last executing test programs:
1m56.923570225s ago: executing program 0 (id=10067):
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x38, 0x701, 0x70bd2a, 0x0, {0x10}}, 0x14}, 0x1, 0x0, 0x0, 0x10004891}, 0x10)
1m56.654090134s ago: executing program 0 (id=10070):
r0 = syz_usb_connect(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000d0918108ac051582588f0000000109022d00010000000009040000030b08000009058d67c8002a000009050502000000000009058b6e", @ANYRESOCT=0x0], 0x0)
syz_usb_control_io$cdc_ncm(r0, &(0x7f00000000c0)={0x14, &(0x7f0000000000)={0x20, 0x5, 0x2f, {0x2f, 0x11, "76637e83c7a51de573b1e364795a503822ac3a96add73706c56bac970337d1ec04c75e8679043589cc16e165b0"}}, 0x0}, 0x0)
1m54.651539232s ago: executing program 3 (id=10089):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {0xd, 0x0, 0x4}, [@NFULA_CFG_CMD={0x5, 0x1, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x44084)
1m54.469080394s ago: executing program 0 (id=10090):
r0 = socket$inet6(0xa, 0x2, 0x3a)
sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x80000006}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000100)="8000102e75243301", 0x8}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="100000000000000029"], 0x18}}], 0x1, 0x40000000)
1m54.414547356s ago: executing program 2 (id=10091):
r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0)
ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7aa, 0x0)
1m54.303585044s ago: executing program 3 (id=10092):
r0 = socket(0x2b, 0x80801, 0x1)
bind$unix(r0, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e)
1m53.920171164s ago: executing program 0 (id=10094):
r0 = syz_open_dev$vim2m(&(0x7f00000001c0), 0x0, 0x2)
ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000380)={0x0, @raw_data="68a9abaa66825885803d7545599bddef31e1e683a99231d77213b8ff1d563f3fc7ba941b1da62b332d7498d9e2287b77aa5c39c50b0a837816f984dc144504769ccb955b8c1428b69e540d9a878ba5fc81a6932af42f7ad8689563f7168e8a2ce494e6e510009434ce363d59cb596192fd96076c86e207b1b16b4ed20152eef07e48a71eeeb3ff25d217094800d6e02fb0d75ff0f9e972c6358ae096ef466574c615894c1e101b114f559d57f52d4fdeb1a5db6567a53b1010caf97ef6a8018eb071712f8f21f0b0"})
1m53.920041584s ago: executing program 2 (id=10095):
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000240))
1m53.721955915s ago: executing program 3 (id=10097):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000002c0)=0x2, 0x4)
1m53.585224674s ago: executing program 0 (id=10098):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$sock_ifreq(r0, 0x891d, &(0x7f00000004c0)={'batadv0\x00', @ifru_settings={0x0, 0x0, @te1=0x0}})
1m53.530666115s ago: executing program 2 (id=10099):
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
bpf$TOKEN_CREATE(0x24, 0x0, 0x0)
1m53.242348147s ago: executing program 3 (id=10101):
r0 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0)
pwritev(r0, &(0x7f0000001600)=[{&(0x7f0000000680)="c500000000e06df7a5abc4ae43259aac6758f707095fb07d0d2ec29ec8ffa7e5ce488a838d3a75a9c91d9a11931fcdd5acc444099776408eec5b72d9cde164c614e46767551bb20dd205698c", 0x4c}], 0x1, 0x2, 0x3)
1m53.223470545s ago: executing program 0 (id=10102):
r0 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_batadv\x00', &(0x7f0000000080)=@ethtool_rxfh_indir={0x1}})
1m53.038294767s ago: executing program 2 (id=10103):
r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@float={0x7, 0x0, 0x0, 0x10, 0x10}]}, {0x0, [0x0, 0x5f, 0x5f, 0x2e, 0x61, 0x2e]}}, 0x0, 0x2c}, 0x28)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85d7, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000280)='syzkaller\x00', 0x2, 0x3, &(0x7f0000000380)=""/3, 0x40f00, 0x18, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000880)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x81}, 0x94)
1m52.854330657s ago: executing program 3 (id=10104):
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4}}, {{0x5, 0x0, 0x3}}, [], {{0x6, 0x1, 0xc, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94)
1m52.72296421s ago: executing program 2 (id=10106):
prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680))
clock_getres(0x3, 0x0)
1m52.561894691s ago: executing program 3 (id=10107):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a3100000000e8010000030a01020000000000000000010000000900030073797a3200000000280004800800024000000000080001400000000514000300626174616476300000000000000000000900010073797a31000000000900010073797a3100000000340008"], 0x25c}}, 0x0)
1m52.515708753s ago: executing program 2 (id=10109):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000e40)={{0x14, 0x10, 0x4}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x25}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xc4}, 0x1, 0x0, 0x0, 0x20004090}, 0x0)
1m51.478015579s ago: executing program 1 (id=10115):
r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x1c3902, 0x0)
ioctl$BLKFRASET(r0, 0x1264, 0x0)
1m51.26914674s ago: executing program 1 (id=10117):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x58}}, 0x0)
1m51.030379984s ago: executing program 1 (id=10119):
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$int_in(r0, 0x4b32, 0x0)
1m50.603928858s ago: executing program 1 (id=10121):
r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x1, 0x109800)
ioctl$SNDRV_PCM_IOCTL_XRUN(r0, 0x4148, 0x0)
1m50.359883554s ago: executing program 1 (id=10123):
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@newtaction={0x48, 0x12, 0xbf68af9d17701211, 0x0, 0x0, {0x7}, [{0x4}, {0x30, 0x1, [@m_ct={0x2c, 0x0, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}]}, 0x48}}, 0x0)
1m50.149426533s ago: executing program 1 (id=10125):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x50}, @call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe1}, 0x94)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50)
1m36.252943021s ago: executing program 32 (id=10102):
r0 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_batadv\x00', &(0x7f0000000080)=@ethtool_rxfh_indir={0x1}})
1m36.103734255s ago: executing program 33 (id=10109):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000e40)={{0x14, 0x10, 0x4}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x25}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xc4}, 0x1, 0x0, 0x0, 0x20004090}, 0x0)
1m35.957630671s ago: executing program 34 (id=10107):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a3100000000e8010000030a01020000000000000000010000000900030073797a3200000000280004800800024000000000080001400000000514000300626174616476300000000000000000000900010073797a31000000000900010073797a3100000000340008"], 0x25c}}, 0x0)
1m33.464641722s ago: executing program 35 (id=10125):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x50}, @call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe1}, 0x94)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50)
21.496307023s ago: executing program 4 (id=10210):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0xd, 0x200cc, 0x6, 0x5}, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)='D', &(0x7f0000000240), 0x4b2, r0}, 0x38)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000700)={0x0, &(0x7f0000000540)=""/245, &(0x7f0000000640), &(0x7f0000000680), 0x2, r0}, 0x38)
21.268627402s ago: executing program 4 (id=10211):
set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5)
madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17)
madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15)
20.001503332s ago: executing program 4 (id=10212):
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x2c, r1, 0x1, 0x70bd26, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_I_TEI={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x2c}}, 0x0)
19.805311584s ago: executing program 4 (id=10213):
mkdirat(0xffffffffffffff9c, &(0x7f00000021c0)='./file0\x00', 0x3a)
mount$tmpfs(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000002200), 0x1000000, &(0x7f0000000000)={[{@noswap}]})
mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2a00a9, &(0x7f0000000080)={[{@noswap}, {@mpol={'mpol', 0x3d, {'interleave', '', @void}}}]})
19.629422715s ago: executing program 4 (id=10214):
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1e7d, 0x2cf6, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x2, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0)
syz_usb_control_io$hid(r0, 0x0, 0x0)
syz_usb_control_io(r0, &(0x7f0000000200)={0x2c, &(0x7f0000000080)={0x0, 0x6, 0x2c, {0x2c, 0x23, "a93e367f64379ac4792fd2847718bc2376c7ae1a87c93be2a1f5c8e0cc62957a83479e8fd8169db03a37"}}, 0x0, 0x0, 0x0, 0x0}, 0x0)
16.398854204s ago: executing program 4 (id=10215):
r0 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@getlink={0x30, 0x12, 0x2fa9ccd93d5c0297, 0x70bd28, 0x0, {0x7}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x4}}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x0)
0s ago: executing program 36 (id=10215):
r0 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@getlink={0x30, 0x12, 0x2fa9ccd93d5c0297, 0x70bd28, 0x0, {0x7}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x4}}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x0)
kernel console output (not intermixed with test programs):
mack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="lib" dev="sda1" ino=264
[ 1138.529791][ T37] audit: type=1400 audit(1072.434:1635153): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=1222
[ 1138.529829][ T37] audit: type=1400 audit(1072.434:1635154): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229
[ 1140.229767][ C0] net_ratelimit: 9433 callbacks suppressed
[ 1140.229789][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1140.230402][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1140.230910][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1140.231461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1140.232087][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1140.232583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1140.233192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1140.233690][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1140.234256][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1140.234858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1143.567239][ T37] kauditd_printk_skb: 76 callbacks suppressed
[ 1143.567257][ T37] audit: type=1400 audit(1077.148:1635231): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1144.262975][ T37] audit: type=1400 audit(1077.803:1635232): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1144.568671][ T37] audit: type=1400 audit(1078.083:1635233): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1145.074254][ T37] audit: type=1400 audit(1078.551:1635234): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1145.564345][ T37] audit: type=1400 audit(1079.019:1635235): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1145.585570][ C0] net_ratelimit: 10187 callbacks suppressed
[ 1145.585592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1145.586136][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1145.586733][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1145.587196][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1145.587739][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1145.588206][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1145.588738][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1145.589304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1145.589759][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1145.590304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1146.071932][ T37] audit: type=1400 audit(1079.496:1635236): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1146.585651][ T37] audit: type=1400 audit(1079.973:1635237): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=15 comm="ksoftirqd/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1147.075547][ T37] audit: type=1400 audit(1080.422:1635238): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="/" dev="sda1" ino=2
[ 1147.075596][ T37] audit: type=1400 audit(1080.431:1635239): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1147.076680][ T37] audit: type=1400 audit(1080.431:1635240): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="etc" dev="sda1" ino=116
[ 1147.496013][T27655] vxcan1 speed is unknown, defaulting to 1000
[ 1149.140013][ T37] kauditd_printk_skb: 39 callbacks suppressed
[ 1149.140030][ T37] audit: type=1400 audit(1082.358:1635280): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1149.173922][ T37] audit: type=1400 audit(1082.396:1635281): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27677 comm="dhcpcd" name="/" dev="sda1" ino=2
[ 1149.183219][ T37] audit: type=1400 audit(1082.396:1635282): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27677 comm="dhcpcd" name="lib" dev="sda1" ino=264
[ 1149.183267][ T37] audit: type=1400 audit(1082.405:1635283): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27677 comm="dhcpcd" name="dhcpcd" dev="sda1" ino=265
[ 1149.183307][ T37] audit: type=1400 audit(1082.405:1635284): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27677 comm="dhcpcd" name="dhcpcd-run-hooks" dev="sda1" ino=273
[ 1149.183346][ T37] audit: type=1400 audit(1082.405:1635285): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=27677 comm="dhcpcd" path="/lib/dhcpcd/dhcpcd-run-hooks" dev="sda1" ino=273
[ 1149.329929][ T37] audit: type=1400 audit(1082.545:1635286): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27677 comm="dhcpcd" name="/" dev="sda1" ino=2
[ 1149.329979][ T37] audit: type=1400 audit(1082.545:1635287): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27677 comm="dhcpcd" name="lib" dev="sda1" ino=264
[ 1149.330020][ T37] audit: type=1400 audit(1082.545:1635288): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27677 comm="dhcpcd" name="dhcpcd" dev="sda1" ino=265
[ 1149.330060][ T37] audit: type=1400 audit(1082.545:1635289): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27677 comm="dhcpcd" name="/" dev="sda1" ino=2
[ 1150.941430][ C0] net_ratelimit: 9730 callbacks suppressed
[ 1150.941449][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1150.942024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1150.942664][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1150.943151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1150.943708][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1150.944243][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1150.944820][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1150.945443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1150.945929][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1150.946551][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1153.024694][ T1166] hsr_slave_0: left promiscuous mode
[ 1153.346266][ T1166] hsr_slave_1: left promiscuous mode
[ 1153.358508][ T1166] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 1153.358613][ T1166] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1154.580876][ T37] kauditd_printk_skb: 1922 callbacks suppressed
[ 1154.580901][ T37] audit: type=1400 audit(1087.447:1636882): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1154.727575][ T1166] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 1154.727609][ T1166] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1155.069529][ T37] audit: type=1400 audit(1087.915:1636883): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1155.566749][ T37] audit: type=1400 audit(1088.373:1636884): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1156.076231][ T37] audit: type=1400 audit(1088.850:1636885): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1156.212464][ T1166] veth1_macvtap: left promiscuous mode
[ 1156.212795][ T1166] veth0_macvtap: left promiscuous mode
[ 1156.213511][ T1166] veth0_vlan: left promiscuous mode
[ 1156.297489][ C0] net_ratelimit: 9734 callbacks suppressed
[ 1156.297512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1156.298038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1156.298612][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1156.299212][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1156.299694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1156.300304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1156.300808][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1156.301356][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1156.301944][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1156.302457][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1156.566920][ T37] audit: type=1400 audit(1089.308:1636886): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1157.096780][ T37] audit: type=1400 audit(1089.804:1636887): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1157.561539][ T37] audit: type=1400 audit(1090.244:1636888): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1158.075151][ T37] audit: type=1400 audit(1090.721:1636889): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1158.579045][ T37] audit: type=1400 audit(1091.188:1636890): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1159.081694][ T37] audit: type=1400 audit(1091.665:1636891): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1159.932892][ T37] kauditd_printk_skb: 76 callbacks suppressed
[ 1159.932910][ T37] audit: type=1400 audit(1092.461:1636968): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27691 comm="syz-executor" name="/" dev="sda1" ino=2
[ 1159.933142][ T37] audit: type=1400 audit(1092.461:1636969): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27691 comm="syz-executor" name="/" dev="sysfs" ino=1
[ 1159.933357][ T37] audit: type=1400 audit(1092.461:1636970): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27691 comm="syz-executor" name="kernel" dev="sysfs" ino=1393
[ 1159.933580][ T37] audit: type=1400 audit(1092.461:1636971): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27691 comm="syz-executor" name="/" dev="debugfs" ino=1
[ 1159.933798][ T37] audit: type=1400 audit(1092.461:1636972): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=27691 comm="syz-executor" name="kcov" dev="debugfs" ino=1118
[ 1159.934128][ T37] audit: type=1400 audit(1092.461:1636973): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=27691 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1118
[ 1159.953729][ T37] audit: type=1400 audit(1092.461:1636974): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=27691 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1118
[ 1160.092555][ T37] audit: type=1400 audit(1092.601:1636975): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1160.210306][ T37] audit: type=1400 audit(1092.685:1636976): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27691 comm="syz-executor" name="/" dev="sda1" ino=2
[ 1160.210368][ T37] audit: type=1400 audit(1092.713:1636977): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27691 comm="syz-executor" name="/" dev="sysfs" ino=1
[ 1161.294240][ T59] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[ 1161.318500][ T59] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[ 1161.320577][ T59] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[ 1161.321814][ T59] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[ 1161.344267][ T59] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[ 1161.653474][ C0] net_ratelimit: 10252 callbacks suppressed
[ 1161.653494][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1161.654069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1161.654557][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1161.655117][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1161.655682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1161.656203][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1161.656919][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1161.657410][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1161.658048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1161.658543][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1161.679419][ T5835] Bluetooth: hci10: unexpected cc 0x0c03 length: 249 > 1
[ 1161.771286][ T5835] Bluetooth: hci10: unexpected cc 0x1003 length: 249 > 9
[ 1161.795450][ T5835] Bluetooth: hci10: unexpected cc 0x1001 length: 249 > 9
[ 1161.835408][ T5835] Bluetooth: hci10: unexpected cc 0x0c23 length: 249 > 4
[ 1161.878044][ T5835] Bluetooth: hci10: unexpected cc 0x0c38 length: 249 > 2
[ 1162.015905][ T5835] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1
[ 1162.030937][ T5835] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9
[ 1162.032499][ T5835] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9
[ 1162.034272][ T5835] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4
[ 1162.035053][ T5835] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2
[ 1163.011105][ T5835] Bluetooth: hci12: unexpected cc 0x0c03 length: 249 > 1
[ 1163.032498][ T5835] Bluetooth: hci12: unexpected cc 0x1003 length: 249 > 9
[ 1163.034048][ T5835] Bluetooth: hci12: unexpected cc 0x1001 length: 249 > 9
[ 1163.035907][ T5835] Bluetooth: hci12: unexpected cc 0x0c23 length: 249 > 4
[ 1163.036731][ T5835] Bluetooth: hci12: unexpected cc 0x0c38 length: 249 > 2
[ 1163.644282][ T59] Bluetooth: hci5: command tx timeout
[ 1164.240761][ T59] Bluetooth: hci11: command tx timeout
[ 1165.270596][ T59] Bluetooth: hci12: command tx timeout
[ 1165.352591][ T59] Bluetooth: hci10: command tx timeout
[ 1165.580374][ T37] kauditd_printk_skb: 1117 callbacks suppressed
[ 1165.580392][ T37] audit: type=1400 audit(1097.746:1638032): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1165.865768][ T59] Bluetooth: hci5: command tx timeout
[ 1166.080758][ T37] audit: type=1400 audit(1098.213:1638033): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1166.428866][ T37] audit: type=1400 audit(1098.531:1638034): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=27696 ocomm="udevd"
[ 1166.429165][ T37] audit: type=1400 audit(1098.531:1638035): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=27698 ocomm="udevd"
