last executing test programs: 1m29.929286858s ago: executing program 4 (id=7256): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@ipv4_delroute={0x44, 0x19, 0x901, 0x0, 0x20, {0x2, 0x18, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x1}, [@RTA_DST={0x8, 0x1, @dev}, @RTA_GATEWAY={0x8, 0x5, @rand_addr=0x64010100}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0xc, 0x1, {0x3, 0x8, 0x1, 0x8, 0x2}}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x4}]}, 0x44}}, 0x0) 1m29.006890482s ago: executing program 4 (id=7258): r0 = syz_open_dev$video4linux(&(0x7f0000000040), 0x7, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000180)={0x8ff2263ec52dc727, 0x0, {0x7, 0x2, 0x1002, 0x9, 0x5, 0x7, 0x0, 0x5}}) 1m28.712184121s ago: executing program 1 (id=7261): r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x7, @mcast2}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="ff", 0x1}], 0x1}, 0x40810) 1m28.55411883s ago: executing program 4 (id=7262): r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x5d7000000000000, 0x1) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f00000000c0)) 1m28.21347488s ago: executing program 1 (id=7265): r0 = syz_open_dev$video4linux(&(0x7f0000001dc0), 0x5, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f00000000c0)={0x5, 0x8, @name="250805dd37e6b3c97c004395f931b7154b03a446469e6fc396bb7fee568ac4d3"}) 1m28.141078041s ago: executing program 4 (id=7266): r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x2, @vbi={0x8, 0x7fffffff, 0x7fffffff, 0x30324c4a, [0x5, 0x5], [0x5], 0x13a}}) 1m27.814751408s ago: executing program 1 (id=7269): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) fanotify_init(0xf00, 0x0) 1m27.677561501s ago: executing program 4 (id=7270): r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000140)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x378, &(0x7f00000001c0)=ANY=[@ANYBLOB="b000004e461bf8513f642b7378947430d76d192e4c158412921bbbd958a738c424ea4db191374bafa88a638fe3d432a6fc39226d299134b3cb1f456ec4ce6836e5952c8bfd9425788af7656f4feeebf86446a6b9315d597cc2c16749d0d81dc722c442e9bd2e1c8bf68a0b50ef997cc71926bb4caf98a46dc709fa4be2813044aa4686d3921fe412da50987a87770f0b80ca528f834208e99c58884e97c191f2c94807e3f9b4b2a53d48a36944adf03ed04bd8c231ff004efe"]) 1m26.764468501s ago: executing program 1 (id=7275): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x17, 0xa, 0x801, 0x0, 0x0, {0x2, 0x0, 0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x44010}, 0x8094) 1m25.819947746s ago: executing program 1 (id=7278): r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000070058000b480400945f640094272d7061d328b92d0000000000008000f0fffeffe809000000fff5dd00000010000100040808004149004001040800", 0x58}], 0x1) 1m20.930223196s ago: executing program 0 (id=7282): r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x3a, 0x44, 0x0, 0x0) 1m20.71454589s ago: executing program 0 (id=7284): r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x1, 0x0, &(0x7f0000000040)) 1m20.605194674s ago: executing program 0 (id=7285): r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x25, &(0x7f0000000000), 0x20000010) 1m20.511994788s ago: executing program 0 (id=7286): r0 = io_uring_setup(0x3c54, &(0x7f0000000080)={0x0, 0xfffff000, 0x1, 0x2}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0), 0x0) 1m20.38372186s ago: executing program 0 (id=7287): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00000000ea"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x17, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000087000000000000000618000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000004008500000086000000bf09000000000000550901000000000095000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000008500000006000000bf91000000000000b702000003000000850000002a000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x4d}, 0x94) 1m20.176203579s ago: executing program 0 (id=7288): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000040)=@setlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x464}}}}}}, @IFLA_ADDRESS={0xa, 0x1, @random="ecf1e3f09495"}, @IFLA_MTU={0x8, 0x4, 0x80}]}, 0x5c}}, 0x8000) 1m17.756847659s ago: executing program 1 (id=7289): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newlink={0x40, 0x10, 0x439, 0x70bd2a, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @rand_addr=0x64010100}]}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4008040) 1m14.917469883s ago: executing program 4 (id=7290): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000a40)={0x0, {{0x2, 0x4e24, @multicast1}}}, 0x90) 1m8.364119461s ago: executing program 2 (id=7300): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000001340)=@newtaction={0x490, 0x30, 0x12f, 0x0, 0x0, {}, [{0x47c, 0x1, [@m_police={0x478, 0x1, 0x0, 0x0, {{0xb}, {0x44c, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0xb84, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, 0x0, 0xc74, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffff001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x6, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffff, 0x2, 0x200, 0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x0, 0x0, 0x1}, 0x2, 0x7e222293, 0x4}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x3}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x490}}, 0xc0) 1m3.910796888s ago: executing program 32 (id=7288): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000040)=@setlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x464}}}}}}, @IFLA_ADDRESS={0xa, 0x1, @random="ecf1e3f09495"}, @IFLA_MTU={0x8, 0x4, 0x80}]}, 0x5c}}, 0x8000) 1m2.006824275s ago: executing program 3 (id=7314): r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=@newlink={0x44, 0x10, 0x437, 0x1, 0x25dfdbf8, {0x0, 0x0, 0x0, 0x0, 0x40c89}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @remote}]}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x44801}, 0x0) 1m1.392103462s ago: executing program 33 (id=7289): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newlink={0x40, 0x10, 0x439, 0x70bd2a, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @rand_addr=0x64010100}]}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4008040) 58.436612653s ago: executing program 34 (id=7290): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000a40)={0x0, {{0x2, 0x4e24, @multicast1}}}, 0x90) 53.773280448s ago: executing program 2 (id=7317): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002ec0), 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x60, &(0x7f0000001100)}, 0x10) 53.56393809s ago: executing program 3 (id=7318): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x1, './file1\x00'}, 0x4) 53.244558744s ago: executing program 2 (id=7319): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)={0x118, 0x28, 0x1, 0x4, 0x25dfdbf8, "", [@nested={0x107, 0xf2, 0x0, 0x1, [@typed={0xc, 0x18, 0x0, 0x0, @u64=0xfac08}, @typed={0x14, 0x3c, 0x0, 0x0, @ipv6=@loopback}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb43d9621dc08c029d1608a46cf26fbe816b89f7cb81bff81a8b9482565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875ec58e9a3ddb9ad02a078cf0d972df9e99f079767734f69ce475f00ac64337803f5eb4e5842f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be", @typed={0x8, 0xe9, 0x0, 0x0, @uid}]}]}, 0x118}], 0x1, 0x0, 0x0, 0x1}, 0x0) 52.950157499s ago: executing program 3 (id=7320): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) 52.544234262s ago: executing program 2 (id=7321): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="0100002010ff"}) 52.352942141s ago: executing program 3 (id=7322): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) 50.621518201s ago: executing program 2 (id=7323): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x16, 0x0, 0x8, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) 50.027137419s ago: executing program 2 (id=7324): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 49.64916859s ago: executing program 3 (id=7325): syz_usb_connect(0x0, 0x24, &(0x7f0000000140)=ANY=[@ANYBLOB="12010000cc1ef420890b070064ef000000010902120001000000000904"], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 47.884174058s ago: executing program 3 (id=7326): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0x6}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x40080}, 0x4000c00) 19.391965501s ago: executing program 35 (id=7324): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 0s ago: executing program 36 (id=7326): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0x6}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x40080}, 0x4000c00) kernel console output (not intermixed with test programs): 400 audit(737.851:34428): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5976 comm="syz-executor" opid=5983 ocomm="syz-executor" [ 750.230637][ T38] audit: type=1400 audit(737.860:34429): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 750.230699][ T38] audit: type=1400 audit(737.860:34430): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 750.293862][ T38] audit: type=1400 audit(737.926:34431): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=21259 comm="syz-executor" opid=21259 ocomm="syz-executor" [ 750.321653][ T38] audit: type=1400 audit(737.972:34432): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21259 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 750.321908][ T38] audit: type=1400 audit(737.972:34433): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21259 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 750.322164][ T38] audit: type=1400 audit(737.972:34434): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21259 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 750.322490][ T38] audit: type=1400 audit(737.972:34435): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21259 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 751.164172][ C0] net_ratelimit: 11577 callbacks suppressed [ 751.164197][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 751.164593][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.165224][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 751.165633][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.166210][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 751.166605][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.167159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 751.167562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.168094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 751.168529][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.587965][T21261] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 751.609733][T21261] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 751.611126][T21261] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 751.629805][T21261] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 751.630637][T21261] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 754.164767][T21251] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 754.191587][T21251] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 754.193065][T21251] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 754.194927][T21251] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 754.195789][T21251] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 755.565984][ T38] kauditd_printk_skb: 526 callbacks suppressed [ 755.566007][ T38] audit: type=1400 audit(742.864:34962): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 756.068763][ T38] audit: type=1400 audit(743.341:34963): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 756.519979][ C0] net_ratelimit: 11925 callbacks suppressed [ 756.520003][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 756.520758][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 756.521165][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 756.521707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 756.522102][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 756.522648][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 756.523089][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 756.523645][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 756.524075][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 756.524618][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 756.569046][ T38] audit: type=1400 audit(743.809:34964): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 757.023834][T21261] Bluetooth: hci7: command tx timeout [ 757.025926][ T59] Bluetooth: hci5: command tx timeout [ 757.063830][ T38] audit: type=1400 audit(744.221:34965): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 757.063889][ T38] audit: type=1400 audit(744.268:34966): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="etc" dev="sda1" ino=116 [ 757.063941][ T38] audit: type=1400 audit(744.268:34967): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="sda1" ino=259 [ 757.069734][ T38] audit: type=1400 audit(744.277:34968): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 757.283361][ T38] audit: type=1400 audit(744.389:34969): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5215 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 757.283423][ T38] audit: type=1400 audit(744.483:34970): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 757.283470][ T38] audit: type=1400 audit(744.483:34971): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="lib" dev="sda1" ino=264 [ 758.819799][T21272] netlink: 228 bytes leftover after parsing attributes in process `syz.2.7319'. [ 759.217814][ T5984] Bluetooth: hci5: command tx timeout [ 759.218410][ T5984] Bluetooth: hci7: command tx timeout [ 759.218659][ T5984] Bluetooth: hci6: command tx timeout [ 760.951985][T21249] lo speed is unknown, defaulting to 1000 [ 760.958988][ T38] kauditd_printk_skb: 827 callbacks suppressed [ 760.959008][ T38] audit: type=1400 audit(747.897:35799): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 760.978798][ T38] audit: type=1400 audit(747.934:35800): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 760.980050][ T38] audit: type=1400 audit(747.934:35801): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 760.980103][ T38] audit: type=1400 audit(747.934:35802): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 761.049312][ T38] audit: type=1400 audit(747.981:35803): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 761.049374][ T38] audit: type=1400 audit(747.981:35804): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="etc" dev="sda1" ino=116 [ 761.049415][ T38] audit: type=1400 audit(747.981:35805): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="sda1" ino=259 [ 761.049454][ T38] audit: type=1400 audit(747.990:35806): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5215 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 761.081699][ T38] audit: type=1400 audit(748.018:35807): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 761.081760][ T38] audit: type=1400 audit(748.028:35808): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 761.427588][T20799] Bluetooth: hci6: command tx timeout [ 761.427624][T20799] Bluetooth: hci7: command tx timeout [ 761.427648][T20799] Bluetooth: hci5: command tx timeout [ 761.876168][ C0] net_ratelimit: 11534 callbacks suppressed [ 761.876190][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 761.876747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 761.877173][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 761.877702][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 761.878147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 761.878673][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 761.879139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 761.879697][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 761.880127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 761.880676][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 762.399963][ T5176] usb 4-1: new high-speed USB device number 16 using dummy_hcd [ 762.614103][ T5176] usb 4-1: Using ep0 maxpacket: 32 [ 762.618726][ T5176] usb 4-1: New USB device found, idVendor=0b89, idProduct=0007, bcdDevice=ef.64 [ 762.618759][ T5176] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 762.663301][ T5176] usb 4-1: config 0 descriptor?? [ 762.699784][ T5176] as10x_usb: device has been detected [ 762.700854][ T5176] dvbdev: DVB: registering new adapter (nBox DVB-T Dongle) [ 762.828244][ T5176] usb 4-1: DVB: registering adapter 2 frontend 0 (nBox DVB-T Dongle)... [ 762.944077][ T5176] as10x_usb: error during firmware upload part1 [ 762.944875][ T5176] Registered device nBox DVB-T Dongle [ 763.024375][ T5176] usb 4-1: USB disconnect, device number 16 [ 763.277633][ T5176] Unregistered device nBox DVB-T Dongle [ 763.293968][ T5176] as10x_usb: device has been disconnected [ 763.657676][ T5984] Bluetooth: hci5: command tx timeout [ 763.657754][ T5984] Bluetooth: hci7: command tx timeout [ 763.657780][ T5984] Bluetooth: hci6: command tx timeout [ 763.776772][T21289] netlink: 'syz.3.7326': attribute type 13 has an invalid length. [ 765.874460][T20799] Bluetooth: hci6: command tx timeout [ 766.339205][T21191] bond0: (slave syz_tun): Releasing backup interface [ 766.413679][T21191] syz_tun (unregistering): left allmulticast mode [ 766.584903][ T38] kauditd_printk_skb: 2750 callbacks suppressed [ 766.584925][ T38] audit: type=1400 audit(753.182:38166): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 766.966955][ T38] audit: type=1400 audit(753.537:38167): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5993 comm="syz-executor" opid=21288 ocomm="syz.3.7326" [ 766.967012][ T38] audit: type=1400 audit(753.537:38168): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5993 comm="syz-executor" opid=21288 ocomm="syz.3.7326" [ 767.039653][ T38] audit: type=1400 audit(753.603:38169): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5215 comm="udevd" opid=21209 