last executing test programs: 1m13.921864587s ago: executing program 4 (id=7272): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_NEWSET={0x1c, 0x12, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}], {0x14}}, 0x44}, 0x1, 0x0, 0x0, 0x890}, 0x0) 1m13.761986791s ago: executing program 3 (id=7274): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000206010200000000000000000000000005000100070000000900020073797a300000000005000500020000001400078005001500020000000800124000000000050004000000000012000300686173683a6e6574"], 0x60}}, 0x0) 1m13.460433272s ago: executing program 4 (id=7277): r0 = syz_open_dev$vim2m(&(0x7f0000000040), 0x3, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000280)={0x0, 0x56595559, 0x0, @stepwise}) 1m13.407174722s ago: executing program 3 (id=7278): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100003020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9e20307600800341c9e08f088a8", 0x0, 0xe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m13.21460609s ago: executing program 2 (id=7280): r0 = socket$inet(0xa, 0x801, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001680)=@mangle={'mangle\x00', 0x44, 0x6, 0xc28, 0x98, 0x98, 0x0, 0x228, 0x98, 0xb90, 0xb90, 0xb90, 0xb90, 0xb90, 0x6, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xac8}}, {{@ip={@remote, @local, 0x0, 0x0, 'vcan0\x00', 'veth0_virt_wifi\x00'}, 0x0, 0xa8, 0xd0, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0xe}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}}]}, @ECN={0x28}}, {{@ip={@private, @multicast2, 0x0, 0x0, 'veth0\x00', 'bond0\x00'}, 0x0, 0x878, 0x8a0, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@u32={{0x7e0}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@ah={{0x30}}]}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xc88) 1m12.994558142s ago: executing program 3 (id=7282): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r0, 0x0, 0x2) 1m12.746944393s ago: executing program 4 (id=7284): r0 = syz_open_dev$video(&(0x7f0000000580), 0x7, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0xf000000, 0x400, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980913, 0x0, '\x00', @p_u8=0x0}}) 1m12.745917574s ago: executing program 2 (id=7285): r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='@ 0'], 0x20) 1m12.596681726s ago: executing program 3 (id=7287): r0 = syz_open_dev$vim2m(&(0x7f0000000080), 0x0, 0x2) ioctl$vim2m_VIDIOC_STREAMOFF(r0, 0xc0205649, &(0x7f0000000600)=0xf010000) 1m12.47183323s ago: executing program 4 (id=7288): r0 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x101000) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) 1m12.309055583s ago: executing program 0 (id=7289): r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 1m12.263440121s ago: executing program 1 (id=7290): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000c80), 0x0) 1m11.995058607s ago: executing program 3 (id=7291): r0 = syz_open_dev$dri(&(0x7f0000000140), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc1, 0x80, 0x34325241, 0x3, [0x2], [0x80ffff], [], [0x400000000000000]}) 1m11.973734778s ago: executing program 2 (id=7292): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="140100001f000117000000000000000001"], 0x114}], 0x1}, 0x0) 1m11.863676106s ago: executing program 4 (id=7293): r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x33, &(0x7f0000000000)=""/3, &(0x7f0000000040)=0x3) 1m11.728410619s ago: executing program 0 (id=7294): r0 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0xffffffff, 0x3, 0xe90, 0x19}) 1m11.719599942s ago: executing program 1 (id=7295): r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, 0x0) 1m11.606869396s ago: executing program 4 (id=7296): syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000002000040257d15a4400001040001090260004201000000090400000102090000052406000105240000000d240f01000004eaffffff1e0006031a00000804800200090581", @ANYBLOB="f7"], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 1m11.558240922s ago: executing program 3 (id=7297): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000abd1a0407b0726228bca000000010902120001000000000904"], 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 1m11.419707457s ago: executing program 2 (id=7298): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r0, 0x0, 0x1a, 0x0, 0x0) 1m11.291751597s ago: executing program 0 (id=7299): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x38, 0x1409, 0x1, 0x0, 0x0, "", [{{0x4, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0xa, 0x33, 'wg0\x00'}}]}, 0x38}}, 0x0) 1m11.185953054s ago: executing program 1 (id=7300): r0 = openat$smackfs_revoke_subject(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) pwritev2(r0, &(0x7f0000000480)=[{&(0x7f0000000680)="6965169b57baa7899cdb5428bc13a3ce956339293c377b251a8766183004fb2dcdc255092c88fc1e5dad276493c086fe226b394471d9466b0cc6284e00bc14f5d46cddcf80ab49c521678c68518d8d8c82b5d1ef0083cbfc8344f241a8c7e911", 0x60}], 0x1, 0x0, 0xb, 0x0) 1m10.915442122s ago: executing program 2 (id=7301): r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000001240)="51e2", 0x2, 0x40895, &(0x7f00000004c0)={0xa, 0xde20, 0x10, @mcast2}, 0x1c) 1m10.914585156s ago: executing program 1 (id=7302): r0 = syz_init_net_socket$bt_rfcomm(0x1f, 0x1, 0x3) listen(r0, 0x340) 1m10.786820731s ago: executing program 0 (id=7303): r0 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0}) 1m10.540744139s ago: executing program 2 (id=7304): r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000180)={'bond0\x00', @ifru_names='rose0\x00'}) 1m10.4914707s ago: executing program 1 (id=7305): r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x20000, 0x0) ioctl$EVIOCGLED(r0, 0x80284504, 0x0) 1m10.310713094s ago: executing program 0 (id=7306): r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read(r0, 0x0, 0x0) 1m9.90048447s ago: executing program 1 (id=7307): r0 = openat$dma_heap(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r0, 0xc0184800, 0x0) 1m9.805950252s ago: executing program 0 (id=7308): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xf, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x6, 0x0, 0x0, 0x2}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xbb}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 0s ago: executing program 32 (id=7308): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xf, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x6, 0x0, 0x0, 0x2}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xbb}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): ][ T5904] audit: audit_lost=15843 audit_rate_limit=0 audit_backlog_limit=64 [ 548.775131][ C1] audit: backlog limit exceeded [ 548.775462][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 548.838477][T19983] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 548.845280][T19983] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 548.916803][T19983] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 548.929937][T19983] Bluetooth: hci2: Opcode 0x0406 failed: -4 [ 548.966623][T19983] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 548.979127][T19983] Bluetooth: hci3: Opcode 0x0406 failed: -4 [ 549.216475][T20004] netlink: 24 bytes leftover after parsing attributes in process `syz.4.6616'. [ 549.695886][T20025] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6625'. [ 549.812007][ T9] usb 1-1: new high-speed USB device number 24 using dummy_hcd [ 549.851891][T20031] tmpfs: Unexpected value for 'inode32' [ 549.986848][ T9] usb 1-1: config 0 has more interface descriptors, than it declares in bNumInterfaces, ignoring interface number: 0 [ 550.049167][ T9] usb 1-1: config 0 has more interface descriptors, than it declares in bNumInterfaces, ignoring interface number: 0 [ 550.113135][ T9] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 550.142304][ T9] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 4 [ 550.163740][ T9] usb 1-1: New USB device found, idVendor=1908, idProduct=1315, bcdDevice= 0.00 [ 550.173502][T20044] vti0: entered promiscuous mode [ 550.194534][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 550.209386][ T9] usb 1-1: Product: syz [ 550.219733][ T9] usb 1-1: Manufacturer: syz [ 550.230982][ T9] usb 1-1: SerialNumber: syz [ 550.254902][ T9] usb 1-1: config 0 descriptor?? [ 550.289620][ T9] usb-storage 1-1:0.0: USB Mass Storage device detected [ 550.356733][ T9] usb-storage 1-1:0.0: Quirks match for vid 1908 pid 1315: 20000 [ 550.542246][ T24] usb 1-1: USB disconnect, device number 24 [ 550.743905][T20064] netlink: 'syz.4.6644': attribute type 1 has an invalid length. [ 550.753909][ T5143] Bluetooth: hci1: command 0x0406 tx timeout [ 550.901015][ T5143] Bluetooth: hci3: command 0x0406 tx timeout [ 550.907523][ T5143] Bluetooth: hci2: command 0x0406 tx timeout [ 551.354746][T20087] sock: sock_timestamping_bind_phc: sock not bind to device [ 551.688917][T20102] __nla_validate_parse: 1 callbacks suppressed [ 551.688939][T20102] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6664'. [ 551.735925][T20105] netlink: 'syz.1.6663': attribute type 3 has an invalid length. [ 551.837625][T20109] netlink: 36 bytes leftover after parsing attributes in process `syz.2.6665'. [ 551.895558][T20109] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6665'. [ 552.363891][T20132] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6678'. [ 552.393307][T20132] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6678'. [ 552.501416][T20136] hfs: unable to load iocharset "io#harset" [ 552.526195][ T24] usb 4-1: new high-speed USB device number 17 using dummy_hcd [ 552.620925][T20146] netlink: 'syz.0.6682': attribute type 1 has an invalid length. [ 552.649452][T20146] netlink: 'syz.0.6682': attribute type 2 has an invalid length. [ 552.694896][ T24] usb 4-1: New USB device found, idVendor=2c42, idProduct=1709, bcdDevice=ca.b7 [ 552.705407][ T24] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 552.724241][ T24] usb 4-1: Product: syz [ 552.728766][T20070] Bluetooth: hci1: command 0x0406 tx timeout [ 552.744405][ T24] usb 4-1: Manufacturer: syz [ 552.754918][ T24] usb 4-1: SerialNumber: syz [ 552.776637][ T24] usb 4-1: config 0 descriptor?? [ 552.878528][T20070] Bluetooth: hci2: command 0x0406 tx timeout [ 552.887902][ T51] Bluetooth: hci3: command 0x0406 tx timeout [ 552.908488][T20157] netlink: 'syz.4.6688': attribute type 3 has an invalid length. [ 552.916296][T20157] netlink: 'syz.4.6688': attribute type 2 has an invalid length. [ 552.933879][T20158] veth0_to_bond: entered allmulticast mode [ 553.210452][ T24] usb 4-1: f81604_write: reg: 105 data: 8a failed: -EPROTO [ 553.238423][ T24] f81604 4-1:0.0: Setting termination of CH#0 failed: -EPROTO [ 553.257851][ T24] f81604 4-1:0.0: probe with driver f81604 failed with error -71 [ 553.294008][ T24] usb 4-1: USB disconnect, device number 17 [ 553.440846][ T30] kauditd_printk_skb: 12318 callbacks suppressed [ 553.440867][ T30] audit: type=1400 audit(2000004657.792:220600): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5904 comm="syz-executor" path="/1323/binderfs" dev="tmpfs" ino=6645 [ 553.468129][ T5193] audit: audit_backlog=65 > audit_backlog_limit=64 [ 553.468182][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64 [ 553.482640][T19375] audit: audit_backlog=65 > audit_backlog_limit=64 [ 553.487364][ T5895] audit: audit_backlog=65 > audit_backlog_limit=64 [ 553.489928][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 553.502971][ C1] audit: audit_lost=16519 audit_rate_limit=0 audit_backlog_limit=64 [ 553.504125][T20175] audit: audit_backlog=65 > audit_backlog_limit=64 [ 553.511019][ C1] audit: backlog limit exceeded [ 553.512949][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 553.622752][T20181] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6700'. [ 553.730531][T20184] : renamed from bond0 (while UP) [ 553.850969][T20190] binfmt_misc: register: failed to install interpreter file ./file0 [ 554.411306][T20216] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 554.473674][T20220] tmpfs: Bad value for 'mpol' [ 554.649687][T20229] netlink: 'syz.4.6723': attribute type 10 has an invalid length. [ 554.676688][T20229] veth1_vlan: entered allmulticast mode [ 554.711381][T20229] team0: Device veth1_vlan failed to register rx_handler [ 554.869810][ T9] usb 3-1: new high-speed USB device number 102 using dummy_hcd [ 555.024633][ T9] usb 3-1: Using ep0 maxpacket: 32 [ 555.039881][ T9] usb 3-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 9 [ 555.064245][ T9] usb 3-1: New USB device found, idVendor=14c8, idProduct=0003, bcdDevice= 5.6c [ 555.097715][ T9] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 555.125342][ T9] usb 3-1: Product: syz [ 555.152467][ T9] usb 3-1: Manufacturer: syz [ 555.162362][ T9] usb 3-1: SerialNumber: syz [ 555.191226][ T9] usb 3-1: config 0 descriptor?? [ 555.207308][T20228] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 555.276787][ T9] input: syz syz as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/input/input67 [ 555.517612][ T24] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 555.568137][ T5981] usb 3-1: USB disconnect, device number 102 [ 555.568308][ C0] usbtouchscreen 3-1:0.0: usbtouch_irq - usb_submit_urb failed with result: -19 [ 555.685322][ T24] usb 2-1: config 0 has an invalid interface number: 255 but max is 0 [ 555.707463][ T24] usb 2-1: config 0 has no interface number 0 [ 555.720334][ T24] usb 2-1: config 0 interface 255 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 555.740749][ T24] usb 2-1: config 0 interface 255 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 555.766238][ T24] usb 2-1: New USB device found, idVendor=10cf, idProduct=8065, bcdDevice=91.79 [ 555.789930][ T24] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 555.821559][ T24] usb 2-1: Product: syz [ 555.830059][ T24] usb 2-1: Manufacturer: syz [ 555.847942][ T24] usb 2-1: SerialNumber: syz [ 555.892045][ T24] usb 2-1: config 0 descriptor?? [ 555.916665][ T24] vmk80xx 2-1:0.255: driver 'vmk80xx' failed to auto-configure device. [ 555.953580][ T24] vmk80xx 2-1:0.255: probe with driver vmk80xx