last executing test programs: 4m50.259951873s ago: executing program 1 (id=10864): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='mpol=prefer=']) 4m49.942838105s ago: executing program 1 (id=10867): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x40, 0x1, 0x4, 0x201, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0xa6}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1000}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xf2b}, @NFULA_CFG_MODE={0xa, 0x2, {0x7ff, 0x2}}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000) 4m49.426630135s ago: executing program 1 (id=10869): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="0100"}) 4m48.984859002s ago: executing program 1 (id=10870): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) 4m48.869748868s ago: executing program 3 (id=10872): mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x8000) mount(&(0x7f0000000580)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)='xfs\x00', 0x10000, &(0x7f0000000080)='norecovery') 4m48.644725574s ago: executing program 1 (id=10874): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000100007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000005e00000095"], &(0x7f0000000ac0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00}, 0x94) 4m48.470431507s ago: executing program 3 (id=10877): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)={0x2, 0x12, 0x0, 0x0, 0x2, 0x0, 0x70bd2c}, 0x10}}, 0x0) 4m48.253779798s ago: executing program 1 (id=10880): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f00000002c0)={0x3c0, 0xa0, 0x3c0, 0xf0, 0x0, 0x2, 0x8, 0x3ffe, {0xbab5, 0x8000, 0x1}, {0x7f, 0x40}, {0x2, 0x80000000, 0x1}, {0xfbfffffd, 0x8, 0x1}, 0x0, 0x1, 0x5, 0xe, 0x1, 0x6, 0x101, 0x80000001, 0x1, 0xe000000, 0x2, 0x9, 0x26, 0x2, 0x3, 0x7}) 4m48.07894961s ago: executing program 3 (id=10881): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @limit={{0xa}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x7}, @NFTA_LIMIT_UNIT={0xc, 0x2, 0x1, 0x0, 0x971a}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x6}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0xe0}}, 0x0) 4m47.684542541s ago: executing program 3 (id=10885): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_NUM_RX_QUEUES={0x8}]}, 0x3c}}, 0x0) 4m47.381525837s ago: executing program 3 (id=10888): mlockall(0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) 4m45.520395559s ago: executing program 3 (id=10907): r0 = openat$vcs(0xffffff9c, &(0x7f00000010c0), 0x2000, 0x0) close_range(r0, r0, 0x0) 4m33.862454229s ago: executing program 32 (id=10880): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f00000002c0)={0x3c0, 0xa0, 0x3c0, 0xf0, 0x0, 0x2, 0x8, 0x3ffe, {0xbab5, 0x8000, 0x1}, {0x7f, 0x40}, {0x2, 0x80000000, 0x1}, {0xfbfffffd, 0x8, 0x1}, 0x0, 0x1, 0x5, 0xe, 0x1, 0x6, 0x101, 0x80000001, 0x1, 0xe000000, 0x2, 0x9, 0x26, 0x2, 0x3, 0x7}) 4m29.639671988s ago: executing program 33 (id=10907): r0 = openat$vcs(0xffffff9c, &(0x7f00000010c0), 0x2000, 0x0) close_range(r0, r0, 0x0) 1m3.42680644s ago: executing program 4 (id=12879): r0 = syz_io_uring_setup(0x880, &(0x7f0000000140)={0x0, 0xbee2, 0x0, 0x2, 0x3fdffffc}, &(0x7f00000000c0), &(0x7f0000000000)) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x2, &(0x7f0000006680)) io_uring_enter(r0, 0x7323, 0x0, 0x5, 0x0, 0x0) 1m2.013194158s ago: executing program 4 (id=12884): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000680), 0x1800, r0}, 0x38) 1m1.879119748s ago: executing program 0 (id=12885): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x48802) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x40002006}) 1m0.939552591s ago: executing program 0 (id=12889): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)={0x2c, r1, 0x801, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24008000}, 0x2400c000) 1m0.70266594s ago: executing program 4 (id=12891): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c40)={{0x14}, [@NFT_MSG_NEWRULE={0x27c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x23c, 0x4, 0x0, 0x1, [{0x238, 0x1, 0x0, 0x1, @match={{0xa}, @val={0x228, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_MATCH_INFO={0x214, 0x3, "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"}, @NFTA_MATCH_NAME={0x8, 0x1, 'bpf\x00'}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x8864}, @NFTA_RULE_COMPAT_FLAGS={0x4, 0x2, 0x1, 0x0, 0x2}]}]}], {0x14}}, 0x2a4}}, 0x4048010) 1m0.037655591s ago: executing program 0 (id=12893): syz_open_dev$ttys(0xc, 0x2, 0x1) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)) 59.363643544s ago: executing program 0 (id=12896): r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x20020009, 0x0, &(0x7f0000000240)={0x20, 0x0, 0xfffc, 0x360, 0x7}, 0x1a, 0x7, 0x60000000, 0x0, 0x4, 0x101, 0x0}) 58.668080141s ago: executing program 0 (id=12898): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000b40)={0x38, r1, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x38}}, 0x0) 48.547134184s ago: executing program 4 (id=12905): ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000000)={[{0x4, 0x200, 0x8, 0x4f, 0x81, 0x7, 0xc0, 0x1, 0xff, 0x6, 0xc, 0x4, 0x9}, {0x8, 0xaff3, 0x0, 0x8, 0x4, 0x1, 0x8, 0x3, 0x4, 0x53, 0x1, 0x6, 0x10005}, {0x0, 0x7, 0x10, 0x10, 0x25, 0x2, 0x0, 0xfb, 0x4, 0x15, 0x1, 0x3, 0x40000000000002}], 0x9}) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5393, &(0x7f0000000000)) 48.542877631s ago: executing program 0 (id=12908): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x141800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, 0x0) 48.477147858s ago: executing program 4 (id=12910): syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r0, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) 48.452005371s ago: executing program 2 (id=12911): r0 = socket$kcm(0x29, 0x2, 0x0) write$cgroup_pressure(r0, &(0x7f0000000140)={'some', 0x20, 0x8, 0x20, 0x20000001}, 