ocomm="udevd" [ 767.041456][ T38] audit: type=1400 audit(753.612:38170): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5215 comm="udevd" opid=21207 ocomm="udevd" [ 767.041523][ T38] audit: type=1400 audit(753.612:38171): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5215 comm="udevd" opid=21287 ocomm="udevd" [ 767.044328][ T38] audit: type=1400 audit(753.612:38172): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5215 comm="udevd" opid=21208 ocomm="udevd" [ 767.044668][ T38] audit: type=1400 audit(753.612:38173): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5215 comm="udevd" opid=21285 ocomm="udevd" [ 767.046624][ T38] audit: type=1400 audit(753.612:38174): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5215 comm="udevd" opid=21286 ocomm="udevd" [ 767.084759][ T38] audit: type=1400 audit(753.612:38175): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 767.232039][ C0] net_ratelimit: 12168 callbacks suppressed [ 767.232064][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 767.232584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 767.232959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 767.233469][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 767.233852][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 767.234405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 767.234778][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 767.235309][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 767.235662][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 767.236164][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 772.214033][ T38] kauditd_printk_skb: 82 callbacks suppressed [ 772.214058][ T38] audit: type=1400 audit(757.878:38258): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 772.214112][ T38] audit: type=1400 audit(758.345:38259): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 772.224510][ T38] audit: type=1400 audit(758.448:38260): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1 comm="init" name="/" dev="sda1" ino=2 [ 772.224567][ T38] audit: type=1400 audit(758.448:38261): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1 comm="init" name="var" dev="sda1" ino=2001 [ 772.224615][ T38] audit: type=1400 audit(758.448:38262): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1 comm="init" name="var" dev="sda1" ino=2001 [ 772.224661][ T38] audit: type=1400 audit(758.448:38263): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1 comm="init" name="/" dev="sda1" ino=2 [ 772.224706][ T38] audit: type=1400 audit(758.448:38264): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1 comm="init" name="/" dev="tmpfs" ino=1 [ 772.224751][ T38] audit: type=1400 audit(758.448:38265): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=1 comm="init" name="utmp" dev="tmpfs" ino=2 [ 772.224799][ T38] audit: type=1400 audit(758.448:38266): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1 comm="init" name="/" dev="sda1" ino=2 [ 772.224845][ T38] audit: type=1400 audit(758.448:38267): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1 comm="init" name="var" dev="sda1" ino=2001 [ 772.587975][ C1] net_ratelimit: 14841 callbacks suppressed [ 772.587999][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.588190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 772.588609][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 772.588618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.589098][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.589193][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 772.589611][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 772.589704][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.590177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.590217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 777.944164][ C0] net_ratelimit: 20983 callbacks suppressed [ 777.944190][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 777.944247][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.944749][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 777.944813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.945189][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 777.945279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.945750][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 777.945839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.946167][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 777.946243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 779.070986][ T38] kauditd_printk_skb: 28 callbacks suppressed [ 779.071020][ T38] audit: type=1400 audit(764.117:38296): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 781.693440][ T38] audit: type=1400 audit(767.250:38297): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 781.693505][ T38] audit: type=1400 audit(767.278:38298): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 781.693557][ T38] audit: type=1400 audit(767.278:38299): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 781.693606][ T38] audit: type=1400 audit(767.288:38300): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1189 comm="irq/34-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 782.377457][ T38] audit: type=1400 audit(767.727:38301): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 782.866374][ T38] audit: type=1400 audit(768.186:38302): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 783.300195][ C1] net_ratelimit: 21108 callbacks suppressed [ 783.300218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.300355][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 783.300685][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.300718][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 783.301240][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 783.301276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.301653][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 783.301762][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.302219][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 783.302366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.463895][ T38] audit: type=1400 audit(768.925:38303): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 783.747057][ T38] audit: type=1400 audit(769.130:38304): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 784.310483][ T38] audit: type=1400 audit(769.589:38305): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 784.655478][ T38] audit: type=1400 audit(770.075:38306): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5834 comm="syz-executor" opid=5977 ocomm="syz-executor" [ 785.676345][ T38] audit: type=1400 audit(770.094:38307): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 785.676412][ T38] audit: type=1400 audit(770.552:38308): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 785.676462][ T38] audit: type=1400 audit(771.011:38309): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 785.731045][ T38] audit: type=1400 audit(771.085:38310): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5977 comm="syz-executor" opid=5989 ocomm="syz-executor" [ 786.278541][ T38] audit: type=1400 audit(771.478:38311): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 786.717186][ T38] audit: type=1400 audit(771.937:38312): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 787.203426][ T38] audit: type=1400 audit(772.423:38313): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 787.710026][ T38] audit: type=1400 audit(772.881:38314): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 787.958654][ T1324] ieee802154 phy1 wpan1: encryption failed: -22 [ 788.656067][ C0] net_ratelimit: 21421 callbacks suppressed [ 788.656092][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 788.656300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.656645][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 788.656738][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.657056][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 788.657334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.657587][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 788.657731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.657959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 788.658270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 789.716068][ T38] audit: type=1400 audit(774.724:38315): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 790.182737][ T38] kauditd_printk_skb: 5 callbacks suppressed [ 790.182761][ T38] audit: type=1400 audit(775.220:38321): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 790.718532][ T38] audit: type=1400 audit(775.753:38322): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 791.339274][ T38] audit: type=1400 audit(776.165:38323): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 791.709715][ T38] audit: type=1400 audit(776.642:38324): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 793.135328][ T38] audit: type=1400 audit(777.521:38325): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=21306 comm="syz-executor" opid=21306 ocomm="syz-executor" [ 793.135391][ T38] audit: type=1400 audit(777.521:38326): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 793.135438][ T38] audit: type=1400 audit(777.521:38327): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 793.135484][ T38] audit: type=1400 audit(777.521:38328): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 793.135531][ T38] audit: type=1400 audit(777.521:38329): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21306 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 793.135576][ T38] audit: type=1400 audit(777.521:38330): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 794.012035][ C1] net_ratelimit: 21347 callbacks suppressed [ 794.012059][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.012207][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 794.012640][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.012722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 794.013085][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 794.013088][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.013633][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 794.013725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.014039][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 794.014150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.475541][ T38] kauditd_printk_skb: 3 callbacks suppressed [ 798.475561][ T38] audit: type=1400 audit(782.039:38334): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5978 comm="syz-executor" opid=5993 ocomm="syz-executor" [ 798.475612][ T38] audit: type=1400 audit(783.002:38335): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="/" dev="sda1" ino=2 [ 798.480622][ T38] audit: type=1400 audit(783.012:38336): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="/" dev="proc" ino=1 [ 798.480669][ T38] audit: type=1400 audit(783.012:38337): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="/" dev="proc" ino=1 [ 798.480707][ T38] audit: type=1400 audit(783.012:38338): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="21306" dev="proc" ino=57385 [ 798.480744][ T38] audit: type=1400 audit(783.012:38339): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 798.480779][ T38] audit: type=1400 audit(783.012:38340): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 798.480813][ T38] audit: type=1400 audit(783.012:38341): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21306 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 798.480963][ T38] audit: type=1400 audit(783.021:38342): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 798.481180][ T38] audit: type=1400 audit(783.021:38343): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 799.368028][ C0] net_ratelimit: 21490 callbacks suppressed [ 799.368052][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 799.368408][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.368453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 799.368856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.369019][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 799.369420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 799.369465][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.369952][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.370045][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 799.370487][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 804.246381][ T38] kauditd_printk_skb: 63 callbacks suppressed [ 804.246405][ T38] audit: type=1400 audit(788.334:38407): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 804.402771][ T38] audit: type=1400 audit(788.531:38408): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="/" dev="sda1" ino=2 [ 804.402832][ T38] audit: type=1400 audit(788.531:38409): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 804.402879][ T38] audit: type=1400 audit(788.531:38410): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 804.402926][ T38] audit: type=1400 audit(788.531:38411): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21306 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 804.402972][ T38] audit: type=1400 audit(788.531:38412): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21306 comm="syz-executor" name="kcov" dev="debugfs" ino=59 [ 804.403020][ T38] audit: type=1400 audit(788.531:38413): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21306 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 804.403066][ T38] audit: type=1400 audit(788.531:38414): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=21306 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 804.723978][ C0] net_ratelimit: 21059 callbacks suppressed [ 804.724004][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 804.724628][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 804.725044][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 804.725653][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 804.726063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 804.726637][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 804.727159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 804.727748][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 804.728154][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 804.728757][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 804.806807][ T38] audit: type=1400 audit(788.895:38415): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 805.232494][ T38] audit: type=1400 audit(789.279:38416): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 810.080056][ C0] net_ratelimit: 21329 callbacks suppressed [ 810.080082][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 810.080250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.080448][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 810.080641][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.081012][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 810.081333][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.081421][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 810.081732][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.081961][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 810.082321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.395392][ T38] kauditd_printk_skb: 31 callbacks suppressed [ 810.395415][ T38] audit: type=1400 audit(794.124:38448): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 810.794417][ T38] audit: type=1400 audit(794.527:38449): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=21306 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 811.786295][ T38] audit: type=1400 audit(795.425:38450): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 811.786358][ T38] audit: type=1400 audit(795.425:38451): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 811.786407][ T38] audit: type=1400 audit(795.425:38452): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 811.786455][ T38] audit: type=1400 audit(795.425:38453): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 811.860982][ T38] audit: type=1400 audit(795.527:38454): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21308 comm="syz-executor" name="/" dev="sda1" ino=2 [ 811.861255][ T38] audit: type=1400 audit(795.527:38455): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21308 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 811.861501][ T38] audit: type=1400 audit(795.527:38456): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21308 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 [ 811.861887][ T38] audit: type=1400 audit(795.527:38457): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21308 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 [ 812.821682][ T59] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 812.834305][ T59] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 812.836313][ T59] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 812.837709][ T59] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 812.838686][ T59] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 815.435884][ C1] net_ratelimit: 21179 callbacks suppressed [ 815.435910][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.436052][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 815.436439][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 815.436509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.436921][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.437004][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 815.437388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 815.437488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.437894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.437926][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 816.056033][ T38] kauditd_printk_skb: 37 callbacks suppressed [ 816.056055][ T38] audit: type=1400 