last executing test programs:
1m13.921864587s ago: executing program 4 (id=7272):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_NEWSET={0x1c, 0x12, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}], {0x14}}, 0x44}, 0x1, 0x0, 0x0, 0x890}, 0x0)
1m13.761986791s ago: executing program 3 (id=7274):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000206010200000000000000000000000005000100070000000900020073797a300000000005000500020000001400078005001500020000000800124000000000050004000000000012000300686173683a6e6574"], 0x60}}, 0x0)
1m13.460433272s ago: executing program 4 (id=7277):
r0 = syz_open_dev$vim2m(&(0x7f0000000040), 0x3, 0x2)
ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000280)={0x0, 0x56595559, 0x0, @stepwise})
1m13.407174722s ago: executing program 3 (id=7278):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100003020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9e20307600800341c9e08f088a8", 0x0, 0xe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50)
1m13.21460609s ago: executing program 2 (id=7280):
r0 = socket$inet(0xa, 0x801, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001680)=@mangle={'mangle\x00', 0x44, 0x6, 0xc28, 0x98, 0x98, 0x0, 0x228, 0x98, 0xb90, 0xb90, 0xb90, 0xb90, 0xb90, 0x6, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xac8}}, {{@ip={@remote, @local, 0x0, 0x0, 'vcan0\x00', 'veth0_virt_wifi\x00'}, 0x0, 0xa8, 0xd0, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0xe}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}}]}, @ECN={0x28}}, {{@ip={@private, @multicast2, 0x0, 0x0, 'veth0\x00', 'bond0\x00'}, 0x0, 0x878, 0x8a0, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@u32={{0x7e0}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@ah={{0x30}}]}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xc88)
1m12.994558142s ago: executing program 3 (id=7282):
r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0)
finit_module(r0, 0x0, 0x2)
1m12.746944393s ago: executing program 4 (id=7284):
r0 = syz_open_dev$video(&(0x7f0000000580), 0x7, 0x0)
ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0xf000000, 0x400, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980913, 0x0, '\x00', @p_u8=0x0}})
1m12.745917574s ago: executing program 2 (id=7285):
r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0)
write$smackfs_cipso(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='@ 0'], 0x20)
1m12.596681726s ago: executing program 3 (id=7287):
r0 = syz_open_dev$vim2m(&(0x7f0000000080), 0x0, 0x2)
ioctl$vim2m_VIDIOC_STREAMOFF(r0, 0xc0205649, &(0x7f0000000600)=0xf010000)
1m12.47183323s ago: executing program 4 (id=7288):
r0 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x101000)
ioctl$NBD_PRINT_DEBUG(r0, 0xab06)
1m12.309055583s ago: executing program 0 (id=7289):
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0)
read$FUSE(r0, 0x0, 0x0)
1m12.263440121s ago: executing program 1 (id=7290):
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]})
newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000c80), 0x0)
1m11.995058607s ago: executing program 3 (id=7291):
r0 = syz_open_dev$dri(&(0x7f0000000140), 0x1, 0x0)
ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc1, 0x80, 0x34325241, 0x3, [0x2], [0x80ffff], [], [0x400000000000000]})
1m11.973734778s ago: executing program 2 (id=7292):
r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10)
sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="140100001f000117000000000000000001"], 0x114}], 0x1}, 0x0)
1m11.863676106s ago: executing program 4 (id=7293):
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_opts(r0, 0x0, 0x33, &(0x7f0000000000)=""/3, &(0x7f0000000040)=0x3)
1m11.728410619s ago: executing program 0 (id=7294):
r0 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0)
ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0xffffffff, 0x3, 0xe90, 0x19})
1m11.719599942s ago: executing program 1 (id=7295):
r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0)
ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, 0x0)
1m11.606869396s ago: executing program 4 (id=7296):
syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000002000040257d15a4400001040001090260004201000000090400000102090000052406000105240000000d240f01000004eaffffff1e0006031a00000804800200090581", @ANYBLOB="f7"], 0x0)
syz_open_dev$char_usb(0xc, 0xb4, 0x0)
1m11.558240922s ago: executing program 3 (id=7297):
r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000abd1a0407b0726228bca000000010902120001000000000904"], 0x0)
syz_usb_control_io$uac1(r0, 0x0, 0x0)
1m11.419707457s ago: executing program 2 (id=7298):
r0 = socket$inet_mptcp(0x2, 0x1, 0x106)
setsockopt$inet_opts(r0, 0x0, 0x1a, 0x0, 0x0)
1m11.291751597s ago: executing program 0 (id=7299):
r0 = socket$nl_rdma(0x10, 0x3, 0x14)
sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x38, 0x1409, 0x1, 0x0, 0x0, "", [{{0x4, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0xa, 0x33, 'wg0\x00'}}]}, 0x38}}, 0x0)
1m11.185953054s ago: executing program 1 (id=7300):
r0 = openat$smackfs_revoke_subject(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0)
pwritev2(r0, &(0x7f0000000480)=[{&(0x7f0000000680)="6965169b57baa7899cdb5428bc13a3ce956339293c377b251a8766183004fb2dcdc255092c88fc1e5dad276493c086fe226b394471d9466b0cc6284e00bc14f5d46cddcf80ab49c521678c68518d8d8c82b5d1ef0083cbfc8344f241a8c7e911", 0x60}], 0x1, 0x0, 0xb, 0x0)
1m10.915442122s ago: executing program 2 (id=7301):
r0 = socket$inet6(0xa, 0x2, 0x0)
sendto$inet6(r0, &(0x7f0000001240)="51e2", 0x2, 0x40895, &(0x7f00000004c0)={0xa, 0xde20, 0x10, @mcast2}, 0x1c)
1m10.914585156s ago: executing program 1 (id=7302):
r0 = syz_init_net_socket$bt_rfcomm(0x1f, 0x1, 0x3)
listen(r0, 0x340)
1m10.786820731s ago: executing program 0 (id=7303):
r0 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0})
1m10.540744139s ago: executing program 2 (id=7304):
r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0)
ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000180)={'bond0\x00', @ifru_names='rose0\x00'})
1m10.4914707s ago: executing program 1 (id=7305):
r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x20000, 0x0)
ioctl$EVIOCGLED(r0, 0x80284504, 0x0)
1m10.310713094s ago: executing program 0 (id=7306):
r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0)
read(r0, 0x0, 0x0)
1m9.90048447s ago: executing program 1 (id=7307):
r0 = openat$dma_heap(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$DMA_HEAP_IOCTL_ALLOC(r0, 0xc0184800, 0x0)
1m9.805950252s ago: executing program 0 (id=7308):
r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xf, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x6, 0x0, 0x0, 0x2}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xbb}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
0s ago: executing program 32 (id=7308):
r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xf, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x6, 0x0, 0x0, 0x2}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xbb}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
kernel console output (not intermixed with test programs):
][ T5904] audit: audit_lost=15843 audit_rate_limit=0 audit_backlog_limit=64
[ 548.775131][ C1] audit: backlog limit exceeded
[ 548.775462][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 548.838477][T19983] Bluetooth: hci1: Opcode 0x0c1a failed: -4
[ 548.845280][T19983] Bluetooth: hci1: Opcode 0x0406 failed: -4
[ 548.916803][T19983] Bluetooth: hci2: Opcode 0x0c1a failed: -4
[ 548.929937][T19983] Bluetooth: hci2: Opcode 0x0406 failed: -4
[ 548.966623][T19983] Bluetooth: hci3: Opcode 0x0c1a failed: -4
[ 548.979127][T19983] Bluetooth: hci3: Opcode 0x0406 failed: -4
[ 549.216475][T20004] netlink: 24 bytes leftover after parsing attributes in process `syz.4.6616'.
[ 549.695886][T20025] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6625'.
[ 549.812007][ T9] usb 1-1: new high-speed USB device number 24 using dummy_hcd
[ 549.851891][T20031] tmpfs: Unexpected value for 'inode32'
[ 549.986848][ T9] usb 1-1: config 0 has more interface descriptors, than it declares in bNumInterfaces, ignoring interface number: 0
[ 550.049167][ T9] usb 1-1: config 0 has more interface descriptors, than it declares in bNumInterfaces, ignoring interface number: 0
[ 550.113135][ T9] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config
[ 550.142304][ T9] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 4
[ 550.163740][ T9] usb 1-1: New USB device found, idVendor=1908, idProduct=1315, bcdDevice= 0.00
[ 550.173502][T20044] vti0: entered promiscuous mode
[ 550.194534][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 550.209386][ T9] usb 1-1: Product: syz
[ 550.219733][ T9] usb 1-1: Manufacturer: syz
[ 550.230982][ T9] usb 1-1: SerialNumber: syz
[ 550.254902][ T9] usb 1-1: config 0 descriptor??
[ 550.289620][ T9] usb-storage 1-1:0.0: USB Mass Storage device detected
[ 550.356733][ T9] usb-storage 1-1:0.0: Quirks match for vid 1908 pid 1315: 20000
[ 550.542246][ T24] usb 1-1: USB disconnect, device number 24
[ 550.743905][T20064] netlink: 'syz.4.6644': attribute type 1 has an invalid length.
[ 550.753909][ T5143] Bluetooth: hci1: command 0x0406 tx timeout
[ 550.901015][ T5143] Bluetooth: hci3: command 0x0406 tx timeout
[ 550.907523][ T5143] Bluetooth: hci2: command 0x0406 tx timeout
[ 551.354746][T20087] sock: sock_timestamping_bind_phc: sock not bind to device
[ 551.688917][T20102] __nla_validate_parse: 1 callbacks suppressed
[ 551.688939][T20102] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6664'.
[ 551.735925][T20105] netlink: 'syz.1.6663': attribute type 3 has an invalid length.
[ 551.837625][T20109] netlink: 36 bytes leftover after parsing attributes in process `syz.2.6665'.
[ 551.895558][T20109] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6665'.
[ 552.363891][T20132] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6678'.
[ 552.393307][T20132] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6678'.
[ 552.501416][T20136] hfs: unable to load iocharset "io#harset"
[ 552.526195][ T24] usb 4-1: new high-speed USB device number 17 using dummy_hcd
[ 552.620925][T20146] netlink: 'syz.0.6682': attribute type 1 has an invalid length.
[ 552.649452][T20146] netlink: 'syz.0.6682': attribute type 2 has an invalid length.
[ 552.694896][ T24] usb 4-1: New USB device found, idVendor=2c42, idProduct=1709, bcdDevice=ca.b7
[ 552.705407][ T24] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 552.724241][ T24] usb 4-1: Product: syz
[ 552.728766][T20070] Bluetooth: hci1: command 0x0406 tx timeout
[ 552.744405][ T24] usb 4-1: Manufacturer: syz
[ 552.754918][ T24] usb 4-1: SerialNumber: syz
[ 552.776637][ T24] usb 4-1: config 0 descriptor??
[ 552.878528][T20070] Bluetooth: hci2: command 0x0406 tx timeout
[ 552.887902][ T51] Bluetooth: hci3: command 0x0406 tx timeout
[ 552.908488][T20157] netlink: 'syz.4.6688': attribute type 3 has an invalid length.
[ 552.916296][T20157] netlink: 'syz.4.6688': attribute type 2 has an invalid length.
[ 552.933879][T20158] veth0_to_bond: entered allmulticast mode
[ 553.210452][ T24] usb 4-1: f81604_write: reg: 105 data: 8a failed: -EPROTO
[ 553.238423][ T24] f81604 4-1:0.0: Setting termination of CH#0 failed: -EPROTO
[ 553.257851][ T24] f81604 4-1:0.0: probe with driver f81604 failed with error -71
[ 553.294008][ T24] usb 4-1: USB disconnect, device number 17
[ 553.440846][ T30] kauditd_printk_skb: 12318 callbacks suppressed
[ 553.440867][ T30] audit: type=1400 audit(2000004657.792:220600): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5904 comm="syz-executor" path="/1323/binderfs" dev="tmpfs" ino=6645
[ 553.468129][ T5193] audit: audit_backlog=65 > audit_backlog_limit=64
[ 553.468182][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64
[ 553.482640][T19375] audit: audit_backlog=65 > audit_backlog_limit=64
[ 553.487364][ T5895] audit: audit_backlog=65 > audit_backlog_limit=64
[ 553.489928][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 553.502971][ C1] audit: audit_lost=16519 audit_rate_limit=0 audit_backlog_limit=64
[ 553.504125][T20175] audit: audit_backlog=65 > audit_backlog_limit=64
[ 553.511019][ C1] audit: backlog limit exceeded
[ 553.512949][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 553.622752][T20181] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6700'.