failed with error -22 [ 556.151832][ T24] usb 2-1: USB disconnect, device number 21 [ 556.332214][T20275] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6746'. [ 556.630552][T20289] wlan1 speed is unknown, defaulting to 1000 [ 558.041617][T20341] netlink: 232 bytes leftover after parsing attributes in process `syz.2.6776'. [ 558.219592][ T30] kauditd_printk_skb: 14316 callbacks suppressed [ 558.219613][ T30] audit: type=1400 audit(2000004662.822:231813): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1337 comm="kworker/u8:6" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 558.258118][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64 [ 558.265487][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 558.272107][ C1] audit: audit_lost=17574 audit_rate_limit=0 audit_backlog_limit=64 [ 558.275059][ T5903] audit: audit_lost=17575 audit_rate_limit=0 audit_backlog_limit=64 [ 558.280155][ C1] audit: backlog limit exceeded [ 558.280801][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 558.299763][ C1] audit: audit_lost=17576 audit_rate_limit=0 audit_backlog_limit=64 [ 558.304897][ T5903] audit: backlog limit exceeded [ 558.307785][ C1] audit: backlog limit exceeded [ 558.796404][T20364] vivid-007: ================= START STATUS ================= [ 558.833217][T20364] vivid-007: Generate PTS: true [ 558.860524][T20364] vivid-007: Generate SCR: true [ 558.868524][T20364] tpg source WxH: 320x240 (Y'CbCr) [ 558.881913][T20364] tpg field: 1 [ 558.893131][T20364] tpg crop: (0,0)/320x240 [ 558.908134][T20364] tpg compose: (0,0)/320x240 [ 558.922889][T20364] tpg colorspace: 8 [ 558.937791][ T6000] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 558.956363][T20364] tpg transfer function: 0/0 [ 558.971057][T20364] tpg Y'CbCr encoding: 0/0 [ 558.982890][T20364] tpg quantization: 0/0 [ 559.018138][T20364] tpg RGB range: 0/2 [ 559.036378][T20364] vivid-007: ================== END STATUS ================== [ 559.103432][ T6000] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 559.134657][ T6000] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 559.169441][ T6000] usb 2-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 0 [ 559.197899][ T6000] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 559.217596][ T6000] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 559.263021][ T6000] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 559.444064][ T6000] snd-usb-audio 2-1:27.0: probe with driver snd-usb-audio failed with error -12 [ 559.571401][ T6000] usb 2-1: USB disconnect, device number 22 [ 559.585817][T19378] udevd[19378]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:27.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 559.694277][T20393] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6800'. [ 559.749451][T20393] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6800'. [ 560.082978][T20410] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6810'. [ 560.106964][T20411] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6808'. [ 560.136570][T20410] openvswitch: netlink: nsh attribute has 65532 unknown bytes. [ 560.144224][T20410] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 561.523970][T20478] : renamed from hsr_slave_0 (while UP) [ 561.681348][T20486] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6846'. [ 561.945327][T20500] usb usb6: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 562.022331][ T9] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 562.203444][ T9] usb 2-1: Using ep0 maxpacket: 16 [ 562.225067][ T9] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid maxpacket 49168, setting to 1024 [ 562.251786][ T9] usb 2-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 562.277144][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 562.295813][ T9] usb 2-1: Product: syz [ 562.315784][ T9] usb 2-1: Manufacturer: syz [ 562.333076][ T9] usb 2-1: SerialNumber: syz [ 562.356135][ T9] usb 2-1: config 0 descriptor?? [ 562.399848][ T9] em28xx 2-1:0.0: New device syz syz @ 480 Mbps (2040:0264, interface 0, class 0) [ 562.426503][ T9] em28xx 2-1:0.0: DVB interface 0 found: isoc [ 562.632348][ T9] em28xx 2-1:0.0: unknown em28xx chip ID (0) [ 562.676626][T20528] veth1_macvtap: left promiscuous mode [ 562.695380][T20530] tmpfs: Bad value for 'mpol' [ 562.722988][ T9] em28xx 2-1:0.0: reading from i2c device at 0xa0 failed (error=-5) [ 562.744351][ T9] em28xx 2-1:0.0: board has no eeprom [ 562.850660][ T9] em28xx 2-1:0.0: Identified as PCTV tripleStick (292e) (card=94) [ 562.865460][ T9] em28xx 2-1:0.0: dvb set to isoc mode. [ 562.880960][ T6014] em28xx 2-1:0.0: Binding DVB extension [ 562.903733][ T9] usb 2-1: USB disconnect, device number 23 [ 562.925473][ T9] em28xx 2-1:0.0: Disconnecting em28xx [ 562.983549][ T30] kauditd_printk_skb: 15551 callbacks suppressed [ 562.983570][ T30] audit: type=1400 audit(2000004667.830:242964): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20537 comm="modprobe" name="usr" dev="sda1" ino=1480 [ 563.045630][ T5895] audit: audit_backlog=65 > audit_backlog_limit=64 [ 563.045770][T20541] audit: audit_backlog=65 > audit_backlog_limit=64 [ 563.052767][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64 [ 563.059907][T20542] audit: audit_backlog=65 > audit_backlog_limit=64 [ 563.066468][ T5903] audit: audit_lost=19044 audit_rate_limit=0 audit_backlog_limit=64 [ 563.080768][T20541] audit: audit_lost=19045 audit_rate_limit=0 audit_backlog_limit=64 [ 563.082618][T20537] audit: audit_backlog=65 > audit_backlog_limit=64 [ 563.095643][T20541] audit: backlog limit exceeded [ 563.102914][ T5895] audit: audit_lost=19046 audit_rate_limit=0 audit_backlog_limit=64 [ 563.137386][ T6014] em28xx 2-1:0.0: Registering input extension [ 563.162704][ T9] em28xx 2-1:0.0: Closing input extension [ 563.282437][ T9] em28xx 2-1:0.0: Freeing device [ 563.320330][T19375] udevd[19375]: setting owner of /dev/bus/usb/002/023 to uid=0, gid=0 failed: No such file or directory [ 565.515547][T20644] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 565.571049][T20644] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 565.982437][T20667] netlink: 'syz.0.6932': attribute type 5 has an invalid length. [ 566.943378][T20704] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6949'. [ 567.240109][T20710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 567.498781][ T9] usb 4-1: new high-speed USB device number 18 using dummy_hcd [ 567.690981][ T9] usb 4-1: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=e2.3d [ 567.718214][ T9] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 567.726318][ T9] usb 4-1: Product: syz [ 567.755334][ T9] usb 4-1: Manufacturer: syz [ 567.755628][ T30] kauditd_printk_skb: 12559 callbacks suppressed [ 567.755647][ T30] audit: type=1400 audit(2000004672.838:253739): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20736 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 567.760165][ T9] usb 4-1: SerialNumber: syz [ 567.777106][ T5895] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.786045][ C0] vkms_vblank_simulate: vblank timer overrun [ 567.791511][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.791536][ C1] audit: audit_lost=19642 audit_rate_limit=0 audit_backlog_limit=64 [ 567.791557][ C1] audit: backlog limit exceeded [ 567.797387][T20738] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.798854][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.810843][T20738] audit: audit_lost=19643 audit_rate_limit=0 audit_backlog_limit=64 [ 567.811242][ C1] audit: audit_lost=19644 audit_rate_limit=0 audit_backlog_limit=64 [ 567.820255][T20738] audit: backlog limit exceeded [ 567.900805][ T9] r8152-cfgselector 4-1: Unknown version 0x0000 [ 567.907137][ T9] r8152-cfgselector 4-1: config 0 descriptor?? [ 568.117406][ T6014] usb 1-1: new high-speed USB device number 25 using dummy_hcd [ 568.298363][ T6014] usb 1-1: Using ep0 maxpacket: 32 [ 568.309942][ T6014] usb 1-1: config 0 has an invalid interface number: 35 but max is 0 [ 568.326636][ T6014] usb 1-1: config 0 has no interface number 0 [ 568.345938][ T6014] usb 1-1: New USB device found, idVendor=10c4, idProduct=818a, bcdDevice=7d.8f [ 568.362687][ T5981] r8152-cfgselector 4-1: USB disconnect, device number 18 [ 568.370029][ T6014] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 568.370059][ T6014] usb 1-1: Product: syz [ 568.370076][ T6014] usb 1-1: Manufacturer: syz [ 568.370093][ T6014] usb 1-1: SerialNumber: syz [ 568.400171][ T6014] usb 1-1: config 0 descriptor?? [ 568.440461][ T6014] radio-si470x 1-1:0.35: could not find interrupt in endpoint [ 568.498617][ T6014] radio-si470x 1-1:0.35: probe with driver radio-si470x failed with error -5 [ 568.657257][ T6014] radio-raremono 1-1:0.35: this is not Thanko's Raremono. [ 568.679653][ T6014] usbhid 1-1:0.35: couldn't find an input interrupt endpoint [ 568.886650][ T5854] usb 1-1: USB disconnect, device number 25 [ 569.090369][ T6014] usb 3-1: new high-speed USB device number 103 using dummy_hcd [ 569.227774][T20789] ieee802154 phy0 wpan0: encryption failed: -22 [ 569.250774][ T6014] usb 3-1: Using ep0 maxpacket: 8 [ 569.263281][ T6014] usb 3-1: config 168 descriptor has 1 excess byte, ignoring [ 569.275333][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 569.287563][ T6014] usb 3-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 569.300409][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 569.312367][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 569.324292][ T6014] usb 3-1: config 168 descriptor has 1 excess byte, ignoring [ 569.335126][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 569.352838][ T6014] usb 3-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 569.366730][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 569.383668][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 569.440349][ T6014] usb 3-1: config 168 descriptor has 1 excess byte, ignoring [ 569.458396][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 569.476882][T20794] netlink: 'syz.4.6991': attribute type 1 has an invalid length. [ 569.479942][ T6014] usb 3-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 569.487312][T20794] netlink: 224 bytes leftover after parsing attributes in process `syz.4.6991'. [ 569.512800][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 569.525267][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 569.541127][ T6014] usb 3-1: string descriptor 0 read error: -22 [ 569.548805][ T6014] usb 3-1: New USB device found, idVendor=0a07, idProduct=0064, bcdDevice=40.6e [ 569.563609][ T6014] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 569.599743][ T6014] adutux 3-1:168.0: ADU100 now attached to /dev/usb/adutux0 [ 569.840123][ T5854] usb 3-1: USB disconnect, device number 103 [ 570.275393][T20818] xt_hashlimit: overflow, try lower: 18446744073709551615/7 [ 570.431590][ T5854] usb 1-1: new high-speed USB device number 26 using dummy_hcd [ 570.639244][ T5854] usb 1-1: unable to get BOS descriptor or descriptor too short [ 570.654938][ T5854] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 570.678133][ T5854] usb 1-1: config 1 interface 0 altsetting 247 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 570.705484][ T5854] usb 1-1: config 1 interface 0 has no altsetting 1 [ 570.726188][ T5854] usb 1-1: New USB device found, idVendor=2040, idProduct=b990, bcdDevice=f6.75 [ 570.752313][ T5854] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 570.765472][ T5854] usb 1-1: Product: syz [ 570.772440][ T5854] usb 1-1: Manufacturer: syz [ 570.784191][ T5854] usb 1-1: SerialNumber: syz [ 570.811912][ T5854] smsusb:smsusb_probe: board id=8, interface number 0 [ 571.017785][ T5854] smsusb:smsusb_probe: Device initialized with return code -19 [ 571.251148][ T5854] usb 1-1: USB disconnect, device number 26 [ 571.650140][T20865] libceph: resolve '0.' (ret=-3): failed [ 572.527286][ T30] kauditd_printk_skb: 12393 callbacks suppressed [ 572.527305][ T30] audit: type=1400 audit(2000004677.857:265575): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5903 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 572.570323][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.583865][T20898] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.586647][ T5903] audit: audit_lost=19831 audit_rate_limit=0 audit_backlog_limit=64 [ 572.599882][T20898] audit: audit_lost=19832 audit_rate_limit=0 audit_backlog_limit=64 [ 572.606361][ T5903] audit: backlog limit exceeded [ 572.609063][T20901] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.613960][ T5893] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.626687][T20901] audit: audit_lost=19833 audit_rate_limit=0 audit_backlog_limit=64 [ 572.637482][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.790178][T20907] netlink: 'syz.2.7044': attribute type 1 has an invalid length. [ 572.882375][T20070] Bluetooth: hci1: ACL packet for unknown connection handle 196 [ 573.298017][T20929] netlink: 'syz.2.7056': attribute type 2 has an invalid length. [ 573.907088][T20957] netlink: 'syz.3.7069': attribute type 11 has an invalid length. [ 573.993851][ T6014] usb 1-1: new high-speed USB device number 27 using dummy_hcd [ 574.165620][ T6014] usb 1-1: Using ep0 maxpacket: 16 [ 574.178761][ T6014] usb 1-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 574.208076][ T6014] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 574.234510][ T6014] usb 1-1: Product: syz [ 574.248883][ T6014] usb 1-1: Manufacturer: syz [ 574.257043][ T6014] usb 1-1: SerialNumber: syz [ 574.286264][ T6014] r8152-cfgselector 1-1: Unknown version 0x0000 [ 574.303047][ T6014] r8152-cfgselector 1-1: config 0 descriptor?? [ 574.769995][ T24] r8152-cfgselector 1-1: USB disconnect, device number 27 [ 574.772778][T20989] macvtap0: entered allmulticast mode [ 574.804102][T20989] veth0_macvtap: entered allmulticast mode [ 575.409262][T21014] netlink: 'syz.1.7099': attribute type 10 has an invalid length. [ 575.449750][T21014] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 575.494873][T21014] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 