0x2f) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x20000818) 48.247922791s ago: executing program 6 (id=12912): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) 47.79913902s ago: executing program 2 (id=12914): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x10, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000005000000000000008000000018000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 47.755268116s ago: executing program 4 (id=12915): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000540)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x88, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x5c, 0x4, 0x0, 0x1, [{0x58, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x48, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0x2c, 0x3, "7339f2f10461afb9fdd672bad09dfb78c7699c74e891a0c700"/40}, @NFTA_TARGET_REV={0x8}, @NFTA_TARGET_NAME={0xe, 0x1, 'IDLETIMER\x00'}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xb0}, 0x1, 0x0, 0x0, 0x4000850}, 0x20040040) 47.235569922s ago: executing program 2 (id=12916): r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in=@private=0xa010101, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xe, 0x8}, 0x0, 0x0, 0x1}, {{@in=@private=0xa010101, 0x0, 0x33}, 0x0, @in=@dev, 0x200, 0x0, 0x0, 0x7, 0x0, 0xfffffffe}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev={0xac, 0x14, 0x14, 0x39}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x4d3, 0x33}, 0x0, @in6=@remote, 0xfffffffe}}, 0xe8) 47.175840885s ago: executing program 6 (id=12917): setitimer(0x2, &(0x7f0000000580)={{0x77359400}, {0x0, 0xea60}}, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffffff}, 0x0) mlockall(0x7) 46.493851094s ago: executing program 2 (id=12918): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x34, r1, 0x1, 0x0, 0x0, {0x2, 0x2, 0x2}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x34}, 0x1, 0x40030000000000, 0x0, 0x40084}, 0x0) 46.281359173s ago: executing program 6 (id=12919): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x38, r1, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@GTPA_LINK={0x8}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_VERSION={0x8}, @GTPA_FLOW={0x6, 0x6, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 46.116467169s ago: executing program 2 (id=12920): shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='numa_maps\x00') lseek(r0, 0x1000000, 0x0) 45.920021044s ago: executing program 6 (id=12921): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/partitions\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000023896) 45.45777926s ago: executing program 2 (id=12923): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) sendmmsg(r0, &(0x7f0000006a80)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="e7fd46ff0d9249b75e162f3e0c7bc89aa72f0804d3286db7266ffbba479ee55cf05f311693ba31957261714b0e3af87ae1689eaa665b91d7b5", 0x39}, {0x0}], 0x2}}], 0x1, 0x804) 45.201588861s ago: executing program 6 (id=12924): r0 = fanotify_init(0x8, 0x40000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) fanotify_mark(r0, 0x1, 0x100018, r1, 0x0) 44.552480764s ago: executing program 5 (id=12926): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010020bd7000fbdbdf2526000000180001801400020064756d6d7930"], 0x2c}}, 0x20000000) 44.299143903s ago: executing program 6 (id=12927): r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000000c0)) 44.04213635s ago: executing program 5 (id=12928): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x12ba, 0x100, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000000c0)={0x2c, &(0x7f0000000100)={0x0, 0x0, 0x8, {0x8, 0x0, "392cdaab4a73"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 41.785418817s ago: executing program 5 (id=12929): r0 = memfd_create(&(0x7f00000005c0)='\x103q}2[\xe0\x9a\xee\xaf\x03\x97\x9et\v\"|Ma\x86\xe7\xc0\x14\x9f\xb9h\xb1\x96\xe7=I\x860S6\xb5\xa8\xc2\x95Je%\xfeG\'\b\x00\x00\x00\x00\x00\x00\x00\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94k\xcd\t\x00\x90k\xd6\x05\xb6&\xd0\x9daA\xc5\x9c_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2Oc\xc0c\x03gB!\xb0\xb8n\x01\x9bT\x95\x10\x86\xe8$\x7f\r[\xf9\x0e1v\xb1\n\x88\v\x95uy\xb5:`\x8b\nC\x18A;\xaa%\xaf\xc7\xa3\xac\xa2D\xb5\xe2\xe1\xdc(\xfd\x05\x9fB\x84O\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\xa0\x17\xe3\xac\xe9\xc9\xa7\x8a\x1b\x03\"&\xac\xcap>\xccZ\x01\xbc\x18\xc1\xb9\xe9\v\x8b\x9c\xb4Q\xd4\x96EV<>\x99\xca\xb3\xe0\xc4tL\xed\xf5W\xbd#\xcf\x8a\x84\xed\x9f/\xd4\xbb\xea;-Dp\xf8\xd0F\x90\xf8\x92Ip6\xf4\x16\xe8\x14\xe0\x92!\x92-F\xe2\x14D\x91\xa8b\x04\xdd\x1d\a\xdc\xe0\x18\x85{\x80Q\xf6k\x96\xfaQ\x9fW\vO\xf0\xe4O\\\xceS\xe2\x05\x049d\x06#\x88\xc3\xdf\x85O\x1c\xc3\xad?r\xd7\x0e\x00\xd7\x83\xb0\x88\x9c\xf6Y-F\x98\xdd\x9c~\xfd\x95\xc3\xb6lC\xaa\"Y\xa2K\xecz\x84:*\xf5Y\xd1\x9b1\xbd\x9b\x15\xd4\xec\x02o\x01&\xaa\x90w\xc4\xc7\x8en\xb5\x1ag\xab&?\xbe\xcb\xe8v\xa8\xe0\xa4\x81sW\xacf\x149\xd2}\xef\x03Ga\x9a$4\x8c\xa5!p\x83\x05\x96%\x02%\xabj\n\b\xc8NC\x91}&y\xd3\xe1\xeep\'\xc5\xab\x19GsX5\x8c\n\x9fh\xee;4\xb1%V\xe0\xa9\x8e\xf30:\xd8\x18N~G\x139\xcaf2\x02F1\xc6\x82\x00E\xae\x9d\x17\x871N:\xb4\xea \x8e\xdelP\x83\x1f\'\xe2\xd6\xc0\xc3\xfc\xc9677u\xf3RUP@o>\xee\xb8\xa3\t\x02\xb7\\,\xebK\xed\x1b\xc9e\xb3\x16\xce\x9bI\xdb\xfa\x82\x85\t\x9bg\xd0s\xe2\f{\x8cp~;\xf8\x96\xf2\x91\x06\x89\xa6D\xce\xac\x03\xc1\x83\xd1\xe6 |\xa75\xd7\x80t\xfc\xf8\xd2\x12N\x1cB7^\xfd4\xae\xb0VFw\b!\xae\x1baTv\xc0z\x19\xc5\xc8w\xba\x97N\x9a`\x8f\xfc\x9ee\xf9\x00\x1cQA\x14]\r\xd4\"\xc2\x12GD\xdb{\x88\xaa\x81\xc8\xa2\xdeI\xa2\xbel\x0e\xec\x17fNI\x05\xff\x8d\xf4_\x1a\vqA\xb7\x0ed<\x98\xee\xb8\x19\xec\x9f\xee\xe1_\xacG\x8b\xa3\xc3\x13\x80\x0f\xf4I\xdeAwG\xbdkno\xa2\b\x126\x97\x9b\xf9|P\xd94\v\x15\xcb\xc0\x9d\x11\xf3\x18\xae!2\x1b\x12\xa9\xc8~\xb7S\x94\xb5\xc7;\xa90D>s\xe9\xa4N\xf8\xdb\xab\xa0\x94~\xa1]b\xa4\xe5\xe2e\x1c\x8b\xd2\xc7Md\x93\x02\xd8\xb0,\xeb\x03\xaa\v\xed\x9bR\x8a\x80\xc2\x1f\x17ej\x973wv\x83a\xe06\x96\xde\xbc%Uh;H\xf8S\xf1\xa1g\x02\xc4\xc3\xa4\xa8\x96\t\xfex\xa2?