[ 553.730531][T20184] : renamed from bond0 (while UP)
[ 553.850969][T20190] binfmt_misc: register: failed to install interpreter file ./file0
[ 554.411306][T20216] openvswitch: netlink: Either Ethernet header or EtherType is required.
[ 554.473674][T20220] tmpfs: Bad value for 'mpol'
[ 554.649687][T20229] netlink: 'syz.4.6723': attribute type 10 has an invalid length.
[ 554.676688][T20229] veth1_vlan: entered allmulticast mode
[ 554.711381][T20229] team0: Device veth1_vlan failed to register rx_handler
[ 554.869810][ T9] usb 3-1: new high-speed USB device number 102 using dummy_hcd
[ 555.024633][ T9] usb 3-1: Using ep0 maxpacket: 32
[ 555.039881][ T9] usb 3-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 9
[ 555.064245][ T9] usb 3-1: New USB device found, idVendor=14c8, idProduct=0003, bcdDevice= 5.6c
[ 555.097715][ T9] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 555.125342][ T9] usb 3-1: Product: syz
[ 555.152467][ T9] usb 3-1: Manufacturer: syz
[ 555.162362][ T9] usb 3-1: SerialNumber: syz
[ 555.191226][ T9] usb 3-1: config 0 descriptor??
[ 555.207308][T20228] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22
[ 555.276787][ T9] input: syz syz as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/input/input67
[ 555.517612][ T24] usb 2-1: new high-speed USB device number 21 using dummy_hcd
[ 555.568137][ T5981] usb 3-1: USB disconnect, device number 102
[ 555.568308][ C0] usbtouchscreen 3-1:0.0: usbtouch_irq - usb_submit_urb failed with result: -19
[ 555.685322][ T24] usb 2-1: config 0 has an invalid interface number: 255 but max is 0
[ 555.707463][ T24] usb 2-1: config 0 has no interface number 0
[ 555.720334][ T24] usb 2-1: config 0 interface 255 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0
[ 555.740749][ T24] usb 2-1: config 0 interface 255 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0
[ 555.766238][ T24] usb 2-1: New USB device found, idVendor=10cf, idProduct=8065, bcdDevice=91.79
[ 555.789930][ T24] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 555.821559][ T24] usb 2-1: Product: syz
[ 555.830059][ T24] usb 2-1: Manufacturer: syz
[ 555.847942][ T24] usb 2-1: SerialNumber: syz
[ 555.892045][ T24] usb 2-1: config 0 descriptor??
[ 555.916665][ T24] vmk80xx 2-1:0.255: driver 'vmk80xx' failed to auto-configure device.
[ 555.953580][ T24] vmk80xx 2-1:0.255: probe with driver vmk80xx failed with error -22
[ 556.151832][ T24] usb 2-1: USB disconnect, device number 21
[ 556.332214][T20275] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6746'.
[ 556.630552][T20289] wlan1 speed is unknown, defaulting to 1000
[ 558.041617][T20341] netlink: 232 bytes leftover after parsing attributes in process `syz.2.6776'.
[ 558.219592][ T30] kauditd_printk_skb: 14316 callbacks suppressed
[ 558.219613][ T30] audit: type=1400 audit(2000004662.822:231813): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1337 comm="kworker/u8:6" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 558.258118][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64
[ 558.265487][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 558.272107][ C1] audit: audit_lost=17574 audit_rate_limit=0 audit_backlog_limit=64
[ 558.275059][ T5903] audit: audit_lost=17575 audit_rate_limit=0 audit_backlog_limit=64
[ 558.280155][ C1] audit: backlog limit exceeded
[ 558.280801][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 558.299763][ C1] audit: audit_lost=17576 audit_rate_limit=0 audit_backlog_limit=64
[ 558.304897][ T5903] audit: backlog limit exceeded
[ 558.307785][ C1] audit: backlog limit exceeded
[ 558.796404][T20364] vivid-007: ================= START STATUS =================
[ 558.833217][T20364] vivid-007: Generate PTS: true
[ 558.860524][T20364] vivid-007: Generate SCR: true
[ 558.868524][T20364] tpg source WxH: 320x240 (Y'CbCr)
[ 558.881913][T20364] tpg field: 1
[ 558.893131][T20364] tpg crop: (0,0)/320x240
[ 558.908134][T20364] tpg compose: (0,0)/320x240
[ 558.922889][T20364] tpg colorspace: 8
[ 558.937791][ T6000] usb 2-1: new high-speed USB device number 22 using dummy_hcd
[ 558.956363][T20364] tpg transfer function: 0/0
[ 558.971057][T20364] tpg Y'CbCr encoding: 0/0
[ 558.982890][T20364] tpg quantization: 0/0
[ 559.018138][T20364] tpg RGB range: 0/2
[ 559.036378][T20364] vivid-007: ================== END STATUS ==================
[ 559.103432][ T6000] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7
[ 559.134657][ T6000] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0
[ 559.169441][ T6000] usb 2-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 0
[ 559.197899][ T6000] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d
[ 559.217596][ T6000] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 559.263021][ T6000] usb 2-1: Quirk or no altset; falling back to MIDI 1.0
[ 559.444064][ T6000] snd-usb-audio 2-1:27.0: probe with driver snd-usb-audio failed with error -12
[ 559.571401][ T6000] usb 2-1: USB disconnect, device number 22
[ 559.585817][T19378] udevd[19378]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:27.0/sound/card3/controlC3/../uevent} for writing: No such file or directory
[ 559.694277][T20393] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6800'.
[ 559.749451][T20393] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6800'.
[ 560.082978][T20410] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6810'.
[ 560.106964][T20411] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6808'.
[ 560.136570][T20410] openvswitch: netlink: nsh attribute has 65532 unknown bytes.
[ 560.144224][T20410] openvswitch: netlink: Flow actions may not be safe on all matching packets.
[ 561.523970][T20478] : renamed from hsr_slave_0 (while UP)
[ 561.681348][T20486] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6846'.
[ 561.945327][T20500] usb usb6: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK.
[ 562.022331][ T9] usb 2-1: new high-speed USB device number 23 using dummy_hcd
[ 562.203444][ T9] usb 2-1: Using ep0 maxpacket: 16
[ 562.225067][ T9] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid maxpacket 49168, setting to 1024
[ 562.251786][ T9] usb 2-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1
[ 562.277144][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 562.295813][ T9] usb 2-1: Product: syz
[ 562.315784][ T9] usb 2-1: Manufacturer: syz
[ 562.333076][ T9] usb 2-1: SerialNumber: syz
[ 562.356135][ T9] usb 2-1: config 0 descriptor??
[ 562.399848][ T9] em28xx 2-1:0.0: New device syz syz @ 480 Mbps (2040:0264, interface 0, class 0)
[ 562.426503][ T9] em28xx 2-1:0.0: DVB interface 0 found: isoc
[ 562.632348][ T9] em28xx 2-1:0.0: unknown em28xx chip ID (0)
[ 562.676626][T20528] veth1_macvtap: left promiscuous mode
[ 562.695380][T20530] tmpfs: Bad value for 'mpol'
[ 562.722988][ T9] em28xx 2-1:0.0: reading from i2c device at 0xa0 failed (error=-5)
[ 562.744351][ T9] em28xx 2-1:0.0: board has no eeprom
[ 562.850660][ T9] em28xx 2-1:0.0: Identified as PCTV tripleStick (292e) (card=94)
[ 562.865460][ T9] em28xx 2-1:0.0: dvb set to isoc mode.
[ 562.880960][ T6014] em28xx 2-1:0.0: Binding DVB extension
[ 562.903733][ T9] usb 2-1: USB disconnect, device number 23
[ 562.925473][ T9] em28xx 2-1:0.0: Disconnecting em28xx
[ 562.983549][ T30] kauditd_printk_skb: 15551 callbacks suppressed
[ 562.983570][ T30] audit: type=1400 audit(2000004667.830:242964): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20537 comm="modprobe" name="usr" dev="sda1" ino=1480
[ 563.045630][ T5895] audit: audit_backlog=65 > audit_backlog_limit=64
[ 563.045770][T20541] audit: audit_backlog=65 > audit_backlog_limit=64
[ 563.052767][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64
[ 563.059907][T20542] audit: audit_backlog=65 > audit_backlog_limit=64
[ 563.066468][ T5903] audit: audit_lost=19044 audit_rate_limit=0 audit_backlog_limit=64
[ 563.080768][T20541] audit: audit_lost=19045 audit_rate_limit=0 audit_backlog_limit=64
[ 563.082618][T20537] audit: audit_backlog=65 > audit_backlog_limit=64
[ 563.095643][T20541] audit: backlog limit exceeded
[ 563.102914][ T5895] audit: audit_lost=19046 audit_rate_limit=0 audit_backlog_limit=64
[ 563.137386][ T6014] em28xx 2-1:0.0: Registering input extension
[ 563.162704][ T9] em28xx 2-1:0.0: Closing input extension
[ 563.282437][ T9] em28xx 2-1:0.0: Freeing device
[ 563.320330][T19375] udevd[19375]: setting owner of /dev/bus/usb/002/023 to uid=0, gid=0 failed: No such file or directory
[ 565.515547][T20644] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK.
[ 565.571049][T20644] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET.
[ 565.982437][T20667] netlink: 'syz.0.6932': attribute type 5 has an invalid length.
[ 566.943378][T20704] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6949'.
[ 567.240109][T20710] 8021q: adding VLAN 0 to HW filter on device bond0
[ 567.498781][ T9] usb 4-1: new high-speed USB device number 18 using dummy_hcd
[ 567.690981][ T9] usb 4-1: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=e2.3d
[ 567.718214][ T9] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 567.726318][ T9] usb 4-1: Product: syz
[ 567.755334][ T9] usb 4-1: Manufacturer: syz
[ 567.755628][ T30] kauditd_printk_skb: 12559 callbacks suppressed
[ 567.755647][ T30] audit: type=1400 audit(2000004672.838:253739): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20736 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 567.760165][ T9] usb 4-1: SerialNumber: syz
[ 567.777106][ T5895] audit: audit_backlog=65 > audit_backlog_limit=64
[ 567.786045][ C0] vkms_vblank_simulate: vblank timer overrun
[ 567.791511][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 567.791536][ C1] audit: audit_lost=19642 audit_rate_limit=0 audit_backlog_limit=64
[ 567.791557][ C1] audit: backlog limit exceeded
[ 567.797387][T20738] audit: audit_backlog=65 > audit_backlog_limit=64
[ 567.798854][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 567.810843][T20738] audit: audit_lost=19643 audit_rate_limit=0 audit_backlog_limit=64
[ 567.811242][ C1] audit: audit_lost=19644 audit_rate_limit=0 audit_backlog_limit=64
[ 567.820255][T20738] audit: backlog limit exceeded
[ 567.900805][ T9] r8152-cfgselector 4-1: Unknown version 0x0000
[ 567.907137][ T9] r8152-cfgselector 4-1: config 0 descriptor??
[ 568.117406][ T6014] usb 1-1: new high-speed USB device number 25 using dummy_hcd
[ 568.298363][ T6014] usb 1-1: Using ep0 maxpacket: 32
[ 568.309942][ T6014] usb 1-1: config 0 has an invalid interface number: 35 but max is 0
[ 568.326636][ T6014] usb 1-1: config 0 has no interface number 0
[ 568.345938][ T6014] usb 1-1: New USB device found, idVendor=10c4, idProduct=818a, bcdDevice=7d.8f
[ 568.362687][ T5981] r8152-cfgselector 4-1: USB disconnect, device number 18
[ 568.370029][ T6014] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 568.370059][ T6014] usb 1-1: Product: syz
[ 568.370076][ T6014] usb 1-1: Manufacturer: syz
[ 568.370093][ T6014] usb 1-1: SerialNumber: syz
[ 568.400171][ T6014] usb 1-1: config 0 descriptor??