575.572970][T21020] ip6gretap1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 576.477323][T21052] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7117'. [ 576.993422][T21076] xt_NFQUEUE: number of total queues is 0 [ 577.300903][ T30] kauditd_printk_skb: 11014 callbacks suppressed [ 577.300923][ T30] audit: type=1400 audit(2000004682.876:275726): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5903 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 577.342234][ T5893] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.344308][ T5901] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.350020][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.357002][ T5903] audit: audit_backlog=66 > audit_backlog_limit=64 [ 577.362775][ C1] audit: audit_lost=20122 audit_rate_limit=0 audit_backlog_limit=64 [ 577.369716][ T5901] audit: audit_lost=20123 audit_rate_limit=0 audit_backlog_limit=64 [ 577.377334][ C1] audit: backlog limit exceeded [ 577.377693][ C1] audit: audit_backlog=66 > audit_backlog_limit=64 [ 577.385731][ T30] audit: type=1400 audit(2000004682.897:275727): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5903 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 577.660882][T21101] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7141'. [ 577.820516][T21109] netlink: 28 bytes leftover after parsing attributes in process `syz.4.7144'. [ 577.874847][T21109] netlink: 28 bytes leftover after parsing attributes in process `syz.4.7144'. [ 578.784646][T21140] xt_SECMARK: invalid mode: 2 [ 579.233279][T21154] bridge3: entered promiscuous mode [ 579.388239][T21160] xt_ecn: cannot match TCP bits for non-tcp packets [ 580.984623][T21189] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 581.683689][ T24] usb 5-1: new high-speed USB device number 13 using dummy_hcd [ 581.724226][T21207] openvswitch: netlink: Message has 1 unknown bytes. [ 581.847749][T21207] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 581.872361][ T24] usb 5-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 581.935878][ T24] usb 5-1: config 27 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 581.971160][ T24] usb 5-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 0 [ 582.032087][ T24] usb 5-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 582.079823][ T24] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 582.089445][ T30] kauditd_printk_skb: 6665 callbacks suppressed [ 582.089464][ T30] audit: type=1400 audit(2000004687.895:281363): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21212 comm="syz.1.7195" name="newroot" dev="tmpfs" ino=2 [ 582.208536][ T24] usb 5-1: Quirk or no altset; falling back to MIDI 1.0 [ 582.246276][T21201] audit: audit_backlog=65 > audit_backlog_limit=64 [ 582.255911][T21216] audit: audit_backlog=66 > audit_backlog_limit=64 [ 582.262865][ T30] audit: type=1400 audit(2000004687.895:281364): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21212 comm="syz.1.7195" name="/" dev="devtmpfs" ino=1 [ 582.281735][ C1] vkms_vblank_simulate: vblank timer overrun [ 582.301691][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 582.308345][ C1] audit: audit_lost=20468 audit_rate_limit=0 audit_backlog_limit=64 [ 582.316450][ C1] audit: backlog limit exceeded [ 582.323105][ T5893] audit: audit_backlog=65 > audit_backlog_limit=64 [ 582.332606][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 582.339268][ C1] audit: audit_lost=20469 audit_rate_limit=0 audit_backlog_limit=64 [ 582.718682][ T24] snd-usb-audio 5-1:27.0: probe with driver snd-usb-audio failed with error -12 [ 582.870533][ T24] usb 5-1: USB disconnect, device number 13 [ 583.035014][T21222] udevd[21222]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:27.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 583.108713][T21226] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7199'. [ 583.429760][T21230] lo: entered promiscuous mode [ 583.448144][T21230] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 585.316650][T21269] netlink: 'syz.3.7221': attribute type 6 has an invalid length. [ 586.870279][ T30] kauditd_printk_skb: 8810 callbacks suppressed [ 586.870299][ T30] audit: type=1400 audit(2000004692.913:286679): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5904 comm="syz-executor" path="/1423" dev="tmpfs" ino=7143 [ 586.926082][T21299] audit: audit_backlog=65 > audit_backlog_limit=64 [ 586.928943][T21301] audit: audit_backlog=65 > audit_backlog_limit=64 [ 586.966594][T21300] audit: audit_backlog=65 > audit_backlog_limit=64 [ 586.980192][T21300] audit: audit_lost=21636 audit_rate_limit=0 audit_backlog_limit=64 [ 586.984067][T21299] audit: audit_lost=21637 audit_rate_limit=0 audit_backlog_limit=64 [ 586.988735][T21301] audit: audit_lost=21638 audit_rate_limit=0 audit_backlog_limit=64 [ 586.988757][T21301] audit: backlog limit exceeded [ 586.988780][T21301] audit: audit_backlog=65 > audit_backlog_limit=64 [ 586.988795][T21301] audit: audit_lost=21639 audit_rate_limit=0 audit_backlog_limit=64 [ 588.565922][T21344] netlink: 'syz.1.7256': attribute type 30 has an invalid length. [ 589.109335][T21357] Zero length message leads to an empty skb [ 589.477602][T21363] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 590.938803][T21395] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 591.186010][T21401] Invalid ELF header magic: != ELF [ 591.632338][ T5893] audit_log_start: 5623 callbacks suppressed [ 591.632357][ T5893] audit: audit_backlog=65 > audit_backlog_limit=64 [ 591.633016][ T30] audit: type=1400 audit(2000004697.911:291823): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 591.664840][ C1] vkms_vblank_simulate: vblank timer overrun [ 591.665108][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 591.665129][ C1] audit: audit_lost=21799 audit_rate_limit=0 audit_backlog_limit=64 [ 591.665147][ C1] audit: backlog limit exceeded [ 591.691958][T21409] audit: audit_backlog=65 > audit_backlog_limit=64 [ 591.699124][ T5893] audit: audit_lost=21800 audit_rate_limit=0 audit_backlog_limit=64 [ 591.716850][T21412] audit: audit_backlog=65 > audit_backlog_limit=64 [ 591.727908][T21409] audit: audit_lost=21801 audit_rate_limit=0 audit_backlog_limit=64 [ 591.737758][ T5893] audit: backlog limit exceeded [ 592.233837][T21423] netlink: 256 bytes leftover after parsing attributes in process `syz.2.7292'. [ 592.775433][ T5869] usb 5-1: new high-speed USB device number 14 using dummy_hcd [ 592.851833][ T24] usb 4-1: new high-speed USB device number 19 using dummy_hcd [ 592.960349][ T5869] usb 5-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 592.988872][ T5869] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 593.033504][ T24] usb 4-1: New USB device found, idVendor=077b, idProduct=2226, bcdDevice=ca.8b [ 593.052415][ T5869] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 593.082021][ T24] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 593.102714][ T5869] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 593.143214][ T24] usb 4-1: config 0 descriptor?? [ 593.170490][ T5869] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 593.271171][ T5869] usb 5-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 593.319897][ T5869] usb 5-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 593.376626][ T5869] usb 5-1: Product: syz [ 593.423131][ T5869] usb 5-1: Manufacturer: syz [ 593.476734][ T5869] cdc_wdm 5-1:1.0: skipping garbage [ 593.514244][ T5869] cdc_wdm 5-1:1.0: skipping garbage [ 593.582406][ T5869] cdc_wdm 5-1:1.0: cdc-wdm0: USB WDM device [ 593.622313][ T24] asix 4-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 593.635798][ T5869] cdc_wdm 5-1:1.0: Unknown control protocol [ 593.716317][ T24] asix 4-1:0.0: probe with driver asix failed with error -71 [ 593.733119][ T5869] usb 5-1: USB disconnect, device number 14 [ 593.882749][ T24] usb 4-1: USB disconnect, device number 19 [ 594.177183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 594.189896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 594.202383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 594.214876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 594.227705][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 594.240261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 594.252742][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 594.265250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 594.277829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 594.290301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 596.454050][ T30] kauditd_printk_skb: 4620 callbacks suppressed [ 596.454073][ T30] audit: type=1400 audit(2000004702.961:295244): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21457 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 596.546583][ T5895] audit: audit_backlog=65 > audit_backlog_limit=64 [ 596.833086][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 596.839724][ C1] audit: audit_lost=22202 audit_rate_limit=0 audit_backlog_limit=64 [ 596.847929][ C1] audit: backlog limit exceeded [ 596.869644][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 596.876274][ C1] audit: audit_lost=22203 audit_rate_limit=0 audit_backlog_limit=64 [ 596.884442][ C1] audit: backlog limit exceeded [ 597.331949][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 597.338615][ C1] audit: audit_lost=22204 audit_rate_limit=0 audit_backlog_limit=64 [ 598.947501][ C1] net_ratelimit: 10208 callbacks suppressed [ 598.947524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 598.966133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 598.978629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 598.991114][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 599.003684][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 599.016216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 599.028723][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 599.041385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 599.053879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 599.066403][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.719030][ C1] net_ratelimit: 11392 callbacks suppressed [ 603.719052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.737578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.750336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.762820][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.775320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.787782][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.800266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.812733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.825216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 603.837724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 604.547493][ C0] sched: DL replenish lagged too much [ 604.852047][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 608.490747][ C1] net_ratelimit: 11563 callbacks suppressed [ 608.490770][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 608.509350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 608.521822][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 608.534321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 608.546813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 608.559382][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 608.571935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 608.584528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 608.596995][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 608.609459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 611.605226][ T30] kauditd_printk_skb: 99 callbacks suppressed [ 611.605249][ T30] audit: type=1400 audit(2000004706.531:295310): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 612.681343][ T5895] audit: audit_lost=22216 audit_rate_limit=0 audit_backlog_limit=64 [ 612.689493][ T5895] audit: backlog limit exceeded [ 613.262265][ C1] net_ratelimit: 11581 callbacks suppressed [ 613.262290][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 613.280753][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 613.293437][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 613.305954][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 613.318441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 613.330963][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 613.343545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 613.356052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 613.368560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 613.381111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 615.211853][T21456] audit: audit_backlog=65 > audit_backlog_limit=64 [ 615.346739][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 615.353376][ C1] audit: audit_lost=22217 audit_rate_limit=0 audit_backlog_limit=64 [ 615.361435][ C1] audit: backlog limit exceeded [ 615.849955][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 615.856666][ C1] audit: audit_lost=22218 audit_rate_limit=0 audit_backlog_limit=64 [ 615.864723][ C1] audit: backlog limit exceeded [ 616.419991][T21456] audit_log_lost: 3 callbacks suppressed [ 616.420013][T21456] audit: audit_lost=22220 audit_rate_limit=0 audit_backlog_limit=64 [ 616.804914][ T30] audit: type=1400 audit(2000004707.056:295311): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 617.353455][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 617.360105][ C1] audit: audit_lost=22221 audit_rate_limit=0 audit_backlog_limit=64 [ 617.368190][ C1] audit: backlog limit exceeded [ 617.387828][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 617.394410][ C1] audit: audit_lost=22222 audit_rate_limit=0 audit_backlog_limit=64 [ 617.402477][ C1] audit: backlog limit exceeded [ 617.851492][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 617.858132][ C1] audit: audit_lost=22223 audit_rate_limit=0 audit_backlog_limit=64 [ 618.034168][ C1] net_ratelimit: 10516 callbacks suppressed [ 618.034191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 618.052692][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 618.065171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 