[ 1166.429424][ T37] audit: type=1400 audit(1098.531:1638036): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=27697 ocomm="udevd"
[ 1166.464304][ T59] Bluetooth: hci11: command tx timeout
[ 1166.491085][ T37] audit: type=1400 audit(1098.587:1638037): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2
[ 1166.491315][ T37] audit: type=1400 audit(1098.587:1638038): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="etc" dev="sda1" ino=116
[ 1166.539200][ T37] audit: type=1400 audit(1098.634:1638039): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=259
[ 1166.582026][ T37] audit: type=1400 audit(1098.672:1638040): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261
[ 1166.582340][ T37] audit: type=1400 audit(1098.681:1638041): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2
[ 1167.009372][ C0] net_ratelimit: 10432 callbacks suppressed
[ 1167.009394][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1167.010003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1167.010510][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1167.011058][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1167.011703][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1167.012191][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1167.012766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1167.013266][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1167.013852][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1167.014449][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1167.490790][ T59] Bluetooth: hci12: command tx timeout
[ 1167.577823][ T59] Bluetooth: hci10: command tx timeout
[ 1168.089292][ T59] Bluetooth: hci5: command tx timeout
[ 1168.688003][ T59] Bluetooth: hci11: command tx timeout
[ 1169.714551][ T59] Bluetooth: hci12: command tx timeout
[ 1169.799908][ T59] Bluetooth: hci10: command tx timeout
[ 1170.312964][T27344] Bluetooth: hci5: command tx timeout
[ 1170.672501][T27344] Bluetooth: hci3: command 0x0406 tx timeout
[ 1170.672647][T27344] Bluetooth: hci1: command 0x0406 tx timeout
[ 1170.672675][T27344] Bluetooth: hci0: command 0x0406 tx timeout
[ 1170.672761][T27344] Bluetooth: hci2: command 0x0406 tx timeout
[ 1170.925954][ T59] Bluetooth: hci11: command tx timeout
[ 1170.957381][ T37] kauditd_printk_skb: 45 callbacks suppressed
[ 1170.957399][ T37] audit: type=1400 audit(1102.769:1638087): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2
[ 1170.960094][ T37] audit: type=1400 audit(1102.769:1638088): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="etc" dev="sda1" ino=116
[ 1170.960325][ T37] audit: type=1400 audit(1102.769:1638089): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=259
[ 1170.960670][ T37] audit: type=1400 audit(1102.769:1638090): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261
[ 1170.960930][ T37] audit: type=1400 audit(1102.769:1638091): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2
[ 1170.961139][ T37] audit: type=1400 audit(1102.769:1638092): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="lib" dev="sda1" ino=264
[ 1170.961347][ T37] audit: type=1400 audit(1102.769:1638093): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=1222
[ 1170.961679][ T37] audit: type=1400 audit(1102.769:1638094): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229
[ 1170.961929][ T37] audit: type=1400 audit(1102.769:1638095): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2
[ 1170.962151][ T37] audit: type=1400 audit(1102.769:1638096): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="tmpfs" ino=1
[ 1171.938226][T27515] Bluetooth: hci12: command tx timeout
[ 1172.055464][T27520] Bluetooth: hci10: command tx timeout
[ 1172.369651][ C0] net_ratelimit: 9934 callbacks suppressed
[ 1172.369672][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1172.370181][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1172.370762][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1172.371259][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1172.371923][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1172.372526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1172.373004][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1172.373576][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1172.374128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1172.374674][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1176.594969][ T37] kauditd_printk_skb: 154 callbacks suppressed
[ 1176.594987][ T37] audit: type=1400 audit(1108.044:1638251): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1177.181666][ T37] audit: type=1400 audit(1108.587:1638252): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1177.592349][ T37] audit: type=1400 audit(1108.970:1638253): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1177.721506][ C0] net_ratelimit: 9995 callbacks suppressed
[ 1177.721528][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1177.722027][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1177.722603][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1177.723143][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1177.723707][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1177.724304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1177.724789][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1177.725388][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1177.725906][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1177.726425][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1178.094663][ T37] audit: type=1400 audit(1109.438:1638254): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1178.606078][ T37] audit: type=1400 audit(1109.924:1638255): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1179.104369][ T37] audit: type=1400 audit(1110.392:1638256): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1179.453469][ T1166] team0 (unregistering): Port device team_slave_1 removed
[ 1179.703891][ T37] audit: type=1400 audit(1110.953:1638257): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1180.092529][ T37] audit: type=1400 audit(1111.309:1638258): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1180.601570][ T37] audit: type=1400 audit(1111.795:1638259): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1180.865641][ T1166] team0 (unregistering): Port device team_slave_0 removed
[ 1181.106026][ T37] audit: type=1400 audit(1112.263:1638260): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1182.145174][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1182.145192][ T37] audit: type=1400 audit(1113.236:1638262): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1182.604899][ T37] audit: type=1400 audit(1113.666:1638263): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1183.077549][ C0] net_ratelimit: 9923 callbacks suppressed
[ 1183.077569][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1183.078166][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1183.078808][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1183.079335][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1183.079940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1183.080431][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1183.080969][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1183.081597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1183.082104][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1183.082700][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1183.096140][ T37] audit: type=1400 audit(1114.124:1638264): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1183.609261][ T37] audit: type=1400 audit(1114.592:1638265): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1184.104532][ T37] audit: type=1400 audit(1115.069:1638266): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1184.602300][ T37] audit: type=1400 audit(1115.528:1638267): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1184.858904][ T1322] ieee802154 phy1 wpan1: encryption failed: -22
[ 1185.112016][ T37] audit: type=1400 audit(1116.014:1638268): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1185.723722][ T37] audit: type=1400 audit(1116.585:1638269): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1186.102979][ T37] audit: type=1400 audit(1116.931:1638270): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1186.613523][ T37] audit: type=1400 audit(1117.408:1638271): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1187.605513][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1187.605531][ T37] audit: type=1400 audit(1118.343:1638273): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1188.254135][ T37] audit: type=1400 audit(1118.951:1638274): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1188.254540][ T37] audit: type=1400 audit(1118.951:1638275): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1188.433660][ C0] net_ratelimit: 9799 callbacks suppressed
[ 1188.433682][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1188.434223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1188.434792][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1188.435396][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1188.435882][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1188.436486][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1188.437007][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1188.437542][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1188.438140][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1188.438650][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1188.599292][ T37] audit: type=1400 audit(1119.269:1638276): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1189.117760][ T37] audit: type=1400 audit(1119.756:1638277): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1189.607974][ T37] audit: type=1400 audit(1120.214:1638278): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1190.099784][ T37] audit: type=1400 audit(1120.672:1638279): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1191.555129][ T37] audit: type=1400 audit(1121.149:1638280): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1191.555184][ T37] audit: type=1400 audit(1121.608:1638281): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1191.602186][ T37] audit: type=1400 audit(1122.085:1638282): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1193.789535][ C0] net_ratelimit: 11307 callbacks suppressed
[ 1193.789557][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1193.789811][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1193.790052][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1193.790659][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1193.791153][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1193.791590][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1193.791728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1193.792321][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1193.792836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1193.793364][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1193.985790][ T37] kauditd_printk_skb: 3 callbacks suppressed
[ 1193.985809][ T37] audit: type=1400 audit(1123.666:1638286): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1193.985849][ T37] audit: type=1400 audit(1123.965:1638287): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1194.843559][ T37] audit: type=1400 audit(1124.713:1638288): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1194.843615][ T37] audit: type=1400 audit(1124.713:1638289): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1194.843658][ T37] audit: type=1400 audit(1124.891:1638290): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1194.843698][ T37] audit: type=1400 audit(1125.012:1638291): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=27652 comm="syz-executor" opid=27655 ocomm="syz-executor"
[ 1195.410958][ T37] audit: type=1400 audit(1125.359:1638292): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1195.490439][ T37] audit: type=1400 audit(1125.723:1638293): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=27709 comm="syz-executor" opid=27709 ocomm="syz-executor"
[ 1195.491969][ T37] audit: type=1400 audit(1125.723:1638294): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27709 comm="syz-executor" name="root" dev="sda1" ino=1265
[ 1195.492177][ T37] audit: type=1400 audit(1125.723:1638295): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27709 comm="syz-executor" name="root" dev="sda1" ino=1265
[ 1199.145388][ C0] net_ratelimit: 11705 callbacks suppressed
[ 1199.145407][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1199.145992][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1199.146454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1199.146648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1199.146999][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1199.147686][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1199.148187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1199.148562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1199.148792][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1199.149293][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1200.706181][ T37] kauditd_printk_skb: 45 callbacks suppressed
[ 1200.706202][ T37] audit: type=1400 audit(1128.230:1638341): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1200.706247][ T37] audit: type=1400 audit(1128.632:1638342): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1200.706287][ T37] audit: type=1400 audit(1129.119:1638343): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1200.706327][ T37] audit: type=1400 audit(1129.643:1638344): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1200.706366][ T37] audit: type=1400 audit(1130.054:1638345): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1200.706405][ T37] audit: type=1400 audit(1130.513:1638346): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1202.929881][ T37] audit: type=1400 audit(1132.608:1638347): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1202.929937][ T37] audit: type=1400 audit(1132.608:1638348): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1202.929980][ T37] audit: type=1400 audit(1132.608:1638349): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1202.930021][ T37] audit: type=1400 audit(1132.608:1638350): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1204.501657][ C0] net_ratelimit: 11730 callbacks suppressed
[ 1204.501679][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1204.502097][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1204.502298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1204.502709][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1204.503238][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1204.503791][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1204.504284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1204.504396][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1204.504911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1204.505598][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1206.842666][ T37] kauditd_printk_skb: 14 callbacks suppressed
[ 1206.842686][ T37] audit: type=1400 audit(1135.255:1638365): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1206.842730][ T37] audit: type=1400 audit(1135.676:1638366): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1206.842772][ T37] audit: type=1400 audit(1136.125:1638367): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1206.842813][ T37] audit: type=1400 audit(1136.125:1638368): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1207.063853][ T37] audit: type=1400 audit(1136.546:1638369): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27709 comm="syz-executor" name="/" dev="sda1" ino=2
[ 1207.063902][ T37] audit: type=1400 audit(1136.546:1638370): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27709 comm="syz-executor" name="/" dev="sysfs" ino=1
[ 1207.063941][ T37] audit: type=1400 audit(1136.546:1638371): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27709 comm="syz-executor" name="kernel" dev="sysfs" ino=1393
[ 1207.063981][ T37] audit: type=1400 audit(1136.546:1638372): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27709 comm="syz-executor" name="/" dev="debugfs" ino=1
[ 1207.064016][ T37] audit: type=1400 audit(1136.546:1638373): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=27709 comm="syz-executor" name="kcov" dev="debugfs" ino=1118
[ 1207.064064][ T37] audit: type=1400 audit(1136.546:1638374): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=27709 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1118
[ 1209.857621][ C0] net_ratelimit: 11966 callbacks suppressed
[ 1209.857644][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1209.858156][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1209.858731][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1209.859159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1209.859361][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1209.859866][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1209.860379][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1209.860900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1209.861184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1209.861475][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1212.304034][ T37] kauditd_printk_skb: 22 callbacks suppressed
[ 1212.304054][ T37] audit: type=1400 audit(1141.354:1638397): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1212.687037][ T37] audit: type=1400 audit(1141.747:1638398): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1213.199097][ T37] audit: type=1400 audit(1142.233:1638399): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1213.906340][ T37] audit: type=1400 audit(1142.701:1638400): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1214.184088][ T37] audit: type=1400 audit(1143.150:1638401): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1214.944277][ T37] audit: type=1400 audit(1143.618:1638402): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1214.944344][ T37] audit: type=1400 audit(1143.880:1638403): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="/" dev="sda1" ino=2
[ 1214.944384][ T37] audit: type=1400 audit(1143.880:1638404): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="etc" dev="sda1" ino=116
[ 1214.944423][ T37] audit: type=1400 audit(1143.880:1638405): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="cron" dev="sda1" ino=120
[ 1215.135633][ T37] audit: type=1400 audit(1144.095:1638406): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1215.213356][ C1] net_ratelimit: 12028 callbacks suppressed
[ 1215.213367][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1215.213377][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1215.213951][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1215.214653][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1215.215137][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1215.215380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1215.215719][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1215.216240][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1215.216813][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1215.217189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1218.253589][ T37] kauditd_printk_skb: 15 callbacks suppressed
[ 1218.253607][ T37] audit: type=1400 audit(1147.013:1638422): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=27709 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1118
[ 1219.253276][ T37] audit: type=1400 audit(1147.827:1638423): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1219.253334][ T37] audit: type=1400 audit(1147.827:1638424): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1219.795942][ T37] audit: type=1400 audit(1148.323:1638425): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1220.235592][ T37] audit: type=1400 audit(1148.781:1638426): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1220.570382][ C1] net_ratelimit: 11968 callbacks suppressed
[ 1220.570403][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.572161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.573944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.575731][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.577562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.579384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.581358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.583252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.585132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.586995][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1220.707044][ T37] audit: type=1400 audit(1149.249:1638427): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1221.808723][ T37] audit: type=1400 audit(1149.707:1638428): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1221.808777][ T37] audit: type=1400 audit(1150.240:1638429): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1222.212358][ T37] audit: type=1400 audit(1150.652:1638430): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1222.789557][ T37] audit: type=1400 audit(1151.148:1638431): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1223.807408][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1223.807428][ T37] audit: type=1400 audit(1152.111:1638433): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1224.298229][ T37] audit: type=1400 audit(1152.523:1638434): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1224.816754][ T37] audit: type=1400 audit(1152.990:1638435): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1225.303626][ T37] audit: type=1400 audit(1153.458:1638436): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1225.676845][ T37] audit: type=1400 audit(1153.935:1638437): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1225.925589][ C0] net_ratelimit: 11894 callbacks suppressed