\xcb\\Y\x1e\xfe\xca\xa0i\x80O\x11\xac\xb7$\xdb\xbc\xb0\xcb\xacqU\xb5*\x00\x00\x00\x00\x00\x00\x00\f\xda\xf8oV\x89\xd3\x1f\x99+\xe5T\x8eM4\x1c\xc6\x7f\xd4\xf2\xcc\xd3\x94\xca\xd4\x00\x00\x00\x00\x00\x00\x00\x00\x00~A9\xf6IBu2L\x9e\xa2\xd0\x92\xd1\xbc\xb8\tJ\xa1\aN\x87\x95\xbb\xa9s\xab\x90\x06\xc6!p\x9e?~\xf9\xe6\xae*\v\xa3\xd9gxKN\'z]*\x93\xf7\b\x91\xd0\xff\xd9\xc6a\xb5q\x9c\xa1Go\xd58\x93\xe0,\x9f\xe4\xa9\xd9A\x9e\x95e\x98\xd0V\x9d\xed\x97\xf1\xc5\xce\xf5\x90!d\x9a\xd8\x10\xbbx\r8\xff\x8bNUK\xebA\xe5\x92f\xc4\xd1\xa8\x15\xbf\xb5iW\xdb.kbf*\x89\xf0\xecq m-~\xbbf?\xec=\xd2\xe2\x1e\x8d/o\xcd\xc8x\xdb\xe6\xd0W\xca\xc5kz\x8e9\xfa\x86\x0f\x96p', 0x3) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}) fcntl$addseals(r0, 0x409, 0xb) 40.591429743s ago: executing program 5 (id=12930): r0 = syz_io_uring_setup(0x24fc, &(0x7f0000000400)={0x0, 0x2008b1d, 0x10100, 0x0, 0xfffffffc}, &(0x7f00000003c0)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_OPENAT2={0x1c, 0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000240)={0x700400, 0x82, 0x2}, 0x0, 0x18, 0x0, 0x12345}) io_uring_enter(r0, 0x1066, 0x0, 0x0, 0x0, 0x0) 40.348596807s ago: executing program 5 (id=12931): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000180)={0x34, r1, 0x1, 0x0, 0x0, {0x54}, [@nsim={{0xe, 0x2}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 40.096763936s ago: executing program 5 (id=12932): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x3c, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_MEMORY={0x8, 0xa, 0x1bd}]}}]}, 0x3c}}, 0x0) 0s ago: executing program 34 (id=12908): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x141800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, 0x0) kernel console output (not intermixed with test programs): _permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1025.346771][ T37] audit: type=1400 audit(2000000524.553:309885): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1025.346808][ T37] audit: type=1400 audit(2000000524.553:309886): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1025.346840][ T37] audit: type=1400 audit(2000000524.553:309887): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" name="2638" dev="tmpfs" ino=13241 [ 1025.347259][ T37] audit: type=1400 audit(2000000524.553:309888): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" path="/2638" dev="tmpfs" ino=13241 [ 1025.347302][ T37] audit: type=1400 audit(2000000524.553:309889): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" path="/2638" dev="tmpfs" ino=13241 [ 1025.347339][ T37] audit: type=1400 audit(2000000524.553:309890): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1025.347375][ T37] audit: type=1400 audit(2000000524.553:309891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1025.347412][ T37] audit: type=1400 audit(2000000524.553:309892): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="2638" dev="tmpfs" ino=13241 [ 1025.347452][ T37] audit: type=1400 audit(2000000524.553:309893): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1025.955819][T18880] Bluetooth: hci2: command 0x0406 tx timeout [ 1026.475546][T32625] ieee802154 phy1 wpan1: encryption failed: -22 [ 1027.003426][T32641] netlink: 276 bytes leftover after parsing attributes in process `syz.4.12567'. [ 1027.292153][T32648] [U] ^C [ 1027.698915][T32664] netlink: 24 bytes leftover after parsing attributes in process `syz.5.12577'. [ 1028.370741][T32686] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12589'. [ 1028.647561][T32697] A link change request failed with some changes committed already. Interface vlan0 may have been left with an inconsistent configuration, please check. [ 1029.397264][T32719] netlink: 224 bytes leftover after parsing attributes in process `syz.5.12604'. [ 1029.773877][T32732] netlink: 28 bytes leftover after parsing attributes in process `syz.6.12612'. [ 1030.072505][T32737] libceph: resolve '4' (ret=-3): failed [ 1030.089923][T32740] netlink: 'syz.5.12615': attribute type 10 has an invalid length. [ 1030.089946][T32740] netlink: 40 bytes leftover after parsing attributes in process `syz.5.12615'. [ 1030.089993][T32740] batadv0: entered promiscuous mode [ 1030.090015][T32740] batadv0: entered allmulticast mode [ 1030.091130][T32740] bridge0: port 3(batadv0) entered blocking state [ 1030.091288][T32740] bridge0: port 3(batadv0) entered disabled state [ 1030.096222][T32740] bridge0: port 3(batadv0) entered blocking state [ 1030.096382][T32740] bridge0: port 3(batadv0) entered forwarding state [ 1030.148279][ T37] kauditd_printk_skb: 19169 callbacks suppressed [ 1030.148296][ T37] audit: type=1400 audit(2000000529.592:323051): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32741 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1030.148343][ T37] audit: type=1400 audit(2000000529.592:323052): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32741 comm="syz-executor" name="/" dev="proc" ino=1 [ 1030.148384][ T37] audit: type=1400 audit(2000000529.592:323053): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32741 comm="syz-executor" name="/" dev="proc" ino=1 [ 1030.148426][ T37] audit: type=1400 audit(2000000529.592:323054): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32741 comm="syz-executor" name="5147" dev="proc" ino=99397 [ 1030.148467][ T37] audit: type=1400 audit(2000000529.592:323055): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=32741 comm="syz-executor" name="oom_score_adj" dev="proc" ino=99398 [ 1030.148509][ T37] audit: type=1400 audit(2000000529.592:323056): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32741 comm="syz-executor" path="/proc/5147/oom_score_adj" dev="proc" ino=99398 [ 1030.148558][ T37] audit: type=1400 audit(2000000529.603:323057): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32741 