618.077792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 618.090291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 618.102795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 618.115272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 618.127757][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 618.140347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 618.152865][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 621.368069][ C1] audit_log_start: 55 callbacks suppressed [ 621.368091][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 621.380527][ C1] audit: audit_lost=22242 audit_rate_limit=0 audit_backlog_limit=64 [ 621.388577][ C1] audit: backlog limit exceeded [ 621.852040][ T5901] audit: audit_backlog=65 > audit_backlog_limit=64 [ 621.874457][ T5901] audit: audit_lost=22243 audit_rate_limit=0 audit_backlog_limit=64 [ 621.882720][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 621.882744][ C1] audit: audit_lost=22244 audit_rate_limit=0 audit_backlog_limit=64 [ 621.882763][ C1] audit: backlog limit exceeded [ 622.114077][T21456] audit: backlog limit exceeded [ 622.119060][T21456] audit: audit_backlog=65 > audit_backlog_limit=64 [ 622.805690][ C1] net_ratelimit: 10765 callbacks suppressed [ 622.805714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 622.824266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 622.836739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 622.849313][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 622.861816][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 622.874314][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 622.886827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 622.899481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 622.911953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 622.924410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 626.897567][ T30] kauditd_printk_skb: 83 callbacks suppressed [ 626.897590][ T30] audit: type=1400 audit(2000004734.387:295387): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=49 comm="kworker/u8:3" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 627.577061][ C1] net_ratelimit: 10356 callbacks suppressed [ 627.577084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 627.595542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 627.608154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 627.620655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 627.633158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 627.645725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 627.658215][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 627.670689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 627.683181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 627.695691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 628.535223][ T5901] audit: backlog limit exceeded [ 632.348649][ C1] net_ratelimit: 11059 callbacks suppressed [ 632.348671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 632.367244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 632.379734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 632.392323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 632.404966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 632.417455][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 632.429956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 632.442453][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 632.454914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 632.467431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 633.324464][ T30] audit: type=1400 audit(2000004734.387:295388): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=49 comm="kworker/u8:3" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 637.120611][ C1] net_ratelimit: 11400 callbacks suppressed [ 637.120633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 637.139257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 637.151765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 637.164243][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 637.176749][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 637.189229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 637.201733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 637.214199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 637.226886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 637.239468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 641.891629][ C1] net_ratelimit: 10579 callbacks suppressed [ 641.891655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 641.910085][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 641.922572][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 641.935086][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 641.947617][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 641.960111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 641.972692][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 641.985919][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 641.998430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 642.010968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 642.940063][ C0] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 644.165984][ T5193] audit: audit_backlog=65 > audit_backlog_limit=64 [ 644.401832][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 644.408479][ C1] audit: audit_lost=22248 audit_rate_limit=0 audit_backlog_limit=64 [ 644.416530][ C1] audit: backlog limit exceeded [ 644.904128][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 644.910813][ C1] audit: audit_lost=22249 audit_rate_limit=0 audit_backlog_limit=64 [ 644.918895][ C1] audit: backlog limit exceeded [ 645.406455][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 645.413137][ C1] audit: audit_lost=22250 audit_rate_limit=0 audit_backlog_limit=64 [ 645.421202][ C1] audit: backlog limit exceeded [ 646.663673][ C1] net_ratelimit: 10895 callbacks suppressed [ 646.663698][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 646.682330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 646.694841][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 646.707347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 646.719838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 646.732510][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 646.745006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 646.757684][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 646.770217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 646.782696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 649.411230][ C1] audit_log_start: 30 callbacks suppressed [ 649.411253][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 649.423780][ C1] audit: audit_lost=22261 audit_rate_limit=0 audit_backlog_limit=64 [ 649.431946][ C1] audit: backlog limit exceeded [ 649.903431][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 649.910040][ C1] audit: audit_lost=22262 audit_rate_limit=0 audit_backlog_limit=64 [ 649.918128][ C1] audit: backlog limit exceeded [ 650.400781][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 650.407404][ C1] audit: audit_lost=22263 audit_rate_limit=0 audit_backlog_limit=64 [ 650.415427][ C1] audit: backlog limit exceeded [ 650.907881][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 651.435412][ C1] net_ratelimit: 10846 callbacks suppressed [ 651.435434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 651.454041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 651.466678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 651.479206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 651.491745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 651.504326][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 651.516874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 651.529553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 651.542158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 651.554732][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 654.406894][ C1] audit_log_start: 50 callbacks suppressed [ 654.406917][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 654.419373][ C1] audit: audit_lost=22281 audit_rate_limit=0 audit_backlog_limit=64 [ 654.427425][ C1] audit: backlog limit exceeded [ 654.906141][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 654.912783][ C1] audit: audit_lost=22282 audit_rate_limit=0 audit_backlog_limit=64 [ 654.920808][ C1] audit: backlog limit exceeded [ 655.236787][ T30] audit: type=1400 audit(2000004734.387:295389): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=49 comm="kworker/u8:3" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 655.913268][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 655.920005][ C1] audit: audit_lost=22283 audit_rate_limit=0 audit_backlog_limit=64 [ 655.928071][ C1] audit: backlog limit exceeded [ 656.206952][ C1] net_ratelimit: 11384 callbacks suppressed [ 656.206975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 656.225425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 656.237931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 656.250700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 656.263176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 656.275650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 656.288118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 656.300587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 656.313073][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 656.325572][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 657.761047][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 659.418458][ C1] audit_log_start: 24 callbacks suppressed [ 659.418482][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 659.431104][ C1] audit: audit_lost=22292 audit_rate_limit=0 audit_backlog_limit=64 [ 659.439161][ C1] audit: backlog limit exceeded [ 659.919304][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 659.925933][ C1] audit: audit_lost=22293 audit_rate_limit=0 audit_backlog_limit=64 [ 659.933984][ C1] audit: backlog limit exceeded [ 660.423820][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 660.430461][ C1] audit: audit_lost=22294 audit_rate_limit=0 audit_backlog_limit=64 [ 660.438524][ C1] audit: backlog limit exceeded [ 660.917993][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 660.978668][ C1] net_ratelimit: 11436 callbacks suppressed [ 660.978691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 660.997220][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 661.009850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 661.022363][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 661.034956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 661.047605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 661.060077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 661.072591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 661.085077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 661.097594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 664.361536][ C1] audit_log_start: 64 callbacks suppressed [ 664.361559][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 664.361577][ C1] audit: audit_lost=22317 audit_rate_limit=0 audit_backlog_limit=64 [ 664.361595][ C1] audit: backlog limit exceeded [ 664.695161][ T30] audit: type=1400 audit(2000004734.429:295390): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=49 comm="kworker/u8:3" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 664.695221][ T30] audit: type=1400 audit(2000004734.933:295391): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=21457 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 664.695274][ T30] audit: type=1400 audit(2000004735.437:295392): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 664.695324][ T30] audit: type=1400 audit(2000004735.951:295393): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 664.695372][ T30] audit: type=1400 audit(2000004736.277:295394): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5193 comm="udevd" path="/run/udev/rules.d" dev="tmpfs" ino=11 [ 664.695418][ T30] audit: type=1400 audit(2000004736.308:295395): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="sda1" ino=2 [ 664.695463][ T30] audit: type=1400 audit(2000004736.308:295396): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="lib" dev="sda1" ino=264 [ 665.750285][ C1] net_ratelimit: 11447 callbacks suppressed [ 665.750308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 665.750722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 665.751161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 665.751565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 665.751959][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 665.752263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 665.752586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 665.752923][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 665.753378][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 665.753829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.503019][ T30] kauditd_printk_skb: 76 callbacks suppressed [ 670.503040][ T30] audit: type=1400 audit(2000004779.598:295473): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=4145 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 670.503093][ T30] audit: type=1400 audit(2000004780.123:295474): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 670.503142][ T30] audit: type=1400 audit(2000004780.658:295475): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 670.521726][ C1] net_ratelimit: 10794 callbacks suppressed [ 670.521745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.522252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.522750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.523245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.523743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.524239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.524733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.525229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.525715][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.526206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 