[ 1225.925610][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1225.926177][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1225.926789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1225.926839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1225.927316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1225.927868][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1225.928569][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1225.928983][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1225.929057][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1225.929697][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1226.232201][ T37] audit: type=1400 audit(1154.393:1638438): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1226.735508][ T37] audit: type=1400 audit(1154.861:1638439): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1227.269506][ T37] audit: type=1400 audit(1155.329:1638440): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1227.719855][ T37] audit: type=1400 audit(1155.806:1638441): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1228.191327][ T37] audit: type=1400 audit(1156.274:1638442): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1229.204711][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1229.204731][ T37] audit: type=1400 audit(1157.200:1638444): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1229.729183][ T37] audit: type=1400 audit(1157.686:1638445): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1230.252858][ T37] audit: type=1400 audit(1158.154:1638446): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1230.777016][ T37] audit: type=1400 audit(1158.612:1638447): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1231.182262][ T37] audit: type=1400 audit(1159.080:1638448): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1231.281448][ C0] net_ratelimit: 11761 callbacks suppressed
[ 1231.281471][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1231.282032][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1231.282557][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1231.282679][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1231.283081][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1231.283683][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1231.284184][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1231.284443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1231.284724][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1231.285370][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1231.718854][ T37] audit: type=1400 audit(1159.538:1638449): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1232.165713][ T37] audit: type=1400 audit(1160.025:1638450): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1232.745121][ T37] audit: type=1400 audit(1160.483:1638451): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1233.215846][ T37] audit: type=1400 audit(1160.951:1638452): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1233.417241][ T37] audit: type=1400 audit(1161.035:1638453): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27709 comm="syz-executor" name="/" dev="sda1" ino=2
[ 1234.334755][ T59] Bluetooth: hci7: command 0x0406 tx timeout
[ 1234.334804][ T59] Bluetooth: hci9: command 0x0406 tx timeout
[ 1234.334828][ T59] Bluetooth: hci6: command 0x0406 tx timeout
[ 1234.334851][ T59] Bluetooth: hci8: command 0x0406 tx timeout
[ 1234.691421][ T37] kauditd_printk_skb: 6 callbacks suppressed
[ 1234.691441][ T37] audit: type=1400 audit(1162.036:1638460): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=27709 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1118
[ 1234.691484][ T37] audit: type=1400 audit(1162.354:1638461): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1235.202204][ T37] audit: type=1400 audit(1162.831:1638462): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1235.446181][ T37] audit: type=1400 audit(1163.046:1638463): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1235.685873][ T37] audit: type=1400 audit(1163.280:1638464): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1235.768494][ T37] audit: type=1400 audit(1163.355:1638465): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=27709 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1118
[ 1236.207758][ T37] audit: type=1400 audit(1163.738:1638466): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1236.637523][ C0] net_ratelimit: 11731 callbacks suppressed
[ 1236.637544][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1236.637625][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1236.638043][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1236.638592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1236.639217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1236.639401][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1236.639733][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1236.640314][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1236.640808][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1236.641178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1237.109115][ T37] audit: type=1400 audit(1164.655:1638467): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1237.828598][ T37] audit: type=1400 audit(1165.281:1638468): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1239.812637][ T37] audit: type=1400 audit(1165.431:1638469): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1240.227346][ T37] kauditd_printk_skb: 5 callbacks suppressed
[ 1240.227366][ T37] audit: type=1400 audit(1167.508:1638475): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1240.700268][ T37] audit: type=1400 audit(1167.985:1638476): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1241.264314][ T37] audit: type=1400 audit(1168.452:1638477): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1241.402675][ T37] audit: type=1400 audit(1168.621:1638478): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5822 comm="syz-executor" opid=27691 ocomm="syz-executor"
[ 1241.722035][ T37] audit: type=1400 audit(1168.911:1638479): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1241.993596][ C0] net_ratelimit: 11876 callbacks suppressed
[ 1241.993617][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1241.993901][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1241.994128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1241.994674][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1241.995279][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1241.995668][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1241.995762][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1241.996376][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1241.996819][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1241.997365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1242.292352][ T37] audit: type=1400 audit(1169.453:1638480): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1242.769653][ T37] audit: type=1400 audit(1169.865:1638481): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1243.086279][ T37] audit: type=1400 audit(1170.239:1638482): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=27691 comm="syz-executor" opid=27694 ocomm="syz-executor"
[ 1243.214183][ T37] audit: type=1400 audit(1170.323:1638483): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1243.669789][ T37] audit: type=1400 audit(1170.772:1638484): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1245.990704][ T37] audit: type=1400 audit(1172.896:1638485): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=775 comm="irq/25-virtio3-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1245.990757][ T37] audit: type=1400 audit(1172.896:1638486): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=775 comm="irq/25-virtio3-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1245.990797][ T37] audit: type=1400 audit(1172.896:1638487): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=775 comm="irq/25-virtio3-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1245.990839][ T37] audit: type=1400 audit(1172.896:1638488): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=775 comm="irq/25-virtio3-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1245.990893][ T37] audit: type=1400 audit(1172.896:1638489): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=775 comm="irq/25-virtio3-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1245.990933][ T37] audit: type=1400 audit(1172.914:1638490): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/32-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1246.199959][ T37] audit: type=1400 audit(1173.111:1638491): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1246.744406][ T37] audit: type=1400 audit(1173.588:1638492): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1247.207363][ T37] audit: type=1400 audit(1174.074:1638493): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1247.349777][ C0] net_ratelimit: 11898 callbacks suppressed
[ 1247.349799][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1247.350503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1247.350650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1247.351046][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1247.351691][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1247.352249][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1247.352395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1247.352942][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1247.353609][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1247.354092][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1247.744246][ T37] audit: type=1400 audit(1174.533:1638494): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1251.382290][ T37] kauditd_printk_skb: 6 callbacks suppressed
[ 1251.382316][ T37] audit: type=1400 audit(1177.797:1638501): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1251.430658][ T37] audit: type=1400 audit(1178.040:1638502): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=27709 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1118
[ 1251.682239][ T37] audit: type=1400 audit(1178.274:1638503): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1252.436573][ T37] audit: type=1400 audit(1178.751:1638504): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1252.705612][ C0] net_ratelimit: 11971 callbacks suppressed
[ 1252.705633][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1252.706107][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1252.706247][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1252.706745][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1252.707324][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1252.707846][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1252.707975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1252.708365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1252.708940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1252.709467][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1252.789548][ T37] audit: type=1400 audit(1179.219:1638505): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1253.271338][ T37] audit: type=1400 audit(1179.677:1638506): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1253.730553][ T37] audit: type=1400 audit(1180.145:1638507): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1254.272756][ T37] audit: type=1400 audit(1180.622:1638508): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1254.554903][ T1322] ieee802154 phy1 wpan1: encryption failed: -22
[ 1254.767134][ T37] audit: type=1400 audit(1181.080:1638509): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1255.321677][ T37] audit: type=1400 audit(1181.623:1638510): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=200 comm="irq/10-virtio2" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1257.258713][ T37] kauditd_printk_skb: 3 callbacks suppressed
[ 1257.258732][ T37] audit: type=1400 audit(1183.428:1638514): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1257.690722][ T37] audit: type=1400 audit(1183.905:1638515): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1258.061450][ C0] net_ratelimit: 11980 callbacks suppressed
[ 1258.061473][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1258.062154][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1258.062514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1258.062723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1258.063369][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1258.063913][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1258.064317][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1258.064554][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1258.065224][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1258.065754][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1258.530827][ T37] audit: type=1400 audit(1184.364:1638516): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1258.798135][ T37] audit: type=1400 audit(1184.841:1638517): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1259.194143][ T37] audit: type=1400 audit(1185.290:1638518): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1259.867128][ T37] audit: type=1400 audit(1185.776:1638519): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1260.231848][ T37] audit: type=1400 audit(1186.234:1638520): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1260.938606][ T37] audit: type=1400 audit(1186.702:1638521): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1261.206016][ T37] audit: type=1400 audit(1187.170:1638522): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1261.715193][ T37] audit: type=1400 audit(1187.628:1638523): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1262.934116][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1262.934136][ T37] audit: type=1400 audit(1188.573:1638525): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1263.417900][ C1] net_ratelimit: 12005 callbacks suppressed
[ 1263.417922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1263.417932][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1263.418599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1263.419059][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1263.419694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1263.419786][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1263.420377][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1263.420979][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1263.421507][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1263.421640][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1264.816806][ T37] audit: type=1400 audit(1189.050:1638526): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1264.816864][ T37] audit: type=1400 audit(1189.508:1638527): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1264.816907][ T37] audit: type=1400 audit(1189.976:1638528): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1264.816949][ T37] audit: type=1400 audit(1190.453:1638529): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1265.382497][ T37] audit: type=1400 audit(1190.911:1638530): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1266.132739][T27712] Bluetooth: hci4: command 0x0406 tx timeout
[ 1268.773374][ C0] net_ratelimit: 11997 callbacks suppressed
[ 1268.773396][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1268.773920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1268.773985][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1268.774605][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1268.775202][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1268.775712][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1268.775902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1268.776235][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1268.776784][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1268.777407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1269.333910][ T37] audit: type=1400 audit(1191.388:1638531): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1269.333966][ T37] audit: type=1400 audit(1191.866:1638532): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1269.334008][ T37] audit: type=1400 audit(1192.324:1638533): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1269.334048][ T37] audit: type=1400 audit(1192.792:1638534): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1269.334089][ T37] audit: type=1400 audit(1193.269:1638535): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1269.334129][ T37] audit: type=1400 audit(1193.774:1638536): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1269.334169][ T37] audit: type=1400 audit(1194.204:1638537): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1269.334210][ T37] audit: type=1400 audit(1194.672:1638538): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1270.482737][ T37] audit: type=1400 audit(1195.139:1638539): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1270.482793][ T37] audit: type=1400 audit(1195.598:1638540): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1274.129556][ C0] net_ratelimit: 12100 callbacks suppressed
[ 1274.129578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1274.130133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1274.130732][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1274.131116][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1274.131279][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1274.131864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1274.132285][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1274.132917][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1274.133081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1274.133646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1274.802320][ T37] kauditd_printk_skb: 8 callbacks suppressed
[ 1274.802341][ T37] audit: type=1400 audit(1199.863:1638549): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1275.407814][ T37] audit: type=1400 audit(1200.284:1638550): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1275.407870][ T37] audit: type=1400 audit(1200.424:1638551): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="/" dev="sda1" ino=2
[ 1275.407910][ T37] audit: type=1400 audit(1200.424:1638552): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="etc" dev="sda1" ino=116
[ 1275.407955][ T37] audit: type=1400 audit(1200.424:1638553): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="cron" dev="sda1" ino=120
[ 1275.666210][ T37] audit: type=1400 audit(1200.649:1638554): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=41224 daddr=10.128.10.11 dest=22 netif=eth0
[ 1275.827624][ T37] audit: type=1400 audit(1200.799:1638555): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1276.569187][ T37] audit: type=1400 audit(1201.229:1638556): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1276.737890][ T37] audit: type=1400 audit(1201.687:1638557): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1276.970161][ T37] audit: type=1400 audit(1201.912:1638558): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=41224 daddr=10.128.10.11 dest=22 netif=eth0
[ 1279.485690][ C0] net_ratelimit: 12036 callbacks suppressed
[ 1279.485712][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1279.485889][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1279.486267][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1279.486800][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1279.487347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1279.487811][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1279.487953][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1279.488464][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1279.489032][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1279.489535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1280.390406][ T37] kauditd_printk_skb: 6 callbacks suppressed
[ 1280.390427][ T37] audit: type=1400 audit(1204.970:1638565): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1280.808999][ T37] audit: type=1400 audit(1205.429:1638566): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1281.277935][ T37] audit: type=1400 audit(1205.915:1638567): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1281.921922][ T37] audit: type=1400 audit(1206.374:1638568): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1282.449211][ T37] audit: type=1400 audit(1206.841:1638569): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1282.735873][ T37] audit: type=1400 audit(1207.300:1638570): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1283.279239][ T37] audit: type=1400 audit(1207.786:1638571): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1283.760034][ T37] audit: type=1400 audit(1208.244:1638572): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1284.292149][ T37] audit: type=1400 audit(1208.721:1638573): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1284.819355][ T37] audit: type=1400 audit(1209.180:1638574): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1284.841606][ C0] net_ratelimit: 12020 callbacks suppressed