comm="syz-executor" name="2555" dev="tmpfs" ino=12840 [ 1030.148600][ T37] audit: type=1400 audit(2000000529.603:323058): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32741 comm="syz-executor" name="2555" dev="tmpfs" ino=12840 [ 1030.148658][ T5209] audit: audit_lost=54430 audit_rate_limit=0 audit_backlog_limit=64 [ 1030.148673][ T5209] audit: backlog limit exceeded [ 1030.461227][ T2243] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1030.461248][ T2243] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1030.845140][T29770] Bluetooth: hci4: command 0x0406 tx timeout [ 1031.529371][ T9] usb 3-1: new high-speed USB device number 37 using dummy_hcd [ 1031.672027][ T9] usb 3-1: Using ep0 maxpacket: 16 [ 1031.675858][ T9] usb 3-1: config 1 has an invalid descriptor of length 171, skipping remainder of the config [ 1031.675892][ T9] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1031.706071][ T9] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1031.706101][ T9] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1031.706123][ T9] usb 3-1: Product: syz [ 1031.706138][ T9] usb 3-1: Manufacturer: syz [ 1031.706153][ T9] usb 3-1: SerialNumber: syz [ 1031.997658][ T9] usb 3-1: 0:2 : does not exist [ 1031.997765][ T9] usb 3-1: unit 9 not found! [ 1032.132592][ T9] usb 3-1: USB disconnect, device number 37 [ 1032.282679][T12045] usb 1-1: new high-speed USB device number 49 using dummy_hcd [ 1032.283194][T30502] udevd[30502]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1032.447516][T12045] usb 1-1: config index 0 descriptor too short (expected 23569, got 27) [ 1032.447577][T12045] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1032.458572][T12045] usb 1-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 1032.458602][T12045] usb 1-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 1032.458622][T12045] usb 1-1: Manufacturer: syz [ 1032.477337][T12045] usb 1-1: config 0 descriptor?? [ 1032.605282][T12045] rc_core: IR keymap rc-hauppauge not found [ 1032.605316][T12045] Registered IR keymap rc-empty [ 1032.617875][T12045] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0 [ 1032.632858][T12045] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0/input84 [ 1032.645433][ T338] openvswitch: netlink: IP tunnel dst address not specified [ 1032.792022][ C0] igorplugusb 1-1:0.0: Error: urb status = -32 [ 1032.795850][ T6099] usb 1-1: USB disconnect, device number 49 [ 1033.884758][ T376] netlink: 24 bytes leftover after parsing attributes in process `syz.5.12667'. [ 1034.560736][ T399] netlink: 7 bytes leftover after parsing attributes in process `syz.6.12677'. [ 1034.700830][T12045] usb 6-1: new high-speed USB device number 7 using dummy_hcd [ 1034.713292][ T403] PKCS8: Unsupported PKCS#8 version [ 1034.843829][T12045] usb 6-1: Using ep0 maxpacket: 32 [ 1034.847596][T12045] usb 6-1: New USB device found, idVendor=0ac8, idProduct=0321, bcdDevice=6f.be [ 1034.847627][T12045] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1034.901452][T12045] usb 6-1: config 0 descriptor?? [ 1034.920637][ T37] kauditd_printk_skb: 20909 callbacks suppressed [ 1034.920655][ T37] audit: type=1400 audit(2000000534.600:337026): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1034.920698][ T37] audit: type=1400 audit(2000000534.600:337027): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="platform" dev="sysfs" ino=36 [ 1034.920741][ T37] audit: type=1400 audit(2000000534.600:337028): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="dummy_hcd.5" dev="sysfs" ino=26481 [ 1034.920781][ T37] audit: type=1400 audit(2000000534.600:337029): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="usb6" dev="sysfs" ino=26510 [ 1034.920822][ T37] audit: type=1400 audit(2000000534.600:337030): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="6-1" dev="sysfs" ino=291370 [ 1034.920869][ T37] audit: type=1400 audit(2000000534.610:337031): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="/" dev="sda1" ino=2 [ 1034.920908][ T37] audit: type=1400 audit(2000000534.610:337032): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="/" dev="sysfs" ino=1 [ 1034.920945][ T37] audit: type=1400 audit(2000000534.610:337033): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1034.920997][ T37] audit: type=1400 audit(2000000534.610:337034): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="platform" dev="sysfs" ino=36 [ 1034.921036][ T37] audit: type=1400 audit(2000000534.610:337035): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="dummy_hcd.5" dev="sysfs" ino=26481 [ 1034.924919][T12045] gspca_main: vc032x-2.14.0 probing 0ac8:0321 [ 1035.165592][ T411] vivid-000: ================= START STATUS ================= [ 1035.165614][ T411] vivid-000: Radio HW Seek Mode: Bounded [ 1035.165637][ T411] vivid-000: Radio Programmable HW Seek: false [ 1035.165656][ T411] vivid-000: RDS Rx I/O Mode: Block I/O [ 1035.165675][ T411] vivid-000: Generate RBDS Instead of RDS: false [ 1035.165693][ T411] vivid-000: RDS Reception: true [ 1035.165712][ T411] vivid-000: RDS Program Type: 0 inactive [ 1035.165734][ T411] vivid-000: RDS PS Name: inactive [ 1035.165754][ T411] vivid-000: RDS Radio Text: inactive [ 1035.165774][ T411] vivid-000: RDS Traffic Announcement: false inactive [ 1035.165805][ T411] vivid-000: RDS Traffic Program: false inactive [ 1035.165827][ T411] vivid-000: RDS Music: false inactive [ 1035.165851][ T411] vivid-000: ================== END STATUS ================== [ 1035.372593][ T414] befs: (nullb0): invalid magic header [ 1035.373727][T12045] gspca_vc032x: reg_w err -71 [ 