audit(799.110:38495): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 816.232167][ T38] audit: type=1400 audit(799.578:38496): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 817.640119][ T38] audit: type=1400 audit(800.045:38497): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 817.640182][ T38] audit: type=1400 audit(800.522:38498): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 817.774101][ T38] audit: type=1400 audit(801.018:38499): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 818.261593][ T38] audit: type=1400 audit(801.458:38500): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 819.021698][ T38] audit: type=1400 audit(801.916:38501): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 819.268569][ T38] audit: type=1400 audit(802.384:38502): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 819.700046][ T38] audit: type=1400 audit(802.861:38503): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 820.202546][ T38] audit: type=1400 audit(803.319:38504): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 820.792110][ C1] net_ratelimit: 21571 callbacks suppressed [ 820.792134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.792258][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 820.792553][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.792632][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 820.793139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.793187][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 820.793565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.793577][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 820.794105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 820.794130][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 821.780877][ T38] kauditd_printk_skb: 112 callbacks suppressed [ 821.780901][ T38] audit: type=1400 audit(804.732:38617): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 822.134853][ T5984] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 822.136075][ T38] audit: type=1400 audit(805.134:38618): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 822.136351][ T38] audit: type=1400 audit(805.134:38619): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="tmpfs" ino=1 [ 822.136574][ T38] audit: type=1400 audit(805.134:38620): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 822.136925][ T38] audit: type=1400 audit(805.134:38621): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5215 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 822.137177][ T38] audit: type=1400 audit(805.134:38622): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5215 comm="udevd" name="queue" dev="tmpfs" ino=17084 [ 822.137389][ T38] audit: type=1400 audit(805.134:38623): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5215 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 822.137868][ T5984] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 822.138302][ T5984] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 822.139616][ T5984] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 822.140423][ T5984] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 822.141747][ T38] audit: type=1400 audit(805.153:38624): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=21308 comm="syz-executor" path="socket:[57387]" dev="sockfs" ino=57387 [ 822.268166][ T38] audit: type=1400 audit(805.265:38625): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 822.730908][ T38] audit: type=1400 audit(805.667:38626): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 826.148278][ C0] net_ratelimit: 21620 callbacks suppressed [ 826.148302][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 826.148318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.148734][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.148764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 826.149297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.149341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 826.149689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.149769][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 826.150262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.150371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 827.263883][ T38] kauditd_printk_skb: 13 callbacks suppressed [ 827.263923][ T38] audit: type=1400 audit(809.876:38640): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 827.538780][ T38] audit: type=1400 audit(810.138:38641): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 827.538842][ T38] audit: type=1400 audit(810.138:38642): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="lib" dev="sda1" ino=264 [ 827.538887][ T38] audit: type=1400 audit(810.138:38643): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="sda1" ino=1222 [ 827.773537][ T38] audit: type=1400 audit(810.363:38644): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 828.219584][ T38] audit: type=1400 audit(810.821:38645): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 828.487795][ T38] audit: type=1400 audit(811.083:38646): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5215 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 828.489154][ T38] audit: type=1400 audit(811.083:38647): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 828.489206][ T38] audit: type=1400 audit(811.083:38648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="tmpfs" ino=1 [ 828.489249][ T38] audit: type=1400 audit(811.083:38649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 831.503888][ C0] net_ratelimit: 21050 callbacks suppressed [ 831.503912][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 831.504178][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.504500][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 831.504808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.504909][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 831.505249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.505442][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 831.505809][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 831.505854][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.506268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.764647][ T38] kauditd_printk_skb: 32 callbacks suppressed [ 832.764671][ T38] audit: type=1400 audit(815.049:38682): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 833.258937][ T38] audit: type=1400 audit(815.517:38683): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 833.851380][ T38] audit: type=1400 audit(815.985:38684): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 834.026907][ T38] audit: type=1400 audit(816.134:38685): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=21316 comm="syz-executor" opid=21316 ocomm="syz-executor" [ 834.276266][ T38] audit: type=1400 audit(816.462:38686): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 834.768723][ T38] audit: type=1400 audit(816.508:38687): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 834.768784][ T38] audit: type=1400 audit(816.929:38688): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 834.911900][ T59] Bluetooth: hci0: command tx timeout [ 834.920178][ T38] audit: type=1400 audit(817.098:38689): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 834.920431][ T38] audit: type=1400 audit(817.098:38690): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 834.920751][ T38] audit: type=1400 audit(817.098:38691): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21316 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 836.860013][ C0] net_ratelimit: 21185 callbacks suppressed [ 836.860021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.860037][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 836.860413][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 836.860632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.860943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 836.861117][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.861350][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 836.861751][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.861911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 836.862200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.288023][ T38] kauditd_printk_skb: 19 callbacks suppressed [ 838.288047][ T38] audit: type=1400 audit(820.213:38711): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 838.410928][ T38] audit: type=1400 audit(820.334:38712): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 838.410987][ T38] audit: type=1400 audit(820.334:38713): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 838.411033][ T38] audit: type=1400 audit(820.334:38714): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="syzkaller.PAACij" dev="sda1" ino=2066 [ 838.768476][ T38] audit: type=1400 audit(820.671:38715): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 839.256214][ T59] Bluetooth: hci0: command tx timeout [ 839.336937][ T38] audit: type=1400 audit(821.223:38716): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 839.480828][ T38] audit: type=1400 audit(821.373:38717): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="sda1" ino=2 [ 839.481048][ T38] audit: type=1400 audit(821.373:38718): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 839.481234][ T38] audit: type=1400 audit(821.373:38719): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 839.481427][ T38] audit: type=1400 audit(821.373:38720): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 842.216165][ C0] net_ratelimit: 20812 callbacks suppressed [ 842.216189][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 842.216707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 842.217148][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 842.217344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.217672][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 842.217785][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.218045][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 842.218573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 842.218949][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 842.219472][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 842.952646][ T59] Bluetooth: hci0: command tx timeout [ 844.074599][ T38] kauditd_printk_skb: 121 callbacks suppressed [ 844.074623][ T38] audit: type=1400 audit(825.348:38842): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 844.211812][ T38] audit: type=1400 audit(825.778:38843): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 844.668824][ T38] audit: type=1400 audit(825.825:38844): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 844.668887][ T38] audit: type=1400 audit(826.199:38845): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 845.562064][ T38] audit: type=1400 audit(827.041:38846): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 845.724950][ T59] Bluetooth: hci0: command tx timeout [ 847.354436][ T38] audit: type=1400 audit(828.715:38847): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 847.572280][ C0] net_ratelimit: 15737 callbacks suppressed [ 847.572305][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 847.572708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 847.573238][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 847.573315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.573625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 847.573730][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.574162][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 847.574571][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 847.575099][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 847.575438][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 849.845126][ T38] audit: type=1400 audit(831.007:38848): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 849.845201][ T38] audit: type=1400 audit(831.017:38849): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 849.982093][ T38] audit: type=1400 audit(831.129:38850): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 849.982154][ T38] audit: type=1400 audit(831.129:38851): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 850.337489][ T38] audit: type=1400 audit(831.456:38852): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 850.806701][ T38] audit: type=1400 audit(831.905:38853): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 852.300612][ T38] audit: type=1400 audit(832.822:38854): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 852.928201][ C0] net_ratelimit: 15782 callbacks suppressed [ 852.928224][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 852.928631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.928649][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 852.929065][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.929171][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 852.929613][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 852.930141][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 852.930534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 852.930716][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.931088][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 854.381658][ T38] audit: type=1400 audit(835.235:38855): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 854.531334][ T38] audit: type=1400 audit(835.235:38856): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 855.277215][ T38] audit: type=1400 audit(835.665:38857): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 855.277279][ T38] audit: type=1400 audit(836.124:38858): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 856.776514][ T38] audit: type=1400 audit(836.199:38859): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="sda1" ino=2 [ 856.776575][ T38] audit: type=1400 audit(836.610:38860): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 856.776624][ T38] audit: type=1400 audit(837.069:38861): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 856.776675][ T38] audit: type=1400 audit(837.536:38862): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 856.776721][ T38] audit: type=1400 audit(837.536:38863): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 856.776765][ T38] audit: type=1400 audit(837.536:38864): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 856.776810][ T38] audit: type=1400 audit(837.536:38865): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21316 comm="syz-executor" name="kcov" dev="debugfs" ino=59 [ 856.939873][ T38] audit: type=1400 audit(837.649:38866): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 858.283908][ C1] net_ratelimit: 15876 callbacks suppressed [ 858.283931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 858.284173][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 858.284341][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 858.284583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 858.285154][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 858.285520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 858.286067][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 858.286069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 858.286442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 858.286484][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.023503][ T38] kauditd_printk_skb: 16 callbacks suppressed [ 862.023525][ T38] audit: type=1400 audit(839.650:38883): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 862.023573][ T38] audit: type=1400 audit(839.650:38884): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="lib" dev="sda1" ino=264 [ 862.023619][ T38] audit: type=1400 audit(839.650:38885): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="sda1" ino=1222 [ 862.023662][ T38] audit: type=1400 audit(839.650:38886): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5215 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 862.023707][ T38] audit: type=1400 audit(839.650:38887): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 862.023769][ T38] audit: type=1400 audit(839.650:38888): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="tmpfs" ino=1 [ 862.023815][ T38] audit: type=1400 audit(839.650:38889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 862.023872][ T38] audit: type=1400 audit(839.650:38890): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5215 comm="udevd" path="/run/udev/rules.d" dev="tmpfs" ino=11 [ 862.023919][ T38] audit: type=1400 audit(839.650:38891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 862.023964][ T38] audit: type=1400 audit(839.650:38892): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="lib" dev="sda1" ino=264 [ 863.639857][ C0] net_ratelimit: 16386 callbacks suppressed [ 863.639881][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 863.640338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 863.640416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 863.640749][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 863.640813][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 863.641349][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 863.641746][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 863.641884][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 863.642276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 863.642644][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 867.387178][ T38] kauditd_printk_skb: 145 callbacks suppressed [ 867.387203][ T38] audit: type=1400 audit(847.405:39038): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 867.860619][ T38] audit: type=1400 audit(847.882:39039): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 867.958388][ T38] audit: type=1400 audit(847.966:39040): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="lib" dev="sda1" ino=264 [ 867.958449][ T38] audit: type=1400 