670.577057][ T30] audit: type=1400 audit(2000004780.742:295476): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 670.577118][ T30] audit: type=1400 audit(2000004780.742:295477): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 670.577164][ T30] audit: type=1400 audit(2000004780.742:295478): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269 [ 671.188799][ T30] audit: type=1400 audit(2000004781.173:295479): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=4145 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 672.306321][ T30] audit: type=1400 audit(2000004781.698:295480): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 672.306384][ T30] audit: type=1400 audit(2000004782.223:295481): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 672.394855][ T30] audit: type=1400 audit(2000004782.653:295482): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="/" dev="sda1" ino=2 [ 675.293638][ C1] net_ratelimit: 11134 callbacks suppressed [ 675.293662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.294088][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.294503][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.294926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.295343][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.295797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.296358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.296784][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.297217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.297815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 675.492800][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 675.492823][ T30] audit: type=1400 audit(2000004785.950:295496): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 676.676870][ T30] audit: type=1400 audit(2000004786.464:295497): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 676.676942][ T30] audit: type=1400 audit(2000004786.989:295498): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 676.985995][ T30] audit: type=1400 audit(2000004787.493:295499): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5893 comm="syz-executor" path="/1442" dev="tmpfs" ino=7242 [ 677.202627][ T30] audit: type=1400 audit(2000004787.535:295500): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=4145 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 677.828778][ T30] audit: type=1400 audit(2000004788.039:295501): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 678.943845][ T30] audit: type=1400 audit(2000004788.585:295502): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 678.943908][ T30] audit: type=1400 audit(2000004789.110:295503): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 678.991266][ T30] audit: type=1400 audit(2000004789.646:295504): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5193 comm="udevd" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 680.064954][ C1] net_ratelimit: 11444 callbacks suppressed [ 680.064977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.065463][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.065920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.066380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.066851][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.067330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.067793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.068281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.068734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.069187][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 680.160521][ T30] audit: type=1400 audit(2000004790.150:295505): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=21458 comm="kworker/u8:4" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 682.492067][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 682.492089][ T30] audit: type=1400 audit(2000004791.200:295507): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 682.492143][ T30] audit: type=1400 audit(2000004791.735:295508): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 682.492192][ T30] audit: type=1400 audit(2000004792.260:295509): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 682.492240][ T30] audit: type=1400 audit(2000004792.649:295510): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="sda1" ino=2 [ 682.492285][ T30] audit: type=1400 audit(2000004792.649:295511): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="var" dev="sda1" ino=2001 [ 682.492330][ T30] audit: type=1400 audit(2000004792.649:295512): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="var" dev="sda1" ino=2001 [ 682.492375][ T30] audit: type=1400 audit(2000004792.649:295513): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="sda1" ino=2 [ 682.492419][ T30] audit: type=1400 audit(2000004792.649:295514): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 [ 682.492464][ T30] audit: type=1400 audit(2000004792.649:295515): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=1834 [ 682.492509][ T30] audit: type=1400 audit(2000004792.649:295516): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1838 [ 684.836767][ C1] net_ratelimit: 11146 callbacks suppressed [ 684.836791][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 684.837208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 684.837616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 684.838051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 684.838455][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 684.838866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 684.839299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 684.839705][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 684.840146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 684.840563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 687.359830][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 687.359852][ T30] audit: type=1400 audit(2000004798.329:295534): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sda1" ino=2 [ 687.359903][ T30] audit: type=1400 audit(2000004798.350:295535): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sysfs" ino=1 [ 687.359948][ T30] audit: type=1400 audit(2000004798.350:295536): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="devices" dev="sysfs" ino=7 [ 687.359994][ T30] audit: type=1400 audit(2000004798.381:295537): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="platform" dev="sysfs" ino=38 [ 687.378093][ T30] audit: type=1400 audit(2000004798.381:295538): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="dummy_hcd.4" dev="sysfs" ino=26770 [ 687.378149][ T30] audit: type=1400 audit(2000004798.381:295539): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="usb5" dev="sysfs" ino=26799 [ 688.415671][ T30] audit: type=1400 audit(2000004798.560:295540): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 688.415734][ T30] audit: type=1400 audit(2000004799.095:295541): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 689.005988][ T30] audit: type=1400 audit(2000004799.610:295542): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 689.006050][ T30] audit: type=1400 audit(2000004800.145:295543): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 689.608376][ C1] net_ratelimit: 11922 callbacks suppressed [ 689.608399][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 689.608825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 689.609228][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 689.609641][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 689.610091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 689.610526][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 689.610952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 689.611407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 689.611813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 689.612214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 692.145791][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 692.145812][ T30] audit: type=1400 audit(2000004802.770:295558): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 692.145867][ T30] audit: type=1400 audit(2000004803.295:295559): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 692.675061][ T30] audit: type=1400 audit(2000004803.820:295560): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=21458 comm="kworker/u8:4" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 693.003798][ T30] audit: type=1400 audit(2000004804.345:295561): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 693.513279][ T30] audit: type=1400 audit(2000004804.870:295562): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 694.162979][ T30] audit: type=1400 audit(2000004805.406:295563): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 694.191304][ T30] audit: type=1400 audit(2000004805.574:295564): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5901 comm="syz-executor" name="cgroup.net" dev="tmpfs" ino=7272 [ 694.191372][ T30] audit: type=1400 audit(2000004805.574:295565): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269 [ 694.191417][ T30] audit: type=1400 audit(2000004805.574:295566): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 694.191461][ T30] audit: type=1400 audit(2000004805.574:295567): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 694.379779][ C1] net_ratelimit: 11687 callbacks suppressed [ 694.379801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 694.380223][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 694.380652][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 694.381057][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 694.381468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 694.381893][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 694.382327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 694.382765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 694.383239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 694.383638][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 697.033984][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 697.034007][ T30] audit: type=1400 audit(2000004808.188:295574): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="crontabs" dev="sda1" ino=121 [ 697.034059][ T30] audit: type=1400 audit(2000004808.535:295575): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="sda1" ino=2 [ 697.034104][ T30] audit: type=1400 audit(2000004808.535:295576): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="tmpfs" ino=1 [ 697.034149][ T30] audit: type=1400 audit(2000004808.535:295577): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 697.034195][ T30] audit: type=1400 audit(2000004808.535:295578): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=5193 comm="udevd" name="queue" dev="tmpfs" ino=14985 [ 697.034238][ T30] audit: type=1400 audit(2000004808.556:295579): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 697.631165][ T30] audit: type=1400 audit(2000004808.640:295580): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sda1" ino=2 [ 697.631224][ T30] audit: type=1400 audit(2000004808.640:295581): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sysfs" ino=1 [ 697.631272][ T30] audit: type=1400 audit(2000004808.640:295582): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="devices" dev="sysfs" ino=7 [ 697.631317][ T30] audit: type=1400 audit(2000004808.640:295583): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="platform" dev="sysfs" ino=38 [ 699.151641][ C1] net_ratelimit: 11667 callbacks suppressed [ 699.151664][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 699.152097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 699.152500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 699.152934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 699.153338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 699.153752][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 699.154287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 699.154703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 699.155120][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 699.155546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 702.027673][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 702.040950][ T30] audit: type=1400 audit(2000004813.816:295604): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 702.063285][ T30] audit: type=1400 audit(2000004813.837:295605): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sysfs" ino=1 [ 702.063355][ T30] audit: type=1400 audit(2000004813.837:295606): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="devices" dev="sysfs" ino=7 [ 702.063400][ T30] audit: type=1400 audit(2000004813.837:295607): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="platform" dev="sysfs" ino=38 [ 702.063443][ T30] audit: type=1400 audit(2000004813.837:295608): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="dummy_hcd.4" dev="sysfs" ino=26770 [ 702.063486][ T30] audit: type=1400 audit(2000004813.837:295609): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="usb5" dev="sysfs" ino=26799 [ 702.103697][ T30] audit: type=1400 audit(2000004813.900:295610): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="/" dev="sda1" ino=2 [ 702.103752][ T30] audit: type=1400 audit(2000004813.900:295611): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="etc" dev="sda1" ino=116 [ 702.557672][ T30] audit: type=1400 audit(2000004814.330:295612): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=12 comm="kworker/u8:0" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 702.682883][ T30] audit: type=1400 audit(2000004814.509:295613): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5903 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 703.923387][ C1] net_ratelimit: 10759 callbacks suppressed [ 703.923411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 