[ 1284.841627][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1284.842202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1284.842242][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1284.842693][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1284.843224][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1284.843768][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1284.844271][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1284.844401][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1284.844892][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1284.845518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1285.799730][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1285.799751][ T37] audit: type=1400 audit(1210.143:1638576): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1286.282595][ T37] audit: type=1400 audit(1210.583:1638577): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1286.796637][ T37] audit: type=1400 audit(1211.060:1638578): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1287.299201][ T37] audit: type=1400 audit(1211.528:1638579): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1287.801055][ T37] audit: type=1400 audit(1212.005:1638580): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1288.301269][ T37] audit: type=1400 audit(1212.472:1638581): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1288.910240][ T37] audit: type=1400 audit(1212.921:1638582): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1289.295963][ T37] audit: type=1400 audit(1213.398:1638583): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1289.927389][ T37] audit: type=1400 audit(1213.875:1638584): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1290.197300][ C0] net_ratelimit: 12082 callbacks suppressed
[ 1290.197322][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1290.197849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1290.198399][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1290.198874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1290.198986][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1290.199515][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1290.200119][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1290.200682][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1290.200757][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1290.201356][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1290.289678][ T37] audit: type=1400 audit(1214.334:1638585): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1291.382788][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1291.382809][ T37] audit: type=1400 audit(1215.269:1638587): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1291.792833][ T37] audit: type=1400 audit(1215.756:1638588): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1292.419053][ T37] audit: type=1400 audit(1216.214:1638589): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1292.792573][ T37] audit: type=1400 audit(1216.672:1638590): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1293.368805][ T37] audit: type=1400 audit(1217.140:1638591): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1294.006407][ T37] audit: type=1400 audit(1217.617:1638592): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1294.280922][ T37] audit: type=1400 audit(1218.085:1638593): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1294.835360][ T37] audit: type=1400 audit(1218.552:1638594): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1295.296239][ T37] audit: type=1400 audit(1219.011:1638595): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1295.553553][ C0] net_ratelimit: 12162 callbacks suppressed
[ 1295.553574][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1295.554122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1295.554374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1295.554645][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1295.555228][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1295.555751][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1295.556230][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1295.556383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1295.556846][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1295.557531][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1295.806370][ T37] audit: type=1400 audit(1219.488:1638596): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1296.841815][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1296.841835][ T37] audit: type=1400 audit(1220.423:1638598): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1297.315014][ T37] audit: type=1400 audit(1220.900:1638599): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1298.202520][ T37] audit: type=1400 audit(1221.368:1638600): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1298.394270][ T37] audit: type=1400 audit(1221.836:1638601): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1298.834099][ T37] audit: type=1400 audit(1222.303:1638602): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1299.337237][ T37] audit: type=1400 audit(1222.790:1638603): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1299.775124][ T37] audit: type=1400 audit(1223.229:1638604): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1300.373811][ T37] audit: type=1400 audit(1223.735:1638605): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1300.826061][ T37] audit: type=1400 audit(1224.174:1638606): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1300.909299][ C0] net_ratelimit: 12067 callbacks suppressed
[ 1300.909320][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1300.909887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1300.910297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1300.910739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1300.911230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1300.911740][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1300.912142][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1300.912598][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1300.913112][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1300.913526][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1301.526602][ T37] audit: type=1400 audit(1224.633:1638607): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1302.286011][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1302.286033][ T37] audit: type=1400 audit(1225.596:1638609): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1302.821056][ T37] audit: type=1400 audit(1226.054:1638610): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1303.368236][ T37] audit: type=1400 audit(1226.522:1638611): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1303.759736][ T37] audit: type=1400 audit(1226.980:1638612): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1304.351184][ T37] audit: type=1400 audit(1227.448:1638613): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1304.800687][ T37] audit: type=1400 audit(1227.925:1638614): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1305.346742][ T37] audit: type=1400 audit(1228.393:1638615): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1305.781869][ T37] audit: type=1400 audit(1228.861:1638616): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1306.265455][ C0] net_ratelimit: 12181 callbacks suppressed
[ 1306.265455][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1306.265474][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1306.265928][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1306.266462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1306.267013][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1306.267528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1306.267623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1306.268115][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1306.268746][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1306.269364][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1306.307332][ T37] audit: type=1400 audit(1229.328:1638617): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1306.885887][ T37] audit: type=1400 audit(1229.796:1638618): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1307.812687][ T37] kauditd_printk_skb: 1 callbacks suppressed
[ 1307.812714][ T37] audit: type=1400 audit(1230.731:1638620): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1308.386765][ T37] audit: type=1400 audit(1231.255:1638621): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1308.793452][ T37] audit: type=1400 audit(1231.686:1638622): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1309.278413][ T37] audit: type=1400 audit(1232.144:1638623): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1309.630326][ T37] audit: type=1400 audit(1232.481:1638624): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5578 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121
[ 1309.801459][ T37] audit: type=1400 audit(1232.602:1638625): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1310.346997][ T37] audit: type=1400 audit(1233.070:1638626): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1310.859842][ T37] audit: type=1400 audit(1233.547:1638627): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1311.000471][ T37] audit: type=1400 audit(1233.650:1638628): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2
[ 1311.000709][ T37] audit: type=1400 audit(1233.762:1638629): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="etc" dev="sda1" ino=116
[ 1311.621330][ C1] net_ratelimit: 12066 callbacks suppressed
[ 1311.621352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1311.621690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1311.622188][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1311.622744][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1311.623120][ C1] bridge0: received packet on veth0_to_bridge with own address as source ad[ 1311.623120][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1311.623406][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1311.623900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1311.624454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1311.624926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1311.625031][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1313.334772][ T37] kauditd_printk_skb: 6 callbacks suppressed
[ 1313.334792][ T37] audit: type=1400 audit(1235.885:1638636): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1313.779547][ T37] audit: type=1400 audit(1236.363:1638637): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1314.881808][ T37] audit: type=1400 audit(1236.821:1638638): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1314.881940][ T37] audit: type=1400 audit(1237.289:1638639): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1315.285740][ T37] audit: type=1400 audit(1237.766:1638640): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1315.820827][ T37] audit: type=1400 audit(1238.233:1638641): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1316.379361][ T37] audit: type=1400 audit(1238.654:1638642): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="/" dev="sda1" ino=2
[ 1316.379413][ T37] audit: type=1400 audit(1238.701:1638643): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1316.379456][ T37] audit: type=1400 audit(1238.720:1638644): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="etc" dev="sda1" ino=116
[ 1316.836000][ T37] audit: type=1400 audit(1239.159:1638645): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1316.836097][ T1322] ieee802154 phy1 wpan1: encryption failed: -22
[ 1316.977344][ C0] net_ratelimit: 12181 callbacks suppressed
[ 1316.977364][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1316.977966][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1316.978348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1316.978515][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1316.979063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1316.979659][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1316.980123][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1316.980147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1316.980715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1316.981222][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1318.972830][ T37] kauditd_printk_skb: 4 callbacks suppressed
[ 1318.972849][ T37] audit: type=1400 audit(1241.040:1638650): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1182 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1319.221720][ T37] audit: type=1400 audit(1241.217:1638651): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=27716 comm="syz-executor" opid=27716 ocomm="syz-executor"
[ 1319.302958][ T37] audit: type=1400 audit(1241.507:1638652): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1319.521663][ T37] audit: type=1400 audit(1241.732:1638653): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2
[ 1319.521712][ T37] audit: type=1400 audit(1241.732:1638654): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="lib" dev="sda1" ino=264
[ 1319.521751][ T37] audit: type=1400 audit(1241.732:1638655): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=1222
[ 1319.794250][ T37] audit: type=1400 audit(1241.984:1638656): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1320.580432][ T37] audit: type=1400 audit(1242.443:1638657): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.11 dest=49072 netif=eth0
[ 1320.580485][ T37] audit: type=1400 audit(1242.471:1638658): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27716 comm="syz-executor" name="root" dev="sda1" ino=1265
[ 1320.580525][ T37] audit: type=1400 audit(1242.471:1638659): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27716 comm="syz-executor" name="root" dev="sda1" ino=1265
[ 1321.699039][ C1] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured!
[ 1321.869233][ T38] INFO: task kworker/u8:7:1173 blocked for more than 144 seconds.
[ 1321.869258][ T38] Not tainted syzkaller #0
[ 1321.869268][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.869277][ T38] task:kworker/u8:7 state:D stack:20088 pid:1173 tgid:1173 ppid:2 task_flags:0x4208160 flags:0x00004000
[ 1321.869322][ T38] Workqueue: events_unbound linkwatch_event
[ 1321.869346][ T38] Call Trace:
[ 1321.869353][ T38]
[ 1321.869390][ T38] __schedule+0x16f3/0x4c20
[ 1321.869427][ T38] ? ret_from_fork_asm+0x1a/0x30
[ 1321.869463][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.869505][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.869533][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.869552][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.869575][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1321.869614][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.869639][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.869669][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.869702][ T38] ? linkwatch_event+0xe/0x60
[ 1321.869728][ T38] ? process_scheduled_works+0x9ef/0x17b0
[ 1321.869756][ T38] ? linkwatch_event+0xe/0x60
[ 1321.869772][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.869793][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.869817][ T38] ? process_scheduled_works+0x9ef/0x17b0
[ 1321.869841][ T38] linkwatch_event+0xe/0x60
[ 1321.869859][ T38] process_scheduled_works+0xae1/0x17b0
[ 1321.869911][ T38] ? __pfx_process_scheduled_works+0x10/0x10
[ 1321.869951][ T38] worker_thread+0x8a0/0xda0
[ 1321.869977][ T38] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 1321.870010][ T38] ? __kthread_parkme+0x7b/0x200
[ 1321.870043][ T38] kthread+0x711/0x8a0
[ 1321.870071][ T38] ? __pfx_worker_thread+0x10/0x10
[ 1321.870092][ T38] ? __pfx_kthread+0x10/0x10
[ 1321.870122][ T38] ? __pfx_kthread+0x10/0x10
[ 1321.870147][ T38] ret_from_fork+0x436/0x7d0
[ 1321.870173][ T38] ? __pfx_ret_from_fork+0x10/0x10
[ 1321.870202][ T38] ? __switch_to_asm+0x39/0x70
[ 1321.870219][ T38] ? __switch_to_asm+0x33/0x70
[ 1321.870234][ T38] ? __pfx_kthread+0x10/0x10
[ 1321.870260][ T38] ret_from_fork_asm+0x1a/0x30
[ 1321.870295][ T38]
[ 1321.870351][ T38] INFO: task kworker/u8:8:3500 blocked for more than 144 seconds.
[ 1321.870365][ T38] Not tainted syzkaller #0
[ 1321.870375][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.870384][ T38] task:kworker/u8:8 state:D stack:20488 pid:3500 tgid:3500 ppid:2 task_flags:0x4208160 flags:0x00004000
[ 1321.870426][ T38] Workqueue: ipv6_addrconf addrconf_verify_work
[ 1321.870449][ T38] Call Trace:
[ 1321.870456][ T38]
[ 1321.870468][ T38] __schedule+0x16f3/0x4c20
[ 1321.870504][ T38] ? unwind_next_frame+0xa5/0x2390
[ 1321.870529][ T38] ? ret_from_fork_asm+0x1a/0x30
[ 1321.870557][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.870601][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.870628][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.870646][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.870677][ T38] ? task_blocks_on_rt_mutex+0x78c/0x1380
[ 1321.870717][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.870741][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.870764][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.870797][ T38] ? _raw_spin_unlock_irqrestore+0xad/0x110
[ 1321.870835][ T38] ? addrconf_verify_work+0x19/0x30
[ 1321.870854][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.870875][ T38] ? addrconf_verify_work+0x19/0x30
[ 1321.870900][ T38] addrconf_verify_work+0x19/0x30
[ 1321.870921][ T38] ? process_scheduled_works+0x9ef/0x17b0
[ 1321.870941][ T38] process_scheduled_works+0xae1/0x17b0
[ 1321.870993][ T38] ? __pfx_process_scheduled_works+0x10/0x10
[ 1321.871033][ T38] worker_thread+0x8a0/0xda0
[ 1321.871059][ T38] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 1321.871093][ T38] ? __kthread_parkme+0x7b/0x200
[ 1321.871125][ T38] kthread+0x711/0x8a0
[ 1321.871154][ T38] ? __pfx_worker_thread+0x10/0x10
[ 1321.871176][ T38] ? __pfx_kthread+0x10/0x10
[ 1321.871205][ T38] ? __pfx_kthread+0x10/0x10
[ 1321.871230][ T38] ret_from_fork+0x436/0x7d0
[ 1321.871255][ T38] ? __pfx_ret_from_fork+0x10/0x10
[ 1321.871284][ T38] ? __switch_to_asm+0x39/0x70
[ 1321.871301][ T38] ? __switch_to_asm+0x33/0x70
[ 1321.871317][ T38] ? __pfx_kthread+0x10/0x10
[ 1321.871342][ T38] ret_from_fork_asm+0x1a/0x30
[ 1321.871376][ T38]
[ 1321.871389][ T38] INFO: task dhcpcd:5499 blocked for more than 144 seconds.
[ 1321.871402][ T38] Not tainted syzkaller #0
[ 1321.871412][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.871421][ T38] task:dhcpcd state:D stack:21320 pid:5499 tgid:5499 ppid:5498 task_flags:0x400140 flags:0x00004002
[ 1321.871462][ T38] Call Trace:
[ 1321.871468][ T38]
[ 1321.871480][ T38] __schedule+0x16f3/0x4c20
[ 1321.871520][ T38] ? __dev_queue_xmit+0x26f/0x3b70
[ 1321.871550][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.871592][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.871621][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.871639][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.871666][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1321.871705][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.871729][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.871752][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.871772][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.871806][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1321.871834][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1321.871862][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1321.871880][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.871907][ T38] inet_rtm_newaddr+0x3b0/0x18b0
[ 1321.871938][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1321.871977][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1321.871997][ T38] rtnetlink_rcv_msg+0x7cf/0xb70
[ 1321.872020][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.872044][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70
[ 1321.872067][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1321.872108][ T38] netlink_rcv_skb+0x205/0x470
[ 1321.872130][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.872153][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1321.872178][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 1321.872214][ T38] ? netlink_deliver_tap+0x2e/0x1b0
[ 1321.872243][ T38] netlink_unicast+0x843/0xa10
[ 1321.872269][ T38] ? __pfx_netlink_unicast+0x10/0x10
[ 1321.872290][ T38] ? netlink_sendmsg+0x642/0xb30
[ 1321.872309][ T38] ? skb_put+0x11b/0x210
[ 1321.872339][ T38] netlink_sendmsg+0x805/0xb30
[ 1321.872363][ T38] ? __pfx_rt_mutex_slowunlock+0x10/0x10
[ 1321.872392][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1321.872418][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.872443][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20
[ 1321.872462][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1321.872486][ T38] __sock_sendmsg+0x21c/0x270
[ 1321.872511][ T38] ____sys_sendmsg+0x508/0x820
[ 1321.872536][ T38] ? __pfx_____sys_sendmsg+0x10/0x10
[ 1321.872565][ T38] ? import_iovec+0x74/0xa0
[ 1321.872592][ T38] ___sys_sendmsg+0x21f/0x2a0
[ 1321.872614][ T38] ? __pfx____sys_sendmsg+0x10/0x10
[ 1321.872679][ T38] ? __pfx_vfs_read+0x10/0x10
[ 1321.872711][ T38] __x64_sys_sendmsg+0x1a1/0x260
[ 1321.872734][ T38] ? __pfx___x64_sys_sendmsg+0x10/0x10
[ 1321.872764][ T38] ? __pfx_ksys_read+0x10/0x10
[ 1321.872783][ T38] ? __task_pid_nr_ns+0x28/0x470
[ 1321.872813][ T38] ? do_syscall_64+0xbe/0x3b0
[ 1321.872852][ T38] do_syscall_64+0xfa/0x3b0
[ 1321.872870][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.872894][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.872912][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1321.872935][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.872954][ T38] RIP: 0033:0x7fd07f078407
[ 1321.872970][ T38] RSP: 002b:00007ffe905044b0 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
[ 1321.872990][ T38] RAX: ffffffffffffffda RBX: 00007fd07efee740 RCX: 00007fd07f078407
[ 1321.873005][ T38] RDX: 0000000000000000 RSI: 00007ffe90518690 RDI: 0000000000000004
[ 1321.873017][ T38] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[ 1321.873029][ T38] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffe905288c0
[ 1321.873041][ T38] R13: 00007fd07efee6c8 R14: 0000000000000044 R15: 00007ffe90518690
[ 1321.873072][ T38]
[ 1321.873118][ T38] INFO: task syz-executor:27501 blocked for more than 144 seconds.