[ 568.440461][ T6014] radio-si470x 1-1:0.35: could not find interrupt in endpoint
[ 568.498617][ T6014] radio-si470x 1-1:0.35: probe with driver radio-si470x failed with error -5
[ 568.657257][ T6014] radio-raremono 1-1:0.35: this is not Thanko's Raremono.
[ 568.679653][ T6014] usbhid 1-1:0.35: couldn't find an input interrupt endpoint
[ 568.886650][ T5854] usb 1-1: USB disconnect, device number 25
[ 569.090369][ T6014] usb 3-1: new high-speed USB device number 103 using dummy_hcd
[ 569.227774][T20789] ieee802154 phy0 wpan0: encryption failed: -22
[ 569.250774][ T6014] usb 3-1: Using ep0 maxpacket: 8
[ 569.263281][ T6014] usb 3-1: config 168 descriptor has 1 excess byte, ignoring
[ 569.275333][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11
[ 569.287563][ T6014] usb 3-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F
[ 569.300409][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7
[ 569.312367][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0
[ 569.324292][ T6014] usb 3-1: config 168 descriptor has 1 excess byte, ignoring
[ 569.335126][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11
[ 569.352838][ T6014] usb 3-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F
[ 569.366730][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7
[ 569.383668][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0
[ 569.440349][ T6014] usb 3-1: config 168 descriptor has 1 excess byte, ignoring
[ 569.458396][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11
[ 569.476882][T20794] netlink: 'syz.4.6991': attribute type 1 has an invalid length.
[ 569.479942][ T6014] usb 3-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F
[ 569.487312][T20794] netlink: 224 bytes leftover after parsing attributes in process `syz.4.6991'.
[ 569.512800][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7
[ 569.525267][ T6014] usb 3-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0
[ 569.541127][ T6014] usb 3-1: string descriptor 0 read error: -22
[ 569.548805][ T6014] usb 3-1: New USB device found, idVendor=0a07, idProduct=0064, bcdDevice=40.6e
[ 569.563609][ T6014] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 569.599743][ T6014] adutux 3-1:168.0: ADU100 now attached to /dev/usb/adutux0
[ 569.840123][ T5854] usb 3-1: USB disconnect, device number 103
[ 570.275393][T20818] xt_hashlimit: overflow, try lower: 18446744073709551615/7
[ 570.431590][ T5854] usb 1-1: new high-speed USB device number 26 using dummy_hcd
[ 570.639244][ T5854] usb 1-1: unable to get BOS descriptor or descriptor too short
[ 570.654938][ T5854] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2
[ 570.678133][ T5854] usb 1-1: config 1 interface 0 altsetting 247 has 1 endpoint descriptor, different from the interface descriptor's value: 0
[ 570.705484][ T5854] usb 1-1: config 1 interface 0 has no altsetting 1
[ 570.726188][ T5854] usb 1-1: New USB device found, idVendor=2040, idProduct=b990, bcdDevice=f6.75
[ 570.752313][ T5854] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 570.765472][ T5854] usb 1-1: Product: syz
[ 570.772440][ T5854] usb 1-1: Manufacturer: syz
[ 570.784191][ T5854] usb 1-1: SerialNumber: syz
[ 570.811912][ T5854] smsusb:smsusb_probe: board id=8, interface number 0
[ 571.017785][ T5854] smsusb:smsusb_probe: Device initialized with return code -19
[ 571.251148][ T5854] usb 1-1: USB disconnect, device number 26
[ 571.650140][T20865] libceph: resolve '0.' (ret=-3): failed
[ 572.527286][ T30] kauditd_printk_skb: 12393 callbacks suppressed
[ 572.527305][ T30] audit: type=1400 audit(2000004677.857:265575): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5903 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 572.570323][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64
[ 572.583865][T20898] audit: audit_backlog=65 > audit_backlog_limit=64
[ 572.586647][ T5903] audit: audit_lost=19831 audit_rate_limit=0 audit_backlog_limit=64
[ 572.599882][T20898] audit: audit_lost=19832 audit_rate_limit=0 audit_backlog_limit=64
[ 572.606361][ T5903] audit: backlog limit exceeded
[ 572.609063][T20901] audit: audit_backlog=65 > audit_backlog_limit=64
[ 572.613960][ T5893] audit: audit_backlog=65 > audit_backlog_limit=64
[ 572.626687][T20901] audit: audit_lost=19833 audit_rate_limit=0 audit_backlog_limit=64
[ 572.637482][ T5903] audit: audit_backlog=65 > audit_backlog_limit=64
[ 572.790178][T20907] netlink: 'syz.2.7044': attribute type 1 has an invalid length.
[ 572.882375][T20070] Bluetooth: hci1: ACL packet for unknown connection handle 196
[ 573.298017][T20929] netlink: 'syz.2.7056': attribute type 2 has an invalid length.
[ 573.907088][T20957] netlink: 'syz.3.7069': attribute type 11 has an invalid length.
[ 573.993851][ T6014] usb 1-1: new high-speed USB device number 27 using dummy_hcd
[ 574.165620][ T6014] usb 1-1: Using ep0 maxpacket: 16
[ 574.178761][ T6014] usb 1-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06
[ 574.208076][ T6014] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 574.234510][ T6014] usb 1-1: Product: syz
[ 574.248883][ T6014] usb 1-1: Manufacturer: syz
[ 574.257043][ T6014] usb 1-1: SerialNumber: syz
[ 574.286264][ T6014] r8152-cfgselector 1-1: Unknown version 0x0000
[ 574.303047][ T6014] r8152-cfgselector 1-1: config 0 descriptor??
[ 574.769995][ T24] r8152-cfgselector 1-1: USB disconnect, device number 27
[ 574.772778][T20989] macvtap0: entered allmulticast mode
[ 574.804102][T20989] veth0_macvtap: entered allmulticast mode
[ 575.409262][T21014] netlink: 'syz.1.7099': attribute type 10 has an invalid length.
[ 575.449750][T21014] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 575.494873][T21014] bond0: (slave batadv0): Enslaving as an active interface with an up link
[ 575.572970][T21020] ip6gretap1: default qdisc (pfifo_fast) fail, fallback to noqueue
[ 576.477323][T21052] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7117'.
[ 576.993422][T21076] xt_NFQUEUE: number of total queues is 0
[ 577.300903][ T30] kauditd_printk_skb: 11014 callbacks suppressed
[ 577.300923][ T30] audit: type=1400 audit(2000004682.876:275726): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5903 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 577.342234][ T5893] audit: audit_backlog=65 > audit_backlog_limit=64
[ 577.344308][ T5901] audit: audit_backlog=65 > audit_backlog_limit=64
[ 577.350020][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 577.357002][ T5903] audit: audit_backlog=66 > audit_backlog_limit=64
[ 577.362775][ C1] audit: audit_lost=20122 audit_rate_limit=0 audit_backlog_limit=64
[ 577.369716][ T5901] audit: audit_lost=20123 audit_rate_limit=0 audit_backlog_limit=64
[ 577.377334][ C1] audit: backlog limit exceeded
[ 577.377693][ C1] audit: audit_backlog=66 > audit_backlog_limit=64
[ 577.385731][ T30] audit: type=1400 audit(2000004682.897:275727): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5903 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 577.660882][T21101] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7141'.
[ 577.820516][T21109] netlink: 28 bytes leftover after parsing attributes in process `syz.4.7144'.
[ 577.874847][T21109] netlink: 28 bytes leftover after parsing attributes in process `syz.4.7144'.
[ 578.784646][T21140] xt_SECMARK: invalid mode: 2
[ 579.233279][T21154] bridge3: entered promiscuous mode
[ 579.388239][T21160] xt_ecn: cannot match TCP bits for non-tcp packets
[ 580.984623][T21189] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0)
[ 581.683689][ T24] usb 5-1: new high-speed USB device number 13 using dummy_hcd
[ 581.724226][T21207] openvswitch: netlink: Message has 1 unknown bytes.
[ 581.847749][T21207] openvswitch: netlink: Flow actions may not be safe on all matching packets.
[ 581.872361][ T24] usb 5-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7
[ 581.935878][ T24] usb 5-1: config 27 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0
[ 581.971160][ T24] usb 5-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 0
[ 582.032087][ T24] usb 5-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d
[ 582.079823][ T24] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 582.089445][ T30] kauditd_printk_skb: 6665 callbacks suppressed
[ 582.089464][ T30] audit: type=1400 audit(2000004687.895:281363): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21212 comm="syz.1.7195" name="newroot" dev="tmpfs" ino=2
[ 582.208536][ T24] usb 5-1: Quirk or no altset; falling back to MIDI 1.0
[ 582.246276][T21201] audit: audit_backlog=65 > audit_backlog_limit=64
[ 582.255911][T21216] audit: audit_backlog=66 > audit_backlog_limit=64
[ 582.262865][ T30] audit: type=1400 audit(2000004687.895:281364): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21212 comm="syz.1.7195" name="/" dev="devtmpfs" ino=1
[ 582.281735][ C1] vkms_vblank_simulate: vblank timer overrun
[ 582.301691][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 582.308345][ C1] audit: audit_lost=20468 audit_rate_limit=0 audit_backlog_limit=64
[ 582.316450][ C1] audit: backlog limit exceeded
[ 582.323105][ T5893] audit: audit_backlog=65 > audit_backlog_limit=64
[ 582.332606][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 582.339268][ C1] audit: audit_lost=20469 audit_rate_limit=0 audit_backlog_limit=64
[ 582.718682][ T24] snd-usb-audio 5-1:27.0: probe with driver snd-usb-audio failed with error -12
[ 582.870533][ T24] usb 5-1: USB disconnect, device number 13
[ 583.035014][T21222] udevd[21222]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:27.0/sound/card3/controlC3/../uevent} for writing: No such file or directory
[ 583.108713][T21226] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7199'.
[ 583.429760][T21230] lo: entered promiscuous mode
[ 583.448144][T21230] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check.
[ 585.316650][T21269] netlink: 'syz.3.7221': attribute type 6 has an invalid length.
[ 586.870279][ T30] kauditd_printk_skb: 8810 callbacks suppressed
[ 586.870299][ T30] audit: type=1400 audit(2000004692.913:286679): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5904 comm="syz-executor" path="/1423" dev="tmpfs" ino=7143
[ 586.926082][T21299] audit: audit_backlog=65 > audit_backlog_limit=64
[ 586.928943][T21301] audit: audit_backlog=65 > audit_backlog_limit=64
[ 586.966594][T21300] audit: audit_backlog=65 > audit_backlog_limit=64
[ 586.980192][T21300] audit: audit_lost=21636 audit_rate_limit=0 audit_backlog_limit=64
[ 586.984067][T21299] audit: audit_lost=21637 audit_rate_limit=0 audit_backlog_limit=64
[ 586.988735][T21301] audit: audit_lost=21638 audit_rate_limit=0 audit_backlog_limit=64
[ 586.988757][T21301] audit: backlog limit exceeded
[ 586.988780][T21301] audit: audit_backlog=65 > audit_backlog_limit=64
[ 586.988795][T21301] audit: audit_lost=21639 audit_rate_limit=0 audit_backlog_limit=64
[ 588.565922][T21344] netlink: 'syz.1.7256': attribute type 30 has an invalid length.
[ 589.109335][T21357] Zero length message leads to an empty skb
[ 589.477602][T21363] x_tables: ip_tables: icmp match: only valid for protocol 1
[ 590.938803][T21395] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING
[ 591.186010][T21401] Invalid ELF header magic: != ELF
[ 591.632338][ T5893] audit_log_start: 5623 callbacks suppressed
[ 591.632357][ T5893] audit: audit_backlog=65 > audit_backlog_limit=64
[ 591.633016][ T30] audit: type=1400 audit(2000004697.911:291823): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 591.664840][ C1] vkms_vblank_simulate: vblank timer overrun
[ 591.665108][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 591.665129][ C1] audit: audit_lost=21799 audit_rate_limit=0 audit_backlog_limit=64
[ 591.665147][ C1] audit: backlog limit exceeded
[ 591.691958][T21409] audit: audit_backlog=65 > audit_backlog_limit=64
[ 591.699124][ T5893] audit: audit_lost=21800 audit_rate_limit=0 audit_backlog_limit=64
[ 591.716850][T21412] audit: audit_backlog=65 > audit_backlog_limit=64
[ 591.727908][T21409] audit: audit_lost=21801 audit_rate_limit=0 audit_backlog_limit=64
[ 591.737758][ T5893] audit: backlog limit exceeded
[ 592.233837][T21423] netlink: 256 bytes leftover after parsing attributes in process `syz.2.7292'.