703.923849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 703.924278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 703.924710][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 703.925199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 703.925631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 703.926063][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 703.926493][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 703.926918][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 703.927377][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 707.907518][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 707.907541][ T30] audit: type=1400 audit(2000004819.423:295636): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 708.694887][ C1] net_ratelimit: 11565 callbacks suppressed [ 708.694911][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 708.695341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 708.695778][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 708.696184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 708.696595][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 708.696998][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 708.697425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 708.697838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 708.698266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 708.698682][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 710.919972][ T30] audit: type=1400 audit(2000004821.144:295637): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 713.434465][ T30] audit: type=1400 audit(2000004824.641:295638): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 713.466504][ C1] net_ratelimit: 11912 callbacks suppressed [ 713.466528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 713.466938][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 713.467353][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 713.467755][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 713.468159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 713.468613][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 713.469017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 713.469427][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 713.469831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 713.470235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 715.983864][ T30] audit: type=1400 audit(2000004828.452:295639): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5893 comm="syz-executor" path="/1442/cgroup" dev="tmpfs" ino=7243 [ 715.983925][ T30] audit: type=1400 audit(2000004828.452:295640): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 715.983972][ T30] audit: type=1400 audit(2000004828.452:295641): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 715.984017][ T30] audit: type=1400 audit(2000004828.452:295642): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="1442" dev="tmpfs" ino=7242 [ 718.238036][ C1] net_ratelimit: 11913 callbacks suppressed [ 718.238059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 718.238468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 718.238878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 718.239305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 718.239713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 718.240136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 718.240542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 718.240953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 718.241355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 718.241786][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 719.174757][ T30] audit: type=1400 audit(2000004831.634:295643): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 719.388347][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 720.569717][ T30] audit: type=1400 audit(2000004833.292:295644): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5193 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=14985 [ 721.113653][ T30] audit: type=1400 audit(2000004833.838:295645): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=21434 comm="udevd" path="/run/udev/data/c189:402" dev="tmpfs" ino=14991 [ 723.009666][ C1] net_ratelimit: 11610 callbacks suppressed [ 723.009689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 723.010105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 723.010537][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 723.010978][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 723.011406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 723.011826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 723.012263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 723.012678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 723.013082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 723.013521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.781542][ C1] net_ratelimit: 11091 callbacks suppressed [ 727.781566][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.782045][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.782492][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.783003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.783426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.783876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.784320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.784747][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.785153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 727.785573][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 728.779164][ T30] audit: type=1400 audit(2000004841.892:295646): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="/" dev="sda1" ino=2 [ 728.779223][ T30] audit: type=1400 audit(2000004841.892:295647): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="/" dev="tmpfs" ino=1 [ 728.779268][ T30] audit: type=1400 audit(2000004841.892:295648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 728.779313][ T30] audit: type=1400 audit(2000004841.892:295649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="data" dev="tmpfs" ino=13 [ 729.183512][ T30] audit: type=1400 audit(2000004842.280:295650): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5901 comm="syz-executor" path="/1448/cgroup.cpu" dev="tmpfs" ino=7271 [ 729.183570][ T30] audit: type=1400 audit(2000004842.312:295651): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 729.183626][ T30] audit: type=1400 audit(2000004842.312:295652): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 729.183671][ T30] audit: type=1400 audit(2000004842.312:295653): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269 [ 730.588305][ T30] audit: type=1400 audit(2000004843.813:295654): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="/" dev="sda1" ino=2 [ 732.553059][ C1] net_ratelimit: 11194 callbacks suppressed [ 732.553084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 732.553496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 732.553917][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 732.554331][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 732.554732][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 732.555159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 732.555571][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 732.555976][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 732.556408][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 732.556930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 733.077771][ T30] audit: type=1400 audit(2000004845.335:295655): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=994 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 734.505051][ T30] audit: type=1400 audit(2000004847.897:295656): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="etc" dev="sda1" ino=116 [ 734.505111][ T30] audit: type=1400 audit(2000004847.897:295657): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="cron" dev="sda1" ino=120 [ 737.208571][ T30] audit: type=1400 audit(2000004850.764:295658): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5193 comm="udevd" name="queue" dev="tmpfs" ino=14985 [ 737.324827][ C1] net_ratelimit: 11242 callbacks suppressed [ 737.324849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.325309][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.325776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.326229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.326697][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.327152][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.327596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.328230][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.328689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.329155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 737.830871][ T30] audit: type=1400 audit(2000004851.394:295659): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5893 comm="syz-executor" name="1442" dev="tmpfs" ino=7242 [ 737.830932][ T30] audit: type=1400 audit(2000004851.394:295660): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5893 comm="syz-executor" name="cgroup" dev="tmpfs" ino=7243 [ 737.830979][ T30] audit: type=1400 audit(2000004851.394:295661): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5893 comm="syz-executor" name="1442" dev="tmpfs" ino=7242 [ 737.831030][ T30] audit: type=1400 audit(2000004851.394:295662): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 737.831076][ T30] audit: type=1400 audit(2000004851.394:295663): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 739.634218][ T30] audit: type=1400 audit(2000004853.273:295664): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21435 comm="udevd" path="/run/udev/data/c189:525" dev="tmpfs" ino=14986 [ 740.812226][ T30] audit: type=1400 audit(2000004854.523:295665): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="sda1" ino=2 [ 740.812286][ T30] audit: type=1400 audit(2000004854.523:295666): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="etc" dev="sda1" ino=116 [ 740.812332][ T30] audit: type=1400 audit(2000004854.523:295667): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="udev" dev="sda1" ino=259 [ 741.506874][ T30] audit: type=1400 audit(2000004855.247:295668): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=21435 comm="udevd" path="/run/udev/data/c189:525" dev="tmpfs" ino=14986 [ 741.537170][ T30] audit: type=1400 audit(2000004855.279:295669): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21434 comm="udevd" name="data" dev="tmpfs" ino=13 [ 741.537230][ T30] audit: type=1400 audit(2000004855.279:295670): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=21434 comm="udevd" name="c189:402" dev="tmpfs" ino=14991 [ 741.537275][ T30] audit: type=1400 audit(2000004855.279:295671): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=21434 comm="udevd" name="data" dev="tmpfs" ino=13 [ 741.537320][ T30] audit: type=1400 audit(2000004855.279:295672): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="/" dev="sda1" ino=2 [ 741.537365][ T30] audit: type=1400 audit(2000004855.279:295673): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 742.096267][ C1] net_ratelimit: 10784 callbacks suppressed [ 742.096291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 742.096707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 742.097110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 742.097521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 742.097956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 742.098369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 742.098805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 742.099208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 742.099627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 742.100065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.867854][ C1] net_ratelimit: 11059 callbacks suppressed [ 746.867878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.868295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.868699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.869158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.869564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.869968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.870379][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.870781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.871218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 746.871643][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 748.607512][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 748.607534][ T30] audit: type=1400 audit(2000004862.691:295675): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269 [ 748.607585][ T30] audit: type=1400 audit(2000004862.691:295676): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5901 comm="syz-executor" name="cgroup.cpu" dev="tmpfs" ino=7271 [ 748.607631][ T30] audit: type=1400 audit(2000004862.691:295677): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269 [ 748.607675][ T30] audit: type=1400 audit(2000004862.691:295678): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 748.607720][ T30] audit: type=1400 audit(2000004862.691:295679): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 748.607766][ T30] audit: type=1400 audit(2000004862.691:295680): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269 [ 751.639802][ C1] net_ratelimit: 10637 callbacks suppressed [ 751.639826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 751.640281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 751.640799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 751.641254][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 751.641711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 751.642165][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 751.642625][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 751.643099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 751.643583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 