[ 1321.873132][ T38] Not tainted syzkaller #0
[ 1321.873141][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.873150][ T38] task:syz-executor state:D stack:25320 pid:27501 tgid:27501 ppid:1 task_flags:0x400140 flags:0x00004006
[ 1321.873194][ T38] Call Trace:
[ 1321.873200][ T38]
[ 1321.873212][ T38] __schedule+0x16f3/0x4c20
[ 1321.873249][ T38] ? is_bpf_text_address+0x292/0x2b0
[ 1321.873272][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1321.873298][ T38] ? kernel_text_address+0xa5/0xe0
[ 1321.873321][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.873363][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.873391][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.873409][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.873431][ T38] ? task_blocks_on_rt_mutex+0x78c/0x1380
[ 1321.873471][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.873508][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.890870][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.890914][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.890943][ T38] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 1321.890969][ T38] ? __pfx___might_resched+0x10/0x10
[ 1321.890996][ T38] ? cangw_pernet_exit_batch+0x20/0x90
[ 1321.891016][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.891037][ T38] ? cangw_pernet_exit_batch+0x20/0x90
[ 1321.891062][ T38] cangw_pernet_exit_batch+0x20/0x90
[ 1321.891084][ T38] ? __pfx_cangw_pernet_exit_batch+0x10/0x10
[ 1321.891104][ T38] ops_undo_list+0x522/0x990
[ 1321.891136][ T38] ? __pfx_ops_undo_list+0x10/0x10
[ 1321.891157][ T38] ? ops_init+0x469/0x5c0
[ 1321.891190][ T38] setup_net+0x2d3/0x320
[ 1321.891216][ T38] ? __pfx_setup_net+0x10/0x10
[ 1321.891242][ T38] ? __mutex_rt_init+0x3b/0x50
[ 1321.891269][ T38] copy_net_ns+0x31b/0x4d0
[ 1321.891296][ T38] create_new_namespaces+0x3f3/0x720
[ 1321.891323][ T38] ? security_capable+0x7e/0x2e0
[ 1321.891356][ T38] unshare_nsproxy_namespaces+0x11c/0x170
[ 1321.891381][ T38] ksys_unshare+0x4c8/0x8c0
[ 1321.891412][ T38] ? __pfx_ksys_unshare+0x10/0x10
[ 1321.891437][ T38] ? rt_spin_unlock+0x65/0x80
[ 1321.891470][ T38] __x64_sys_unshare+0x38/0x50
[ 1321.891493][ T38] do_syscall_64+0xfa/0x3b0
[ 1321.891511][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.891535][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.891553][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1321.891576][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.891594][ T38] RIP: 0033:0x7f936b4606c7
[ 1321.891611][ T38] RSP: 002b:00007ffc53b6ad18 EFLAGS: 00000206 ORIG_RAX: 0000000000000110
[ 1321.891632][ T38] RAX: ffffffffffffffda RBX: 00007f936b6b5f40 RCX: 00007f936b4606c7
[ 1321.891646][ T38] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
[ 1321.891666][ T38] RBP: 00007f936b6b67b8 R08: 0000000000000000 R09: 0000000000000000
[ 1321.891678][ T38] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000008
[ 1321.891690][ T38] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
[ 1321.891719][ T38]
[ 1321.891730][ T38] INFO: task syz-executor:27505 blocked for more than 144 seconds.
[ 1321.891744][ T38] Not tainted syzkaller #0
[ 1321.891754][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.891763][ T38] task:syz-executor state:D stack:24936 pid:27505 tgid:27505 ppid:1 task_flags:0x400140 flags:0x00004006
[ 1321.891807][ T38] Call Trace:
[ 1321.891814][ T38]
[ 1321.891826][ T38] __schedule+0x16f3/0x4c20
[ 1321.891862][ T38] ? is_bpf_text_address+0x292/0x2b0
[ 1321.891886][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1321.891912][ T38] ? kernel_text_address+0xa5/0xe0
[ 1321.891936][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.891979][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.892007][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.892025][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.892048][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1321.892087][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.892112][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.892134][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.892154][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.892187][ T38] ? cangw_pernet_exit_batch+0x20/0x90
[ 1321.892215][ T38] ? __pfx___might_resched+0x10/0x10
[ 1321.892241][ T38] ? cangw_pernet_exit_batch+0x20/0x90
[ 1321.892260][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.892288][ T38] cangw_pernet_exit_batch+0x20/0x90
[ 1321.892309][ T38] ? __pfx_cangw_pernet_exit_batch+0x10/0x10
[ 1321.892329][ T38] ops_undo_list+0x522/0x990
[ 1321.892358][ T38] ? __pfx_ops_undo_list+0x10/0x10
[ 1321.892380][ T38] ? ops_init+0x469/0x5c0
[ 1321.892413][ T38] setup_net+0x2d3/0x320
[ 1321.892439][ T38] ? __pfx_setup_net+0x10/0x10
[ 1321.892464][ T38] ? __mutex_rt_init+0x3b/0x50
[ 1321.892490][ T38] copy_net_ns+0x31b/0x4d0
[ 1321.892517][ T38] create_new_namespaces+0x3f3/0x720
[ 1321.892544][ T38] ? security_capable+0x7e/0x2e0
[ 1321.892576][ T38] unshare_nsproxy_namespaces+0x11c/0x170
[ 1321.892602][ T38] ksys_unshare+0x4c8/0x8c0
[ 1321.892632][ T38] ? __pfx_ksys_unshare+0x10/0x10
[ 1321.892664][ T38] ? rt_spin_unlock+0x65/0x80
[ 1321.892697][ T38] __x64_sys_unshare+0x38/0x50
[ 1321.892720][ T38] do_syscall_64+0xfa/0x3b0
[ 1321.892737][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.892762][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.892780][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1321.892802][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.892820][ T38] RIP: 0033:0x7fb0a5b406c7
[ 1321.892836][ T38] RSP: 002b:00007ffd3764b8a8 EFLAGS: 00000206 ORIG_RAX: 0000000000000110
[ 1321.892856][ T38] RAX: ffffffffffffffda RBX: 00007fb0a5d95f40 RCX: 00007fb0a5b406c7
[ 1321.892870][ T38] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
[ 1321.892882][ T38] RBP: 00007fb0a5d967b8 R08: 0000000000000000 R09: 0000000000000000
[ 1321.892895][ T38] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000008
[ 1321.892907][ T38] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
[ 1321.892937][ T38]
[ 1321.892946][ T38] INFO: task syz-executor:27513 blocked for more than 144 seconds.
[ 1321.892959][ T38] Not tainted syzkaller #0
[ 1321.892969][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.892977][ T38] task:syz-executor state:D stack:22104 pid:27513 tgid:27513 ppid:1 task_flags:0x400140 flags:0x00004006
[ 1321.893018][ T38] Call Trace:
[ 1321.893024][ T38]
[ 1321.893037][ T38] __schedule+0x16f3/0x4c20
[ 1321.893073][ T38] ? is_bpf_text_address+0x292/0x2b0
[ 1321.893095][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1321.893121][ T38] ? kernel_text_address+0xa5/0xe0
[ 1321.893145][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.893187][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.893215][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.893233][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.893255][ T38] ? task_blocks_on_rt_mutex+0x78c/0x1380
[ 1321.893294][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.893318][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.893341][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.893373][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.893400][ T38] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 1321.893427][ T38] ? __pfx___might_resched+0x10/0x10
[ 1321.893452][ T38] ? cangw_pernet_exit_batch+0x20/0x90
[ 1321.893472][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.893493][ T38] ? cangw_pernet_exit_batch+0x20/0x90
[ 1321.893519][ T38] cangw_pernet_exit_batch+0x20/0x90
[ 1321.893540][ T38] ? __pfx_cangw_pernet_exit_batch+0x10/0x10
[ 1321.893560][ T38] ops_undo_list+0x522/0x990
[ 1321.893591][ T38] ? __pfx_ops_undo_list+0x10/0x10
[ 1321.893612][ T38] ? ops_init+0x469/0x5c0
[ 1321.893646][ T38] setup_net+0x2d3/0x320
[ 1321.893678][ T38] ? __pfx_setup_net+0x10/0x10
[ 1321.893704][ T38] ? __mutex_rt_init+0x3b/0x50
[ 1321.893730][ T38] copy_net_ns+0x31b/0x4d0
[ 1321.893757][ T38] create_new_namespaces+0x3f3/0x720
[ 1321.893784][ T38] ? security_capable+0x7e/0x2e0
[ 1321.893816][ T38] unshare_nsproxy_namespaces+0x11c/0x170
[ 1321.893843][ T38] ksys_unshare+0x4c8/0x8c0
[ 1321.893874][ T38] ? __pfx_ksys_unshare+0x10/0x10
[ 1321.893899][ T38] ? rt_spin_unlock+0x65/0x80
[ 1321.893932][ T38] __x64_sys_unshare+0x38/0x50
[ 1321.893956][ T38] do_syscall_64+0xfa/0x3b0
[ 1321.893973][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.893997][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.894015][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1321.894037][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.894055][ T38] RIP: 0033:0x7f5b5e2606c7
[ 1321.894071][ T38] RSP: 002b:00007ffd1a63f238 EFLAGS: 00000202 ORIG_RAX: 0000000000000110
[ 1321.894090][ T38] RAX: ffffffffffffffda RBX: 00007f5b5e4b5f40 RCX: 00007f5b5e2606c7
[ 1321.894104][ T38] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
[ 1321.894116][ T38] RBP: 00007f5b5e4b67b8 R08: 0000000000000000 R09: 0000000000000000
[ 1321.894129][ T38] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008
[ 1321.894140][ T38] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
[ 1321.894169][ T38]
[ 1321.894178][ T38] INFO: task syz-executor:27519 blocked for more than 144 seconds.
[ 1321.894191][ T38] Not tainted syzkaller #0
[ 1321.894201][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.894227][ T38] task:syz-executor state:D stack:21992 pid:27519 tgid:27519 ppid:1 task_flags:0x400140 flags:0x00004006
[ 1321.894268][ T38] Call Trace:
[ 1321.894275][ T38]
[ 1321.894287][ T38] __schedule+0x16f3/0x4c20
[ 1321.894324][ T38] ? is_bpf_text_address+0x292/0x2b0
[ 1321.894346][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1321.894372][ T38] ? kernel_text_address+0xa5/0xe0
[ 1321.894396][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.894438][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.894466][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.894483][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.894507][ T38] ? task_blocks_on_rt_mutex+0x78c/0x1380
[ 1321.894546][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.894570][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.894593][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.894625][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.894659][ T38] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 1321.894686][ T38] ? __pfx___might_resched+0x10/0x10
[ 1321.894711][ T38] ? cangw_pernet_exit_batch+0x20/0x90
[ 1321.894731][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.894752][ T38] ? cangw_pernet_exit_batch+0x20/0x90
[ 1321.894778][ T38] cangw_pernet_exit_batch+0x20/0x90
[ 1321.894799][ T38] ? __pfx_cangw_pernet_exit_batch+0x10/0x10
[ 1321.894819][ T38] ops_undo_list+0x522/0x990
[ 1321.894850][ T38] ? __pfx_ops_undo_list+0x10/0x10
[ 1321.894884][ T38] ? ops_init+0x469/0x5c0
[ 1321.912378][ T38] setup_net+0x2d3/0x320
[ 1321.912416][ T38] ? __pfx_setup_net+0x10/0x10
[ 1321.912442][ T38] ? __mutex_rt_init+0x3b/0x50
[ 1321.912469][ T38] copy_net_ns+0x31b/0x4d0
[ 1321.912496][ T38] create_new_namespaces+0x3f3/0x720
[ 1321.912524][ T38] ? security_capable+0x7e/0x2e0
[ 1321.912557][ T38] unshare_nsproxy_namespaces+0x11c/0x170
[ 1321.912583][ T38] ksys_unshare+0x4c8/0x8c0
[ 1321.912614][ T38] ? __pfx_ksys_unshare+0x10/0x10
[ 1321.912640][ T38] ? rt_spin_unlock+0x65/0x80
[ 1321.912680][ T38] __x64_sys_unshare+0x38/0x50
[ 1321.912704][ T38] do_syscall_64+0xfa/0x3b0
[ 1321.912722][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.912746][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.912765][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1321.912787][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.912806][ T38] RIP: 0033:0x7ff9fd9106c7
[ 1321.912823][ T38] RSP: 002b:00007ffea1cee058 EFLAGS: 00000206 ORIG_RAX: 0000000000000110
[ 1321.912843][ T38] RAX: ffffffffffffffda RBX: 00007ff9fdb65f40 RCX: 00007ff9fd9106c7
[ 1321.912857][ T38] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
[ 1321.912869][ T38] RBP: 00007ff9fdb667b8 R08: 0000000000000000 R09: 0000000000000000
[ 1321.912881][ T38] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000008
[ 1321.912893][ T38] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
[ 1321.912923][ T38]
[ 1321.912936][ T38] INFO: task syz-executor:27597 blocked for more than 144 seconds.
[ 1321.912951][ T38] Not tainted syzkaller #0
[ 1321.912962][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.912971][ T38] task:syz-executor state:D stack:22616 pid:27597 tgid:27597 ppid:1 task_flags:0x400140 flags:0x00004004
[ 1321.913014][ T38] Call Trace:
[ 1321.913021][ T38]
[ 1321.913034][ T38] __schedule+0x16f3/0x4c20
[ 1321.913065][ T38] ? kasan_save_track+0x3e/0x80
[ 1321.913086][ T38] ? __kasan_slab_free+0x5b/0x80
[ 1321.913107][ T38] ? common_lsm_audit+0x23a/0x2e0
[ 1321.913130][ T38] ? smk_tskacc+0x2fc/0x370
[ 1321.913145][ T38] ? smack_file_ioctl+0x219/0x340
[ 1321.913163][ T38] ? security_file_ioctl+0xfb/0x2d0
[ 1321.913182][ T38] ? __se_sys_ioctl+0x47/0x170
[ 1321.913200][ T38] ? do_syscall_64+0xfa/0x3b0
[ 1321.913216][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.913244][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.913287][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.913315][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.913334][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.913356][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1321.913395][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.913420][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.913443][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.913462][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.913495][ T38] ? __tun_chr_ioctl+0x37d/0x1df0
[ 1321.913528][ T38] ? __tun_chr_ioctl+0x37d/0x1df0
[ 1321.913544][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.913572][ T38] __tun_chr_ioctl+0x37d/0x1df0
[ 1321.913597][ T38] ? __pfx___tun_chr_ioctl+0x10/0x10
[ 1321.913623][ T38] ? __pfx_fput_close_sync+0x10/0x10
[ 1321.913653][ T38] ? bpf_lsm_file_ioctl+0x9/0x20
[ 1321.913674][ T38] ? __pfx_tun_chr_ioctl+0x10/0x10
[ 1321.913699][ T38] __se_sys_ioctl+0xfc/0x170
[ 1321.913723][ T38] do_syscall_64+0xfa/0x3b0
[ 1321.913740][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.913765][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.913783][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1321.913805][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.913823][ T38] RIP: 0033:0x7f8aebb4eacb
[ 1321.913839][ T38] RSP: 002b:00007ffe12b30960 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 1321.913857][ T38] RAX: ffffffffffffffda RBX: 00007f8aebda5f40 RCX: 00007f8aebb4eacb
[ 1321.913872][ T38] RDX: 00007ffe12b309e0 RSI: 00000000400454ca RDI: 00000000000000c8
[ 1321.913884][ T38] RBP: 00007f8aebda67b8 R08: 0000000000000000 R09: 0000000000000000
[ 1321.913897][ T38] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008
[ 1321.913909][ T38] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
[ 1321.913938][ T38]
[ 1321.913947][ T38] INFO: task syz-executor:27600 blocked for more than 144 seconds.