[ 592.775433][ T5869] usb 5-1: new high-speed USB device number 14 using dummy_hcd
[ 592.851833][ T24] usb 4-1: new high-speed USB device number 19 using dummy_hcd
[ 592.960349][ T5869] usb 5-1: config 1 has too many interfaces: 66, using maximum allowed: 32
[ 592.988872][ T5869] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config
[ 593.033504][ T24] usb 4-1: New USB device found, idVendor=077b, idProduct=2226, bcdDevice=ca.8b
[ 593.052415][ T5869] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 66
[ 593.082021][ T24] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 593.102714][ T5869] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[ 593.143214][ T24] usb 4-1: config 0 descriptor??
[ 593.170490][ T5869] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0
[ 593.271171][ T5869] usb 5-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40
[ 593.319897][ T5869] usb 5-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0
[ 593.376626][ T5869] usb 5-1: Product: syz
[ 593.423131][ T5869] usb 5-1: Manufacturer: syz
[ 593.476734][ T5869] cdc_wdm 5-1:1.0: skipping garbage
[ 593.514244][ T5869] cdc_wdm 5-1:1.0: skipping garbage
[ 593.582406][ T5869] cdc_wdm 5-1:1.0: cdc-wdm0: USB WDM device
[ 593.622313][ T24] asix 4-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71
[ 593.635798][ T5869] cdc_wdm 5-1:1.0: Unknown control protocol
[ 593.716317][ T24] asix 4-1:0.0: probe with driver asix failed with error -71
[ 593.733119][ T5869] usb 5-1: USB disconnect, device number 14
[ 593.882749][ T24] usb 4-1: USB disconnect, device number 19
[ 594.177183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 594.189896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 594.202383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 594.214876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 594.227705][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 594.240261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 594.252742][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 594.265250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 594.277829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 594.290301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 596.454050][ T30] kauditd_printk_skb: 4620 callbacks suppressed
[ 596.454073][ T30] audit: type=1400 audit(2000004702.961:295244): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21457 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 596.546583][ T5895] audit: audit_backlog=65 > audit_backlog_limit=64
[ 596.833086][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 596.839724][ C1] audit: audit_lost=22202 audit_rate_limit=0 audit_backlog_limit=64
[ 596.847929][ C1] audit: backlog limit exceeded
[ 596.869644][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 596.876274][ C1] audit: audit_lost=22203 audit_rate_limit=0 audit_backlog_limit=64
[ 596.884442][ C1] audit: backlog limit exceeded
[ 597.331949][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 597.338615][ C1] audit: audit_lost=22204 audit_rate_limit=0 audit_backlog_limit=64
[ 598.947501][ C1] net_ratelimit: 10208 callbacks suppressed
[ 598.947524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 598.966133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 598.978629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 598.991114][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 599.003684][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 599.016216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 599.028723][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 599.041385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 599.053879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 599.066403][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.719030][ C1] net_ratelimit: 11392 callbacks suppressed
[ 603.719052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.737578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.750336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.762820][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.775320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.787782][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.800266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.812733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.825216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 603.837724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 604.547493][ C0] sched: DL replenish lagged too much
[ 604.852047][ T1303] ieee802154 phy0 wpan0: encryption failed: -22
[ 608.490747][ C1] net_ratelimit: 11563 callbacks suppressed
[ 608.490770][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 608.509350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 608.521822][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 608.534321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 608.546813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 608.559382][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 608.571935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 608.584528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 608.596995][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 608.609459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 611.605226][ T30] kauditd_printk_skb: 99 callbacks suppressed
[ 611.605249][ T30] audit: type=1400 audit(2000004706.531:295310): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 612.681343][ T5895] audit: audit_lost=22216 audit_rate_limit=0 audit_backlog_limit=64
[ 612.689493][ T5895] audit: backlog limit exceeded
[ 613.262265][ C1] net_ratelimit: 11581 callbacks suppressed
[ 613.262290][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 613.280753][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 613.293437][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 613.305954][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 613.318441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 613.330963][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 613.343545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 613.356052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 613.368560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 613.381111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 615.211853][T21456] audit: audit_backlog=65 > audit_backlog_limit=64
[ 615.346739][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 615.353376][ C1] audit: audit_lost=22217 audit_rate_limit=0 audit_backlog_limit=64
[ 615.361435][ C1] audit: backlog limit exceeded
[ 615.849955][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 615.856666][ C1] audit: audit_lost=22218 audit_rate_limit=0 audit_backlog_limit=64
[ 615.864723][ C1] audit: backlog limit exceeded
[ 616.419991][T21456] audit_log_lost: 3 callbacks suppressed
[ 616.420013][T21456] audit: audit_lost=22220 audit_rate_limit=0 audit_backlog_limit=64
[ 616.804914][ T30] audit: type=1400 audit(2000004707.056:295311): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 617.353455][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 617.360105][ C1] audit: audit_lost=22221 audit_rate_limit=0 audit_backlog_limit=64
[ 617.368190][ C1] audit: backlog limit exceeded
[ 617.387828][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 617.394410][ C1] audit: audit_lost=22222 audit_rate_limit=0 audit_backlog_limit=64
[ 617.402477][ C1] audit: backlog limit exceeded
[ 617.851492][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 617.858132][ C1] audit: audit_lost=22223 audit_rate_limit=0 audit_backlog_limit=64
[ 618.034168][ C1] net_ratelimit: 10516 callbacks suppressed
[ 618.034191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 618.052692][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 618.065171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 618.077792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 618.090291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 618.102795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 618.115272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 618.127757][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 618.140347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 618.152865][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 621.368069][ C1] audit_log_start: 55 callbacks suppressed
[ 621.368091][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 621.380527][ C1] audit: audit_lost=22242 audit_rate_limit=0 audit_backlog_limit=64
[ 621.388577][ C1] audit: backlog limit exceeded
[ 621.852040][ T5901] audit: audit_backlog=65 > audit_backlog_limit=64
[ 621.874457][ T5901] audit: audit_lost=22243 audit_rate_limit=0 audit_backlog_limit=64
[ 621.882720][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 621.882744][ C1] audit: audit_lost=22244 audit_rate_limit=0 audit_backlog_limit=64
[ 621.882763][ C1] audit: backlog limit exceeded
[ 622.114077][T21456] audit: backlog limit exceeded
[ 622.119060][T21456] audit: audit_backlog=65 > audit_backlog_limit=64
[ 622.805690][ C1] net_ratelimit: 10765 callbacks suppressed
[ 622.805714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 622.824266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 622.836739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 622.849313][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 622.861816][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 622.874314][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 622.886827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 622.899481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 622.911953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 622.924410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 626.897567][ T30] kauditd_printk_skb: 83 callbacks suppressed
[ 626.897590][ T30] audit: type=1400 audit(2000004734.387:295387): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=49 comm="kworker/u8:3" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 627.577061][ C1] net_ratelimit: 10356 callbacks suppressed
[ 627.577084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 627.595542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 627.608154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 627.620655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 627.633158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 627.645725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 627.658215][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 627.670689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 627.683181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 627.695691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 628.535223][ T5901] audit: backlog limit exceeded
[ 632.348649][ C1] net_ratelimit: 11059 callbacks suppressed
[ 632.348671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 632.367244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 632.379734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 632.392323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 632.404966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 632.417455][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 632.429956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 632.442453][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 632.454914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 632.467431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 633.324464][ T30] audit: type=1400 audit(2000004734.387:295388): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=49 comm="kworker/u8:3" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 637.120611][ C1] net_ratelimit: 11400 callbacks suppressed
[ 637.120633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 637.139257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 637.151765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 637.164243][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 637.176749][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 637.189229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 637.201733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 637.214199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 637.226886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 637.239468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 641.891629][ C1] net_ratelimit: 10579 callbacks suppressed
[ 641.891655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 641.910085][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 641.922572][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 641.935086][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 641.947617][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 641.960111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 641.972692][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 641.985919][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 641.998430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 642.010968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 642.940063][ C0] ip6_tunnel: ip6gre1 xmit: Local address not yet configured!
[ 644.165984][ T5193] audit: audit_backlog=65 > audit_backlog_limit=64
[ 644.401832][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 644.408479][ C1] audit: audit_lost=22248 audit_rate_limit=0 audit_backlog_limit=64
[ 644.416530][ C1] audit: backlog limit exceeded
[ 644.904128][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 644.910813][ C1] audit: audit_lost=22249 audit_rate_limit=0 audit_backlog_limit=64
[ 644.918895][ C1] audit: backlog limit exceeded
[ 645.406455][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 645.413137][ C1] audit: audit_lost=22250 audit_rate_limit=0 audit_backlog_limit=64
[ 645.421202][ C1] audit: backlog limit exceeded
[ 646.663673][ C1] net_ratelimit: 10895 callbacks suppressed
[ 646.663698][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 646.682330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 646.694841][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 646.707347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 646.719838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 646.732510][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 646.745006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 646.757684][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 646.770217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 646.782696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 649.411230][ C1] audit_log_start: 30 callbacks suppressed
[ 649.411253][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 649.423780][ C1] audit: audit_lost=22261 audit_rate_limit=0 audit_backlog_limit=64
[ 649.431946][ C1] audit: backlog limit exceeded
[ 649.903431][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 649.910040][ C1] audit: audit_lost=22262 audit_rate_limit=0 audit_backlog_limit=64
[ 649.918128][ C1] audit: backlog limit exceeded
[ 650.400781][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 650.407404][ C1] audit: audit_lost=22263 audit_rate_limit=0 audit_backlog_limit=64
[ 650.415427][ C1] audit: backlog limit exceeded
[ 650.907881][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 651.435412][ C1] net_ratelimit: 10846 callbacks suppressed
[ 651.435434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 651.454041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 651.466678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 651.479206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 651.491745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 651.504326][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 651.516874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 651.529553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 651.542158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 651.554732][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 654.406894][ C1] audit_log_start: 50 callbacks suppressed
[ 654.406917][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 654.419373][ C1] audit: audit_lost=22281 audit_rate_limit=0 audit_backlog_limit=64
[ 654.427425][ C1] audit: backlog limit exceeded
[ 654.906141][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 654.912783][ C1] audit: audit_lost=22282 audit_rate_limit=0 audit_backlog_limit=64
[ 654.920808][ C1] audit: backlog limit exceeded
[ 655.236787][ T30] audit: type=1400 audit(2000004734.387:295389): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=49 comm="kworker/u8:3" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 655.913268][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 655.920005][ C1] audit: audit_lost=22283 audit_rate_limit=0 audit_backlog_limit=64
[ 655.928071][ C1] audit: backlog limit exceeded
[ 656.206952][ C1] net_ratelimit: 11384 callbacks suppressed
[ 656.206975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 656.225425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 656.237931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 656.250700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 656.263176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 656.275650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 656.288118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 656.300587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 656.313073][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 656.325572][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 657.761047][ T1303] ieee802154 phy0 wpan0: encryption failed: -22
[ 659.418458][ C1] audit_log_start: 24 callbacks suppressed
[ 659.418482][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 659.431104][ C1] audit: audit_lost=22292 audit_rate_limit=0 audit_backlog_limit=64
[ 659.439161][ C1] audit: backlog limit exceeded
[ 659.919304][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 659.925933][ C1] audit: audit_lost=22293 audit_rate_limit=0 audit_backlog_limit=64
[ 659.933984][ C1] audit: backlog limit exceeded
[ 660.423820][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 660.430461][ C1] audit: audit_lost=22294 audit_rate_limit=0 audit_backlog_limit=64
[ 660.438524][ C1] audit: backlog limit exceeded
[ 660.917993][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 660.978668][ C1] net_ratelimit: 11436 callbacks suppressed
[ 660.978691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 660.997220][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 661.009850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 661.022363][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 661.034956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 661.047605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 661.060077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 661.072591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 661.085077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 661.097594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 664.361536][ C1] audit_log_start: 64 callbacks suppressed
[ 664.361559][ C1] audit: audit_backlog=65 > audit_backlog_limit=64
[ 664.361577][ C1] audit: audit_lost=22317 audit_rate_limit=0 audit_backlog_limit=64
[ 664.361595][ C1] audit: backlog limit exceeded