1035.373742][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373752][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373762][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373771][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373779][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373789][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373798][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373808][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373818][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373826][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373835][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373844][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373854][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373863][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373872][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373881][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373890][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373899][T12045] gspca_vc032x: I2c Bus Busy Wait 00 [ 1035.373908][T12045] gspca_vc032x: Unknown sensor... [ 1035.373992][T12045] vc032x 6-1:0.0: probe with driver vc032x failed with error -22 [ 1035.407279][T12045] usb 6-1: USB disconnect, device number 7 [ 1036.444146][T12045] usb 7-1: new high-speed USB device number 6 using dummy_hcd [ 1036.588729][T12045] usb 7-1: Using ep0 maxpacket: 16 [ 1036.597492][T12045] usb 7-1: config 0 has an invalid interface number: 35 but max is 0 [ 1036.597519][T12045] usb 7-1: config 0 has no interface number 0 [ 1036.597571][T12045] usb 7-1: config 0 interface 35 altsetting 0 endpoint 0xE has an invalid bInterval 0, changing to 7 [ 1036.597597][T12045] usb 7-1: config 0 interface 35 altsetting 0 endpoint 0xE has invalid wMaxPacketSize 0 [ 1036.621996][T12045] usb 7-1: New USB device found, idVendor=07d0, idProduct=4101, bcdDevice=ec.5c [ 1036.622027][T12045] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1036.622047][T12045] usb 7-1: Product: syz [ 1036.622062][T12045] usb 7-1: Manufacturer: syz [ 1036.622076][T12045] usb 7-1: SerialNumber: syz [ 1036.651223][T12045] usb 7-1: config 0 descriptor?? [ 1036.702231][T12045] cypress_m8 7-1:0.35: Nokia CA-42 V2 Adapter converter detected [ 1036.924299][T12045] usb 7-1: Nokia CA-42 V2 Adapter converter now attached to ttyUSB0 [ 1037.124427][T12045] usb 7-1: USB disconnect, device number 6 [ 1037.164609][T12045] nokiaca42v2 ttyUSB0: Nokia CA-42 V2 Adapter converter now disconnected from ttyUSB0 [ 1037.165397][T12045] cypress_m8 7-1:0.35: device disconnected [ 1037.306791][ T470] netlink: 'syz.2.12713': attribute type 11 has an invalid length. [ 1037.560917][ T480] netlink: 12 bytes leftover after parsing attributes in process `syz.2.12718'. [ 1037.791718][ T489] openvswitch: netlink: Unexpected mask (mask=40040, allowed=10048) [ 1038.148852][ T6069] usb 7-1: new high-speed USB device number 7 using dummy_hcd [ 1038.311377][ T6069] usb 7-1: Using ep0 maxpacket: 8 [ 1038.315195][ T6069] usb 7-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1038.315255][ T6069] usb 7-1: New USB device found, idVendor=046d, idProduct=0892, bcdDevice=6d.2a [ 1038.315277][ T6069] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1038.361154][ T6069] usb 7-1: config 0 descriptor?? [ 1038.383947][ T6069] gspca_main: vc032x-2.14.0 probing 046d:0892 [ 1038.789151][ T6069] gspca_vc032x: reg_w err -71 [ 1038.789244][ T6069] vc032x 7-1:0.0: probe with driver vc032x failed with error -71 [ 1038.818674][ T6069] usb 7-1: USB disconnect, device number 7 [ 1039.350376][ T538] netlink: 'syz.5.12746': attribute type 3 has an invalid length. [ 1039.350404][ T538] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.12746'. [ 1039.387805][ T6069] usb 1-1: new high-speed USB device number 50 using dummy_hcd [ 1039.471195][ T542] netlink: 'syz.5.12750': attribute type 4 has an invalid length. [ 1039.543598][ T6069] usb 1-1: config 0 has an invalid interface number: 117 but max is 0 [ 1039.543627][ T6069] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1039.543647][ T6069] usb 1-1: config 0 has no interface number 0 [ 1039.543703][ T6069] usb 1-1: config 0 interface 117 altsetting 0 endpoint 0x88 has invalid wMaxPacketSize 0 [ 1039.543729][ T6069] usb 1-1: config 0 interface 117 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1039.605523][ T6069] usb 1-1: New USB device found, idVendor=0afa, idProduct=03e8, bcdDevice=99.d0 [ 1039.605554][ T6069] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1039.605574][ T6069] usb 1-1: Product: syz [ 1039.605588][ T6069] usb 1-1: Manufacturer: syz [ 1039.605603][ T6069] usb 1-1: SerialNumber: syz [ 1039.680133][ T6069] usb 1-1: config 0 descriptor?? [ 1039.705141][ T37] kauditd_printk_skb: 15822 callbacks suppressed [ 1039.705160][ T37] audit: type=1400 audit(2000000539.607:349071): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="/" dev="sysfs" ino=1 [ 1039.705205][ T37] audit: type=1400 audit(2000000539.607:349072): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=531 comm="syz.0.12744" path="/dev/raw-gadget" dev="devtmpfs" ino=815 [ 1039.705246][ T37] audit: type=1400 audit(2000000539.607:349073): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=531 comm="syz.0.12744" path="/dev/raw-gadget" dev="devtmpfs" ino=815 [ 1039.705289][ T37] audit: type=1400 audit(2000000539.607:349074): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1039.705330][ T37] audit: type=1400 audit(2000000539.607:349075): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="platform" dev="sysfs" ino=36 [ 1039.705368][ T37] audit: type=1400 audit(2000000539.607:349076): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="dummy_hcd.0" dev="sysfs" ino=25706 [ 1039.705409][ T37] audit: type=1400 audit(2000000539.607:349077): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="usb1" dev="sysfs" ino=25735 [ 1039.705446][ T37] audit: type=1400 audit(2000000539.607:349078): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=30676 comm="udevd" name="1-1" dev="sysfs" ino=291792 [ 1039.705486][ T37] audit: type=1400 audit(2000000539.607:349079): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=30676 