[ 1321.913960][ T38] Not tainted syzkaller #0
[ 1321.913969][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.913978][ T38] task:syz-executor state:D stack:21928 pid:27600 tgid:27600 ppid:1 task_flags:0x400140 flags:0x00004004
[ 1321.914021][ T38] Call Trace:
[ 1321.914028][ T38]
[ 1321.914041][ T38] __schedule+0x16f3/0x4c20
[ 1321.914076][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.914111][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.914153][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.914181][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.914199][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.914221][ T38] ? task_blocks_on_rt_mutex+0x78c/0x1380
[ 1321.914261][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.914285][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.914308][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.914340][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1321.914368][ T38] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 1321.914401][ T38] ? rtnetlink_rcv_msg+0x71c/0xb70
[ 1321.914424][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.914444][ T38] ? rtnetlink_rcv_msg+0x71c/0xb70
[ 1321.914470][ T38] rtnetlink_rcv_msg+0x71c/0xb70
[ 1321.914493][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.914516][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70
[ 1321.914539][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1321.914580][ T38] netlink_rcv_skb+0x205/0x470
[ 1321.914603][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.914625][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1321.914656][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 1321.914691][ T38] ? netlink_deliver_tap+0x2e/0x1b0
[ 1321.914723][ T38] netlink_unicast+0x843/0xa10
[ 1321.914756][ T38] ? __pfx_netlink_unicast+0x10/0x10
[ 1321.914780][ T38] ? netlink_sendmsg+0x642/0xb30
[ 1321.914801][ T38] ? skb_put+0x11b/0x210
[ 1321.914830][ T38] netlink_sendmsg+0x805/0xb30
[ 1321.914864][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1321.914896][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20
[ 1321.914915][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1321.914940][ T38] __sock_sendmsg+0x21c/0x270
[ 1321.914966][ T38] __sys_sendto+0x3c7/0x520
[ 1321.914994][ T38] ? __pfx___sys_sendto+0x10/0x10
[ 1321.915031][ T38] ? fput_close_sync+0x119/0x200
[ 1321.915065][ T38] ? __pfx_fput_close_sync+0x10/0x10
[ 1321.915085][ T38] ? rt_spin_unlock+0x65/0x80
[ 1321.915112][ T38] __x64_sys_sendto+0xde/0x100
[ 1321.915141][ T38] do_syscall_64+0xfa/0x3b0
[ 1321.915161][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.915178][ T38] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20
[ 1321.915196][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1321.915219][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1321.915237][ T38] RIP: 0033:0x7effe8020d5c
[ 1321.915252][ T38] RSP: 002b:00007fff4bc6ed60 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[ 1321.915271][ T38] RAX: ffffffffffffffda RBX: 00007effe8da4620 RCX: 00007effe8020d5c
[ 1321.915286][ T38] RDX: 000000000000003c RSI: 00007effe8da4670 RDI: 0000000000000003
[ 1321.915298][ T38] RBP: 0000000000000000 R08: 00007fff4bc6edb4 R09: 000000000000000c
[ 1321.915310][ T38] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
[ 1321.915322][ T38] R13: 0000000000000000 R14: 00007effe8da4670 R15: 0000000000000000
[ 1321.915352][ T38]
[ 1321.915361][ T38] INFO: task syz-executor:27604 blocked for more than 144 seconds.
[ 1321.915373][ T38] Not tainted syzkaller #0
[ 1321.915383][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1321.915392][ T38] task:syz-executor state:D stack:25800 pid:27604 tgid:27604 ppid:1 task_flags:0x400140 flags:0x00004006
[ 1321.915435][ T38] Call Trace:
[ 1321.915442][ T38]
[ 1321.915455][ T38] __schedule+0x16f3/0x4c20
[ 1321.915506][ T38] ? __pfx___schedule+0x10/0x10
[ 1321.915549][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1321.915576][ T38] rt_mutex_schedule+0x77/0xf0
[ 1321.915610][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1321.915633][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1321.915678][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1321.915703][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1321.915726][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1321.915745][ T38] ? __lock_acquire+0xab9/0xd20
[ 1321.915779][ T38] ? ip_tunnel_init_net+0x2ab/0x800
[ 1321.915816][ T38] ? ip_tunnel_init_net+0x2ab/0x800
[ 1321.915835][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1321.915862][ T38] ip_tunnel_init_net+0x2ab/0x800
[ 1321.915892][ T38] ? __pfx_ip_tunnel_init_net+0x10/0x10
[ 1321.915931][ T38] ops_init+0x35c/0x5c0
[ 1321.915966][ T38] setup_net+0x10c/0x320
[ 1321.915987][ T38] ? copy_net_ns+0x304/0x4d0
[ 1321.916011][ T38] ? __pfx_setup_net+0x10/0x10
[ 1321.916037][ T38] ? __mutex_rt_init+0x3b/0x50
[ 1321.916063][ T38] copy_net_ns+0x31b/0x4d0
[ 1321.916090][ T38] create_new_namespaces+0x3f3/0x720
[ 1321.916117][ T38] ? security_capable+0x7e/0x2e0
[ 1321.916149][ T38] unshare_nsproxy_namespaces+0x11c/0x170
[ 1321.916174][ T38] ksys_unshare+0x4c8/0x8c0
[ 1321.916205][ T38] ? __pfx_ksys_unshare+0x10/0x10
[ 1321.916229][ T38] ? rt_spin_unlock+0x65/0x80
[ 1321.916273][ T38] __x64_sys_unshare+0x38/0x50
[ 1322.104415][ T38] do_syscall_64+0xfa/0x3b0
[ 1322.104447][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1322.104472][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.104490][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1322.104513][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.104532][ T38] RIP: 0033:0x7fd3707306c7
[ 1322.104548][ T38] RSP: 002b:00007ffc8c955788 EFLAGS: 00000202 ORIG_RAX: 0000000000000110
[ 1322.104569][ T38] RAX: ffffffffffffffda RBX: 00007fd370985f40 RCX: 00007fd3707306c7
[ 1322.104583][ T38] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
[ 1322.104596][ T38] RBP: 00007fd3709867b8 R08: 0000000000000000 R09: 0000000000000000
[ 1322.104609][ T38] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008
[ 1322.104620][ T38] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
[ 1322.104656][ T38]
[ 1322.104665][ T38] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[ 1322.104678][ T38] INFO: task syz-executor:27607 blocked for more than 145 seconds.
[ 1322.104693][ T38] Not tainted syzkaller #0
[ 1322.104703][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1322.104712][ T38] task:syz-executor state:D stack:25448 pid:27607 tgid:27607 ppid:1 task_flags:0x400140 flags:0x00004004
[ 1322.104757][ T38] Call Trace:
[ 1322.104764][ T38]
[ 1322.104777][ T38] __schedule+0x16f3/0x4c20
[ 1322.104829][ T38] ? __pfx___schedule+0x10/0x10
[ 1322.104872][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1322.104899][ T38] rt_mutex_schedule+0x77/0xf0
[ 1322.104918][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1322.104940][ T38] ? task_blocks_on_rt_mutex+0x78c/0x1380
[ 1322.104979][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1322.105004][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1322.105027][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1322.105059][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1322.105087][ T38] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 1322.105122][ T38] ? inet6_rtm_newaddr+0x5b7/0xd20
[ 1322.105143][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1322.105165][ T38] ? inet6_rtm_newaddr+0x5b7/0xd20
[ 1322.105191][ T38] inet6_rtm_newaddr+0x5b7/0xd20
[ 1322.105215][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1322.105245][ T38] ? __pfx_inet6_rtm_newaddr+0x10/0x10
[ 1322.105297][ T38] ? __pfx_inet6_rtm_newaddr+0x10/0x10
[ 1322.105321][ T38] rtnetlink_rcv_msg+0x7cf/0xb70
[ 1322.105345][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.105371][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70
[ 1322.105392][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.105433][ T38] netlink_rcv_skb+0x205/0x470
[ 1322.105456][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.105478][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.105504][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 1322.105540][ T38] ? netlink_deliver_tap+0x2e/0x1b0
[ 1322.105572][ T38] netlink_unicast+0x843/0xa10
[ 1322.105603][ T38] ? __pfx_netlink_unicast+0x10/0x10
[ 1322.105634][ T38] ? netlink_sendmsg+0x642/0xb30
[ 1322.105656][ T38] ? skb_put+0x11b/0x210
[ 1322.105685][ T38] netlink_sendmsg+0x805/0xb30
[ 1322.105718][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.105750][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20
[ 1322.105769][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.105793][ T38] __sock_sendmsg+0x21c/0x270
[ 1322.105820][ T38] __sys_sendto+0x3c7/0x520
[ 1322.105847][ T38] ? __pfx___sys_sendto+0x10/0x10
[ 1322.105884][ T38] ? fput_close_sync+0x119/0x200
[ 1322.105918][ T38] ? __pfx_fput_close_sync+0x10/0x10
[ 1322.105937][ T38] ? rt_spin_unlock+0x65/0x80
[ 1322.105965][ T38] __x64_sys_sendto+0xde/0x100
[ 1322.105994][ T38] do_syscall_64+0xfa/0x3b0
[ 1322.106011][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1322.106035][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.106054][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1322.106076][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.106095][ T38] RIP: 0033:0x7f00877e0d5c
[ 1322.106110][ T38] RSP: 002b:00007ffd741a89c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[ 1322.106129][ T38] RAX: ffffffffffffffda RBX: 00007f0088564620 RCX: 00007f00877e0d5c
[ 1322.106144][ T38] RDX: 0000000000000040 RSI: 00007f0088564670 RDI: 0000000000000003
[ 1322.106156][ T38] RBP: 0000000000000000 R08: 00007ffd741a8a14 R09: 000000000000000c
[ 1322.106168][ T38] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
[ 1322.106180][ T38] R13: 0000000000000000 R14: 00007f0088564670 R15: 0000000000000000
[ 1322.106210][ T38]
[ 1322.106218][ T38] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[ 1322.106228][ T38] INFO: task syz-executor:27655 blocked for more than 145 seconds.
[ 1322.106241][ T38] Not tainted syzkaller #0
[ 1322.106251][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1322.106260][ T38] task:syz-executor state:D stack:25928 pid:27655 tgid:27655 ppid:1 task_flags:0x400140 flags:0x00004006
[ 1322.106304][ T38] Call Trace:
[ 1322.106311][ T38]
[ 1322.106324][ T38] __schedule+0x16f3/0x4c20
[ 1322.106374][ T38] ? __pfx___schedule+0x10/0x10
[ 1322.106418][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1322.106445][ T38] rt_mutex_schedule+0x77/0xf0
[ 1322.106464][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1322.106486][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1322.106527][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1322.106551][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1322.106574][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1322.106594][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.106633][ T38] ? ib_get_eth_speed+0x151/0x7b0
[ 1322.106667][ T38] ? ib_get_eth_speed+0x151/0x7b0
[ 1322.106685][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1322.106712][ T38] ib_get_eth_speed+0x151/0x7b0
[ 1322.106736][ T38] ? __pfx_ib_get_eth_speed+0x10/0x10
[ 1322.106781][ T38] siw_query_port+0x3c/0x4a0
[ 1322.106809][ T38] ib_setup_port_attrs+0x24e/0x2060
[ 1322.106835][ T38] ? do_raw_spin_lock+0x121/0x290
[ 1322.106866][ T38] ? _raw_spin_unlock_irqrestore+0x85/0x110
[ 1322.106892][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1322.106927][ T38] ? __pfx_ib_setup_port_attrs+0x10/0x10
[ 1322.106949][ T38] ? rt_mutex_slowunlock+0x493/0x8a0
[ 1322.106976][ T38] ? rt_mutex_slowunlock+0x1be/0x2e0
[ 1322.106996][ T38] ? __pfx_rt_mutex_slowunlock+0x10/0x10
[ 1322.107032][ T38] ? device_add+0x70b/0xb50
[ 1322.107058][ T38] add_one_compat_dev+0x3d6/0x5c0
[ 1322.107088][ T38] rdma_dev_init_net+0x1dd/0x270
[ 1322.107112][ T38] ? __pfx_rdma_dev_init_net+0x10/0x10
[ 1322.107146][ T38] ops_init+0x35c/0x5c0
[ 1322.107181][ T38] setup_net+0x10c/0x320
[ 1322.107202][ T38] ? copy_net_ns+0x304/0x4d0
[ 1322.107226][ T38] ? __pfx_setup_net+0x10/0x10
[ 1322.107252][ T38] ? __mutex_rt_init+0x3b/0x50
[ 1322.107278][ T38] copy_net_ns+0x31b/0x4d0
[ 1322.107306][ T38] create_new_namespaces+0x3f3/0x720
[ 1322.107333][ T38] ? security_capable+0x7e/0x2e0
[ 1322.107365][ T38] unshare_nsproxy_namespaces+0x11c/0x170
[ 1322.107390][ T38] ksys_unshare+0x4c8/0x8c0
[ 1322.107422][ T38] ? __pfx_ksys_unshare+0x10/0x10
[ 1322.107447][ T38] ? rt_spin_unlock+0x65/0x80
[ 1322.107479][ T38] __x64_sys_unshare+0x38/0x50
[ 1322.107503][ T38] do_syscall_64+0xfa/0x3b0
[ 1322.107520][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1322.107544][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.107562][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1322.107585][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.107603][ T38] RIP: 0033:0x7ff9435706c7
[ 1322.107618][ T38] RSP: 002b:00007fff352ed1f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000110
[ 1322.107643][ T38] RAX: ffffffffffffffda RBX: 00007ff9437c5f40 RCX: 00007ff9435706c7
[ 1322.107658][ T38] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
[ 1322.107670][ T38] RBP: 00007ff9437c67b8 R08: 0000000000000000 R09: 0000000000000000
[ 1322.107682][ T38] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008
[ 1322.107693][ T38] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
[ 1322.107723][ T38]
[ 1322.107730][ T38] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[ 1322.107745][ T38] INFO: task syz-executor:27694 blocked for more than 145 seconds.
[ 1322.107758][ T38] Not tainted syzkaller #0
[ 1322.107768][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1322.107777][ T38] task:syz-executor state:D stack:26920 pid:27694 tgid:27694 ppid:1 task_flags:0x400140 flags:0x00004004
[ 1322.107821][ T38] Call Trace:
[ 1322.107828][ T38]
[ 1322.107840][ T38] __schedule+0x16f3/0x4c20
[ 1322.107890][ T38] ? __pfx___schedule+0x10/0x10
[ 1322.107934][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1322.107962][ T38] rt_mutex_schedule+0x77/0xf0
[ 1322.107980][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1322.108002][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1322.108058][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1322.108083][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1322.108106][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1322.108126][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.108160][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.108187][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1322.108215][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.108232][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1322.108259][ T38] inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.108289][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1322.108329][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1322.108348][ T38] rtnetlink_rcv_msg+0x7cf/0xb70
[ 1322.108371][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.108395][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70
[ 1322.108417][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.108458][ T38] netlink_rcv_skb+0x205/0x470
[ 1322.108479][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.108502][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.108527][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 1322.108563][ T38] ? netlink_deliver_tap+0x2e/0x1b0
[ 1322.108594][ T38] netlink_unicast+0x843/0xa10
[ 1322.108626][ T38] ? __pfx_netlink_unicast+0x10/0x10
[ 1322.108657][ T38] ? netlink_sendmsg+0x642/0xb30
[ 1322.108690][ T38] ? skb_put+0x11b/0x210
[ 1322.333507][ C0] net_ratelimit: 12063 callbacks suppressed
[ 1322.333529][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1322.334044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1322.334085][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1322.334667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1322.335266][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1322.335699][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1322.335829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:05:27:20:5a:49, vlan:0)
[ 1322.336330][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1322.336860][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 1322.337344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 1322.383612][ T38] netlink_sendmsg+0x805/0xb30
[ 1322.383659][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.383692][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20
[ 1322.383712][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.383736][ T38] __sock_sendmsg+0x21c/0x270
[ 1322.383763][ T38] __sys_sendto+0x3c7/0x520
[ 1322.383790][ T38] ? __pfx___sys_sendto+0x10/0x10
[ 1322.383843][ T38] ? exc_page_fault+0x76/0xf0
[ 1322.383873][ T38] ? do_user_addr_fault+0xc8a/0x1390
[ 1322.383901][ T38] __x64_sys_sendto+0xde/0x100
[ 1322.383929][ T38] do_syscall_64+0xfa/0x3b0
[ 1322.383947][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1322.383971][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.383989][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1322.384012][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.384030][ T38] RIP: 0033:0x7f65b9310d5c
[ 1322.384047][ T38] RSP: 002b:00007fffefeeebc0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[ 1322.384068][ T38] RAX: ffffffffffffffda RBX: 00007f65ba094620 RCX: 00007f65b9310d5c
[ 1322.384082][ T38] RDX: 0000000000000028 RSI: 00007f65ba094670 RDI: 0000000000000003
[ 1322.384095][ T38] RBP: 0000000000000000 R08: 00007fffefeeec14 R09: 000000000000000c
[ 1322.384107][ T38] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
[ 1322.384119][ T38] R13: 0000000000000000 R14: 00007f65ba094670 R15: 0000000000000000
[ 1322.384149][ T38]
[ 1322.384158][ T38] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[ 1322.384171][ T38] INFO: task syz-executor:27699 blocked for more than 145 seconds.