audit(847.985:39041): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="sda1" ino=1222 [ 867.958496][ T38] audit: type=1400 audit(847.985:39042): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5215 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 867.958543][ T38] audit: type=1400 audit(847.985:39043): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 867.958588][ T38] audit: type=1400 audit(847.985:39044): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="usr" dev="sda1" ino=1480 [ 867.958635][ T38] audit: type=1400 audit(847.985:39045): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="lib" dev="sda1" ino=1642 [ 867.958681][ T38] audit: type=1400 audit(847.985:39046): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 867.958735][ T38] audit: type=1400 audit(847.985:39047): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="usr" dev="sda1" ino=1480 [ 868.996348][ C0] net_ratelimit: 16946 callbacks suppressed [ 868.996377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 868.996825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 868.997407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 868.997815][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 868.998432][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 868.998862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 868.999407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 868.999834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 869.000424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 869.000819][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 873.753174][ T38] kauditd_printk_skb: 34 callbacks suppressed [ 873.753198][ T38] audit: type=1400 audit(852.269:39082): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21325 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 873.753248][ T38] audit: type=1400 audit(852.269:39083): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21325 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 873.753293][ T38] audit: type=1400 audit(852.269:39084): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=21325 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 873.806636][ T38] audit: type=1400 audit(853.457:39085): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 873.806707][ T38] audit: type=1400 audit(853.457:39086): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 873.806755][ T38] audit: type=1400 audit(853.457:39087): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 873.806802][ T38] audit: type=1400 audit(853.457:39088): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21321 comm="syz-executor" name="kcov" dev="debugfs" ino=59 [ 874.352198][ C0] net_ratelimit: 17198 callbacks suppressed [ 874.352222][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 874.352643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 874.352841][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 874.353154][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 874.353257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 874.353516][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 874.354021][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 874.354397][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 874.354424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 874.354929][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 874.535324][ T38] audit: type=1400 audit(854.140:39089): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21321 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 874.535808][ T38] audit: type=1400 audit(854.158:39090): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=21321 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 875.082376][ T38] audit: type=1400 audit(854.561:39091): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1032 comm="irq/29-virtio0-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 879.342581][ T38] kauditd_printk_skb: 34 callbacks suppressed [ 879.342603][ T38] audit: type=1400 audit(858.648:39126): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 879.617007][ T38] audit: type=1400 audit(858.826:39127): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5215 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 879.622144][ T38] audit: type=1400 audit(858.910:39128): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 879.622199][ T38] audit: type=1400 audit(858.910:39129): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="lib" dev="sda1" ino=264 [ 879.622307][ T38] audit: type=1400 audit(858.910:39130): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="sda1" ino=1222 [ 879.633046][ T38] audit: type=1400 audit(858.920:39131): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 879.633104][ T38] audit: type=1400 audit(858.920:39132): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 879.633152][ T38] audit: type=1400 audit(858.920:39133): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="syzkaller.D7mKTA" dev="sda1" ino=2068 [ 879.707988][ C0] net_ratelimit: 16899 callbacks suppressed [ 879.708009][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 879.708412][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 879.708720][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 879.709146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 879.709455][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 879.709876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 879.710154][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 879.710606][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 879.710927][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 879.711464][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 880.098177][ T38] audit: type=1400 audit(858.957:39134): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="sda1" ino=2 [ 880.098236][ T38] audit: type=1400 audit(859.275:39135): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 880.193870][ T1324] ieee802154 phy1 wpan1: encryption failed: -22 [ 884.732486][ T38] kauditd_printk_skb: 54 callbacks suppressed [ 884.732508][ T38] audit: type=1400 audit(863.690:39190): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="/" dev="sda1" ino=2 [ 884.732557][ T38] audit: type=1400 audit(863.690:39191): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="/" dev="sda1" ino=2 [ 885.063872][ C0] net_ratelimit: 17624 callbacks suppressed [ 885.063897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 885.064034][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 885.064304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 885.064865][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 885.065181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 885.065385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 885.065895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 885.066147][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 885.066255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 885.066554][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 885.166432][ T38] audit: type=1400 audit(863.699:39192): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 885.166494][ T38] audit: type=1400 audit(863.699:39193): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 885.166542][ T38] audit: type=1400 audit(863.699:39194): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 885.166588][ T38] audit: type=1400 audit(863.699:39195): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21321 comm="syz-executor" name="kcov" dev="debugfs" ino=59 [ 885.166636][ T38] audit: type=1400 audit(863.699:39196): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21321 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 885.166684][ T38] audit: type=1400 audit(863.699:39197): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=21321 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 885.166731][ T38] audit: type=1400 audit(863.802:39198): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 885.389711][ T38] audit: type=1400 audit(864.261:39199): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 890.419953][ C0] net_ratelimit: 17483 callbacks suppressed [ 890.419977][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 890.420222][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 890.420499][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 890.420611][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 890.420885][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 890.421100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 890.421414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 890.421791][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 890.422277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 890.422346][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 890.532219][ T38] kauditd_printk_skb: 62 callbacks suppressed [ 890.532244][ T38] audit: type=1400 audit(868.947:39262): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 890.731926][ T38] audit: type=1400 audit(869.312:39263): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5834 comm="syz-executor" opid=21306 ocomm="syz-executor" [ 890.761967][ T38] audit: type=1400 audit(869.321:39264): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="sda1" ino=2 [ 890.762022][ T38] audit: type=1400 audit(869.321:39265): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 890.762067][ T38] audit: type=1400 audit(869.331:39266): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21325 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 890.762111][ T38] audit: type=1400 audit(869.331:39267): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 890.762164][ T38] audit: type=1400 audit(869.331:39268): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 890.762209][ T38] audit: type=1400 audit(869.331:39269): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21316 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 890.762253][ T38] audit: type=1400 audit(869.331:39270): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21316 comm="syz-executor" name="kcov" dev="debugfs" ino=59 [ 890.762298][ T38] audit: type=1400 audit(869.331:39271): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21316 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 894.836346][T21251] Bluetooth: hci7: command 0x0406 tx timeout [ 894.836488][T21251] Bluetooth: hci5: command 0x0406 tx timeout [ 894.836516][T21251] Bluetooth: hci6: command 0x0406 tx timeout [ 895.776019][ C0] net_ratelimit: 17493 callbacks suppressed [ 895.776041][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 895.776461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 895.776752][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 895.777141][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 895.777417][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 895.777851][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 895.778155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 895.778545][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 895.778740][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 895.779087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 896.000507][ T38] kauditd_printk_skb: 106 callbacks suppressed [ 896.000533][ T38] audit: type=1400 audit(874.101:39378): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 896.401832][ T38] audit: type=1400 audit(874.513:39379): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 896.401902][ T38] audit: type=1400 audit(874.569:39380): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 896.777716][ T38] audit: type=1400 audit(874.924:39381): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 897.838597][ T38] audit: type=1400 audit(875.757:39382): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 898.143744][ T38] audit: type=1400 audit(876.215:39383): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 898.143806][ T38] audit: type=1400 audit(876.215:39384): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="tmpfs" ino=1 [ 898.143852][ T38] audit: type=1400 audit(876.215:39385): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 899.463222][ T38] audit: type=1400 audit(877.384:39386): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 900.105534][ T38] audit: type=1400 audit(877.740:39387): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 901.131978][ C0] net_ratelimit: 17852 callbacks suppressed [ 901.132003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 901.132158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 901.132418][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 901.132574][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 901.132933][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 901.133042][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 901.133305][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 901.133848][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 901.134153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 901.134256][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 901.563234][ T38] kauditd_printk_skb: 3 callbacks suppressed [ 901.563256][ T38] audit: type=1400 audit(879.264:39391): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 902.001159][ T38] audit: type=1400 audit(879.742:39392): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 902.492932][ T38] audit: type=1400 audit(880.200:39393): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 903.117116][ T38] audit: type=1400 audit(880.677:39394): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 903.403505][ T38] audit: type=1400 audit(881.145:39395): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 904.570168][ T38] audit: type=1400 audit(881.622:39396): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 904.570228][ T38] audit: type=1400 audit(882.089:39397): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 905.552208][ T38] audit: type=1400 audit(882.557:39398): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 905.552269][ T38] audit: type=1400 audit(883.006:39399): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 906.487858][ C0] net_ratelimit: 17939 callbacks suppressed [ 906.487882][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 906.488414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 906.488567][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.488796][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 906.488970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 906.489367][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 906.489712][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 906.489869][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.490253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 906.490625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 907.636369][ T38] audit: type=1400 audit(883.492:39400): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 907.636431][ T38] audit: type=1400 audit(883.951:39401): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 907.636482][ T38] audit: type=1400 audit(884.428:39402): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 907.636532][ T38] audit: type=1400 audit(884.596:39403): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="/" dev="sda1" ino=2 [ 907.636581][ T38] audit: type=1400 audit(884.596:39404): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 907.636627][ T38] audit: type=1400 audit(884.596:39405): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 907.636675][ T38] audit: type=1400 audit(884.596:39406): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 907.636722][ T38] audit: type=1400 audit(884.596:39407): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21322 comm="syz-executor" name="kcov" dev="debugfs" ino=59 [ 907.636780][ T38] audit: type=1400 audit(884.961:39408): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 907.663804][ T38] audit: type=1400 audit(885.129:39409): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="/" dev="sda1" ino=2 [ 911.843967][ C0] net_ratelimit: 17547 callbacks suppressed [ 911.843991][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 911.844366][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 911.844583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.844896][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 911.844984][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 911.845288][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 911.845487][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.845817][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 911.846220][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 911.846689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 913.218632][ T38] kauditd_printk_skb: 24 callbacks suppressed [ 913.218654][ T38] audit: type=1400 audit(890.340:39434): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="/" dev="sda1" ino=2 [ 913.218945][ T38] audit: type=1400 audit(890.340:39435): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 913.219199][ T38] audit: type=1400 audit(890.340:39436): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 913.219489][ T38] audit: type=1400 audit(890.340:39437): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21321 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 913.219735][ T38] audit: type=1400 audit(890.340:39438): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21321 comm="syz-executor" name="kcov" dev="debugfs" ino=59 [ 913.220157][ T38] audit: type=1400 audit(890.340:39439): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21321 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 913.220626][ T38] audit: type=1400 audit(890.340:39440): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=21321 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 913.442164][ T38] audit: type=1400 