[ 664.695161][ T30] audit: type=1400 audit(2000004734.429:295390): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=49 comm="kworker/u8:3" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 664.695221][ T30] audit: type=1400 audit(2000004734.933:295391): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=21457 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 664.695274][ T30] audit: type=1400 audit(2000004735.437:295392): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 664.695324][ T30] audit: type=1400 audit(2000004735.951:295393): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 664.695372][ T30] audit: type=1400 audit(2000004736.277:295394): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5193 comm="udevd" path="/run/udev/rules.d" dev="tmpfs" ino=11
[ 664.695418][ T30] audit: type=1400 audit(2000004736.308:295395): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="sda1" ino=2
[ 664.695463][ T30] audit: type=1400 audit(2000004736.308:295396): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="lib" dev="sda1" ino=264
[ 665.750285][ C1] net_ratelimit: 11447 callbacks suppressed
[ 665.750308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 665.750722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 665.751161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 665.751565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 665.751959][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 665.752263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 665.752586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 665.752923][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 665.753378][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 665.753829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.503019][ T30] kauditd_printk_skb: 76 callbacks suppressed
[ 670.503040][ T30] audit: type=1400 audit(2000004779.598:295473): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=4145 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 670.503093][ T30] audit: type=1400 audit(2000004780.123:295474): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 670.503142][ T30] audit: type=1400 audit(2000004780.658:295475): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 670.521726][ C1] net_ratelimit: 10794 callbacks suppressed
[ 670.521745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.522252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.522750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.523245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.523743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.524239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.524733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.525229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.525715][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.526206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 670.577057][ T30] audit: type=1400 audit(2000004780.742:295476): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 670.577118][ T30] audit: type=1400 audit(2000004780.742:295477): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 670.577164][ T30] audit: type=1400 audit(2000004780.742:295478): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269
[ 671.188799][ T30] audit: type=1400 audit(2000004781.173:295479): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=4145 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 672.306321][ T30] audit: type=1400 audit(2000004781.698:295480): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 672.306384][ T30] audit: type=1400 audit(2000004782.223:295481): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 672.394855][ T30] audit: type=1400 audit(2000004782.653:295482): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="/" dev="sda1" ino=2
[ 675.293638][ C1] net_ratelimit: 11134 callbacks suppressed
[ 675.293662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.294088][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.294503][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.294926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.295343][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.295797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.296358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.296784][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.297217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.297815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 675.492800][ T30] kauditd_printk_skb: 13 callbacks suppressed
[ 675.492823][ T30] audit: type=1400 audit(2000004785.950:295496): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 676.676870][ T30] audit: type=1400 audit(2000004786.464:295497): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 676.676942][ T30] audit: type=1400 audit(2000004786.989:295498): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 676.985995][ T30] audit: type=1400 audit(2000004787.493:295499): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5893 comm="syz-executor" path="/1442" dev="tmpfs" ino=7242
[ 677.202627][ T30] audit: type=1400 audit(2000004787.535:295500): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=4145 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 677.828778][ T30] audit: type=1400 audit(2000004788.039:295501): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 678.943845][ T30] audit: type=1400 audit(2000004788.585:295502): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 678.943908][ T30] audit: type=1400 audit(2000004789.110:295503): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5981 comm="kworker/1:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 678.991266][ T30] audit: type=1400 audit(2000004789.646:295504): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5193 comm="udevd" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 680.064954][ C1] net_ratelimit: 11444 callbacks suppressed
[ 680.064977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.065463][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.065920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.066380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.066851][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.067330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.067793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.068281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.068734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.069187][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 680.160521][ T30] audit: type=1400 audit(2000004790.150:295505): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=21458 comm="kworker/u8:4" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 682.492067][ T30] kauditd_printk_skb: 1 callbacks suppressed
[ 682.492089][ T30] audit: type=1400 audit(2000004791.200:295507): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 682.492143][ T30] audit: type=1400 audit(2000004791.735:295508): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 682.492192][ T30] audit: type=1400 audit(2000004792.260:295509): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=13 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 682.492240][ T30] audit: type=1400 audit(2000004792.649:295510): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="sda1" ino=2
[ 682.492285][ T30] audit: type=1400 audit(2000004792.649:295511): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="var" dev="sda1" ino=2001
[ 682.492330][ T30] audit: type=1400 audit(2000004792.649:295512): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="var" dev="sda1" ino=2001
[ 682.492375][ T30] audit: type=1400 audit(2000004792.649:295513): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="sda1" ino=2
[ 682.492419][ T30] audit: type=1400 audit(2000004792.649:295514): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1
[ 682.492464][ T30] audit: type=1400 audit(2000004792.649:295515): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=1834
[ 682.492509][ T30] audit: type=1400 audit(2000004792.649:295516): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1838
[ 684.836767][ C1] net_ratelimit: 11146 callbacks suppressed
[ 684.836791][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 684.837208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 684.837616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 684.838051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 684.838455][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 684.838866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 684.839299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 684.839705][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 684.840146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 684.840563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 687.359830][ T30] kauditd_printk_skb: 17 callbacks suppressed
[ 687.359852][ T30] audit: type=1400 audit(2000004798.329:295534): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sda1" ino=2
[ 687.359903][ T30] audit: type=1400 audit(2000004798.350:295535): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sysfs" ino=1
[ 687.359948][ T30] audit: type=1400 audit(2000004798.350:295536): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="devices" dev="sysfs" ino=7
[ 687.359994][ T30] audit: type=1400 audit(2000004798.381:295537): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="platform" dev="sysfs" ino=38
[ 687.378093][ T30] audit: type=1400 audit(2000004798.381:295538): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="dummy_hcd.4" dev="sysfs" ino=26770
[ 687.378149][ T30] audit: type=1400 audit(2000004798.381:295539): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="usb5" dev="sysfs" ino=26799
[ 688.415671][ T30] audit: type=1400 audit(2000004798.560:295540): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 688.415734][ T30] audit: type=1400 audit(2000004799.095:295541): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 689.005988][ T30] audit: type=1400 audit(2000004799.610:295542): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 689.006050][ T30] audit: type=1400 audit(2000004800.145:295543): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 689.608376][ C1] net_ratelimit: 11922 callbacks suppressed
[ 689.608399][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 689.608825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 689.609228][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 689.609641][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 689.610091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 689.610526][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 689.610952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 689.611407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 689.611813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 689.612214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 692.145791][ T30] kauditd_printk_skb: 14 callbacks suppressed
[ 692.145812][ T30] audit: type=1400 audit(2000004802.770:295558): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 692.145867][ T30] audit: type=1400 audit(2000004803.295:295559): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 692.675061][ T30] audit: type=1400 audit(2000004803.820:295560): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=21458 comm="kworker/u8:4" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 693.003798][ T30] audit: type=1400 audit(2000004804.345:295561): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 693.513279][ T30] audit: type=1400 audit(2000004804.870:295562): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 694.162979][ T30] audit: type=1400 audit(2000004805.406:295563): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 694.191304][ T30] audit: type=1400 audit(2000004805.574:295564): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5901 comm="syz-executor" name="cgroup.net" dev="tmpfs" ino=7272
[ 694.191372][ T30] audit: type=1400 audit(2000004805.574:295565): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269
[ 694.191417][ T30] audit: type=1400 audit(2000004805.574:295566): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 694.191461][ T30] audit: type=1400 audit(2000004805.574:295567): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 694.379779][ C1] net_ratelimit: 11687 callbacks suppressed
[ 694.379801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 694.380223][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 694.380652][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 694.381057][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 694.381468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 694.381893][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 694.382327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 694.382765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 694.383239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 694.383638][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 697.033984][ T30] kauditd_printk_skb: 6 callbacks suppressed
[ 697.034007][ T30] audit: type=1400 audit(2000004808.188:295574): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="crontabs" dev="sda1" ino=121
[ 697.034059][ T30] audit: type=1400 audit(2000004808.535:295575): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="sda1" ino=2
[ 697.034104][ T30] audit: type=1400 audit(2000004808.535:295576): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="tmpfs" ino=1
[ 697.034149][ T30] audit: type=1400 audit(2000004808.535:295577): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="udev" dev="tmpfs" ino=9
[ 697.034195][ T30] audit: type=1400 audit(2000004808.535:295578): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=5193 comm="udevd" name="queue" dev="tmpfs" ino=14985
[ 697.034238][ T30] audit: type=1400 audit(2000004808.556:295579): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 697.631165][ T30] audit: type=1400 audit(2000004808.640:295580): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sda1" ino=2
[ 697.631224][ T30] audit: type=1400 audit(2000004808.640:295581): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sysfs" ino=1
[ 697.631272][ T30] audit: type=1400 audit(2000004808.640:295582): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="devices" dev="sysfs" ino=7
[ 697.631317][ T30] audit: type=1400 audit(2000004808.640:295583): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="platform" dev="sysfs" ino=38
[ 699.151641][ C1] net_ratelimit: 11667 callbacks suppressed
[ 699.151664][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 699.152097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 699.152500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 699.152934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 699.153338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 699.153752][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 699.154287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 699.154703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 699.155120][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 699.155546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 702.027673][ T30] kauditd_printk_skb: 20 callbacks suppressed
[ 702.040950][ T30] audit: type=1400 audit(2000004813.816:295604): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 702.063285][ T30] audit: type=1400 audit(2000004813.837:295605): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="/" dev="sysfs" ino=1
[ 702.063355][ T30] audit: type=1400 audit(2000004813.837:295606): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="devices" dev="sysfs" ino=7
[ 702.063400][ T30] audit: type=1400 audit(2000004813.837:295607): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="platform" dev="sysfs" ino=38
[ 702.063443][ T30] audit: type=1400 audit(2000004813.837:295608): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="dummy_hcd.4" dev="sysfs" ino=26770
[ 702.063486][ T30] audit: type=1400 audit(2000004813.837:295609): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="usb5" dev="sysfs" ino=26799
[ 702.103697][ T30] audit: type=1400 audit(2000004813.900:295610): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="/" dev="sda1" ino=2
[ 702.103752][ T30] audit: type=1400 audit(2000004813.900:295611): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="etc" dev="sda1" ino=116
[ 702.557672][ T30] audit: type=1400 audit(2000004814.330:295612): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=12 comm="kworker/u8:0" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 702.682883][ T30] audit: type=1400 audit(2000004814.509:295613): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5903 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1
[ 703.923387][ C1] net_ratelimit: 10759 callbacks suppressed
[ 703.923411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 703.923849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 703.924278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 703.924710][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 703.925199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 703.925631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 703.926063][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 703.926493][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 703.926918][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 703.927377][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 707.907518][ T30] kauditd_printk_skb: 22 callbacks suppressed
[ 707.907541][ T30] audit: type=1400 audit(2000004819.423:295636): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 708.694887][ C1] net_ratelimit: 11565 callbacks suppressed
[ 708.694911][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 708.695341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 708.695778][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 708.696184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 708.696595][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 708.696998][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 708.697425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 708.697838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 708.698266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 708.698682][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 710.919972][ T30] audit: type=1400 audit(2000004821.144:295637): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 713.434465][ T30] audit: type=1400 audit(2000004824.641:295638): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 713.466504][ C1] net_ratelimit: 11912 callbacks suppressed
[ 713.466528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 713.466938][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 713.467353][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 713.467755][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 713.468159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 713.468613][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 713.469017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 713.469427][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 713.469831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 713.470235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 715.983864][ T30] audit: type=1400 audit(2000004828.452:295639): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5893 comm="syz-executor" path="/1442/cgroup" dev="tmpfs" ino=7243