[ 1322.384186][ T38] Not tainted syzkaller #0
[ 1322.384196][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1322.384206][ T38] task:syz-executor state:D stack:22632 pid:27699 tgid:27699 ppid:27692 task_flags:0x400140 flags:0x00004000
[ 1322.384249][ T38] Call Trace:
[ 1322.384255][ T38]
[ 1322.384268][ T38] __schedule+0x16f3/0x4c20
[ 1322.384319][ T38] ? __pfx___schedule+0x10/0x10
[ 1322.384361][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1322.384389][ T38] rt_mutex_schedule+0x77/0xf0
[ 1322.384409][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1322.384432][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1322.384472][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1322.384496][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1322.384519][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1322.384539][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.384574][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.384609][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1322.384638][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.384655][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1322.384683][ T38] inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.384714][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1322.384752][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1322.384772][ T38] rtnetlink_rcv_msg+0x7cf/0xb70
[ 1322.384796][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.384820][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70
[ 1322.384842][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.384883][ T38] netlink_rcv_skb+0x205/0x470
[ 1322.384905][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.384927][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.384952][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 1322.384988][ T38] ? netlink_deliver_tap+0x2e/0x1b0
[ 1322.385020][ T38] netlink_unicast+0x843/0xa10
[ 1322.385053][ T38] ? __pfx_netlink_unicast+0x10/0x10
[ 1322.385077][ T38] ? netlink_sendmsg+0x642/0xb30
[ 1322.385099][ T38] ? skb_put+0x11b/0x210
[ 1322.385128][ T38] netlink_sendmsg+0x805/0xb30
[ 1322.385161][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.385193][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20
[ 1322.385213][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.385237][ T38] __sock_sendmsg+0x21c/0x270
[ 1322.385263][ T38] __sys_sendto+0x3c7/0x520
[ 1322.385290][ T38] ? __pfx___sys_sendto+0x10/0x10
[ 1322.385342][ T38] ? exc_page_fault+0x76/0xf0
[ 1322.385371][ T38] ? do_user_addr_fault+0xc8a/0x1390
[ 1322.385397][ T38] __x64_sys_sendto+0xde/0x100
[ 1322.385426][ T38] do_syscall_64+0xfa/0x3b0
[ 1322.385442][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1322.385467][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.385485][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1322.385508][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.385526][ T38] RIP: 0033:0x7f742d4c0d5c
[ 1322.385542][ T38] RSP: 002b:00007ffc53fdb8d0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[ 1322.385561][ T38] RAX: ffffffffffffffda RBX: 00007f742e244620 RCX: 00007f742d4c0d5c
[ 1322.385575][ T38] RDX: 0000000000000028 RSI: 00007f742e244670 RDI: 0000000000000003
[ 1322.385588][ T38] RBP: 0000000000000000 R08: 00007ffc53fdb924 R09: 000000000000000c
[ 1322.385599][ T38] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
[ 1322.385616][ T38] R13: 0000000000000000 R14: 00007f742e244670 R15: 0000000000000000
[ 1322.385647][ T38]
[ 1322.385655][ T38] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[ 1322.385665][ T38] INFO: task syz-executor:27701 blocked for more than 145 seconds.
[ 1322.385678][ T38] Not tainted syzkaller #0
[ 1322.385688][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1322.385697][ T38] task:syz-executor state:D stack:26440 pid:27701 tgid:27701 ppid:27693 task_flags:0x400140 flags:0x00004000
[ 1322.385741][ T38] Call Trace:
[ 1322.385748][ T38]
[ 1322.385760][ T38] __schedule+0x16f3/0x4c20
[ 1322.385811][ T38] ? __pfx___schedule+0x10/0x10
[ 1322.385854][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1322.385881][ T38] rt_mutex_schedule+0x77/0xf0
[ 1322.385900][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1322.385922][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1322.385962][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1322.385999][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1322.386022][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1322.386041][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.386075][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.386102][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1322.386129][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.386147][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1322.386174][ T38] inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.386205][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1322.386243][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1322.386262][ T38] rtnetlink_rcv_msg+0x7cf/0xb70
[ 1322.386285][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.386310][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70
[ 1322.386333][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.386374][ T38] netlink_rcv_skb+0x205/0x470
[ 1322.386395][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.386417][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.386443][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 1322.386478][ T38] ? netlink_deliver_tap+0x2e/0x1b0
[ 1322.386510][ T38] netlink_unicast+0x843/0xa10
[ 1322.386541][ T38] ? __pfx_netlink_unicast+0x10/0x10
[ 1322.386565][ T38] ? netlink_sendmsg+0x642/0xb30
[ 1322.386586][ T38] ? skb_put+0x11b/0x210
[ 1322.386634][ T38] netlink_sendmsg+0x805/0xb30
[ 1322.404115][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.404161][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20
[ 1322.404181][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.404206][ T38] __sock_sendmsg+0x21c/0x270
[ 1322.404233][ T38] __sys_sendto+0x3c7/0x520
[ 1322.404261][ T38] ? __pfx___sys_sendto+0x10/0x10
[ 1322.404312][ T38] ? exc_page_fault+0x76/0xf0
[ 1322.404342][ T38] ? do_user_addr_fault+0xc8a/0x1390
[ 1322.404369][ T38] __x64_sys_sendto+0xde/0x100
[ 1322.404397][ T38] do_syscall_64+0xfa/0x3b0
[ 1322.404415][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1322.404439][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.404457][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1322.404481][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.404499][ T38] RIP: 0033:0x7f350eed0d5c
[ 1322.404515][ T38] RSP: 002b:00007fffe730b090 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[ 1322.404536][ T38] RAX: ffffffffffffffda RBX: 00007f350fc54620 RCX: 00007f350eed0d5c
[ 1322.404551][ T38] RDX: 0000000000000028 RSI: 00007f350fc54670 RDI: 0000000000000003
[ 1322.404563][ T38] RBP: 0000000000000000 R08: 00007fffe730b0e4 R09: 000000000000000c
[ 1322.404576][ T38] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
[ 1322.404587][ T38] R13: 0000000000000000 R14: 00007f350fc54670 R15: 0000000000000000
[ 1322.404625][ T38]
[ 1322.404633][ T38] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[ 1322.404645][ T38] INFO: task syz-executor:27704 blocked for more than 145 seconds.
[ 1322.404659][ T38] Not tainted syzkaller #0
[ 1322.404669][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1322.404679][ T38] task:syz-executor state:D stack:26816 pid:27704 tgid:27704 ppid:27703 task_flags:0x400140 flags:0x00004000
[ 1322.404724][ T38] Call Trace:
[ 1322.404731][ T38]
[ 1322.404744][ T38] __schedule+0x16f3/0x4c20
[ 1322.404796][ T38] ? __pfx___schedule+0x10/0x10
[ 1322.404838][ T38] ? _raw_spin_unlock_irq+0x23/0x50
[ 1322.404866][ T38] rt_mutex_schedule+0x77/0xf0
[ 1322.404884][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0
[ 1322.404906][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380
[ 1322.404947][ T38] rt_mutex_slowlock+0x2b1/0x6e0
[ 1322.404971][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0
[ 1322.404994][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10
[ 1322.405013][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.405047][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.405075][ T38] ? is_bpf_text_address+0x26/0x2b0
[ 1322.405103][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.405120][ T38] mutex_lock_nested+0x16a/0x1d0
[ 1322.405147][ T38] inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.405178][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1322.405217][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10
[ 1322.405236][ T38] rtnetlink_rcv_msg+0x7cf/0xb70
[ 1322.405260][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.405284][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70
[ 1322.405307][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.405347][ T38] netlink_rcv_skb+0x205/0x470
[ 1322.405368][ T38] ? __lock_acquire+0xab9/0xd20
[ 1322.405391][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 1322.405416][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 1322.405452][ T38] ? netlink_deliver_tap+0x2e/0x1b0
[ 1322.405484][ T38] netlink_unicast+0x843/0xa10
[ 1322.405515][ T38] ? __pfx_netlink_unicast+0x10/0x10
[ 1322.405540][ T38] ? netlink_sendmsg+0x642/0xb30
[ 1322.405561][ T38] ? skb_put+0x11b/0x210
[ 1322.405590][ T38] netlink_sendmsg+0x805/0xb30
[ 1322.405629][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.405661][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20
[ 1322.405680][ T38] ? __pfx_netlink_sendmsg+0x10/0x10
[ 1322.405705][ T38] __sock_sendmsg+0x21c/0x270
[ 1322.405731][ T38] __sys_sendto+0x3c7/0x520
[ 1322.405758][ T38] ? __pfx___sys_sendto+0x10/0x10
[ 1322.405810][ T38] ? exc_page_fault+0x76/0xf0
[ 1322.405838][ T38] ? do_user_addr_fault+0xc8a/0x1390
[ 1322.405864][ T38] __x64_sys_sendto+0xde/0x100
[ 1322.405893][ T38] do_syscall_64+0xfa/0x3b0
[ 1322.405910][ T38] ? lockdep_hardirqs_on+0x9c/0x150
[ 1322.405934][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.405954][ T38] ? clear_bhb_loop+0x60/0xb0
[ 1322.405977][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 1322.405995][ T38] RIP: 0033:0x7f4172b30d5c
[ 1322.406011][ T38] RSP: 002b:00007ffd01b6f450 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[ 1322.406030][ T38] RAX: ffffffffffffffda RBX: 00007f41738b4620 RCX: 00007f4172b30d5c
[ 1322.406044][ T38] RDX: 0000000000000028 RSI: 00007f41738b4670 RDI: 0000000000000003
[ 1322.406057][ T38] RBP: 0000000000000000 R08: 00007ffd01b6f4a4 R09: 000000000000000c
[ 1322.406070][ T38] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
[ 1322.406082][ T38] R13: 0000000000000000 R14: 00007f41738b4670 R15: 0000000000000000
[ 1322.406112][ T38]
[ 1322.406119][ T38] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[ 1322.406149][ T38]
[ 1322.406149][ T38] Showing all locks held in the system:
[ 1322.406158][ T38] 2 locks held by kthreadd/2:
[ 1322.406169][ T38] #0: ffffffff8dac5768 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60
[ 1322.406215][ T38] #1: ffff88801d291b58 (&n->list_lock){+.+.}-{3:3}, at: __slab_free+0x19e/0x390
[ 1322.406260][ T38] 3 locks held by kworker/0:1/10:
[ 1322.406271][ T38] #0: ffff888019898538 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.406318][ T38] #1: ffffc900000f7bc0 (deferred_process_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.406363][ T38] #2: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20
[ 1322.406407][ T38] 4 locks held by pr/legacy/17:
[ 1322.406420][ T38] 7 locks held by ktimers/1/29:
[ 1322.406430][ T38] 2 locks held by ksoftirqd/1/30:
[ 1322.406441][ T38] 1 lock held by khungtaskd/38:
[ 1322.406452][ T38] #0: ffffffff8d9a8dc0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180
[ 1322.406504][ T38] 4 locks held by kworker/0:2/990:
[ 1322.406518][ T38] 4 locks held by kworker/u8:6/1166:
[ 1322.406528][ T38] #0: ffff88801a6f4138 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.406574][ T38] #1: ffffc90004b3fbc0 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.406624][ T38] #2: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xf7/0x800
[ 1322.406672][ T38] #3: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: default_device_exit_batch+0xdc/0x890
[ 1322.406719][ T38] 3 locks held by kworker/u8:7/1173:
[ 1322.406731][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.406776][ T38] #1: ffffc90004c5fbc0 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.406821][ T38] #2: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60
[ 1322.406865][ T38] 2 locks held by aoe_tx0/1322:
[ 1322.406876][ T38] #0: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400
[ 1322.406920][ T38] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400
[ 1322.406977][ T38] 4 locks held by kworker/R-krxrp/3431:
[ 1322.406988][ T38] #0: ffff88814daad138 ((wq_completion)krxrpcd){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.407033][ T38] #1: ffffc9000d457ba0 ((work_completion)(&rxnet->peer_keepalive_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.407080][ T38] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400
[ 1322.407124][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400
[ 1322.407169][ T38] 3 locks held by kworker/u8:8/3500:
[ 1322.407180][ T38] #0: ffff88802fe69938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.407225][ T38] #1: ffffc9000d5c7bc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.407271][ T38] #2: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30
[ 1322.407318][ T38] 2 locks held by klogd/5193:
[ 1322.407328][ T38] #0: ffffffff8dac5768 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60
[ 1322.407383][ T38] #1: ffff88801d291b58 (&n->list_lock){+.+.}-{3:3}, at: __slab_free+0x19e/0x390
[ 1322.407425][ T38] 3 locks held by udevd/5204:
[ 1322.407437][ T38] 1 lock held by dhcpcd/5499:
[ 1322.407448][ T38] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.407493][ T38] 2 locks held by getty/5590:
[ 1322.407503][ T38] #0: ffff88823bf3a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70
[ 1322.407544][ T38] #1: ffffc90003e832e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x444/0x1410
[ 1322.407589][ T38] 5 locks held by kworker/u9:2/5835:
[ 1322.407605][ T38] #0: ffff888049b3b138 ((wq_completion)hci11){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.407650][ T38] #1: ffffc90004c9fbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.407696][ T38] #2: ffff888037c68e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0
[ 1322.407739][ T38] #3: ffff888037c680a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30