751.644040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 754.265336][ T30] audit: type=1400 audit(2000004868.613:295681): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 754.265395][ T30] audit: type=1400 audit(2000004868.613:295682): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=5893 comm="syz-executor" name="1442" dev="tmpfs" ino=7242 [ 754.265441][ T30] audit: type=1400 audit(2000004868.634:295683): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 754.265487][ T30] audit: type=1400 audit(2000004868.655:295684): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 754.265540][ T30] audit: type=1400 audit(2000004868.655:295685): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 754.302758][ T30] audit: type=1400 audit(2000004868.676:295686): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="sda1" ino=2 [ 754.302818][ T30] audit: type=1400 audit(2000004868.676:295687): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="var" dev="sda1" ino=2001 [ 754.302863][ T30] audit: type=1400 audit(2000004868.676:295688): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="var" dev="sda1" ino=2001 [ 754.302912][ T30] audit: type=1400 audit(2000004868.676:295689): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="sda1" ino=2 [ 754.302957][ T30] audit: type=1400 audit(2000004868.676:295690): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 [ 756.411095][ C1] net_ratelimit: 10550 callbacks suppressed [ 756.411118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 756.411585][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 756.412037][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 756.412527][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 756.412980][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 756.413470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 756.413922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 756.414388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 756.414847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 756.415332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 760.529834][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 760.529858][ T30] audit: type=1400 audit(2000004874.094:295702): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=994 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0 [ 761.182786][ C1] net_ratelimit: 10622 callbacks suppressed [ 761.182808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 761.183274][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 761.183718][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 761.184195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 761.184655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 761.185133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 761.185584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 761.186044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 761.186498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 761.186994][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 763.964554][ T30] audit: type=1400 audit(2000004878.829:295704): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5565 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 763.964622][ T30] audit: type=1400 audit(2000004878.829:295703): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5193 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 763.964668][ T30] audit: type=1400 audit(2000004878.850:295705): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="sda1" ino=2 [ 763.964713][ T30] audit: type=1400 audit(2000004878.850:295706): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="lib" dev="sda1" ino=264 [ 763.964757][ T30] audit: type=1400 audit(2000004878.850:295707): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="udev" dev="sda1" ino=1222 [ 764.751131][ T30] audit: type=1400 audit(2000004879.606:295708): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 764.751193][ T30] audit: type=1400 audit(2000004879.606:295709): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 764.751246][ T30] audit: type=1400 audit(2000004879.606:295710): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269 [ 765.045515][ T30] audit: type=1400 audit(2000004879.952:295711): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="devices" dev="sysfs" ino=7 [ 765.954442][ C1] net_ratelimit: 10527 callbacks suppressed [ 765.954466][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 765.954913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 765.955355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 765.955803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 765.956268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 765.956715][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 765.957186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 765.957634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 765.958075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 765.958521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 767.964836][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 767.964857][ T30] audit: type=1400 audit(2000004883.029:295720): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5901 comm="syz-executor" path="/1448/cgroup" dev="tmpfs" ino=7270 [ 770.726037][ C1] net_ratelimit: 11028 callbacks suppressed [ 770.726060][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 770.726472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 770.726875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 770.727311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 770.727714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 770.728128][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 770.728551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 770.728962][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 770.729367][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 770.729792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.497952][ C1] net_ratelimit: 11119 callbacks suppressed [ 775.497977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.498453][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.498914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.499388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.499866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.500336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.500797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.501248][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.501729][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 775.502182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 777.882511][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 779.341770][ T30] audit: type=1400 audit(2000004894.977:295721): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="crontabs" dev="sda1" ino=121 [ 780.269251][ C1] net_ratelimit: 10766 callbacks suppressed [ 780.269275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.269739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.270258][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.270776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.271235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.271703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.272201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.272674][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.273134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.273584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 780.732754][ T31] INFO: task kworker/0:6:6014 blocked for more than 143 seconds. [ 780.732792][ T31] Not tainted 6.15.0-syzkaller-13526-g7a912d04415b #0 [ 780.732807][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 780.732819][ T31] task:kworker/0:6 state:D stack:15496 pid:6014 tgid:6014 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 780.732876][ T31] Workqueue: events_power_efficient reg_check_chans_work [ 780.732921][ T31] Call Trace: [ 780.732935][ T31] [ 780.732953][ T31] __schedule+0x16a2/0x4cb0 [ 780.732994][ T31] ? do_raw_spin_unlock+0x122/0x240 [ 780.733027][ T31] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 780.733087][ T31] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 780.733111][ T31] ? schedule+0x165/0x360 [ 780.733148][ T31] ? __pfx___schedule+0x10/0x10 [ 780.733197][ T31] ? schedule+0x91/0x360 [ 780.733232][ T31] schedule+0x165/0x360 [ 780.733267][ T31] schedule_preempt_disabled+0x13/0x30 [ 780.733298][ T31] __mutex_lock+0x724/0xe80 [ 780.733322][ T31] ? __mutex_lock+0x51b/0xe80 [ 780.733351][ T31] ? reg_check_chans_work+0x95/0xf00 [ 780.733382][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 780.733421][ T31] ? do_raw_spin_lock+0x121/0x290 [ 780.733443][ T31] ? look_up_lock_class+0x74/0x170 [ 780.733481][ T31] reg_check_chans_work+0x95/0xf00 [ 780.733516][ T31] ? __lock_acquire+0xab9/0xd20 [ 780.733555][ T31] ? __pfx_reg_check_chans_work+0x10/0x10 [ 780.733584][ T31] ? process_scheduled_works+0x9ef/0x17b0 [ 780.733625][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 780.733655][ T31] ? process_scheduled_works+0x9ef/0x17b0 [ 780.733694][ T31] ? process_scheduled_works+0x9ef/0x17b0 [ 780.733729][ T31] process_scheduled_works+0xade/0x17b0 [ 780.733795][ T31] ? __pfx_process_scheduled_works+0x10/0x10 [ 780.733848][ T31] worker_thread+0x8a0/0xda0 [ 780.733885][ T31] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 780.733926][ T31] ? __kthread_parkme+0x7b/0x200 [ 780.733972][ T31] kthread+0x70e/0x8a0 [ 780.734001][ T31] ? __pfx_worker_thread+0x10/0x10 [ 780.734034][ T31] ? __pfx_kthread+0x10/0x10 [ 780.734062][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 780.734093][ T31] ? lockdep_hardirqs_on+0x9c/0x150 [ 780.734124][ T31] ? __pfx_kthread+0x10/0x10 [ 780.734150][ T31] ret_from_fork+0x3f9/0x770 [ 780.734183][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 780.734221][ T31] ? __switch_to_asm+0x39/0x70 [ 780.734243][ T31] ? __switch_to_asm+0x33/0x70 [ 780.734264][ T31] ? __pfx_kthread+0x10/0x10 [ 780.734290][ T31] ret_from_fork_asm+0x1a/0x30 [ 780.734331][ T31] [ 780.734359][ T31] [ 780.734359][ T31] Showing all locks held in the system: [ 780.734371][ T31] 1 lock held by kthreadd/2: [ 780.734391][ T31] 1 lock held by kworker/R-kvfre/6: [ 780.734405][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0 [ 780.734479][ T31] 4 locks held by kworker/u8:0/12: [ 780.734494][ T31] 4 locks held by kworker/u8:1/13: [ 780.734508][ T31] 1 lock held by kworker/R-mm_pe/14: [ 780.734522][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0 [ 780.734593][ T31] 3 locks held by kworker/1:0/24: [ 780.734607][ T31] #0: ffff88805d425548 ((wq_completion)wg-kex-wg1#6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 780.734694][ T31] #1: ffffc900001e7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 780.734783][ T31] #2: ffff888029ed0d20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_begin_session+0x36/0xbd0 [ 780.734849][ T31] 1 lock held by khungtaskd/31: [ 780.734863][ T31] #0: ffffffff8e13f060 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 780.734934][ T31] 4 locks held by kworker/u8:2/36: [ 780.734948][ T31] #0: ffff88807b4c5148 ((wq_completion)wg-kex-wg1#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 780.735021][ T31] #1: ffffc90000ac7bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 780.735090][ T31] #2: ffff888028b11308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 780.735156][ T31] #3: ffff888029ed34c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 780.735223][ T31] 3 locks held by kworker/u8:3/49: [ 780.735242][ T31] 3 locks held by kworker/u8:5/994: [ 780.735259][ T31] 3 locks held by kworker/u8:6/1337: [ 780.735282][ T31] 3 locks held by kworker/R-ipv6_/3171: [ 780.735296][ T31] #0: ffff88814cc2c948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 780.735366][ T31] #1: ffffc9000ba17ba0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 780.735433][ T31] #2: ffffffff8f4fe3c8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 780.735498][ T31] 5 locks held by kworker/R-bat_e/3401: [ 780.735513][ T31] 4 locks held by kworker/u8:7/4092: [ 780.735527][ T31] 4 locks held by kworker/u8:8/4145: [ 780.735542][ T31] 1 lock held by klogd/5182: [ 780.735556][ T31] 2 locks held by udevd/5193: [ 780.735570][ T31] 1 lock held by crond/5565: [ 780.735583][ T31] 2 locks held by getty/5582: [ 780.735597][ T31] #0: ffff88802ff960a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 780.735655][ T31] #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 [ 780.735730][ T31] 1 lock held by syz-executor/5810: [ 780.735745][ T31] 4 locks held by kworker/0:3/5854: [ 780.735759][ T31] 4 locks held by syz-executor/5893: [ 780.735774][ T31] 2 locks held by syz-executor/5895: [ 780.735788][ T31] 2 locks held by syz-executor/5901: [ 780.735804][ T31] 1 lock held by kworker/R-wg-cr/5921: [ 780.735818][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0 [ 780.735877][ T31] 1 lock held by kworker/R-wg-cr/5922: [ 780.735890][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0 [ 780.749531][ T31] 1 lock held by kworker/R-wg-cr/5926: [ 780.749548][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0 [ 780.749621][ T31] 1 lock held by kworker/R-wg-cr/5927: [ 780.749635][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0 [ 780.749703][ T31] 1 lock held by kworker/R-wg-cr/5931: [ 780.749719][ T31] 1 lock held by kworker/R-wg-cr/5933: [ 780.749732][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0 [ 780.749793][ T31] 3 locks held by kworker/0:4/5944: [ 780.749809][ T31] 4 locks held by kworker/1:3/5957: [ 780.749823][ T31] #0: ffff88805d53b148 ((wq_completion)wg-kex-wg1#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 780.749900][ T31] #1: ffffc9000b257bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 780.749988][ T31] #2: ffff888028b11308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x150/0x900 [ 780.750057][ T31] #3: ffff888029ed34c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x4de/0x900 [ 780.750125][ T31] 4 locks held by kworker/0:5/5971: [ 780.750139][ T31] 4 locks held by kworker/1:5/5981: [ 780.750155][ T31] 3 locks held by kworker/1:7/6000: [ 780.750169][ T31] 3 locks held by kworker/0:6/6014: [ 780.750183][ T31] #0: ffff88801a481d48 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 780.750252][ T31] #1: ffffc9000b427bc0 ((reg_check_chans).