comm="udevd" name="uevent" dev="sysfs" ino=291793 [ 1039.705524][ T37] audit: type=1400 audit(2000000539.607:349080): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=30676 comm="udevd" path="/sys/devices/platform/dummy_hcd.0/usb1/1-1/uevent" dev="sysfs" ino=291793 [ 1040.128226][ T6069] usbtouchscreen 1-1:0.117: probe with driver usbtouchscreen failed with error -71 [ 1040.154631][ T6069] usb 1-1: USB disconnect, device number 50 [ 1040.241925][ T561] geneve2: entered promiscuous mode [ 1040.241955][ T561] geneve2: entered allmulticast mode [ 1040.495917][ T568] netlink: 'syz.6.12760': attribute type 21 has an invalid length. [ 1040.569602][ T568] netlink: 132 bytes leftover after parsing attributes in process `syz.6.12760'. [ 1041.371425][ T589] netlink: 16 bytes leftover after parsing attributes in process `syz.4.12772'. [ 1041.432938][ T591] netlink: 'syz.0.12771': attribute type 1 has an invalid length. [ 1041.432960][ T591] netlink: 224 bytes leftover after parsing attributes in process `syz.0.12771'. [ 1041.432991][ T591] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12771'. [ 1042.073198][ T609] cifs: Unknown parameter 'no'aN[Gzob,er;%j [ 1042.073198][ T609] z,@qJ#"h/.W1ȱnNC"C<+`#k' [ 1042.103904][ T608] overlayfs: overlapping lowerdir path [ 1043.476078][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.477503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.478235][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.478985][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.479723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.480472][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.481101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.481863][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.482504][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.483246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1043.712221][ T651] Process accounting resumed [ 1044.169661][ T6069] usb 5-1: new high-speed USB device number 47 using dummy_hcd [ 1044.341047][ T6069] usb 5-1: Using ep0 maxpacket: 32 [ 1044.345141][ T6069] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1044.403488][ T6069] usb 5-1: New USB device found, idVendor=0ccd, idProduct=0039, bcdDevice=a6.13 [ 1044.403519][ T6069] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1044.403540][ T6069] usb 5-1: Product: syz [ 1044.403554][ T6069] usb 5-1: Manufacturer: syz [ 1044.403569][ T6069] usb 5-1: SerialNumber: syz [ 1044.489832][ T671] audit_log_start: 12601 callbacks suppressed [ 1044.489850][ T671] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1044.489862][ T671] audit: audit_lost=58836 audit_rate_limit=0 audit_backlog_limit=64 [ 1044.489876][ T671] audit: backlog limit exceeded [ 1044.490076][ T671] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1044.490089][ T671] audit: audit_lost=58837 audit_rate_limit=0 audit_backlog_limit=64 [ 1044.490103][ T671] audit: backlog limit exceeded [ 1044.490380][ T671] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1044.490393][ T671] audit: audit_lost=58838 audit_rate_limit=0 audit_backlog_limit=64 [ 1044.490406][ T671] audit: backlog limit exceeded [ 1044.490420][ T671] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1044.522387][ T6069] usb 5-1: config 0 descriptor?? [ 1044.622104][ T6069] pvrusb2: Hardware description: Terratec Grabster AV400 [ 1044.622128][ T6069] pvrusb2: ********** [ 1044.622135][ T6069] pvrusb2: ***WARNING*** Support for this device (Terratec Grabster AV400) is experimental. [ 1044.622148][ T6069] pvrusb2: Important functionality might not be entirely working. [ 1044.622158][ T6069] pvrusb2: Please consider contacting the driver author to help with further stabilization of the driver. [ 1044.622169][ T6069] pvrusb2: ********** [ 1045.028036][ T2366] pvrusb2: Invalid write control endpoint [ 1045.164843][ T6099] usb 5-1: USB disconnect, device number 47 [ 1045.905221][ T2366] pvrusb2: Invalid write control endpoint [ 1045.905239][ T2366] pvrusb2: ***WARNING*** Detected a wedged cx25840 chip; the device will not work. [ 1045.905249][ T2366] pvrusb2: ***WARNING*** Try power cycling the pvrusb2 device. [ 1045.905257][ T2366] pvrusb2: ***WARNING*** Disabling further access to the device to prevent other foul-ups. [ 1045.905267][ T2366] pvrusb2: Device being rendered inoperable [ 1045.984252][ T2366] cx25840 1-0044: Unable to detect h/w, assuming cx23887 [ 1045.984336][ T2366] cx25840 1-0044: cx23887 A/V decoder found @ 0x88 (pvrusb2_a) [ 1046.015560][ T2366] pvrusb2: Attached sub-driver cx25840 [ 1046.015589][ T2366] pvrusb2: ***WARNING*** pvrusb2 device hardware appears to be jammed and I can't clear it. [ 1046.015600][ T2366] pvrusb2: You might need to power cycle the pvrusb2 device in order to recover. [ 1046.455662][ T45] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 1046.608189][ T45] usb 6-1: Using ep0 maxpacket: 16 [ 1046.689272][ T45] usb 6-1: New USB device found, idVendor=0d49, idProduct=7010, bcdDevice= c.90 [ 1046.689304][ T45] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1046.689325][ T45] usb 6-1: Product: syz [ 1046.689340][ T45] usb 6-1: Manufacturer: syz [ 1046.689354][ T45] usb 6-1: SerialNumber: syz [ 1046.861987][ T45] usb 6-1: config 0 descriptor?? [ 1046.899654][ T45] ums-onetouch 6-1:0.0: USB Mass Storage device detected [ 1047.446743][ T6099] usb 5-1: new high-speed USB device number 48 using dummy_hcd [ 1047.617851][ T6069] usb 1-1: new high-speed USB device number 51 using dummy_hcd [ 1047.695976][ T6099] usb 5-1: New USB device found, idVendor=0bda, idProduct=8153, bcdDevice=e2.3d [ 1047.696007][ T6099] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1047.696027][ T6099] usb 5-1: Product: syz [ 1047.696042][ T6099] usb 5-1: Manufacturer: syz [ 1047.696168][ T6099] usb 5-1: SerialNumber: syz [ 