audit(890.508:39441): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 914.270623][ T38] audit: type=1400 audit(890.985:39442): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 914.281278][ T38] audit: type=1400 audit(891.331:39443): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21325 comm="syz-executor" name="/" dev="sda1" ino=2 [ 917.199844][ C1] net_ratelimit: 17298 callbacks suppressed [ 917.199867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 917.199865][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 917.200215][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 917.200261][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 917.200712][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 917.200717][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 917.201413][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 917.201795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 917.201948][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 917.202316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 919.198953][ T38] kauditd_printk_skb: 15 callbacks suppressed [ 919.198981][ T38] audit: type=1400 audit(894.745:39459): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 919.199036][ T38] audit: type=1400 audit(895.213:39460): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 919.199085][ T38] audit: type=1400 audit(895.728:39461): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1032 comm="irq/29-virtio0-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 919.237471][ T38] audit: type=1400 audit(895.971:39462): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=21321 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 919.445603][ T38] audit: type=1400 audit(896.148:39463): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 919.978766][ T38] audit: type=1400 audit(896.616:39464): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 920.438179][ T38] audit: type=1400 audit(897.074:39465): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 920.936240][ T38] audit: type=1400 audit(897.542:39466): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 921.475364][ T38] audit: type=1400 audit(898.019:39467): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 921.940967][ T38] audit: type=1400 audit(898.459:39468): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 922.555879][ C0] net_ratelimit: 17686 callbacks suppressed [ 922.555902][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 922.556261][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 922.556550][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 922.556776][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 922.556937][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 922.557137][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 922.557456][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 922.557648][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 922.558070][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 922.558509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 924.937273][ T38] kauditd_printk_skb: 14 callbacks suppressed [ 924.937296][ T38] audit: type=1400 audit(901.293:39483): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 925.093603][ T38] audit: type=1400 audit(901.387:39484): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="/" dev="sda1" ino=2 [ 925.093665][ T38] audit: type=1400 audit(901.387:39485): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 925.093710][ T38] audit: type=1400 audit(901.387:39486): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 925.093754][ T38] audit: type=1400 audit(901.387:39487): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 925.093797][ T38] audit: type=1400 audit(901.387:39488): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21322 comm="syz-executor" name="kcov" dev="debugfs" ino=59 [ 925.093843][ T38] audit: type=1400 audit(901.387:39489): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21322 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 925.093886][ T38] audit: type=1400 audit(901.387:39490): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=21322 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 925.448231][ T38] audit: type=1400 audit(901.761:39491): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 925.952215][ T38] audit: type=1400 audit(902.238:39492): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 927.911929][ C1] net_ratelimit: 17596 callbacks suppressed [ 927.911963][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 927.912067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 927.912356][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 927.912432][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 927.912838][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 927.912945][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 927.913345][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 927.913849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 927.913928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 927.914273][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 931.178958][ T38] kauditd_printk_skb: 46 callbacks suppressed [ 931.178982][ T38] audit: type=1400 audit(906.438:39539): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 931.179036][ T38] audit: type=1400 audit(906.915:39540): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 931.193817][ T38] audit: type=1400 audit(907.139:39541): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 931.193877][ T38] audit: type=1400 audit(907.139:39542): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="etc" dev="sda1" ino=116 [ 931.193927][ T38] audit: type=1400 audit(907.139:39543): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="udev" dev="sda1" ino=259 [ 931.610078][ T38] audit: type=1400 audit(907.504:39544): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 931.610141][ T38] audit: type=1400 audit(907.504:39545): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 931.884108][ T38] audit: type=1400 audit(907.785:39546): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="/" dev="sda1" ino=2 [ 931.884169][ T38] audit: type=1400 audit(907.785:39547): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 931.884218][ T38] audit: type=1400 audit(907.785:39548): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21322 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 933.267920][ C1] net_ratelimit: 17860 callbacks suppressed [ 933.267943][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 933.268009][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 933.268342][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 933.268375][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 933.268851][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 933.268937][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 933.269317][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 933.269894][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 933.270009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 933.270304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 934.227167][ T1324] ieee802154 phy1 wpan1: encryption failed: -22 [ 937.040637][ T38] kauditd_printk_skb: 15 callbacks suppressed [ 937.040662][ T38] audit: type=1400 audit(912.069:39564): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 937.040714][ T38] audit: type=1400 audit(912.537:39565): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 937.491954][ T38] audit: type=1400 audit(912.995:39566): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 938.013487][ T38] audit: type=1400 audit(913.472:39567): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 938.492302][ T38] audit: type=1400 audit(913.958:39568): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 938.623855][ C0] net_ratelimit: 18180 callbacks suppressed [ 938.623880][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 938.623969][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 938.624267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 938.625016][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 938.625098][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 938.625435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 938.625956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 938.626114][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 938.626347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 938.626501][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 940.533984][ T38] audit: type=1400 audit(914.398:39569): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1188 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 940.534049][ T38] audit: type=1400 audit(914.875:39570): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 940.534101][ T38] audit: type=1400 audit(915.352:39571): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 940.534151][ T38] audit: type=1400 audit(915.352:39572): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 940.534210][ T38] audit: type=1400 audit(915.792:39573): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 943.608815][ T38] kauditd_printk_skb: 2 callbacks suppressed [ 943.608839][ T38] audit: type=1400 audit(918.738:39576): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.149 dest=44050 netif=eth0 [ 943.979812][ C0] net_ratelimit: 17818 callbacks suppressed [ 943.979835][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 943.979849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 943.980361][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 943.980426][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 943.980787][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 943.981318][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 943.981430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 943.981694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 943.982203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:3b:7d:86:8f:f4, vlan:0) [ 943.982392][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 946.435816][ T39] INFO: task kworker/u8:5:156 blocked for more than 154 seconds. [ 946.435843][ T39] Not tainted syzkaller #0 [ 946.435856][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.435867][ T39] task:kworker/u8:5 state:D stack:20088 pid:156 tgid:156 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 946.435927][ T39] Workqueue: netns cleanup_[ 946.435927][ T39] Workqueue: netns cleanup_net [ 946.435963][ T39] Call Trace: [ 946.435972][ T39] [ 946.435988][ T39] __schedule+0x16f3/0x4c20 [ 946.436051][ T39] ? __pfx___schedule+0x10/0x10 [ 946.436105][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.436154][ T39] rt_mutex_schedule+0x77/0xf0 [ 946.436176][ T39] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 946.436203][ T39] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 946.436248][ T39] rt_mutex_slowlock+0x2b1/0x6e0 [ 946.436278][ T39] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 946.436305][ T39] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 946.436330][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.436369][ T39] ? wg_netns_pre_exit+0x1c/0x1d0 [ 946.436399][ T39] ? net_generic+0x1e/0x240 [ 946.436430][ T39] ? wg_netns_pre_exit+0x1c/0x1d0 [ 946.436452][ T39] mutex_lock_nested+0x16a/0x1d0 [ 946.436492][ T39] wg_netns_pre_exit+0x1c/0x1d0 [ 946.436521][ T39] ops_undo_list+0x187/0x990 [ 946.436559][ T39] ? __pfx_ops_undo_list+0x10/0x10 [ 946.436601][ T39] cleanup_net+0x4cb/0x800 [ 946.436634][ T39] ? __pfx_cleanup_net+0x10/0x10 [ 946.436667][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.436696][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.436724][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.436753][ T39] process_scheduled_works+0xae1/0x17b0 [ 946.436827][ T39] ? __pfx_process_scheduled_works+0x10/0x10 [ 946.436875][ T39] worker_thread+0x8a0/0xda0 [ 946.436908][ T39] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 946.436954][ T39] ? __kthread_parkme+0x7b/0x200 [ 946.436995][ T39] kthread+0x711/0x8a0 [ 946.437033][ T39] ? __pfx_worker_thread+0x10/0x10 [ 946.437061][ T39] ? __pfx_kthread+0x10/0x10 [ 946.437100][ T39] ? __pfx_kthread+0x10/0x10 [ 946.437135][ T39] ret_from_fork+0x436/0x7d0 [ 946.437167][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 946.437203][ T39] ? __switch_to_asm+0x39/0x70 [ 946.437224][ T39] ? __switch_to_asm+0x33/0x70 [ 946.437256][ T39] ? __pfx_kthread+0x10/0x10 [ 946.437288][ T39] ret_from_fork_asm+0x1a/0x30 [ 946.437325][ T39] [ 946.437434][ T39] INFO: task kworker/0:5:6054 blocked for more than 154 seconds. [ 946.437450][ T39] Not tainted syzkaller #0 [ 946.437460][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.437470][ T39] task:kworker/0:5 state:D stack:18792 pid:6054 tgid:6054 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 946.437530][ T39] Workqueue: events_power_efficient reg_check_chans_work [ 946.437553][ T39] Call Trace: [ 946.437560][ T39] [ 946.437573][ T39] __schedule+0x16f3/0x4c20 [ 946.437616][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.437656][ T39] ? __pfx___schedule+0x10/0x10 [ 946.437705][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.437741][ T39] rt_mutex_schedule+0x77/0xf0 [ 946.437762][ T39] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 946.437788][ T39] ? task_blocks_on_rt_mutex+0xf04/0x1380 [ 946.437832][ T39] rt_mutex_slowlock+0x2b1/0x6e0 [ 946.437861][ T39] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 946.437888][ T39] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 946.437912][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.437950][ T39] ? reg_check_chans_work+0x95/0xf30 [ 946.437975][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.438008][ T39] ? reg_check_chans_work+0x95/0xf30 [ 946.438026][ T39] mutex_lock_nested+0x16a/0x1d0 [ 946.438052][ T39] ? do_raw_spin_lock+0x121/0x290 [ 946.438081][ T39] reg_check_chans_work+0x95/0xf30 [ 946.438108][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.438143][ T39] ? __pfx_reg_check_chans_work+0x10/0x10 [ 946.438164][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.438197][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.438229][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.438254][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.438282][ T39] process_scheduled_works+0xae1/0x17b0 [ 946.438350][ T39] ? __pfx_process_scheduled_works+0x10/0x10 [ 946.438396][ T39] worker_thread+0x8a0/0xda0 [ 946.438451][ T39] kthread+0x711/0x8a0 [ 946.438492][ T39] ? __pfx_worker_thread+0x10/0x10 [ 946.438520][ T39] ? __pfx_kthread+0x10/0x10 [ 946.438604][ T39] ? __pfx_kthread+0x10/0x10 [ 946.438638][ T39] ret_from_fork+0x436/0x7d0 [ 946.438669][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 946.438703][ T39] ? __switch_to_asm+0x39/0x70 [ 946.438722][ T39] ? __switch_to_asm+0x33/0x70 [ 946.438741][ T39] ? __pfx_kthread+0x10/0x10 [ 946.438774][ T39] ret_from_fork_asm+0x1a/0x30 [ 946.438811][ T39] [ 946.438823][ T39] INFO: task kworker/1:4:6061 blocked for more than 154 seconds. [ 946.438837][ T39] Not tainted syzkaller #0 [ 946.438848][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.438858][ T39] task:kworker/1:4 state:D stack:20232 pid:6061 tgid:6061 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 946.438912][ T39] Workqueue: events switchdev_deferred_process_work [ 946.438935][ T39] Call Trace: [ 946.438943][ T39] [ 946.438956][ T39] __schedule+0x16f3/0x4c20 [ 946.439013][ T39] ? __pfx___schedule+0x10/0x10 [ 946.439062][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.439096][ T39] rt_mutex_schedule+0x77/0xf0 [ 946.439116][ T39] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 946.439142][ T39] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 946.439186][ T39] rt_mutex_slowlock+0x2b1/0x6e0 [ 946.439216][ T39] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 946.439244][ T39] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 946.439282][ T39] ? switchdev_deferred_process_work+0xe/0x20 [ 946.439312][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.439344][ T39] ? switchdev_deferred_process_work+0xe/0x20 [ 946.439366][ T39] mutex_lock_nested+0x16a/0x1d0 [ 946.439391][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.439423][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.439451][ T39] switchdev_deferred_process_work+0xe/0x20 [ 946.439473][ T39] process_scheduled_works+0xae1/0x17b0 [ 946.439536][ T39] ? __pfx_process_scheduled_works+0x10/0x10 [ 946.439580][ T39] worker_thread+0x8a0/0xda0 [ 946.439621][ T39] ? __kthread_parkme+0x7b/0x200 [ 946.439661][ T39] kthread+0x711/0x8a0 [ 946.439696][ T39] ? __pfx_worker_thread+0x10/0x10 [ 946.439741][ T39] ? __pfx_kthread+0x10/0x10 [ 946.439780][ T39] ? __pfx_kthread+0x10/0x10 [ 946.439815][ T39] ret_from_fork+0x436/0x7d0 [ 946.439847][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 946.439883][ T39] ? __switch_to_asm+0x39/0x70 [ 946.439904][ T39] ? __switch_to_asm+0x33/0x70 [ 946.439924][ T39] ? __pfx_kthread+0x10/0x10 [ 946.439958][ T39] ret_from_fork_asm+0x1a/0x30 [ 946.439998][ T39] [ 946.440014][ T39] INFO: task kworker/u8:3:16921 blocked for more than 154 seconds. [ 946.440030][ T39] Not tainted syzkaller #0 [ 946.440042][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.440052][ T39] task:kworker/u8:3 state:D stack:21000 pid:16921 tgid:16921 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 946.440109][ T39] Workqueue: events_unbound linkwatch_event [ 946.440133][ T39] Call Trace: [ 946.440141][ T39] [ 946.440155][ T39] __schedule+0x16f3/0x4c20 [ 946.440199][ T39] ? ret_from_fork_asm+0x1a/0x30 [ 946.440238][ T39] ? __pfx___schedule+0x10/0x10 [ 946.440290][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.440327][ T39] rt_mutex_schedule+0x77/0xf0 [ 946.440348][ T39] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 