[ 715.983925][ T30] audit: type=1400 audit(2000004828.452:295640): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 715.983972][ T30] audit: type=1400 audit(2000004828.452:295641): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 715.984017][ T30] audit: type=1400 audit(2000004828.452:295642): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="1442" dev="tmpfs" ino=7242
[ 718.238036][ C1] net_ratelimit: 11913 callbacks suppressed
[ 718.238059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 718.238468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 718.238878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 718.239305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 718.239713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 718.240136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 718.240542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 718.240953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 718.241355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 718.241786][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 719.174757][ T30] audit: type=1400 audit(2000004831.634:295643): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3401 comm="kworker/R-bat_e" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 719.388347][ T1303] ieee802154 phy0 wpan0: encryption failed: -22
[ 720.569717][ T30] audit: type=1400 audit(2000004833.292:295644): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5193 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=14985
[ 721.113653][ T30] audit: type=1400 audit(2000004833.838:295645): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=21434 comm="udevd" path="/run/udev/data/c189:402" dev="tmpfs" ino=14991
[ 723.009666][ C1] net_ratelimit: 11610 callbacks suppressed
[ 723.009689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 723.010105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 723.010537][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 723.010978][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 723.011406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 723.011826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 723.012263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 723.012678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 723.013082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 723.013521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.781542][ C1] net_ratelimit: 11091 callbacks suppressed
[ 727.781566][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.782045][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.782492][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.783003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.783426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.783876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.784320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.784747][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.785153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 727.785573][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 728.779164][ T30] audit: type=1400 audit(2000004841.892:295646): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="/" dev="sda1" ino=2
[ 728.779223][ T30] audit: type=1400 audit(2000004841.892:295647): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="/" dev="tmpfs" ino=1
[ 728.779268][ T30] audit: type=1400 audit(2000004841.892:295648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="udev" dev="tmpfs" ino=9
[ 728.779313][ T30] audit: type=1400 audit(2000004841.892:295649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="data" dev="tmpfs" ino=13
[ 729.183512][ T30] audit: type=1400 audit(2000004842.280:295650): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5901 comm="syz-executor" path="/1448/cgroup.cpu" dev="tmpfs" ino=7271
[ 729.183570][ T30] audit: type=1400 audit(2000004842.312:295651): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 729.183626][ T30] audit: type=1400 audit(2000004842.312:295652): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 729.183671][ T30] audit: type=1400 audit(2000004842.312:295653): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269
[ 730.588305][ T30] audit: type=1400 audit(2000004843.813:295654): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="/" dev="sda1" ino=2
[ 732.553059][ C1] net_ratelimit: 11194 callbacks suppressed
[ 732.553084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 732.553496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 732.553917][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 732.554331][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 732.554732][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 732.555159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 732.555571][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 732.555976][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 732.556408][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 732.556930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 733.077771][ T30] audit: type=1400 audit(2000004845.335:295655): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=994 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 734.505051][ T30] audit: type=1400 audit(2000004847.897:295656): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="etc" dev="sda1" ino=116
[ 734.505111][ T30] audit: type=1400 audit(2000004847.897:295657): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="cron" dev="sda1" ino=120
[ 737.208571][ T30] audit: type=1400 audit(2000004850.764:295658): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5193 comm="udevd" name="queue" dev="tmpfs" ino=14985
[ 737.324827][ C1] net_ratelimit: 11242 callbacks suppressed
[ 737.324849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.325309][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.325776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.326229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.326697][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.327152][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.327596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.328230][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.328689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.329155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 737.830871][ T30] audit: type=1400 audit(2000004851.394:295659): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5893 comm="syz-executor" name="1442" dev="tmpfs" ino=7242
[ 737.830932][ T30] audit: type=1400 audit(2000004851.394:295660): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5893 comm="syz-executor" name="cgroup" dev="tmpfs" ino=7243
[ 737.830979][ T30] audit: type=1400 audit(2000004851.394:295661): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5893 comm="syz-executor" name="1442" dev="tmpfs" ino=7242
[ 737.831030][ T30] audit: type=1400 audit(2000004851.394:295662): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 737.831076][ T30] audit: type=1400 audit(2000004851.394:295663): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 739.634218][ T30] audit: type=1400 audit(2000004853.273:295664): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21435 comm="udevd" path="/run/udev/data/c189:525" dev="tmpfs" ino=14986
[ 740.812226][ T30] audit: type=1400 audit(2000004854.523:295665): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="sda1" ino=2
[ 740.812286][ T30] audit: type=1400 audit(2000004854.523:295666): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="etc" dev="sda1" ino=116
[ 740.812332][ T30] audit: type=1400 audit(2000004854.523:295667): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="udev" dev="sda1" ino=259
[ 741.506874][ T30] audit: type=1400 audit(2000004855.247:295668): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=21435 comm="udevd" path="/run/udev/data/c189:525" dev="tmpfs" ino=14986
[ 741.537170][ T30] audit: type=1400 audit(2000004855.279:295669): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21434 comm="udevd" name="data" dev="tmpfs" ino=13
[ 741.537230][ T30] audit: type=1400 audit(2000004855.279:295670): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=21434 comm="udevd" name="c189:402" dev="tmpfs" ino=14991
[ 741.537275][ T30] audit: type=1400 audit(2000004855.279:295671): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=21434 comm="udevd" name="data" dev="tmpfs" ino=13
[ 741.537320][ T30] audit: type=1400 audit(2000004855.279:295672): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="/" dev="sda1" ino=2
[ 741.537365][ T30] audit: type=1400 audit(2000004855.279:295673): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21434 comm="udevd" name="/" dev="devtmpfs" ino=1
[ 742.096267][ C1] net_ratelimit: 10784 callbacks suppressed
[ 742.096291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 742.096707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 742.097110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 742.097521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 742.097956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 742.098369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 742.098805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 742.099208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 742.099627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 742.100065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.867854][ C1] net_ratelimit: 11059 callbacks suppressed
[ 746.867878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.868295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.868699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.869158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.869564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.869968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.870379][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.870781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.871218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 746.871643][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 748.607512][ T30] kauditd_printk_skb: 1 callbacks suppressed
[ 748.607534][ T30] audit: type=1400 audit(2000004862.691:295675): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269
[ 748.607585][ T30] audit: type=1400 audit(2000004862.691:295676): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5901 comm="syz-executor" name="cgroup.cpu" dev="tmpfs" ino=7271
[ 748.607631][ T30] audit: type=1400 audit(2000004862.691:295677): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269
[ 748.607675][ T30] audit: type=1400 audit(2000004862.691:295678): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 748.607720][ T30] audit: type=1400 audit(2000004862.691:295679): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 748.607766][ T30] audit: type=1400 audit(2000004862.691:295680): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269
[ 751.639802][ C1] net_ratelimit: 10637 callbacks suppressed
[ 751.639826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 751.640281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 751.640799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 751.641254][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 751.641711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 751.642165][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 751.642625][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 751.643099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 751.643583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 751.644040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 754.265336][ T30] audit: type=1400 audit(2000004868.613:295681): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 754.265395][ T30] audit: type=1400 audit(2000004868.613:295682): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=5893 comm="syz-executor" name="1442" dev="tmpfs" ino=7242
[ 754.265441][ T30] audit: type=1400 audit(2000004868.634:295683): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 754.265487][ T30] audit: type=1400 audit(2000004868.655:295684): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 754.265540][ T30] audit: type=1400 audit(2000004868.655:295685): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5893 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 754.302758][ T30] audit: type=1400 audit(2000004868.676:295686): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="sda1" ino=2
[ 754.302818][ T30] audit: type=1400 audit(2000004868.676:295687): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="var" dev="sda1" ino=2001
[ 754.302863][ T30] audit: type=1400 audit(2000004868.676:295688): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="var" dev="sda1" ino=2001
[ 754.302912][ T30] audit: type=1400 audit(2000004868.676:295689): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="sda1" ino=2
[ 754.302957][ T30] audit: type=1400 audit(2000004868.676:295690): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21456 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1
[ 756.411095][ C1] net_ratelimit: 10550 callbacks suppressed
[ 756.411118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 756.411585][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 756.412037][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 756.412527][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 756.412980][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 756.413470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 756.413922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 756.414388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 756.414847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 756.415332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 760.529834][ T30] kauditd_printk_skb: 11 callbacks suppressed
[ 760.529858][ T30] audit: type=1400 audit(2000004874.094:295702): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=994 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.1.113 dest=54518 netif=eth0
[ 761.182786][ C1] net_ratelimit: 10622 callbacks suppressed
[ 761.182808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 761.183274][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 761.183718][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 761.184195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 761.184655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 761.185133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 761.185584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 761.186044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 761.186498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 761.186994][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 763.964554][ T30] audit: type=1400 audit(2000004878.829:295704): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5565 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121
[ 763.964622][ T30] audit: type=1400 audit(2000004878.829:295703): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5193 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261
[ 763.964668][ T30] audit: type=1400 audit(2000004878.850:295705): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="/" dev="sda1" ino=2
[ 763.964713][ T30] audit: type=1400 audit(2000004878.850:295706): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="lib" dev="sda1" ino=264
[ 763.964757][ T30] audit: type=1400 audit(2000004878.850:295707): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5193 comm="udevd" name="udev" dev="sda1" ino=1222
[ 764.751131][ T30] audit: type=1400 audit(2000004879.606:295708): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 764.751193][ T30] audit: type=1400 audit(2000004879.606:295709): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 764.751246][ T30] audit: type=1400 audit(2000004879.606:295710): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269
[ 765.045515][ T30] audit: type=1400 audit(2000004879.952:295711): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21435 comm="udevd" name="devices" dev="sysfs" ino=7
[ 765.954442][ C1] net_ratelimit: 10527 callbacks suppressed
[ 765.954466][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 765.954913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 765.955355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 765.955803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 765.956268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 765.956715][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 765.957186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 765.957634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 765.958075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 765.958521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 767.964836][ T30] kauditd_printk_skb: 8 callbacks suppressed
[ 767.964857][ T30] audit: type=1400 audit(2000004883.029:295720): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5901 comm="syz-executor" path="/1448/cgroup" dev="tmpfs" ino=7270
[ 770.726037][ C1] net_ratelimit: 11028 callbacks suppressed
[ 770.726060][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 770.726472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 770.726875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 770.727311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 770.727714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 770.728128][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 770.728551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 770.728962][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 770.729367][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 770.729792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.497952][ C1] net_ratelimit: 11119 callbacks suppressed
[ 775.497977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.498453][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.498914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.499388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.499866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.500336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.500797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.501248][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.501729][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 775.502182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 777.882511][ T1303] ieee802154 phy0 wpan0: encryption failed: -22
[ 779.341770][ T30] audit: type=1400 audit(2000004894.977:295721): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5565 comm="crond" name="crontabs" dev="sda1" ino=121
[ 780.269251][ C1] net_ratelimit: 10766 callbacks suppressed
[ 780.269275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.269739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.270258][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.270776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.271235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.271703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.272201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.272674][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.273134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.273584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 780.732754][ T31] INFO: task kworker/0:6:6014 blocked for more than 143 seconds.