1047.798679][ T6069] usb 1-1: Using ep0 maxpacket: 32 [ 1047.808315][ T6099] r8152-cfgselector 5-1: Unknown version 0x0000 [ 1047.808342][ T6099] r8152-cfgselector 5-1: config 0 descriptor?? [ 1047.833213][ T6069] usb 1-1: config index 0 descriptor too short (expected 35577, got 27) [ 1047.833241][ T6069] usb 1-1: config 1 has too many interfaces: 92, using maximum allowed: 32 [ 1047.833262][ T6069] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 92 [ 1047.833340][ T6069] usb 1-1: config 1 has no interface number 0 [ 1047.833393][ T6069] usb 1-1: config 1 interface 1 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1047.833417][ T6069] usb 1-1: config 1 interface 1 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 17 [ 1047.833516][ T6069] usb 1-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 1047.833540][ T6069] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1048.144932][ T6069] snd_usb_pod 1-1:1.1: Line 6 Pocket POD found [ 1048.246569][ C0] net_ratelimit: 6613 callbacks suppressed [ 1048.246588][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.249950][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.250768][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.251418][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.252151][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.252821][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.253587][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.254213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.254998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.255644][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.349259][ T6069] snd_usb_pod 1-1:1.1: invalid control EP [ 1048.349280][ T6069] snd_usb_pod 1-1:1.1: cannot start listening: -22 [ 1048.349594][ T6069] snd_usb_pod 1-1:1.1: Line 6 Pocket POD now disconnected [ 1048.526504][ T6069] snd_usb_pod 1-1:1.1: probe with driver snd_usb_pod failed with error -22 [ 1048.611262][ T6069] usb 1-1: USB disconnect, device number 51 [ 1048.806574][T29653] r8152-cfgselector 5-1: USB disconnect, device number 48 [ 1049.182173][ T716] netlink: 8 bytes leftover after parsing attributes in process `syz.6.12832'. [ 1049.188022][T29653] IPVS: starting estimator thread 0... [ 1049.323037][ T37] kauditd_printk_skb: 6901 callbacks suppressed [ 1049.323057][ T37] audit: type=1400 audit(2000000549.654:365347): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5209 comm="udevd" path="/sys/devices/virtual/block/loop6/trace" dev="sysfs" ino=15466 [ 1049.323105][ T37] audit: type=1400 audit(2000000549.706:365348): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1049.323148][ T37] audit: type=1400 audit(2000000549.706:365349): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sysfs" ino=1 [ 1049.323187][ T37] audit: type=1400 audit(2000000549.706:365350): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1049.323228][ T37] audit: type=1400 audit(2000000549.706:365351): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1049.323268][ T37] audit: type=1400 audit(2000000549.706:365352): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1049.323307][ T37] audit: type=1400 audit(2000000549.706:365353): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="loop6" dev="sysfs" ino=15444 [ 1049.323347][ T37] audit: type=1400 audit(2000000549.706:365354): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1049.323386][ T37] audit: type=1400 audit(2000000549.706:365355): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sysfs" ino=1 [ 1049.323425][ T37] audit: type=1400 audit(2000000549.706:365356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1049.324676][ T717] IPVS: using max 8 ests per chain, 19200 per kthread [ 1050.047650][ T722] tipc: Trying to set illegal importance in message [ 1050.064415][ T725] netlink: 64 bytes leftover after parsing attributes in process `syz.0.12833'. [ 1050.064443][ T725] netlink: 64 bytes leftover after parsing attributes in process `syz.0.12833'. [ 1053.019446][ C0] net_ratelimit: 6529 callbacks suppressed [ 1053.019469][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1053.020465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1053.021267][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1053.021896][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1053.022676][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1053.023303][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1053.024032][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1053.024672][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1053.025428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1053.026050][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1054.100484][ T37] kauditd_printk_skb: 8645 callbacks suppressed [ 1054.100502][ T37] audit: type=1400 audit(2000000554.745:372493): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1054.100546][ T37] audit: type=1400 audit(2000000554.745:372494): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1054.100586][ T37] audit: type=1400 audit(2000000554.745:372495): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1054.100626][ T37] audit: type=1400 audit(2000000554.745:372496): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1054.100665][ T37] audit: type=1400 audit(2000000554.745:372497): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" name="2704" dev="tmpfs" ino=13571 [ 1054.100705][ T37] audit: type=1400 audit(2000000554.745:372498): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" path="/2704" dev="tmpfs" ino=13571 [ 1054.100744][ T37] audit: type=1400 audit(2000000554.745:372499): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" path="/2704" dev="tmpfs" ino=13571 [ 1054.100784][ T37] audit: type=1400 audit(2000000554.745:372500): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1054.100824][ T37] audit: type=1400 