946.440377][ T39] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 946.440424][ T39] rt_mutex_slowlock+0x2b1/0x6e0 [ 946.440454][ T39] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 946.440490][ T39] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 946.440531][ T39] ? linkwatch_event+0xe/0x60 [ 946.440562][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.440596][ T39] ? linkwatch_event+0xe/0x60 [ 946.440617][ T39] mutex_lock_nested+0x16a/0x1d0 [ 946.440642][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.440676][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.440707][ T39] linkwatch_event+0xe/0x60 [ 946.440729][ T39] process_scheduled_works+0xae1/0x17b0 [ 946.440789][ T39] ? __pfx_process_scheduled_works+0x10/0x10 [ 946.440856][ T39] worker_thread+0x8a0/0xda0 [ 946.440889][ T39] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 946.440936][ T39] ? __kthread_parkme+0x7b/0x200 [ 946.440991][ T39] kthread+0x711/0x8a0 [ 946.441028][ T39] ? __pfx_worker_thread+0x10/0x10 [ 946.441057][ T39] ? __pfx_kthread+0x10/0x10 [ 946.441096][ T39] ? __pfx_kthread+0x10/0x10 [ 946.441131][ T39] ret_from_fork+0x436/0x7d0 [ 946.441163][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 946.441199][ T39] ? __switch_to_asm+0x39/0x70 [ 946.441220][ T39] ? __switch_to_asm+0x33/0x70 [ 946.441240][ T39] ? __pfx_kthread+0x10/0x10 [ 946.441275][ T39] ret_from_fork_asm+0x1a/0x30 [ 946.441315][ T39] [ 946.441330][ T39] INFO: task kworker/u8:13:21171 blocked for more than 154 seconds. [ 946.441346][ T39] Not tainted syzkaller #0 [ 946.441358][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.441369][ T39] task:kworker/u8:13 state:D stack:20696 pid:21171 tgid:21171 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 946.441426][ T39] Workqueue: ipv6_addrconf addrconf_verify_work [ 946.441455][ T39] Call Trace: [ 946.441463][ T39] [ 946.441477][ T39] __schedule+0x16f3/0x4c20 [ 946.441530][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.441572][ T39] ? __pfx___schedule+0x10/0x10 [ 946.441625][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.441662][ T39] rt_mutex_schedule+0x77/0xf0 [ 946.441683][ T39] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 946.441712][ T39] ? task_blocks_on_rt_mutex+0xf04/0x1380 [ 946.441760][ T39] rt_mutex_slowlock+0x2b1/0x6e0 [ 946.441792][ T39] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 946.441820][ T39] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 946.441861][ T39] ? addrconf_verify_work+0x19/0x30 [ 946.441896][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.441948][ T39] ? addrconf_verify_work+0x19/0x30 [ 946.441974][ T39] mutex_lock_nested+0x16a/0x1d0 [ 946.442002][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.442042][ T39] addrconf_verify_work+0x19/0x30 [ 946.442069][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 946.442094][ T39] process_scheduled_works+0xae1/0x17b0 [ 946.442156][ T39] ? __pfx_process_scheduled_works+0x10/0x10 [ 946.442205][ T39] worker_thread+0x8a0/0xda0 [ 946.442239][ T39] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 946.442301][ T39] ? __kthread_parkme+0x7b/0x200 [ 946.442345][ T39] kthread+0x711/0x8a0 [ 946.442384][ T39] ? __pfx_worker_thread+0x10/0x10 [ 946.442412][ T39] ? __pfx_kthread+0x10/0x10 [ 946.442453][ T39] ? __pfx_kthread+0x10/0x10 [ 946.442496][ T39] ret_from_fork+0x436/0x7d0 [ 946.442530][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 946.442567][ T39] ? __switch_to_asm+0x39/0x70 [ 946.442589][ T39] ? __switch_to_asm+0x33/0x70 [ 946.442609][ T39] ? __pfx_kthread+0x10/0x10 [ 946.442645][ T39] ret_from_fork_asm+0x1a/0x30 [ 946.442686][ T39] [ 946.442697][ T39] INFO: task syz-executor:21249 blocked for more than 154 seconds. [ 946.442714][ T39] Not tainted syzkaller #0 [ 946.442726][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.442737][ T39] task:syz-executor state:D stack:23912 pid:21249 tgid:21249 ppid:1 task_flags:0x400140 flags:0x00004006 [ 946.442798][ T39] Call Trace: [ 946.442807][ T39] [ 946.442822][ T39] __schedule+0x16f3/0x4c20 [ 946.442868][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.442913][ T39] ? __pfx___schedule+0x10/0x10 [ 946.442967][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.443005][ T39] rt_mutex_schedule+0x77/0xf0 [ 946.443027][ T39] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 946.443057][ T39] ? task_blocks_on_rt_mutex+0xf04/0x1380 [ 946.443106][ T39] rt_mutex_slowlock+0x2b1/0x6e0 [ 946.443138][ T39] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 946.443168][ T39] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 946.443195][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.443238][ T39] ? ip_tunnel_init_net+0x2ab/0x800 [ 946.443283][ T39] ? ip_tunnel_init_net+0x2ab/0x800 [ 946.443309][ T39] mutex_lock_nested+0x16a/0x1d0 [ 946.443344][ T39] ip_tunnel_init_net+0x2ab/0x800 [ 946.443381][ T39] ? __pfx_ip_tunnel_init_net+0x10/0x10 [ 946.443430][ T39] ops_init+0x35c/0x5c0 [ 946.443474][ T39] setup_net+0x10c/0x320 [ 946.443525][ T39] ? copy_net_ns+0x304/0x4d0 [ 946.443555][ T39] ? __pfx_setup_net+0x10/0x10 [ 946.443590][ T39] ? __mutex_rt_init+0x3b/0x50 [ 946.443620][ T39] copy_net_ns+0x31b/0x4d0 [ 946.443673][ T39] create_new_namespaces+0x3f3/0x720 [ 946.443708][ T39] ? security_capable+0x7e/0x2e0 [ 946.443751][ T39] unshare_nsproxy_namespaces+0x11c/0x170 [ 946.443786][ T39] ksys_unshare+0x4c8/0x8c0 [ 946.443828][ T39] ? __pfx_ksys_unshare+0x10/0x10 [ 946.443863][ T39] ? rt_spin_unlock+0x65/0x80 [ 946.443905][ T39] __x64_sys_unshare+0x38/0x50 [ 946.443945][ T39] do_syscall_64+0xfa/0x3b0 [ 946.443966][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 946.444001][ T39] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.444025][ T39] ? clear_bhb_loop+0x60/0xb0 [ 946.444053][ T39] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.444077][ T39] RIP: 0033:0x7ff75cb006c7 [ 946.444098][ T39] RSP: 002b:00007ffee0fc4f58 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 946.444122][ T39] RAX: ffffffffffffffda RBX: 00007ff75cd55f40 RCX: 00007ff75cb006c7 [ 946.444140][ T39] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 946.444155][ T39] RBP: 00007ff75cd567b8 R08: 0000000000000000 R09: 0000000000000000 [ 946.444171][ T39] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000008 [ 946.444185][ T39] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 946.444219][ T39] [ 946.444229][ T39] INFO: task syz-executor:21260 blocked for more than 154 seconds. [ 946.444246][ T39] Not tainted syzkaller #0 [ 946.444258][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.444269][ T39] task:syz-executor state:D stack:23432 pid:21260 tgid:21260 ppid:1 task_flags:0x400140 flags:0x00004006 [ 946.444328][ T39] Call Trace: [ 946.444336][ T39] [ 946.444351][ T39] __schedule+0x16f3/0x4c20 [ 946.444413][ T39] ? __pfx___schedule+0x10/0x10 [ 946.444467][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.444516][ T39] rt_mutex_schedule+0x77/0xf0 [ 946.444538][ T39] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 946.444567][ T39] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 946.444616][ T39] rt_mutex_slowlock+0x2b1/0x6e0 [ 946.444648][ T39] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 946.444675][ T39] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 946.444699][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.444739][ T39] ? ib_get_eth_speed+0x151/0x7b0 [ 946.444778][ T39] ? ib_get_eth_speed+0x151/0x7b0 [ 946.444801][ T39] mutex_lock_nested+0x16a/0x1d0 [ 946.444837][ T39] ib_get_eth_speed+0x151/0x7b0 [ 946.444861][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.444894][ T39] ? __pfx_ib_get_eth_speed+0x10/0x10 [ 946.444937][ T39] ? ib_query_port+0x384/0x830 [ 946.444971][ T39] siw_query_port+0x3c/0x4a0 [ 946.445008][ T39] ib_setup_port_attrs+0x24e/0x2060 [ 946.445044][ T39] ? do_raw_spin_lock+0x121/0x290 [ 946.445082][ T39] ? _raw_spin_unlock_irqrestore+0x85/0x110 [ 946.445118][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 946.445176][ T39] ? __pfx_ib_setup_port_attrs+0x10/0x10 [ 946.445207][ T39] ? rt_mutex_slowunlock+0x493/0x8a0 [ 946.445239][ T39] ? rt_mutex_slowunlock+0x1be/0x2e0 [ 946.445267][ T39] ? __pfx_rt_mutex_slowunlock+0x10/0x10 [ 946.445311][ T39] ? device_add+0x70b/0xb50 [ 946.445339][ T39] add_one_compat_dev+0x3d6/0x5c0 [ 946.445375][ T39] rdma_dev_init_net+0x1dd/0x270 [ 946.445404][ T39] ? __pfx_rdma_dev_init_net+0x10/0x10 [ 946.445445][ T39] ops_init+0x35c/0x5c0 [ 946.445501][ T39] setup_net+0x10c/0x320 [ 946.445530][ T39] ? copy_net_ns+0x304/0x4d0 [ 946.445561][ T39] ? __pfx_setup_net+0x10/0x10 [ 946.445596][ T39] ? __mutex_rt_init+0x3b/0x50 [ 946.445626][ T39] copy_net_ns+0x31b/0x4d0 [ 946.445662][ T39] create_new_namespaces+0x3f3/0x720 [ 946.445696][ T39] ? security_capable+0x7e/0x2e0 [ 946.445735][ T39] unshare_nsproxy_namespaces+0x11c/0x170 [ 946.445768][ T39] ksys_unshare+0x4c8/0x8c0 [ 946.445808][ T39] ? __pfx_ksys_unshare+0x10/0x10 [ 946.445842][ T39] ? rt_spin_unlock+0x65/0x80 [ 946.445882][ T39] __x64_sys_unshare+0x38/0x50 [ 946.445914][ T39] do_syscall_64+0xfa/0x3b0 [ 946.445936][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 946.445969][ T39] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.445992][ T39] ? clear_bhb_loop+0x60/0xb0 [ 946.446020][ T39] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.446041][ T39] RIP: 0033:0x7feb593e06c7 [ 946.446060][ T39] RSP: 002b:00007ffd39210038 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 946.446082][ T39] RAX: ffffffffffffffda RBX: 00007feb59635f40 RCX: 00007feb593e06c7 [ 946.446100][ T39] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 946.446114][ T39] RBP: 00007feb596367b8 R08: 0000000000000000 R09: 0000000000000000 [ 946.446129][ T39] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 946.446144][ T39] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 946.446176][ T39] [ 946.446186][ T39] INFO: task syz-executor:21264 blocked for more than 154 seconds. [ 946.446202][ T39] Not tainted syzkaller #0 [ 946.446213][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.446224][ T39] task:syz-executor state:D stack:20144 pid:21264 tgid:21264 ppid:1 task_flags:0x400140 flags:0x00004006 [ 946.446278][ T39] Call Trace: [ 946.446285][ T39] [ 946.446299][ T39] __schedule+0x16f3/0x4c20 [ 946.446361][ T39] ? __pfx___schedule+0x10/0x10 [ 946.446412][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.446449][ T39] rt_mutex_schedule+0x77/0xf0 [ 946.446471][ T39] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 946.446524][ T39] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 946.446574][ T39] rt_mutex_slowlock+0x2b1/0x6e0 [ 946.446607][ T39] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 946.446638][ T39] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 946.446665][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.446708][ T39] ? ib_get_eth_speed+0x151/0x7b0 [ 946.446749][ T39] ? ib_get_eth_speed+0x151/0x7b0 [ 946.446772][ T39] mutex_lock_nested+0x16a/0x1d0 [ 946.446807][ T39] ib_get_eth_speed+0x151/0x7b0 [ 946.446836][ T39] ? __pfx_ib_get_eth_speed+0x10/0x10 [ 946.446883][ T39] ? mutex_lock_nested+0x154/0x1d0 [ 946.446911][ T39] ? rxe_query_port+0x7e/0x3b0 [ 946.446949][ T39] rxe_query_port+0x93/0x3b0 [ 946.446989][ T39] ib_query_port+0x16d/0x830 [ 946.447021][ T39] ib_setup_port_attrs+0x24e/0x2060 [ 946.447058][ T39] ? do_raw_spin_lock+0x121/0x290 [ 946.447097][ T39] ? _raw_spin_unlock_irqrestore+0x85/0x110 [ 946.447132][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 946.447179][ T39] ? __pfx_ib_setup_port_attrs+0x10/0x10 [ 946.447211][ T39] ? rt_mutex_slowunlock+0x493/0x8a0 [ 946.447245][ T39] ? rt_mutex_slowunlock+0x1be/0x2e0 [ 946.447275][ T39] ? __pfx_rt_mutex_slowunlock+0x10/0x10 [ 946.447321][ T39] ? device_add+0x70b/0xb50 [ 946.447349][ T39] add_one_compat_dev+0x3d6/0x5c0 [ 946.447387][ T39] rdma_dev_init_net+0x1dd/0x270 [ 946.447418][ T39] ? __pfx_rdma_dev_init_net+0x10/0x10 [ 946.447461][ T39] ops_init+0x35c/0x5c0 [ 946.447514][ T39] setup_net+0x10c/0x320 [ 946.447544][ T39] ? copy_net_ns+0x304/0x4d0 [ 946.447574][ T39] ? __pfx_setup_net+0x10/0x10 [ 946.447610][ T39] ? __mutex_rt_init+0x3b/0x50 [ 946.447641][ T39] copy_net_ns+0x31b/0x4d0 [ 946.447684][ T39] create_new_namespaces+0x3f3/0x720 [ 946.447719][ T39] ? security_capable+0x7e/0x2e0 [ 946.447760][ T39] unshare_nsproxy_namespaces+0x11c/0x170 [ 946.447794][ T39] ksys_unshare+0x4c8/0x8c0 [ 946.447837][ T39] ? __pfx_ksys_unshare+0x10/0x10 [ 946.447873][ T39] ? rt_spin_unlock+0x65/0x80 [ 946.447913][ T39] __x64_sys_unshare+0x38/0x50 [ 946.447948][ T39] do_syscall_64+0xfa/0x3b0 [ 946.447970][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 946.448005][ T39] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.448028][ T39] ? clear_bhb_loop+0x60/0xb0 [ 946.448056][ T39] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.448078][ T39] RIP: 0033:0x7f0446a206c7 [ 946.448098][ T39] RSP: 002b:00007ffdbfc3b528 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 946.448121][ T39] RAX: ffffffffffffffda RBX: 00007f0446c75f40 RCX: 00007f0446a206c7 [ 946.448138][ T39] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 946.448154][ T39] RBP: 00007f0446c767b8 R08: 0000000000000000 R09: 0000000000000000 [ 946.448169][ T39] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 946.448184][ T39] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 946.448219][ T39] [ 946.448230][ T39] INFO: task syz.3.7326:21289 blocked for more than 154 seconds. [ 946.448247][ T39] Not tainted syzkaller #0 [ 946.448258][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 946.448269][ T39] task:syz.3.7326 state:D stack:24872 pid:21289 tgid:21288 ppid:5993 task_flags:0x400140 flags:0x00004004 [ 946.448333][ T39] Call Trace: [ 946.448341][ T39] [ 946.448356][ T39] __schedule+0x16f3/0x4c20 [ 946.448405][ T39] ? __pfx_vprintk_emit+0x10/0x10 [ 946.448426][ T39] ? _raw_spin_unlock_irqrestore+0xad/0x110 [ 946.448473][ T39] ? __pfx___schedule+0x10/0x10 [ 946.448535][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 946.448588][ T39] rt_mutex_schedule+0x77/0xf0 [ 946.448611][ T39] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 946.448640][ T39] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 946.448690][ T39] rt_mutex_slowlock+0x2b1/0x6e0 [ 946.448722][ T39] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 946.448754][ T39] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 946.448781][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.448824][ T39] ? rtnl_newlink+0x8db/0x1c70 [ 946.448859][ T39] ? safesetid_security_capable+0xa9/0x1a0 [ 946.448891][ T39] ? bpf_lsm_capable+0x9/0x20 [ 946.448921][ T39] ? security_capable+0x7e/0x2e0 [ 946.448958][ T39] ? rtnl_newlink+0x8db/0x1c70 [ 946.448998][ T39] mutex_lock_nested+0x16a/0x1d0 [ 946.449033][ T39] rtnl_newlink+0x8db/0x1c70 [ 946.449078][ T39] ? __pfx_rtnl_newlink+0x10/0x10 [ 946.449107][ T39] ? migrate_enable+0x29c/0x3c0 [ 946.449135][ T39] ? reacquire_held_locks+0x127/0x1d0 [ 946.449169][ T39] ? __pfx_migrate_enable+0x10/0x10 [ 946.449196][ T39] ? __pfx_migrate_enable+0x10/0x10 [ 946.460402][ T39] ? __local_bh_enable+0x23f/0x3d0 [ 946.460441][ T39] ? reacquire_held_locks+0x127/0x1d0 [ 946.460477][ T39] ? __pfx___local_bh_enable+0x10/0x10 [ 946.460525][ T39] ? __local_bh_enable_ip+0x1b2/0x270 [ 946.460554][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 946.460595][ T39] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 946.460622][ T39] ? dev_hard_start_xmit+0x7f5/0x870 [ 946.460646][ T39] ? __dev_queue_xmit+0x26f/0x3b70 [ 946.460679][ T39] ? __dev_queue_xmit+0x26f/0x3b70 [ 946.460703][ T39] ? __dev_queue_xmit+0x26f/0x3b70 [ 946.460731][ T39] ? __dev_queue_xmit+0x1d3d/0x3b70 [ 946.460761][ T39] ? __lock_acquire+0xab9/0xd20 [ 946.460818][ T39] ? __pfx_rtnl_newlink+0x10/0x10 [ 946.460849][ T39] rtnetlink_rcv_msg+0x7cf/0xb70 [ 946.460885][ T39] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 946.460917][ T39] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 946.460945][ T39] ? ref_tracker_free+0x61e/0x7c0 [ 946.460980][ T39] ? __asan_memcpy+0x40/0x70 [ 946.461003][ T39] ? __pfx_ref_tracker_free+0x10/0x10 [ 946.461033][ T39] ? __skb_clone+0x63/0x7a0 [ 946.461067][ T39] netlink_rcv_skb+0x205/0x470 [ 946.461100][ T39] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 946.461134][ T39] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 946.461178][ T39] ? netlink_deliver_tap+0x2e/0x1b0 [ 946.461219][ T39] netlink_unicast+0x843/0xa10 [ 946.461257][ T39] ? __pfx_netlink_unicast+0x10/0x10 [ 946.461290][ T39] ? netlink_sendmsg+0x642/0xb30 [ 946.461319][ T39] ? skb_put+0x11b/0x210 [ 946.461357][ T39] netlink_sendmsg+0x805/0xb30 [ 946.461400][ T39] ? __pfx_netlink_sendmsg+0x10/0x10 [ 946.461442][ T39] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 946.461466][ T39] ? __pfx_netlink_sendmsg+0x10/0x10 [ 946.461506][ T39] __sock_sendmsg+0x21c/0x270 [ 946.461540][ T39] ____sys_sendmsg+0x508/0x820 [ 946.461570][ T39] ? __pfx_____sys_sendmsg+0x10/0x10 [ 946.461603][ T39] ? import_iovec+0x74/0xa0 [ 946.461636][ T39] ___sys_sendmsg+0x21f/0x2a0 [ 946.461662][ T39] ? __pfx____sys_sendmsg+0x10/0x10 [ 946.461725][ T39] ? __fget_files+0x2a/0x420 [ 946.461757][ T39] ? __fget_files+0x3a6/0x420 [ 946.461802][ T39] __x64_sys_sendmsg+0x1a1/0x260 [ 946.461829][ T39] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 946.461865][ T39] ? rcu_is_watching+0x15/0xb0 [ 946.461905][ T39] ? do_syscall_64+0xbe/0x3b0 [ 946.461932][ T39] do_syscall_64+0xfa/0x3b0 [ 946.461952][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 946.461986][ T39] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.462008][ T39] ? clear_bhb_loop+0x60/0xb0 [ 946.462036][ T39] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.462058][ T39] RIP: 0033:0x7f0e81d6eec9 [ 946.462077][ T39] RSP: 002b:00007f0e7ffce038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 946.462101][ T39] RAX: ffffffffffffffda RBX: 00007f0e81fc5fa0 RCX: 00007f0e81d6eec9 [ 946.462119][ T39] RDX: 0000000004000c00 RSI: 0000200000000180 RDI: 0000000000000003 [ 946.462135][ T39] RBP: 00007f0e81df1f91 R08: 0000000000000000 R09: 0000000000000000 [ 946.462150][ T39] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 946.462164][ T39] R13: 00007f0e81fc6038 R14: 00007f0e81fc5fa0 R15: 00007ffdea810188 [ 946.462199][ T39] [ 946.462258][ T39] [ 946.462258][ T39] Showing all locks held in the system: [ 946.462290][ T39] 5 locks held by kworker/u8:0/12: [ 946.462305][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.462368][ T39] #1: ffffc90000117bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.462429][ T39] #2: ffff88805ce00898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 946.462498][ T39] #3: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.462560][ T39] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.462620][ T39] 5 locks held by kworker/u8:1/13: [ 946.462633][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.462692][ T39] #1: ffffc90000127bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.462751][ T39] #2: ffff88805dc50898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 946.462813][ T39] #3: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.462870][ T39] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.462927][ T39] 2 locks held by ksoftirqd/0/15: [ 946.462941][ T39] #0: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.462997][ T39] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.463056][ T39] 9 locks held by ktimers/0/16: [ 946.463070][ T39] 2 locks held by rcu_preempt/18: [ 946.463083][ T39] #0: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.463140][ T39] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.463200][ T39] 2 locks held by rcuc/0/20: [ 946.463213][ T39] #0: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.463271][ T39] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.463331][ T39] 6 locks held by ktimers/1/29: [ 946.463346][ T39] 1 lock held by kauditd/38: [ 946.463358][ T39] #0: ffffffff8d9f45b8 (kauditd_wait.lock){+.