[ 780.732792][ T31] Not tainted 6.15.0-syzkaller-13526-g7a912d04415b #0
[ 780.732807][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 780.732819][ T31] task:kworker/0:6 state:D stack:15496 pid:6014 tgid:6014 ppid:2 task_flags:0x4208060 flags:0x00004000
[ 780.732876][ T31] Workqueue: events_power_efficient reg_check_chans_work
[ 780.732921][ T31] Call Trace:
[ 780.732935][ T31]
[ 780.732953][ T31] __schedule+0x16a2/0x4cb0
[ 780.732994][ T31] ? do_raw_spin_unlock+0x122/0x240
[ 780.733027][ T31] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 780.733087][ T31] ? __pfx_do_raw_spin_lock+0x10/0x10
[ 780.733111][ T31] ? schedule+0x165/0x360
[ 780.733148][ T31] ? __pfx___schedule+0x10/0x10
[ 780.733197][ T31] ? schedule+0x91/0x360
[ 780.733232][ T31] schedule+0x165/0x360
[ 780.733267][ T31] schedule_preempt_disabled+0x13/0x30
[ 780.733298][ T31] __mutex_lock+0x724/0xe80
[ 780.733322][ T31] ? __mutex_lock+0x51b/0xe80
[ 780.733351][ T31] ? reg_check_chans_work+0x95/0xf00
[ 780.733382][ T31] ? __pfx___mutex_lock+0x10/0x10
[ 780.733421][ T31] ? do_raw_spin_lock+0x121/0x290
[ 780.733443][ T31] ? look_up_lock_class+0x74/0x170
[ 780.733481][ T31] reg_check_chans_work+0x95/0xf00
[ 780.733516][ T31] ? __lock_acquire+0xab9/0xd20
[ 780.733555][ T31] ? __pfx_reg_check_chans_work+0x10/0x10
[ 780.733584][ T31] ? process_scheduled_works+0x9ef/0x17b0
[ 780.733625][ T31] ? _raw_spin_unlock_irq+0x23/0x50
[ 780.733655][ T31] ? process_scheduled_works+0x9ef/0x17b0
[ 780.733694][ T31] ? process_scheduled_works+0x9ef/0x17b0
[ 780.733729][ T31] process_scheduled_works+0xade/0x17b0
[ 780.733795][ T31] ? __pfx_process_scheduled_works+0x10/0x10
[ 780.733848][ T31] worker_thread+0x8a0/0xda0
[ 780.733885][ T31] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 780.733926][ T31] ? __kthread_parkme+0x7b/0x200
[ 780.733972][ T31] kthread+0x70e/0x8a0
[ 780.734001][ T31] ? __pfx_worker_thread+0x10/0x10
[ 780.734034][ T31] ? __pfx_kthread+0x10/0x10
[ 780.734062][ T31] ? _raw_spin_unlock_irq+0x23/0x50
[ 780.734093][ T31] ? lockdep_hardirqs_on+0x9c/0x150
[ 780.734124][ T31] ? __pfx_kthread+0x10/0x10
[ 780.734150][ T31] ret_from_fork+0x3f9/0x770
[ 780.734183][ T31] ? __pfx_ret_from_fork+0x10/0x10
[ 780.734221][ T31] ? __switch_to_asm+0x39/0x70
[ 780.734243][ T31] ? __switch_to_asm+0x33/0x70
[ 780.734264][ T31] ? __pfx_kthread+0x10/0x10
[ 780.734290][ T31] ret_from_fork_asm+0x1a/0x30
[ 780.734331][ T31]
[ 780.734359][ T31]
[ 780.734359][ T31] Showing all locks held in the system:
[ 780.734371][ T31] 1 lock held by kthreadd/2:
[ 780.734391][ T31] 1 lock held by kworker/R-kvfre/6:
[ 780.734405][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0
[ 780.734479][ T31] 4 locks held by kworker/u8:0/12:
[ 780.734494][ T31] 4 locks held by kworker/u8:1/13:
[ 780.734508][ T31] 1 lock held by kworker/R-mm_pe/14:
[ 780.734522][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0
[ 780.734593][ T31] 3 locks held by kworker/1:0/24:
[ 780.734607][ T31] #0: ffff88805d425548 ((wq_completion)wg-kex-wg1#6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 780.734694][ T31] #1: ffffc900001e7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 780.734783][ T31] #2: ffff888029ed0d20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_begin_session+0x36/0xbd0
[ 780.734849][ T31] 1 lock held by khungtaskd/31:
[ 780.734863][ T31] #0: ffffffff8e13f060 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180
[ 780.734934][ T31] 4 locks held by kworker/u8:2/36:
[ 780.734948][ T31] #0: ffff88807b4c5148 ((wq_completion)wg-kex-wg1#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 780.735021][ T31] #1: ffffc90000ac7bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 780.735090][ T31] #2: ffff888028b11308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0
[ 780.735156][ T31] #3: ffff888029ed34c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0
[ 780.735223][ T31] 3 locks held by kworker/u8:3/49:
[ 780.735242][ T31] 3 locks held by kworker/u8:5/994:
[ 780.735259][ T31] 3 locks held by kworker/u8:6/1337:
[ 780.735282][ T31] 3 locks held by kworker/R-ipv6_/3171:
[ 780.735296][ T31] #0: ffff88814cc2c948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 780.735366][ T31] #1: ffffc9000ba17ba0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 780.735433][ T31] #2: ffffffff8f4fe3c8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30
[ 780.735498][ T31] 5 locks held by kworker/R-bat_e/3401:
[ 780.735513][ T31] 4 locks held by kworker/u8:7/4092:
[ 780.735527][ T31] 4 locks held by kworker/u8:8/4145:
[ 780.735542][ T31] 1 lock held by klogd/5182:
[ 780.735556][ T31] 2 locks held by udevd/5193:
[ 780.735570][ T31] 1 lock held by crond/5565:
[ 780.735583][ T31] 2 locks held by getty/5582:
[ 780.735597][ T31] #0: ffff88802ff960a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70
[ 780.735655][ T31] #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400
[ 780.735730][ T31] 1 lock held by syz-executor/5810:
[ 780.735745][ T31] 4 locks held by kworker/0:3/5854:
[ 780.735759][ T31] 4 locks held by syz-executor/5893:
[ 780.735774][ T31] 2 locks held by syz-executor/5895:
[ 780.735788][ T31] 2 locks held by syz-executor/5901:
[ 780.735804][ T31] 1 lock held by kworker/R-wg-cr/5921:
[ 780.735818][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0
[ 780.735877][ T31] 1 lock held by kworker/R-wg-cr/5922:
[ 780.735890][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0
[ 780.749531][ T31] 1 lock held by kworker/R-wg-cr/5926:
[ 780.749548][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0
[ 780.749621][ T31] 1 lock held by kworker/R-wg-cr/5927:
[ 780.749635][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0
[ 780.749703][ T31] 1 lock held by kworker/R-wg-cr/5931:
[ 780.749719][ T31] 1 lock held by kworker/R-wg-cr/5933:
[ 780.749732][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0
[ 780.749793][ T31] 3 locks held by kworker/0:4/5944:
[ 780.749809][ T31] 4 locks held by kworker/1:3/5957:
[ 780.749823][ T31] #0: ffff88805d53b148 ((wq_completion)wg-kex-wg1#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 780.749900][ T31] #1: ffffc9000b257bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 780.749988][ T31] #2: ffff888028b11308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x150/0x900
[ 780.750057][ T31] #3: ffff888029ed34c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x4de/0x900
[ 780.750125][ T31] 4 locks held by kworker/0:5/5971:
[ 780.750139][ T31] 4 locks held by kworker/1:5/5981:
[ 780.750155][ T31] 3 locks held by kworker/1:7/6000:
[ 780.750169][ T31] 3 locks held by kworker/0:6/6014:
[ 780.750183][ T31] #0: ffff88801a481d48 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 780.750252][ T31] #1: ffffc9000b427bc0 ((reg_check_chans).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 780.750320][ T31] #2: ffffffff8f4fe3c8 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x95/0xf00
[ 780.750386][ T31] 1 lock held by kworker/R-bond1/17058:
[ 780.750400][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0
[ 780.750470][ T31] 1 lock held by kworker/R-bond2/17523:
[ 780.750484][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0
[ 780.750554][ T31] 1 lock held by kworker/R-bond0/20711:
[ 780.750569][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0
[ 780.750639][ T31] 5 locks held by udevd/21434:
[ 780.750654][ T31] 3 locks held by udevd/21435:
[ 780.750675][ T31] 3 locks held by syz.2.7304/21450:
[ 780.750690][ T31] 3 locks held by dhcpcd-run-hook/21456:
[ 780.750705][ T31] 4 locks held by kworker/u8:4/21458:
[ 780.750719][ T31] 1 lock held by kworker/u8:9/21459:
[ 780.750732][ T31] #0: ffffffff8dfe5c08 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x2e/0x3a0
[ 780.750803][ T31] 2 locks held by kworker/0:1/21460:
[ 780.750818][ T31]
[ 780.750825][ T31] =============================================
[ 780.750825][ T31]
[ 780.750853][ T31] NMI backtrace for cpu 1
[ 780.750876][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-syzkaller-13526-g7a912d04415b #0 PREEMPT(full)
[ 780.750900][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 780.750913][ T31] Call Trace:
[ 780.750922][ T31]
[ 780.750932][ T31] dump_stack_lvl+0x189/0x250
[ 780.750964][ T31] ? __wake_up_klogd+0xd9/0x110
[ 780.750990][ T31] ? __pfx_dump_stack_lvl+0x10/0x10
[ 780.751020][ T31] ? __pfx__printk+0x10/0x10
[ 780.751055][ T31] nmi_cpu_backtrace+0x39e/0x3d0
[ 780.751087][ T31] ? __pfx_nmi_cpu_backtrace+0x10/0x10
[ 780.751110][ T31] ? _printk+0xcf/0x120
[ 780.751157][ T31] ? __pfx__printk+0x10/0x10
[ 780.751179][ T31] ? debug_show_all_locks+0x2e/0x180
[ 780.751208][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10
[ 780.751237][ T31] nmi_trigger_cpumask_backtrace+0x17a/0x300
[ 780.751266][ T31] watchdog+0xfee/0x1030
[ 780.751295][ T31] ? watchdog+0x1de/0x1030
[ 780.751329][ T31] kthread+0x70e/0x8a0
[ 780.751354][ T31] ? __pfx_watchdog+0x10/0x10
[ 780.751380][ T31] ? __pfx_kthread+0x10/0x10
[ 780.751403][ T31] ? _raw_spin_unlock_irq+0x23/0x50
[ 780.751431][ T31] ? lockdep_hardirqs_on+0x9c/0x150
[ 780.751459][ T31] ? __pfx_kthread+0x10/0x10
[ 780.751500][ T31] ret_from_fork+0x3f9/0x770
[ 780.751531][ T31] ? __pfx_ret_from_fork+0x10/0x10
[ 780.751566][ T31] ? __switch_to_asm+0x39/0x70
[ 780.751584][ T31] ? __switch_to_asm+0x33/0x70
[ 780.751602][ T31] ? __pfx_kthread+0x10/0x10
[ 780.751626][ T31] ret_from_fork_asm+0x1a/0x30
[ 780.751672][ T31]
[ 780.751682][ T31] Sending NMI from CPU 1 to CPUs 0:
[ 780.751711][ C0] NMI backtrace for cpu 0
[ 780.751725][ C0] CPU: 0 UID: 0 PID: 3401 Comm: kworker/R-bat_e Not tainted 6.15.0-syzkaller-13526-g7a912d04415b #0 PREEMPT(full)
[ 780.751746][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 780.751758][ C0] Workqueue: bat_events batadv_tt_purge
[ 780.751786][ C0] RIP: 0010:unwind_next_frame+0x12f9/0x2390
[ 780.751814][ C0] Code: 00 49 89 d5 48 89 d5 48 89 d8 48 29 e8 48 89 c1 48 c1 f9 02 48 c1 e8 3f 48 01 c8 48 83 e0 fe 4c 8d 3c 45 00 00 00 00 49 01 ef <4c> 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 84
[ 780.751830][ C0] RSP: 0018:ffffc90000006bb8 EFLAGS: 00000286
[ 780.751845][ C0] RAX: 0000000000000000 RBX: ffffffff8fb02314 RCX: 0000000000000000
[ 780.751857][ C0] RDX: ffffffff8fb022f4 RSI: ffffffff90299926 RDI: ffffffff8be1af60