[ 1322.407786][ T38] #4: ffffffff8ee3b358 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310
[ 1322.407836][ T38] 4 locks held by kworker/0:4/5882:
[ 1322.407847][ T38] #0: ffff888019899138 ((wq_completion)events_long){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.407892][ T38] #1: ffffc90004fbfbc0 ((work_completion)(&(&ipvs->defense_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.407938][ T38] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400
[ 1322.407983][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400
[ 1322.408043][ T38] 5 locks held by kworker/u8:11/10123:
[ 1322.424660][ T38] 5 locks held by kworker/u8:13/18883:
[ 1322.424679][ T38] 5 locks held by kworker/u9:1/20123:
[ 1322.424691][ T38] #0: ffff888026ecc138 ((wq_completion)hci5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.424744][ T38] #1: ffffc9000455fbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.424790][ T38] #2: ffff88803aed0e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0
[ 1322.424834][ T38] #3: ffff88803aed00a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30
[ 1322.424880][ T38] #4: ffffffff8ee3b358 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310
[ 1322.424929][ T38] 6 locks held by kworker/u9:3/27344:
[ 1322.424940][ T38] #0: ffff888033b40138 ((wq_completion)hci4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.424985][ T38] #1: ffffc9001cf2fbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.425030][ T38] #2: ffff8880319b0e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0
[ 1322.425074][ T38] #3: ffff8880319b00a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30
[ 1322.425119][ T38] #4: ffffffff8ee3b358 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310
[ 1322.425164][ T38] #5: ffff888063982b58 (&conn->lock#2){+.+.}-{4:4}, at: l2cap_conn_del+0x70/0x680
[ 1322.425209][ T38] 2 locks held by syz-executor/27501:
[ 1322.425220][ T38] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
[ 1322.425266][ T38] #1: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: cangw_pernet_exit_batch+0x20/0x90
[ 1322.425311][ T38] 2 locks held by syz-executor/27505:
[ 1322.425322][ T38] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
[ 1322.425366][ T38] #1: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: cangw_pernet_exit_batch+0x20/0x90
[ 1322.425409][ T38] 2 locks held by syz-executor/27513:
[ 1322.425419][ T38] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
[ 1322.425464][ T38] #1: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: cangw_pernet_exit_batch+0x20/0x90
[ 1322.425507][ T38] 4 locks held by kworker/u9:4/27515:
[ 1322.425518][ T38] #0: ffff888028a59138 ((wq_completion)hci8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.425563][ T38] #1: ffffc90004d0fbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.425613][ T38] #2: ffff888076148e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0
[ 1322.425655][ T38] #3: ffff8880761480a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30
[ 1322.425702][ T38] 2 locks held by syz-executor/27519:
[ 1322.425712][ T38] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
[ 1322.425756][ T38] #1: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: cangw_pernet_exit_batch+0x20/0x90
[ 1322.425799][ T38] 5 locks held by kworker/u9:5/27520:
[ 1322.425810][ T38] #0: ffff88805f54c938 ((wq_completion)hci12){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.425855][ T38] #1: ffffc900062b7bc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.425899][ T38] #2: ffff88807d068e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0
[ 1322.425941][ T38] #3: ffff88807d0680a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30
[ 1322.425988][ T38] #4: ffffffff8ee3b358 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310
[ 1322.426037][ T38] 4 locks held by kworker/1:8/27591:
[ 1322.426048][ T38] 1 lock held by syz-executor/27597:
[ 1322.426059][ T38] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: __tun_chr_ioctl+0x37d/0x1df0
[ 1322.426101][ T38] 1 lock held by syz-executor/27600:
[ 1322.426112][ T38] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: rtnetlink_rcv_msg+0x71c/0xb70
[ 1322.426157][ T38] 2 locks held by syz-executor/27604:
[ 1322.426168][ T38] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
[ 1322.426213][ T38] #1: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: ip_tunnel_init_net+0x2ab/0x800
[ 1322.426258][ T38] 1 lock held by syz-executor/27607:
[ 1322.426269][ T38] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet6_rtm_newaddr+0x5b7/0xd20
[ 1322.426315][ T38] 5 locks held by syz-executor/27655:
[ 1322.426327][ T38] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
[ 1322.426370][ T38] #1: ffffffff8ea22de0 (devices_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x19a/0x270
[ 1322.426415][ T38] #2: ffffffff8ea23020 (rdma_nets_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x1d2/0x270
[ 1322.426458][ T38] #3: ffff8880291a1118 (&device->compat_devs_mutex){+.+.}-{4:4}, at: add_one_compat_dev+0xee/0x5c0
[ 1322.426503][ T38] #4: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: ib_get_eth_speed+0x151/0x7b0
[ 1322.426546][ T38] 1 lock held by syz-executor/27694:
[ 1322.426557][ T38] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.426604][ T38] 1 lock held by syz-executor/27699:
[ 1322.426615][ T38] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.426656][ T38] 1 lock held by syz-executor/27701:
[ 1322.426667][ T38] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.426709][ T38] 1 lock held by syz-executor/27704:
[ 1322.426720][ T38] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
[ 1322.426762][ T38] 6 locks held by kworker/u8:1/27707:
[ 1322.426773][ T38] #0: ffff88805a09a138 ((wq_completion)wg-kex-wg1#5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.426821][ T38] #1: ffffc90004677bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.426867][ T38] #2: ffff88805a1c15f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0
[ 1322.426913][ T38] #3: ffff8880397a4e20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0
[ 1322.426956][ T38] #4: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400
[ 1322.427000][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400
[ 1322.427044][ T38] 4 locks held by syz-executor/27709:
[ 1322.427055][ T38] 6 locks held by kworker/u8:10/27711:
[ 1322.427066][ T38] 5 locks held by kworker/u9:6/27712:
[ 1322.427077][ T38] #0: ffff88805cf9a138 ((wq_completion)hci10){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.427121][ T38] #1: ffffc90004a2fbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.427166][ T38] #2: ffff888031f94e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0
[ 1322.427208][ T38] #3: ffff888031f940a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30
[ 1322.427253][ T38] #4: ffffffff8ee3b358 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310
[ 1322.427299][ T38] 4 locks held by kworker/u8:12/27713:
[ 1322.427310][ T38] #0: ffff8880306ad138 ((wq_completion)bat_events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.427355][ T38] #1: ffffc900044efbc0 ((work_completion)(&(&bat_priv->tt.work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.427400][ T38] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400
[ 1322.427444][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400
[ 1322.427488][ T38] 4 locks held by kworker/u8:14/27714:
[ 1322.427499][ T38] #0: ffff88805a16c138 ((wq_completion)wg-kex-wg1#3){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
[ 1322.427546][ T38] #1: ffffc90003e3fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
[ 1322.427590][ T38] #2: ffffffff8d84a9a0 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400
[ 1322.427639][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400
[ 1322.427685][ T38] 2 locks held by syz-executor/27716:
[ 1322.427696][ T38] #0: ffffffff8dac5768 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60
[ 1322.427739][ T38] #1: ffff88801d291b58 (&n->list_lock){+.+.}-{3:3}, at: __slab_free+0x19e/0x390
[ 1322.427781][ T38]
[ 1322.427787][ T38] =============================================
[ 1322.427787][ T38]
[ 1322.427808][ T38] NMI backtrace for cpu 0
[ 1322.427823][ T38] CPU: 0 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)}
[ 1322.427844][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
[ 1322.427855][ T38] Call Trace:
[ 1322.427863][ T38]
[ 1322.427872][ T38] dump_stack_lvl+0x189/0x250
[ 1322.427900][ T38] ? __pfx_dump_stack_lvl+0x10/0x10
[ 1322.427924][ T38] ? __pfx__printk+0x10/0x10
[ 1322.427955][ T38] nmi_cpu_backtrace+0x39e/0x3d0
[ 1322.427980][ T38] ? __pfx_nmi_cpu_backtrace+0x10/0x10
[ 1322.428004][ T38] ? __pfx__printk+0x10/0x10
[ 1322.428027][ T38] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10
[ 1322.428050][ T38] nmi_trigger_cpumask_backtrace+0x17a/0x300
[ 1322.428074][ T38] watchdog+0xf93/0xfe0
[ 1322.428100][ T38] ? watchdog+0x1de/0xfe0
[ 1322.428128][ T38] kthread+0x711/0x8a0
[ 1322.428156][ T38] ? __pfx_watchdog+0x10/0x10
[ 1322.428175][ T38] ? __pfx_kthread+0x10/0x10
[ 1322.428204][ T38] ? __pfx_kthread+0x10/0x10
[ 1322.428228][ T38] ret_from_fork+0x436/0x7d0
[ 1322.428253][ T38] ? __pfx_ret_from_fork+0x10/0x10
[ 1322.428280][ T38] ? __switch_to_asm+0x39/0x70
[ 1322.428296][ T38] ? __switch_to_asm+0x33/0x70
[ 1322.428312][ T38] ? __pfx_kthread+0x10/0x10
[ 1322.428335][ T38] ret_from_fork_asm+0x1a/0x30
[ 1322.428367][ T38]
[ 1322.428375][ T38] Sending NMI from CPU 0 to CPUs 1:
[ 1322.428401][ C1] NMI backtrace for cpu 1
[ 1322.428415][ C1] CPU: 1 UID: 0 PID: 27591 Comm: kworker/1:8 Not tainted syzkaller #0 PREEMPT_{RT,(full)}
[ 1322.428434][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
[ 1322.428444][ C1] Workqueue: events ovs_dp_masks_rebalance
[ 1322.428467][ C1] RIP: 0010:rcu_is_watching+0x2e/0xb0
[ 1322.428489][ C1] Code: 41 57 41 56 53 65 ff 05 00 2b 51 10 e8 ab 35 52 09 89 c3 83 f8 08 73 65 49 bf 00 00 00 00 00 fc ff df 4c 8d 34 dd 10 2d 25 8d <4c> 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 0c 9d 78 00
[ 1322.428502][ C1] RSP: 0018:ffffc9000486f398 EFLAGS: 00000297
[ 1322.428516][ C1] RAX: 0000000000000001 RBX: 0000000000000001 RCX: 178a599129c80e00
[ 1322.428527][ C1] RDX: ffffc9000486f401 RSI: ffffffff8b621660 RDI: ffffffff8b621620
[ 1322.428539][ C1] RBP: dffffc0000000000 R08: ffffc9000486f9a0 R09: 0000000000000000
[ 1322.428551][ C1] R10: ffffc9000486f4d8 R11: fffff5200090de9d R12: ffffc9000486f9b0
[ 1322.428563][ C1] R13: ffffc90004868000 R14: ffffffff8d252d18 R15: dffffc0000000000
[ 1322.428576][ C1] FS: 0000000000000000(0000) GS:ffff8881269bc000(0000) knlGS:0000000000000000
[ 1322.428590][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1322.428601][ C1] CR2: 00007fe04c607ff8 CR3: 000000000d7a6000 CR4: 00000000003526f0
[ 1322.428616][ C1] Call Trace:
[ 1322.428623][ C1]
[ 1322.428630][ C1] ? unwind_next_frame+0xa5/0x2390
[ 1322.428649][ C1] unwind_next_frame+0x1965/0x2390
[ 1322.428671][ C1] ? unwind_next_frame+0xa5/0x2390
[ 1322.428690][ C1] ? __kmalloc_noprof+0x1a5/0x430
[ 1322.428711][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 1322.428728][ C1] arch_stack_walk+0x11c/0x150
[ 1322.428754][ C1] ? ovs_flow_masks_rebalance+0xf4/0xc30
[ 1322.428776][ C1] stack_trace_save+0x9c/0xe0
[ 1322.428791][ C1] ? __pfx_stack_trace_save+0x10/0x10
[ 1322.428812][ C1] save_stack+0xf7/0x1f0
[ 1322.428830][ C1] ? __pfx_save_stack+0x10/0x10
[ 1322.428846][ C1] ? __free_frozen_pages+0xb59/0xce0
[ 1322.428865][ C1] ? __slab_free+0x2db/0x390
[ 1322.428880][ C1] ? qlist_free_all+0x97/0x140
[ 1322.428895][ C1] ? kasan_quarantine_reduce+0x148/0x160
[ 1322.428911][ C1] ? __kasan_slab_alloc+0x22/0x80
[ 1322.428928][ C1] ? __kmalloc_noprof+0x1a5/0x430
[ 1322.428951][ C1] ? page_ext_put+0x97/0xc0
[ 1322.428971][ C1] __reset_page_owner+0x71/0x1f0
[ 1322.428989][ C1] __free_frozen_pages+0xb59/0xce0
[ 1322.429009][ C1] ? reacquire_held_locks+0x127/0x1d0
[ 1322.429031][ C1] ? __pfx___free_frozen_pages+0x10/0x10
[ 1322.429056][ C1] __slab_free+0x2db/0x390
[ 1322.429073][ C1] ? qlist_free_all+0x8c/0x140
[ 1322.429090][ C1] qlist_free_all+0x97/0x140
[ 1322.429108][ C1] kasan_quarantine_reduce+0x148/0x160
[ 1322.429126][ C1] __kasan_slab_alloc+0x22/0x80
[ 1322.429143][ C1] __kmalloc_noprof+0x1a5/0x430
[ 1322.429160][ C1] ? ovs_flow_masks_rebalance+0xf4/0xc30
[ 1322.429182][ C1] ovs_flow_masks_rebalance+0xf4/0xc30
[ 1322.429201][ C1] ? ovs_dp_masks_rebalance+0x56/0xe0
[ 1322.429221][ C1] ? kfree+0x195/0x550
[ 1322.429240][ C1] ovs_dp_masks_rebalance+0x56/0xe0
[ 1322.429258][ C1] ? process_scheduled_works+0x9ef/0x17b0
[ 1322.429276][ C1] process_scheduled_works+0xae1/0x17b0
[ 1322.429306][ C1] ? __pfx_process_scheduled_works+0x10/0x10
[ 1322.429354][ C1] worker_thread+0x8a0/0xda0
[ 1322.429383][ C1] kthread+0x711/0x8a0
[ 1322.429405][ C1] ? __pfx_worker_thread+0x10/0x10
[ 1322.429422][ C1] ? __pfx_kthread+0x10/0x10
[ 1322.429441][ C1] ? __pfx_kthread+0x10/0x10
[ 1322.429459][ C1] ret_from_fork+0x436/0x7d0
[ 1322.429477][ C1] ? __pfx_ret_from_fork+0x10/0x10
[ 1322.429498][ C1] ? __switch_to_asm+0x39/0x70
[ 1322.429512][ C1] ? __switch_to_asm+0x33/0x70
[ 1322.429525][ C1] ? __pfx_kthread+0x10/0x10
[ 1322.429544][ C1] ret_from_fork_asm+0x1a/0x30
[ 1322.429566][ C1]
[ 1322.480241][ T38] Kernel panic - not syncing: hung_task: blocked tasks
[ 1322.480262][ T38] CPU: 0 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)}
[ 1322.480285][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
[ 1322.480297][ T38] Call Trace:
[ 1322.480305][ T38]
[ 1322.480314][ T38] dump_stack_lvl+0x99/0x250
[ 1322.480344][ T38] ? __asan_memcpy+0x40/0x70
[ 1322.480364][ T38] ? __pfx_dump_stack_lvl+0x10/0x10
[ 1322.480388][ T38] ? __pfx__printk+0x10/0x10
[ 1322.480420][ T38] vpanic+0x281/0x750
[ 1322.480446][ T38] ? __pfx_vpanic+0x10/0x10
[ 1322.480469][ T38] ? preempt_schedule+0xae/0xc0
[ 1322.480494][ T38] ? preempt_schedule_common+0x83/0xd0
[ 1322.480525][ T38] panic+0xb9/0xc0
[ 1322.480547][ T38] ? __pfx_panic+0x10/0x10
[ 1322.480571][ T38] ? preempt_schedule_thunk+0x16/0x30
[ 1322.480603][ T38] ? nmi_trigger_cpumask_backtrace+0x2bb/0x300
[ 1322.480628][ T38] watchdog+0xfd2/0xfe0
[ 1322.480655][ T38] ? watchdog+0x1de/0xfe0
[ 1322.480681][ T38] kthread+0x711/0x8a0
[ 1322.480710][ T38] ? __pfx_watchdog+0x10/0x10
[ 1322.480730][ T38] ? __pfx_kthread+0x10/0x10
[ 1322.480759][ T38] ? __pfx_kthread+0x10/0x10
[ 1322.480783][ T38] ret_from_fork+0x436/0x7d0
[ 1322.480808][ T38] ? __pfx_ret_from_fork+0x10/0x10
[ 1322.480835][ T38] ? __switch_to_asm+0x39/0x70
[ 1322.480851][ T38] ? __switch_to_asm+0x33/0x70
[ 1322.480867][ T38] ? __pfx_kthread+0x10/0x10
[ 1322.480892][ T38] ret_from_fork_asm+0x1a/0x30
[ 1322.480924][ T38]
[ 1322.481184][ T38] Kernel Offset: disabled