+.}-{3:3}, at: finish_wait+0xbf/0x1f0 [ 946.463415][ T39] 1 lock held by khungtaskd/39: [ 946.463428][ T39] #0: ffffffff8d9a8dc0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 946.463489][ T39] 5 locks held by kworker/u9:0/59: [ 946.463502][ T39] #0: ffff888143f74938 ((wq_completion)hci6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.463573][ T39] #1: ffffc9000125fbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.463631][ T39] #2: ffff88802844ce80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0 [ 946.463685][ T39] #3: ffff88802844c0a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30 [ 946.463746][ T39] #4: ffffffff8ee3b358 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310 [ 946.463807][ T39] 5 locks held by kworker/u8:4/67: [ 946.463821][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.463877][ T39] #1: ffffc9000152fbc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.463958][ T39] #2: ffff88805d8a0898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 946.464020][ T39] #3: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.464077][ T39] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.464139][ T39] 4 locks held by kworker/u8:5/156: [ 946.464153][ T39] #0: ffff88801a6f4138 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.464211][ T39] #1: ffffc90003a2fbc0 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.464269][ T39] #2: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xf7/0x800 [ 946.464331][ T39] #3: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: wg_netns_pre_exit+0x1c/0x1d0 [ 946.464392][ T39] 6 locks held by kworker/u8:6/1122: [ 946.464406][ T39] #0: ffff8880281ef938 ((wq_completion)wg-kex-wg0#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.464469][ T39] #1: ffffc90004c17bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.464536][ T39] #2: ffff88802f67d5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.464593][ T39] #3: ffff8880311cd8b8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.464650][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.464706][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.464777][ T39] 4 locks held by kworker/u8:10/3193: [ 946.464790][ T39] #0: ffff8880389df138 ((wq_completion)wg-kex-wg2#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.464855][ T39] #1: ffffc9000d1cfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.464913][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.464971][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.465031][ T39] 6 locks held by kworker/u8:11/3527: [ 946.465045][ T39] #0: ffff888028f1c138 ((wq_completion)wg-kex-wg0#3){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.465109][ T39] #1: ffffc9000d7efbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.465179][ T39] #2: ffff8880235bd5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.465233][ T39] #3: ffff88805b5938f0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.465287][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.465343][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.465400][ T39] 4 locks held by kworker/u8:12/3540: [ 946.465413][ T39] #0: ffff88805a35a138 ((wq_completion)wg-kex-wg2#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.465475][ T39] #1: ffffc9000d81fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.465542][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.465596][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.465652][ T39] 7 locks held by kworker/u8:14/3576: [ 946.465665][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.465722][ T39] #1: ffffc9000d6dfbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.465780][ T39] #2: ffff88805b3a3300 (&devlink->lock_key#2){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 946.465848][ T39] #3: ffff88805b406520 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 946.465912][ T39] #4: ffffffff8d9a8dc0 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 946.465968][ T39] #5: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.466023][ T39] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.466079][ T39] 4 locks held by kworker/u8:15/3602: [ 946.466093][ T39] #0: ffff888059c4e138 ((wq_completion)wg-kex-wg2#3){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.466154][ T39] #1: ffffc9000d98fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.466212][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.466266][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.466323][ T39] 4 locks held by kworker/u8:16/3606: [ 946.466336][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.466392][ T39] #1: ffffc9000d43fbc0 ((work_completion)(&port->bc_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.466448][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.466511][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.466568][ T39] 7 locks held by kworker/u8:18/3621: [ 946.466581][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.466639][ T39] #1: ffffc9000dadfbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.466697][ T39] #2: ffff88805b707300 (&devlink->lock_key#4){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 946.466766][ T39] #3: ffff88805b69d520 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 946.466828][ T39] #4: ffffffff8d9a8dc0 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 946.466883][ T39] #5: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.466938][ T39] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.466994][ T39] 6 locks held by kworker/u8:19/3625: [ 946.467007][ T39] #0: ffff88803b87e938 ((wq_completion)wg-kex-wg1#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.467069][ T39] #1: ffffc9000dabfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.467133][ T39] #2: ffff88802f8315f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.467185][ T39] #3: ffff8880311cce20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.467236][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.467288][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.467340][ T39] 6 locks held by kworker/u8:21/3662: [ 946.467352][ T39] #0: ffff8880281eb938 ((wq_completion)wg-kex-wg0#5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.467411][ T39] #1: ffffc9000dcafbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.467463][ T39] #2: ffff88802889d5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.467523][ T39] #3: ffff88805b596350 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.467575][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.467626][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.467680][ T39] 4 locks held by kworker/1:2/5176: [ 946.467692][ T39] 1 lock held by jbd2/sda1-8/5177: [ 946.467705][ T39] 2 locks held by klogd/5204: [ 946.467716][ T39] #0: ffffffff8dac5768 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60 [ 946.467766][ T39] #1: ffff88801de9cb58 (&n->list_lock){+.+.}-{3:3}, at: __put_partials+0x5f/0x1a0 [ 946.467830][ T39] 2 locks held by udevd/5215: [ 946.467843][ T39] 2 locks held by dhcpcd/5509: [ 946.467857][ T39] 3 locks held by dhcpcd/5510: [ 946.467869][ T39] #0: ffff8880278c3a50 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sk_setsockopt+0xc2f/0x2a70 [ 946.467929][ T39] #1: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.467984][ T39] #2: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.468040][ T39] 2 locks held by getty/5604: [ 946.468053][ T39] #0: ffff88823bf768a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 946.468102][ T39] #1: ffffc90003e832e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x444/0x1410 [ 946.468160][ T39] 6 locks held by kworker/u9:3/5984: [ 946.468173][ T39] #0: ffff888032412938 ((wq_completion)hci5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.468230][ T39] #1: ffffc90004d17bc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.468288][ T39] #2: ffff88802ed20e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0 [ 946.468341][ T39] #3: ffff88802ed200a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30 [ 946.468402][ T39] #4: ffffffff8ee3b358 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310 [ 946.468463][ T39] #5: ffff888025577358 (&conn->lock#2){+.+.}-{4:4}, at: l2cap_conn_del+0x70/0x680 [ 946.468528][ T39] 4 locks held by kworker/0:4/6040: [ 946.468542][ T39] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.468599][ T39] #1: ffffc900050e7bc0 ((work_completion)(&(&tbl->gc_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.468657][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.468713][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.468770][ T39] 3 locks held by kworker/0:5/6054: [ 946.468783][ T39] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.468840][ T39] #1: ffffc90005be7bc0 ((reg_check_chans).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.468896][ T39] #2: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x95/0xf30 [ 946.468946][ T39] 3 locks held by kworker/1:4/6061: [ 946.468959][ T39] #0: ffff888019898538 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.469014][ T39] #1: ffffc90005c57bc0 (deferred_process_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.469072][ T39] #2: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20 [ 946.469125][ T39] 4 locks held by kworker/0:8/7037: [ 946.469138][ T39] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.469215][ T39] #1: ffffc90004b27bc0 ((work_completion)(&(&tbl->gc_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.469275][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.469332][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.469392][ T39] 7 locks held by kworker/u8:2/16917: [ 946.469405][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.469463][ T39] #1: ffffc9000bfb7bc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.469540][ T39] #2: ffff888030445300 (&devlink->lock_key#3){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 946.469611][ T39] #3: ffff88805b453520 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 946.469675][ T39] #4: ffffffff8d9a8dc0 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 946.469733][ T39] #5: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.469790][ T39] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.469848][ T39] 3 locks held by kworker/u8:3/16921: [ 946.469861][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.469919][ T39] #1: ffffc90007e77bc0 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.470006][ T39] #2: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60 [ 946.470060][ T39] 4 locks held by kworker/u9:1/20799: [ 946.470073][ T39] #0: ffff8880305ca138 ((wq_completion)krxrpcd){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.470130][ T39] #1: ffffc90004be7bc0 ((work_completion)(&rxnet->peer_keepalive_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.470188][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.470243][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.470299][ T39] 4 locks held by kworker/u8:7/21168: [ 946.470312][ T39] #0: ffff88814dd12138 ((wq_completion)bat_events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.470367][ T39] #1: ffffc9000570fbc0 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.470424][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.470479][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.470543][ T39] 6 locks held by kworker/u8:8/21169: [ 946.470556][ T39] #0: ffff8880281ef938 ((wq_completion)wg-kex-wg0#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.481375][ T39] #1: ffffc900056dfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.481450][ T39] #2: ffff88802f67d5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.481514][ T39] #3: ffff88805ba82e58 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.481568][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.481623][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.481679][ T39] 6 locks held by kworker/u8:9/21170: [ 946.481693][ T39] #0: ffff8880389d9138 ((wq_completion)wg-kex-wg2#5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.481755][ T39] #1: ffffc9000571fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.481812][ T39] #2: ffff88803d4715f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.481866][ T39] #3: ffff88805b597880 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.481919][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.481976][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.482032][ T39] 3 locks held by kworker/u8:13/21171: [ 946.482045][ T39] #0: ffff88814d571138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.482101][ T39] #1: ffffc9000572fbc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.482158][ T39] #2: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 946.482216][ T39] 2 locks held by syz-executor/21249: [ 946.482230][ T39] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 946.482327][ T39] #1: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: ip_tunnel_init_net+0x2ab/0x800 [ 946.482384][ T39] 5 locks held by syz-executor/21260: [ 946.482398][ T39] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 946.482456][ T39] #1: ffffffff8ea22de0 (devices_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x19a/0x270 [ 946.482524][ T39] #2: ffffffff8ea23020 (rdma_nets_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x1d2/0x270 [ 946.482583][ T39] #3: ffff888034e4d118 (&device->compat_devs_mutex){+.+.}-{4:4}, at: add_one_compat_dev+0xee/0x5c0 [ 946.482642][ T39] #4: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: ib_get_eth_speed+0x151/0x7b0 [ 946.482695][ T39] 5 locks held by kworker/u9:4/21261: [ 946.482709][ T39] #0: ffff888028a85938 ((wq_completion)hci7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.482767][ T39] #1: ffffc900058c7bc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.482826][ T39] #2: ffff8880620fce80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0 [ 946.482881][ T39] #3: ffff8880620fc0a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30 [ 946.482943][ T39] #4: ffffffff8ee3b358 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310 [ 946.483005][ T39] 6 locks held by syz-executor/21264: [ 946.483019][ T39] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 946.483077][ T39] #1: ffffffff8ea22de0 (devices_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x19a/0x270 [ 946.483135][ T39] #2: ffffffff8ea23020 (rdma_nets_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x1d2/0x270 [ 946.483191][ T39] #3: ffff888032771118 (&device->compat_devs_mutex){+.+.}-{4:4}, at: add_one_compat_dev+0xee/0x5c0 [ 946.483249][ T39] #4: ffff888032771430 (&rxe->usdev_lock){+.+.}-{4:4}, at: rxe_query_port+0x7e/0x3b0 [ 946.483311][ T39] #5: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: ib_get_eth_speed+0x151/0x7b0 [ 946.483365][ T39] 4 locks held by syz.2.7324/21282: [ 946.483378][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8db/0x1c70 [ 946.483440][ T39] #1: ffffffff8d9a8dc0 (rcu_read_lock){....