[ 780.751871][ C0] RBP: ffffffff8fb02314 R08: 000000000000000f R09: ffffffff81728de5
[ 780.751883][ C0] R10: ffffc90000006cd8 R11: ffffffff81ace580 R12: ffffffff81332f49
[ 780.751896][ C0] R13: ffffffff8fb02310 R14: ffffc90000006c88 R15: ffffffff8fb02314
[ 780.751910][ C0] FS: 0000000000000000(0000) GS:ffff888125c86000(0000) knlGS:0000000000000000
[ 780.751933][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 780.751945][ C0] CR2: 0000555558afb5c8 CR3: 0000000031e66000 CR4: 00000000003526f0
[ 780.751961][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 780.751972][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 780.751983][ C0] Call Trace:
[ 780.751990][ C0]
[ 780.752001][ C0] ? unwind_next_frame+0xa5/0x2390
[ 780.752027][ C0] ? ret_from_fork_asm+0x1a/0x30
[ 780.752046][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 780.752065][ C0] arch_stack_walk+0x11c/0x150
[ 780.752095][ C0] ? ret_from_fork_asm+0x1a/0x30
[ 780.752114][ C0] stack_trace_save+0x9c/0xe0
[ 780.752131][ C0] ? __pfx_stack_trace_save+0x10/0x10
[ 780.752153][ C0] ? stack_depot_save_flags+0x40/0x900
[ 780.752177][ C0] kasan_save_track+0x3e/0x80
[ 780.752196][ C0] ? kasan_save_track+0x3e/0x80
[ 780.752213][ C0] ? __kasan_slab_alloc+0x6c/0x80
[ 780.752233][ C0] ? kmem_cache_alloc_node_noprof+0x1bb/0x3c0
[ 780.752254][ C0] ? kmalloc_reserve+0xbd/0x290
[ 780.752273][ C0] ? __alloc_skb+0x142/0x2d0
[ 780.752291][ C0] ? fdb_notify+0xa6/0x160
[ 780.752315][ C0] ? br_fdb_update+0x4c8/0x690
[ 780.752338][ C0] ? br_handle_frame_finish+0x573/0x19b0
[ 780.752357][ C0] ? br_nf_hook_thresh+0x3c3/0x4a0
[ 780.752377][ C0] ? br_nf_pre_routing_finish_ipv6+0x948/0xd00
[ 780.752398][ C0] ? br_nf_pre_routing_ipv6+0x37e/0x6b0
[ 780.752418][ C0] ? br_handle_frame+0x982/0x14c0
[ 780.752435][ C0] ? __netif_receive_skb_core+0x10e1/0x4180
[ 780.752452][ C0] ? __netif_receive_skb+0x72/0x380
[ 780.752467][ C0] ? process_backlog+0x60e/0x14f0
[ 780.752484][ C0] ? __napi_poll+0xc7/0x480
[ 780.752498][ C0] ? net_rx_action+0x707/0xe30
[ 780.752515][ C0] ? handle_softirqs+0x286/0x870
[ 780.752538][ C0] ? do_softirq+0xec/0x180
[ 780.752561][ C0] ? __local_bh_enable_ip+0x17d/0x1c0
[ 780.752583][ C0] ? batadv_tt_local_purge+0x2a7/0x340
[ 780.752607][ C0] ? batadv_tt_purge+0x35/0x9e0
[ 780.752630][ C0] ? process_scheduled_works+0xade/0x17b0
[ 780.752653][ C0] ? rescuer_thread+0x53c/0xdd0
[ 780.752668][ C0] ? kthread+0x70e/0x8a0
[ 780.752685][ C0] ? ret_from_fork+0x3f9/0x770
[ 780.752705][ C0] ? ret_from_fork_asm+0x1a/0x30
[ 780.752742][ C0] __kasan_slab_alloc+0x6c/0x80
[ 780.752764][ C0] kmem_cache_alloc_node_noprof+0x1bb/0x3c0
[ 780.752786][ C0] ? kmalloc_reserve+0xbd/0x290
[ 780.752808][ C0] kmalloc_reserve+0xbd/0x290
[ 780.752830][ C0] __alloc_skb+0x142/0x2d0
[ 780.752852][ C0] fdb_notify+0xa6/0x160
[ 780.752878][ C0] br_fdb_update+0x4c8/0x690
[ 780.752906][ C0] ? __pfx_br_fdb_update+0x10/0x10
[ 780.752943][ C0] br_handle_frame_finish+0x573/0x19b0
[ 780.752970][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10
[ 780.752996][ C0] ? ip6t_do_table+0x1db/0x1550
[ 780.753020][ C0] ? nf_hook_slow+0x176/0x220
[ 780.753042][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10
[ 780.753061][ C0] br_nf_hook_thresh+0x3c3/0x4a0
[ 780.753085][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10
[ 780.753106][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10
[ 780.753124][ C0] ? nf_nat_ipv6_in+0x1fc/0x2b0
[ 780.753147][ C0] br_nf_pre_routing_finish_ipv6+0x948/0xd00
[ 780.753168][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10
[ 780.753193][ C0] ? br_nf_pre_routing_ipv6+0x42f/0x6b0
[ 780.753214][ C0] br_nf_pre_routing_ipv6+0x37e/0x6b0
[ 780.753237][ C0] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10
[ 780.753260][ C0] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10
[ 780.753281][ C0] ? br_nf_pre_routing+0x720/0x1470
[ 780.753304][ C0] ? __pfx_br_nf_pre_routing+0x10/0x10
[ 780.753323][ C0] br_handle_frame+0x982/0x14c0
[ 780.753348][ C0] ? __pfx_br_handle_frame+0x10/0x10
[ 780.753369][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10
[ 780.753392][ C0] ? __pfx_br_handle_frame+0x10/0x10
[ 780.753412][ C0] __netif_receive_skb_core+0x10e1/0x4180
[ 780.753430][ C0] ? ip6_mc_input+0x9c3/0xbe0
[ 780.753455][ C0] ? kmem_cache_free+0x18f/0x400
[ 780.753479][ C0] ? ip6_mc_input+0x9c3/0xbe0
[ 780.753510][ C0] ? __pfx___netif_receive_skb_core+0x10/0x10
[ 780.753527][ C0] ? ip6_rcv_finish+0x29a/0x2d0
[ 780.753552][ C0] ? NF_HOOK+0x309/0x3a0
[ 780.753574][ C0] ? skb_orphan+0xaf/0xd0
[ 780.753600][ C0] ? __lock_acquire+0xab9/0xd20
[ 780.753626][ C0] ? process_backlog+0x2d5/0x14f0
[ 780.753645][ C0] ? process_backlog+0x2d5/0x14f0
[ 780.753665][ C0] __netif_receive_skb+0x72/0x380
[ 780.753685][ C0] ? process_backlog+0x2d5/0x14f0
[ 780.753704][ C0] process_backlog+0x60e/0x14f0
[ 780.753731][ C0] ? __pfx_process_backlog+0x10/0x10
[ 780.753750][ C0] ? do_raw_spin_lock+0x121/0x290
[ 780.753772][ C0] __napi_poll+0xc7/0x480
[ 780.753787][ C0] ? net_rx_action+0x46d/0xe30
[ 780.753807][ C0] net_rx_action+0x707/0xe30
[ 780.753835][ C0] ? __pfx_net_rx_action+0x10/0x10
[ 780.753874][ C0] handle_softirqs+0x286/0x870
[ 780.753900][ C0] ? do_softirq+0xec/0x180
[ 780.753946][ C0] ? __pfx_handle_softirqs+0x10/0x10
[ 780.753974][ C0] ? batadv_tt_local_purge+0x2a7/0x340
[ 780.753999][ C0] do_softirq+0xec/0x180
[ 780.754022][ C0]
[ 780.754028][ C0]
[ 780.754035][ C0] ? __pfx_do_softirq+0x10/0x10
[ 780.754058][ C0] ? __lock_acquire+0xab9/0xd20
[ 780.754091][ C0] ? lockdep_softirqs_on+0x13b/0x1c0
[ 780.754120][ C0] __local_bh_enable_ip+0x17d/0x1c0
[ 780.754144][ C0] ? __pfx___local_bh_enable_ip+0x10/0x10
[ 780.754171][ C0] ? do_raw_spin_unlock+0x122/0x240
[ 780.754190][ C0] ? batadv_tt_local_purge+0x2a7/0x340
[ 780.754215][ C0] batadv_tt_local_purge+0x2a7/0x340
[ 780.754252][ C0] batadv_tt_purge+0x35/0x9e0
[ 780.754277][ C0] ? _raw_spin_unlock_irq+0x23/0x50
[ 780.754300][ C0] ? process_scheduled_works+0x9ef/0x17b0
[ 780.754324][ C0] ? process_scheduled_works+0x9ef/0x17b0
[ 780.754349][ C0] process_scheduled_works+0xade/0x17b0
[ 780.754389][ C0] ? __pfx_process_scheduled_works+0x10/0x10
[ 780.754419][ C0] ? assign_work+0x381/0x410
[ 780.754445][ C0] rescuer_thread+0x53c/0xdd0
[ 780.754465][ C0] ? rescuer_thread+0xbb/0xdd0
[ 780.754491][ C0] kthread+0x70e/0x8a0
[ 780.754510][ C0] ? __pfx_rescuer_thread+0x10/0x10
[ 780.754526][ C0] ? __pfx_kthread+0x10/0x10
[ 780.754546][ C0] ? _raw_spin_unlock_irq+0x23/0x50
[ 780.754569][ C0] ? lockdep_hardirqs_on+0x9c/0x150
[ 780.754593][ C0] ? __pfx_kthread+0x10/0x10
[ 780.754611][ C0] ret_from_fork+0x3f9/0x770
[ 780.754636][ C0] ? __pfx_ret_from_fork+0x10/0x10
[ 780.754662][ C0] ? __switch_to_asm+0x39/0x70
[ 780.754678][ C0] ? __switch_to_asm+0x33/0x70
[ 780.754694][ C0] ? __pfx_kthread+0x10/0x10
[ 780.754712][ C0] ret_from_fork_asm+0x1a/0x30
[ 780.754738][ C0]
[ 783.867297][ T30] audit: type=1400 audit(2000004899.713:295722): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21434 comm="udevd" name="char" dev="devtmpfs" ino=1319
[ 783.867359][ T30] audit: type=1400 audit(2000004899.713:295723): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=21434 comm="udevd" name="189:402" dev="devtmpfs" ino=5131
[ 783.867405][ T30] audit: type=1400 audit(2000004899.713:295724): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=21434 comm="udevd" name="char" dev="devtmpfs" ino=1319
[ 783.905839][ T30] audit: type=1400 audit(2000004899.755:295725): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 783.905902][ T30] audit: type=1400 audit(2000004899.755:295726): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="newroot" dev="tmpfs" ino=2
[ 783.905948][ T30] audit: type=1400 audit(2000004899.755:295727): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5901 comm="syz-executor" name="1448" dev="tmpfs" ino=7269
[ 784.018839][ T30] audit: type=1400 audit(2000004899.849:295728): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21456 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1839
[ 785.040950][ C1] net_ratelimit: 10749 callbacks suppressed
[ 785.040973][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 785.041383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 785.041839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 785.042259][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 785.042711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 785.043132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 785.043583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 785.044025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 785.044457][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 785.044895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:f1:03:25:2c:4c, vlan:0)
[ 786.790598][ T31] Kernel panic - not syncing: hung_task: blocked tasks
[ 786.790628][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-syzkaller-13526-g7a912d04415b #0 PREEMPT(full)
[ 786.790657][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 786.790672][ T31] Call Trace:
[ 786.790683][ T31]
[ 786.790695][ T31] dump_stack_lvl+0x99/0x250
[ 786.790733][ T31] ? __asan_memcpy+0x40/0x70
[ 786.790757][ T31] ? __pfx_dump_stack_lvl+0x10/0x10
[ 786.790789][ T31] ? __pfx__printk+0x10/0x10
[ 786.790826][ T31] panic+0x2db/0x790
[ 786.790862][ T31] ? __pfx_panic+0x10/0x10
[ 786.790892][ T31] ? __pfx_delay_tsc+0x10/0x10
[ 786.790917][ T31] ? nmi_backtrace_stall_check+0x433/0x440
[ 786.790954][ T31] ? preempt_schedule_thunk+0x16/0x30
[ 786.790982][ T31] ? nmi_trigger_cpumask_backtrace+0x2b6/0x300
[ 786.791020][ T31] watchdog+0x102d/0x1030
[ 786.791050][ T31] ? watchdog+0x1de/0x1030
[ 786.791086][ T31] kthread+0x70e/0x8a0
[ 786.791109][ T31] ? __pfx_watchdog+0x10/0x10
[ 786.791132][ T31] ? __pfx_kthread+0x10/0x10
[ 786.791158][ T31] ? _raw_spin_unlock_irq+0x23/0x50
[ 786.791188][ T31] ? lockdep_hardirqs_on+0x9c/0x150
[ 786.791219][ T31] ? __pfx_kthread+0x10/0x10
[ 786.791244][ T31] ret_from_fork+0x3f9/0x770
[ 786.791276][ T31] ? __pfx_ret_from_fork+0x10/0x10
[ 786.791311][ T31] ? __switch_to_asm+0x39/0x70
[ 786.791339][ T31] ? __switch_to_asm+0x33/0x70
[ 786.791360][ T31] ? __pfx_kthread+0x10/0x10
[ 786.791385][ T31] ret_from_fork_asm+0x1a/0x30
[ 786.791423][ T31]
[ 786.791756][ T31] Kernel Offset: disabled