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 780.750320][ T31] #2: ffffffff8f4fe3c8 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x95/0xf00 [ 780.750386][ T31] 1 lock held by kworker/R-bond1/17058: [ 780.750400][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0 [ 780.750470][ T31] 1 lock held by kworker/R-bond2/17523: [ 780.750484][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0 [ 780.750554][ T31] 1 lock held by kworker/R-bond0/20711: [ 780.750569][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0 [ 780.750639][ T31] 5 locks held by udevd/21434: [ 780.750654][ T31] 3 locks held by udevd/21435: [ 780.750675][ T31] 3 locks held by syz.2.7304/21450: [ 780.750690][ T31] 3 locks held by dhcpcd-run-hook/21456: [ 780.750705][ T31] 4 locks held by kworker/u8:4/21458: [ 780.750719][ T31] 1 lock held by kworker/u8:9/21459: [ 780.750732][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0 [ 780.750803][ T31] 2 locks held by kworker/0:1/21460: [ 780.750818][ T31] [ 780.750825][ T31] ============================================= [ 780.750825][ T31] [ 780.750853][ T31] NMI backtrace for cpu 1 [ 780.750876][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-syzkaller-13526-g7a912d04415b #0 PREEMPT(full) [ 780.750900][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 780.750913][ T31] Call Trace: [ 780.750922][ T31] [ 780.750932][ T31] dump_stack_lvl+0x189/0x250 [ 780.750964][ T31] ? __wake_up_klogd+0xd9/0x110 [ 780.750990][ T31] ? __pfx_dump_stack_lvl+0x10/0x10 [ 780.751020][ T31] ? __pfx__printk+0x10/0x10 [ 780.751055][ T31] nmi_cpu_backtrace+0x39e/0x3d0 [ 780.751087][ T31] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 780.751110][ T31] ? _printk+0xcf/0x120 [ 780.751157][ T31] ? __pfx__printk+0x10/0x10 [ 780.751179][ T31] ? debug_show_all_locks+0x2e/0x180 [ 780.751208][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 780.751237][ T31] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 780.751266][ T31] watchdog+0xfee/0x1030 [ 780.751295][ T31] ? watchdog+0x1de/0x1030 [ 780.751329][ T31] kthread+0x70e/0x8a0 [ 780.751354][ T31] ? __pfx_watchdog+0x10/0x10 [ 780.751380][ T31] ? __pfx_kthread+0x10/0x10 [ 780.751403][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 780.751431][ T31] ? lockdep_hardirqs_on+0x9c/0x150 [ 780.751459][ T31] ? __pfx_kthread+0x10/0x10 [ 780.751500][ T31] ret_from_fork+0x3f9/0x770 [ 780.751531][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 780.751566][ T31] ? __switch_to_asm+0x39/0x70 [ 780.751584][ T31] ? __switch_to_asm+0x33/0x70 [ 780.751602][ T31] ? __pfx_kthread+0x10/0x10 [ 780.751626][ T31] ret_from_fork_asm+0x1a/0x30 [ 780.751672][ T31] [ 780.751682][ T31] Sending NMI from CPU 1 to CPUs 0: [ 780.751711][ C0] NMI backtrace for cpu 0 [ 780.751725][ C0] CPU: 0 UID: 0 PID: 3401 Comm: kworker/R-bat_e Not tainted 6.15.0-syzkaller-13526-g7a912d04415b #0 PREEMPT(full) [ 780.751746][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 780.751758][ C0] Workqueue: bat_events batadv_tt_purge [ 780.751786][ C0] RIP: 0010:unwind_next_frame+0x12f9/0x2390 [ 780.751814][ C0] Code: 00 49 89 d5 48 89 d5 48 89 d8 48 29 e8 48 89 c1 48 c1 f9 02 48 c1 e8 3f 48 01 c8 48 83 e0 fe 4c 8d 3c 45 00 00 00 00 49 01 ef <4c> 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 84 [ 780.751830][ C0] RSP: 0018:ffffc90000006bb8 EFLAGS: 00000286 [ 780.751845][ C0] RAX: 0000000000000000 RBX: ffffffff8fb02314 RCX: 0000000000000000 [ 780.751857][ C0] RDX: ffffffff8fb022f4 RSI: ffffffff90299926 RDI: ffffffff8be1af60 [ 780.751871][ C0] RBP: ffffffff8fb02314 R08: 000000000000000f R09: ffffffff81728de5 [ 780.751883][ C0] R10: ffffc90000006cd8 R11: ffffffff81ace580 R12: ffffffff81332f49 [ 780.751896][ C0] R13: ffffffff8fb02310 R14: ffffc90000006c88 R15: ffffffff8fb02314 [ 780.751910][ C0] FS: 0000000000000000(0000) GS:ffff888125c86000(0000) knlGS:0000000000000000 [ 780.751933][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 780.751945][ C0] CR2: 0000555558afb5c8 CR3: 0000000031e66000 CR4: 00000000003526f0 [ 780.751961][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 780.751972][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 780.751983][ C0] Call Trace: [ 780.751990][ C0] [ 780.752001][ C0] ? unwind_next_frame+0xa5/0x2390 [ 780.752027][ C0] ? ret_from_fork_asm+0x1a/0x30 [ 780.752046][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 780.752065][ C0] arch_stack_walk+0x11c/0x150 [ 780.752095][ C0] ? ret_from_fork_asm+0x1a/0x30 [ 780.752114][ C0] stack_trace_save+0x9c/0xe0 [ 780.752131][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 780.752153][ C0] ? stack_depot_save_flags+0x40/0x900 [ 780.752177][ C0] kasan_save_track+0x3e/0x80 [ 780.752196][ C0] ? kasan_save_track+0x3e/0x80 [ 780.752213][ C0] ? __kasan_slab_alloc+0x6c/0x80 [ 780.752233][ C0] ? kmem_cache_alloc_node_noprof+0x1bb/0x3c0 [ 780.752254][ C0] ? kmalloc_reserve+0xbd/0x290 [ 780.752273][ C0] ? __alloc_skb+0x142/0x2d0 [ 780.752291][ C0] ? fdb_notify+0xa6/0x160 [ 780.752315][ C0] ? br_fdb_update+0x4c8/0x690 [ 780.752338][ C0] ? br_handle_frame_finish+0x573/0x19b0 [ 780.752357][ C0] ? br_nf_hook_thresh+0x3c3/0x4a0 [ 780.752377][ C0] ? br_nf_pre_routing_finish_ipv6+0x948/0xd00 [ 780.752398][ C0] ? br_nf_pre_routing_ipv6+0x37e/0x6b0 [ 780.752418][ C0] ? br_handle_frame+0x982/0x14c0 [ 780.752435][ C0] ? __netif_receive_skb_core+0x10e1/0x4180 [ 780.752452][ C0] ? __netif_receive_skb+0x72/0x380 [ 780.752467][ C0] ? process_backlog+0x60e/0x14f0 [ 780.752484][ C0] ? __napi_poll+0xc7/0x480 [ 780.752498][ C0] ? net_rx_action+0x707/0xe30 [ 780.752515][ C0] ? handle_softirqs+0x286/0x870 [ 780.752538][ C0] ? do_softirq+0xec/0x180 [ 780.752561][ C0] ? __local_bh_enable_ip+0x17d/0x1c0 [ 780.752583][ C0] ? batadv_tt_local_purge+0x2a7/0x340 [ 780.752607][ C0] ? batadv_tt_purge+0x35/0x9e0 [ 780.752630][ C0] ? process_scheduled_works+0xade/0x17b0 [ 780.752653][ C0] ? rescuer_thread+0x53c/0xdd0 [ 780.752668][ C0] ? kthread+0x70e/0x8a0 [ 780.752685][ C0] ? ret_from_fork+0x3f9/0x770 [ 780.752705][ C0] ? ret_from_fork_asm+0x1a/0x30 [ 780.752742][ C0] __kasan_slab_alloc+0x6c/0x80 [ 780.752764][ C0] kmem_cache_alloc_node_noprof+0x1bb/0x3c0 [ 780.752786][ C0] ? kmalloc_reserve+0xbd/0x290 [ 780.752808][ C0] kmalloc_reserve+0xbd/0x290 [ 780.752830][ C0] __alloc_skb+0x142/0x2d0 [ 780.752852][ C0] fdb_notify+0xa6/0x160 [ 780.752878][ C0] br_fdb_update+0x4c8/0x690 [ 780.752906][ C0] ? __pfx_br_fdb_update+0x10/0x10 [ 780.752943][ C0] br_handle_frame_finish+0x573/0x19b0 [ 780.752970][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 780.752996][ C0] ? ip6t_do_table+0x1db/0x1550 [ 780.753020][ C0] ? nf_hook_slow+0x176/0x220 [ 780.753042][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 780.753061][ C0] br_nf_hook_thresh+0x3c3/0x4a0 [ 780.753085][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 780.753106][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 780.753124][ C0] ? nf_nat_ipv6_in+0x1fc/0x2b0 [ 780.753147][ C0] br_nf_pre_routing_finish_ipv6+0x948/0xd00 [ 780.753168][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 780.753193][ C0] ? br_nf_pre_routing_ipv6+0x42f/0x6b0 [ 780.753214][ C0] br_nf_pre_routing_ipv6+0x37e/0x6b0 [ 780.753237][ C0] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 780.753260][ C0] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 780.753281][ C0] ? br_nf_pre_routing+0x720/0x1470 [ 780.753304][ C0] ? __pfx_br_nf_pre_routing+0x10/0x10 [ 780.753323][ C0] br_handle_frame+0x982/0x14c0 [ 780.753348][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 780.753369][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 780.753392][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 780.753412][ C0] __netif_receive_skb_core+0x10e1/0x4180 [ 780.753430][ C0] ? ip6_mc_input+0x9c3/0xbe0 [ 780.753455][ C0] ? kmem_cache_free+0x18f/0x400 [ 780.753479][ C0] ? ip6_mc_input+0x9c3/0xbe0 [ 780.753510][ C0] ? __pfx___netif_receive_skb_core+0x10/0x10 [ 780.753527][ C0] ? ip6_rcv_finish+0x29a/0x2d0 [ 780.753552][ C0] ? NF_HOOK+0x309/0x3a0 [ 780.753574][ C0] ? skb_orphan+0xaf/0xd0 [ 780.753600][ C0] ? __lock_acquire+0xab9/0xd20 [ 780.753626][ C0] ? process_backlog+0x2d5/0x14f0 [ 780.753645][ C0] ? process_backlog+0x2d5/0x14f0 [ 780.753665][ C0] __netif_receive_skb+0x72/0x380 [ 780.753685][ C0] ? process_backlog+0x2d5/0x14f0 [ 780.753704][ C0] process_backlog+0x60e/0x14f0 [ 780.753731][ C0] ? __pfx_process_backlog+0x10/0x10 [ 780.753750][ C0] ? do_raw_spin_lock+0x121/0x290 [ 780.753772][ C0] __napi_poll+0xc7/0x480 [ 780.753787][ C0] ? net_rx_action+0x46d/0xe30 [ 780.753807][ C0] net_rx_action+0x707/0xe30 [ 780.753835][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 780.753874][ C0] handle_softirqs+0x286/0x870 [ 780.753900][ C0] ? do_softirq+0xec/0x180 [ 780.753946][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 780.753974][ C0] ? batadv_tt_local_purge+0x2a7/0x340 [ 780.753999][ C0] do_softirq+0xec/0x180 [ 780.754022][ C0] [ 780.754028][ C0] [ 780.754035][ C0] ? __pfx_do_softirq+0x10/0x10 [ 780.754058][ C0] ? __lock_acquire+0xab9/0xd20 [ 780.754091][ C0] ? lockdep_softirqs_on+0x13b/0x1c0 [ 780.754120][ C0] __local_bh_enable_ip+0x17d/0x1c0 [ 780.754144][ C0] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 780.754171][ C0] ? do_raw_spin_unlock+0x122/0x240 [ 780.754190][ C0] ? batadv_tt_local_purge+0x2a7/0x340 [ 780.754215][ C0] batadv_tt_local_purge+0x2a7/0x340 [ 780.754252][ C0] batadv_tt_purge+0x35/0x9e0 [ 780.754277][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 780.754300][ C0] ? process_scheduled_works+0x9ef/0x17b0 [ 780.754324][ C0] ? process_scheduled_works+0x9ef/0x17b0 [ 780.754349][ C0] process_scheduled_works+0xade/0x17b0 [ 780.754389][ C0] ? __pfx_process_scheduled_works+0x10/0x10 [ 780.754419][ C0] ? assign_work+0x381/0x410 [ 780.754445][ C0] rescuer_thread+0x53c/0xdd0 [ 780.754465][ C0] ? rescuer_thread+0xbb/0xdd0 [ 780.754491][ C0] kthread+0x70e/0x8a0 [ 780.754510][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 780.754526][ C0] ? __pfx_kthread+0x10/0x10 [ 780.754546][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 780.754569][ C0] ? lockdep_hardirqs_on+0x9c/0x150 [ 780.754593][ C0] ? __pfx_kthread+0x10/0x10 [ 780.754611][ C0] ret_from_fork+0x3f9/0x770 [ 780.754636][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 780.754662][ C0] ? __switch_to_asm+0x39/0x70 [ 780.754678][ C0] ? __switch_to_asm+0x33/0x70 [ 780.754694][ C0] ? __pfx_kthread+0x10/0x10 [ 780.754712][ C0] ret_from_fork_asm+0x1a/0x30 [ 780.754738][ C0] [ 783.867297][ T30] audit: type=1400 audit(2000004899.713:295722): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21434 comm="udevd" name="char" dev="devtmpfs" ino=1319 [ 783.867359][ T30] audit: type=1400 audit(2000004899.713:295723): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=21434 comm="udevd" name="189:402" dev="devtmpfs" ino=5131 [ 783.867405][ T30] audit: type=1400 audit(2000004899.713:295724): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=21434 comm="udevd" name="char" dev="devtmpfs" ino=1319 [ 783.905839][ T30] audit: type=1400 audit(2000004899.755:295725): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 783.905902][ T30] audit: type=1400 audit(2000004899.755:295726): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 783.905948][ T30] audit: type=1400 audit(2000004899.755:295727): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269 [ 784.018839][ T30] audit: type=1400 audit(2000004899.849:295728): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21456 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1839 [ 785.040950][ C1] net_ratelimit: 10749 callbacks suppressed [ 785.040973][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 785.041383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 785.041839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 785.042259][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 785.042711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 785.043132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 785.043583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 785.044025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 785.044457][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 785.044895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0) [ 786.790598][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 786.790628][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-syzkaller-13526-g7a912d04415b #0 PREEMPT(full) [ 786.790657][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 786.790672][ T31] Call Trace: [ 786.790683][ T31] [ 786.790695][ T31] dump_stack_lvl+0x99/0x250 [ 786.790733][ T31] ? __asan_memcpy+0x40/0x70 [ 786.790757][ T31] ? __pfx_dump_stack_lvl+0x10/0x10 [ 786.790789][ T31] ? __pfx__printk+0x10/0x10 [ 786.790826][ T31] panic+0x2db/0x790 [ 786.790862][ T31] ? __pfx_panic+0x10/0x10 [ 786.790892][ T31] ? __pfx_delay_tsc+0x10/0x10 [ 786.790917][ T31] ? nmi_backtrace_stall_check+0x433/0x440 [ 786.790954][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 786.790982][ T31] ? nmi_trigger_cpumask_backtrace+0x2b6/0x300 [ 786.791020][ T31] watchdog+0x102d/0x1030 [ 786.791050][ T31] ? watchdog+0x1de/0x1030 [ 786.791086][ T31] kthread+0x70e/0x8a0 [ 786.791109][ T31] ? __pfx_watchdog+0x10/0x10 [ 786.791132][ T31] ? __pfx_kthread+0x10/0x10 [ 786.791158][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 786.791188][ T31] ? lockdep_hardirqs_on+0x9c/0x150 [ 786.791219][ T31] ? __pfx_kthread+0x10/0x10 [ 786.791244][ T31] ret_from_fork+0x3f9/0x770 [ 786.791276][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 786.791311][ T31] ? __switch_to_asm+0x39/0x70 [ 786.791339][ T31] ? __switch_to_asm+0x33/0x70 [ 786.791360][ T31] ? __pfx_kthread+0x10/0x10 [ 786.791385][ T31] ret_from_fork_asm+0x1a/0x30 [ 786.791423][ T31] [ 786.791756][ T31] Kernel Offset: disabled