}-{1:3}, at: rtnl_fill_ifinfo+0x197a/0x1e60 [ 946.483511][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.483566][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.483622][ T39] 1 lock held by syz.3.7326/21289: [ 946.483635][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8db/0x1c70 [ 946.483692][ T39] 4 locks held by kworker/u8:17/21290: [ 946.483705][ T39] #0: ffff88803b87b138 ((wq_completion)wg-kex-wg1#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.483767][ T39] #1: ffffc9000585fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.483823][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.483878][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.483938][ T39] 4 locks held by kworker/u8:22/21292: [ 946.483950][ T39] #0: ffff888028f1c138 ((wq_completion)wg-kex-wg0#3){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.484029][ T39] #1: ffffc9000d2dfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.484088][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.484144][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.484202][ T39] 4 locks held by kworker/u8:24/21294: [ 946.484215][ T39] #0: ffff888028f1e138 ((wq_completion)wg-kex-wg1#3){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.484276][ T39] #1: ffffc9000d2bfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.484333][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.484389][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.484446][ T39] 4 locks held by kworker/u8:25/21295: [ 946.484460][ T39] #0: ffff888038404138 ((wq_completion)wg-kex-wg0){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.484524][ T39] #1: ffffc9000d2afbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.484581][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.484637][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.484695][ T39] 7 locks held by kworker/u8:26/21296: [ 946.484708][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.484767][ T39] #1: ffffc9000d29fbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.484827][ T39] #2: ffff88805aed8300 (&devlink->lock_key){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 946.484891][ T39] #3: ffff88805ae5d920 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 946.484955][ T39] #4: ffffffff8d9a8dc0 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 946.485012][ T39] #5: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.485068][ T39] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.485125][ T39] 5 locks held by kworker/1:3/21298: [ 946.485150][ T39] #0: ffff888019898538 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.485213][ T39] #1: ffffc9000d23fbc0 ((work_completion)(&(&ovs_net->masks_rebalance)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.485265][ T39] #2: ffffffff8f00df58 (ovs_mutex){+.+.}-{4:4}, at: ovs_dp_masks_rebalance+0x2f/0xe0 [ 946.485322][ T39] #3: ffffffff8dac5768 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60 [ 946.485372][ T39] #4: ffff88801de9cb58 (&n->list_lock){+.+.}-{3:3}, at: __slab_free+0x19e/0x390 [ 946.485419][ T39] 4 locks held by kworker/u8:28/21299: [ 946.485432][ T39] #0: ffff88805a35a138 ((wq_completion)wg-kex-wg2#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.485497][ T39] #1: ffffc9000d20fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.485551][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.485620][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.485685][ T39] 4 locks held by kworker/u8:29/21300: [ 946.485697][ T39] #0: ffff8880388fe138 ((wq_completion)wg-kex-wg0#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.485773][ T39] #1: ffffc9000d1bfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.485830][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.485886][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.485941][ T39] 7 locks held by kworker/u8:30/21301: [ 946.485954][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.486010][ T39] #1: ffffc90004947bc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.486068][ T39] #2: ffff88803d589300 (&devlink->lock_key#5){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 946.486134][ T39] #3: ffff88805b911920 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 946.486195][ T39] #4: ffffffff8d9a8dc0 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 946.486249][ T39] #5: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.486304][ T39] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.486359][ T39] 6 locks held by kworker/u8:31/21302: [ 946.486371][ T39] #0: ffff8880388fe138 ((wq_completion)wg-kex-wg0#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.486431][ T39] #1: ffffc9000d17fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.486510][ T39] #2: ffff888059f5d5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.486565][ T39] #3: ffff88805ba803f8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.486619][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.486674][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.486729][ T39] 4 locks held by kworker/u8:32/21303: [ 946.486743][ T39] #0: ffff8880389df138 ((wq_completion)wg-kex-wg2#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.486804][ T39] #1: ffffc9000d15fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.486861][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.486916][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.486971][ T39] 4 locks held by kworker/u8:33/21304: [ 946.486984][ T39] #0: ffff8880599bc138 ((wq_completion)wg-kex-wg1){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.487039][ T39] #1: ffffc9000d14fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.487095][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.487150][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.487206][ T39] 4 locks held by kworker/u8:34/21305: [ 946.487218][ T39] #0: ffff888059c4e138 ((wq_completion)wg-kex-wg2#3){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.487278][ T39] #1: ffffc9000d10fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.487335][ T39] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.487389][ T39] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.487445][ T39] 1 lock held by dhcpcd/21307: [ 946.487457][ T39] #0: ffff88805c0345f8 (&sb->s_type->i_mutex_key#10){+.+.}-{4:4}, at: sock_close+0x9b/0x240 [ 946.487523][ T39] 1 lock held by syz-executor/21308: [ 946.487535][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 946.487588][ T39] 1 lock held by dhcpcd/21310: [ 946.487600][ T39] #0: ffff88803c486350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 946.487658][ T39] 6 locks held by kworker/u8:35/21311: [ 946.487670][ T39] #0: ffff8880281eb938 ((wq_completion)wg-kex-wg0#5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.487731][ T39] #1: ffffc9000cc7fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.487786][ T39] #2: ffff88802889d5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.487841][ T39] #3: ffff8880311ca3c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.487895][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.487950][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.488006][ T39] 6 locks held by kworker/u8:36/21312: [ 946.488019][ T39] #0: ffff888028f1e138 ((wq_completion)wg-kex-wg1#3){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.488079][ T39] #1: ffffc9000cc3fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.488136][ T39] #2: ffff88803b8895f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.488191][ T39] #3: ffff88805b594388 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.488244][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.488298][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.488353][ T39] 6 locks held by kworker/u8:37/21313: [ 946.488366][ T39] #0: ffff8880281ec938 ((wq_completion)wg-kex-wg1#5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.488427][ T39] #1: ffffc9000cbffbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.488491][ T39] #2: ffff88802f6795f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.488546][ T39] #3: ffff88805b596de8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.488600][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.488654][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.488710][ T39] 1 lock held by dhcpcd/21314: [ 946.488722][ T39] #0: ffff8880263dc350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 946.488777][ T39] 1 lock held by syz-executor/21316: [ 946.488790][ T39] 1 lock held by dhcpcd/21317: [ 946.488803][ T39] #0: ffff888059b86350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 946.488857][ T39] 1 lock held by dhcpcd/21319: [ 946.488870][ T39] #0: ffff8880369aa350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 946.488926][ T39] 2 locks held by syz-executor/21322: [ 946.488941][ T39] 1 lock held by syz-executor/21325: [ 946.488954][ T39] #0: ffffffff8d9f45b8 (kauditd_wait.lock){+.+.}-{3:3}, at: __wake_up_common_lock+0x2f/0x1e0 [ 946.489011][ T39] 1 lock held by dhcpcd/21326: [ 946.489023][ T39] #0: ffff88805bac2350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 946.489078][ T39] 6 locks held by kworker/u8:38/21327: [ 946.489090][ T39] #0: ffff888038404138 ((wq_completion)wg-kex-wg0){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.489145][ T39] #1: ffffc9000c8c7bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.489202][ T39] #2: ffff88803cef95f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.489257][ T39] #3: ffff88805b5903f8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.489311][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.489366][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.489421][ T39] 2 locks held by syz-executor/21329: [ 946.489434][ T39] 1 lock held by dhcpcd/21330: [ 946.489447][ T39] #0: ffff88805b9a8350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 946.489510][ T39] 6 locks held by kworker/u8:39/21331: [ 946.489523][ T39] #0: ffff88803b87b138 ((wq_completion)wg-kex-wg1#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 946.489583][ T39] #1: ffffc9000623fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 946.489639][ T39] #2: ffff88802f8355f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 946.489712][ T39] #3: ffff88805ba838f0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 946.489769][ T39] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 946.489826][ T39] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 946.489884][ T39] 3 locks held by syz-executor/21332: [ 946.489900][ T39] [ 946.489907][ T39] ============================================= [ 946.489907][ T39] [ 946.489929][ T39] NMI backtrace for cpu 1 [ 946.489947][ T39] CPU: 1 UID: 0 PID: 39 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 946.489972][ T39] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 946.489987][ T39] Call Trace: [ 946.489997][ T39] [ 946.490008][ T39] dump_stack_lvl+0x189/0x250 [ 946.490046][ T39] ? __pfx_dump_stack_lvl+0x10/0x10 [ 946.490081][ T39] ? __pfx__printk+0x10/0x10 [ 946.490119][ T39] nmi_cpu_backtrace+0x39e/0x3d0 [ 946.490151][ T39] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 946.490183][ T39] ? __pfx__printk+0x10/0x10 [ 946.490211][ T39] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 946.490241][ T39] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 946.490275][ T39] watchdog+0xf93/0xfe0 [ 946.490310][ T39] ? watchdog+0x1de/0xfe0 [ 946.490344][ T39] kthread+0x711/0x8a0 [ 946.490382][ T39] ? __pfx_watchdog+0x10/0x10 [ 946.490410][ T39] ? __pfx_kthread+0x10/0x10 [ 946.490449][ T39] ? __pfx_kthread+0x10/0x10 [ 946.490490][ T39] ret_from_fork+0x436/0x7d0 [ 946.490534][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 946.490568][ T39] ? __switch_to_asm+0x39/0x70 [ 946.490588][ T39] ? __switch_to_asm+0x33/0x70 [ 946.490607][ T39] ? __pfx_kthread+0x10/0x10 [ 946.490640][ T39] ret_from_fork_asm+0x1a/0x30 [ 946.490677][ T39] [ 946.490686][ T39] Sending NMI from CPU 1 to CPUs 0: [ 946.490716][ C0] NMI backtrace for cpu 0 [ 946.490748][ C0] CPU: 0 UID: 0 PID: 21332 Comm: syz-executor Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 946.490776][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 946.490788][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x80 [ 946.490813][ C0] Code: 00 00 00 48 8b 3d 34 c9 66 0b 48 89 de 5b e9 53 af 54 00 cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa <48> 8b 04 24 65 48 8b 0c 25 08 40 f6 91 65 8b 35 58 d4 37 10 81 e6 [ 946.490830][ C0] RSP: 0018:ffffc9000c8b7760 EFLAGS: 00000246 [ 946.490847][ C0] RAX: 2f914e7b3243d300 RBX: ffff888048de5f00 RCX: 000000000010000e [ 946.490868][ C0] RDX: 000000000010000f RSI: ffffea00012378c0 RDI: ffff888048de5f00 [ 946.490882][ C0] RBP: ffff888048de5f00 R08: 0000000000000001 R09: ffffffff821dc50c [ 946.490896][ C0] R10: dffffc0000000000 R11: fffffbfff1e3ac47 R12: ffffea0000000000 [ 946.490910][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 946.490923][ C0] FS: 000055557c1c9500(0000) GS:ffff8881268bc000(0000) knlGS:0000000000000000 [ 946.490939][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 946.490952][ C0] CR2: 00007fef7f26f13c CR3: 000000004cb3c000 CR4: 00000000003526f0 [ 946.490969][ C0] Call Trace: [ 946.490976][ C0] [ 946.490982][ C0] __phys_addr+0x1b/0x180 [ 946.491000][ C0] qlist_free_all+0x39/0x140 [ 946.491023][ C0] kasan_quarantine_reduce+0x148/0x160 [ 946.491046][ C0] __kasan_kmalloc+0x22/0xb0 [ 946.491070][ C0] __kmalloc_node_track_caller_noprof+0x1f3/0x450 [ 946.491095][ C0] ? do_raw_spin_lock+0x121/0x290 [ 946.491115][ C0] ? __kernfs_new_node+0x9c/0x690 [ 946.491137][ C0] kstrdup+0x42/0x100 [ 946.491160][ C0] __kernfs_new_node+0x9c/0x690 [ 946.491178][ C0] ? __lock_acquire+0xab9/0xd20 [ 946.491207][ C0] ? __pfx___kernfs_new_node+0x10/0x10 [ 946.491226][ C0] ? kernfs_root+0x1c/0x230 [ 946.491265][ C0] ? kernfs_root+0x1c/0x230 [ 946.491282][ C0] ? kernfs_root+0x1c/0x230 [ 946.491302][ C0] kernfs_new_node+0x102/0x210 [ 946.491325][ C0] kernfs_create_link+0xa7/0x200 [ 946.491356][ C0] sysfs_do_create_link_sd+0x83/0x110 [ 946.491376][ C0] device_add_class_symlinks+0x1d2/0x240 [ 946.491398][ C0] device_add+0x475/0xb50 [ 946.491418][ C0] rfkill_register+0x183/0x900 [ 946.491447][ C0] hci_register_dev+0x3f5/0x830 [ 946.491476][ C0] vhci_create_device+0x39c/0x660 [ 946.491506][ C0] vhci_write+0x3d0/0x4a0 [ 946.491531][ C0] vfs_write+0x5d2/0xb40 [ 946.491557][ C0] ? __pfx_vhci_write+0x10/0x10 [ 946.491581][ C0] ? __pfx_vfs_write+0x10/0x10 [ 946.491605][ C0] ? lock_vma_under_rcu+0xdf/0x3d0 [ 946.491633][ C0] ksys_write+0x14b/0x260 [ 946.491657][ C0] ? __pfx_ksys_write+0x10/0x10 [ 946.491684][ C0] ? do_syscall_64+0xbe/0x3b0 [ 946.491704][ C0] do_syscall_64+0xfa/0x3b0 [ 946.491722][ C0] ? lockdep_hardirqs_on+0x9c/0x150 [ 946.491758][ C0] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.491777][ C0] ? clear_bhb_loop+0x60/0xb0 [ 946.491799][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.491817][ C0] RIP: 0033:0x7fef7f1cd940 [ 946.491834][ C0] Code: 40 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 80 3d 21 ac 22 00 00 74 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89 [ 946.491850][ C0] RSP: 002b:00007fff3fb7a178 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 [ 946.491867][ C0] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fef7f1cd940 [ 946.491881][ C0] RDX: 0000000000000002 RSI: 00007fff3fb7a18a RDI: 00000000000000ca [ 946.491893][ C0] RBP: 00007fef7f4267b8 R08: 0000000000000000 R09: 00007fef7ff5d6c0 [ 946.491906][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 946.491918][ C0] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 946.491939][ C0] [ 946.513472][ T38] audit: type=1400 audit(919.908:39577): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21322 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=59 [ 946.513535][ T38] audit: type=1400 audit(921.442:39578): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21325 comm="syz-executor" name="/" dev="sda1" ino=2 [ 946.513581][ T38] audit: type=1400 audit(921.451:39579): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5215 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 946.828919][ T38] audit: type=1400 audit(921.750:39580): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21325 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 946.828976][ T38] audit: type=1400 audit(921.750:39581): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21325 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 946.829019][ T38] audit: type=1400 audit(921.760:39582): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21325 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 946.829062][ T38] audit: type=1400 audit(921.760:39583): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=21325 comm="syz-executor" name="kcov" dev="debugfs" ino=59 [ 946.903252][ T38] audit: type=1400 audit(921.825:39584): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="sda1" ino=2 [ 946.903312][ T38] audit: type=1400 audit(921.825:39585): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5215 comm="udevd" name="/" dev="tmpfs" ino=1 [ 947.551291][ T39] Kernel panic - not syncing: hung_task: blocked tasks [ 947.551317][ T39] CPU: 1 UID: 0 PID: 39 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 947.551345][ T39] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 947.551360][ T39] Call Trace: [ 947.551370][ T39] [ 947.551381][ T39] dump_stack_lvl+0x99/0x250 [ 947.551429][ T39] ? __asan_memcpy+0x40/0x70 [ 947.551455][ T39] ? __pfx_dump_stack_lvl+0x10/0x10 [ 947.551497][ T39] ? __pfx__printk+0x10/0x10 [ 947.551537][ T39] vpanic+0x281/0x750 [ 947.551574][ T39] ? __pfx_vpanic+0x10/0x10 [ 947.551606][ T39] ? preempt_schedule+0xae/0xc0 [ 947.551648][ T39] ? preempt_schedule_common+0x83/0xd0 [ 947.551689][ T39] panic+0xb9/0xc0 [ 947.551723][ T39] ? __pfx_panic+0x10/0x10 [ 947.551757][ T39] ? preempt_schedule_thunk+0x16/0x30 [ 947.551791][ T39] ? nmi_trigger_cpumask_backtrace+0x2bb/0x300 [ 947.551831][ T39] watchdog+0xfd2/0xfe0 [ 947.551866][ T39] ? watchdog+0x1de/0xfe0 [ 947.551901][ T39] kthread+0x711/0x8a0 [ 947.551939][ T39] ? __pfx_watchdog+0x10/0x10 [ 947.551967][ T39] ? __pfx_kthread+0x10/0x10 [ 947.552022][ T39] ? __pfx_kthread+0x10/0x10 [ 947.552057][ T39] ret_from_fork+0x436/0x7d0 [ 947.552089][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 947.552123][ T39] ? __switch_to_asm+0x39/0x70 [ 947.552148][ T39] ? __switch_to_asm+0x33/0x70 [ 947.552172][ T39] ? __pfx_kthread+0x10/0x10 [ 947.552206][ T39] ret_from_fork_asm+0x1a/0x30 [ 947.552244][ T39] [ 947.552583][ T39] Kernel Offset: disabled