audit(2000000554.745:372501): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1054.100863][ T37] audit: type=1400 audit(2000000554.745:372502): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="2704" dev="tmpfs" ino=13571 [ 1054.152465][ T6099] usb 7-1: new high-speed USB device number 8 using dummy_hcd [ 1054.375673][ T6099] usb 7-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 1054.375704][ T6099] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1054.446142][ T6099] usb 7-1: config 0 descriptor?? [ 1054.824359][ T6099] udl 7-1:0.0: [drm] Unrecognized vendor firmware descriptor [ 1055.022697][ T6099] [drm:udl_init] *ERROR* Selecting channel failed [ 1055.181959][ T6099] [drm] Initialized udl 0.0.1 for 7-1:0.0 on minor 2 [ 1055.181984][ T6099] [drm] Initialized udl on minor 2 [ 1055.227944][ T6099] udl 7-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 1055.228312][ T6099] udl 7-1:0.0: [drm] Cannot find any crtc or sizes [ 1055.360038][ T6069] udl 7-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 1055.388102][ T6069] udl 7-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 1055.388296][ T6069] udl 7-1:0.0: [drm] Cannot find any crtc or sizes [ 1055.408570][ T6099] usb 7-1: USB disconnect, device number 8 [ 1055.566406][ T45] usb 6-1: USB disconnect, device number 8 [ 1055.756508][ T772] syz.4.12859 (772): drop_caches: 2 [ 1056.677109][ T794] IPv6: NLM_F_REPLACE set, but no existing node found! [ 1057.791376][ C0] net_ratelimit: 6618 callbacks suppressed [ 1057.791400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1057.792207][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1057.792838][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1057.793572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1057.794284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1057.795038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1057.795687][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1057.798015][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1057.798647][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1057.799377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1058.029257][ T45] usb 3-1: new high-speed USB device number 38 using dummy_hcd [ 1058.203909][ T45] usb 3-1: Using ep0 maxpacket: 16 [ 1058.208803][ T45] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1058.208836][ T45] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1058.208876][ T45] usb 3-1: New USB device found, idVendor=1770, idProduct=ff00, bcdDevice= 0.00 [ 1058.208899][ T45] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1058.365565][ T45] usb 3-1: config 0 descriptor?? [ 1058.867721][ T37] kauditd_printk_skb: 7276 callbacks suppressed [ 1058.867738][ T37] audit: type=1400 audit(2000000559.742:377778): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=31220 comm="udevd" path="/sys/devices/platform/uevent" dev="sysfs" ino=37 [ 1058.868880][ T37] audit: type=1400 audit(2000000559.753:377779): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=31220 comm="udevd" name="/" dev="sda1" ino=2 [ 1058.868925][ T37] audit: type=1400 audit(2000000559.753:377780): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=30650 comm="udevd" name="data" dev="tmpfs" ino=14 [ 1058.868965][ T37] audit: type=1400 audit(2000000559.753:377781): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=30650 comm="udevd" name="data" dev="tmpfs" ino=14 [ 1058.869059][ T37] audit: type=1400 audit(2000000559.753:377782): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6015 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1058.996800][ T37] audit: type=1400 audit(2000000559.753:377783): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6015 comm="syz-executor" name="2615" dev="tmpfs" ino=13144 [ 1058.996852][ T37] audit: type=1400 audit(2000000559.753:377785): lsm=SMACK fn=smack_inode_rename action=granted subject="_" object="_" requested=rw pid=30650 comm="udevd" name="c7:75.tmp" dev="tmpfs" ino=16015 [ 1058.996893][ T37] audit: type=1400 audit(2000000559.753:377786): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=808 comm="syz.2.12876" path="/dev/raw-gadget" dev="devtmpfs" ino=815 [ 1058.996933][ T37] audit: type=1400 audit(2000000559.753:377787): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=808 comm="syz.2.12876" path="/dev/raw-gadget" dev="devtmpfs" ino=815 [ 1058.996973][ T37] audit: type=1400 audit(2000000559.753:377788): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6015 comm="syz-executor" path="/2615/cgroup.cpu" dev="tmpfs" ino=13146 [ 1059.230729][ T45] gt683r_led 0003:1770:FF00.0002: unbalanced delimiter at end of report description [ 1059.232593][ T45] gt683r_led 0003:1770:FF00.0002: hid parsing failed [ 1059.232704][ T45] gt683r_led 0003:1770:FF00.0002: probe with driver gt683r_led failed with error -22 [ 1059.404420][ T45] usb 3-1: USB disconnect, device number 38 [ 1060.731540][ T832] netlink: 'syz.6.12886': attribute type 10 has an invalid length. [ 1060.906489][ T832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1060.962162][ T832] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1061.527876][ T837] comedi comedi3: 8255: I/O port conflict (0x5,4) [ 1061.543258][ T837] comedi comedi3: 8255: I/O port conflict (0x3,4) [ 1061.543318][ T837] comedi comedi3: 8255: I/O port conflict (0x4,4) [ 1061.543369][ T837] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1061.543418][ T837] comedi comedi3: 8255: I/O port conflict (0x3,4) [ 1061.543467][ T837] comedi comedi3: 8255: I/O port conflict (0x12,4) [ 1061.543524][ T837] comedi comedi3: 8255: I/O port conflict (0x11,4) [ 1061.543646][ T837] comedi comedi3: 8255: I/O port conflict (0x81,4) [ 1061.543696][ T837] comedi comedi3: 8255: I/O port conflict (0xfffffffffffffffc,4) [ 1061.543749][ T837] comedi comedi3: 8255: I/O port conflict (0x2,4) [ 1061.638236][ T837] comedi comedi3: 8255: I/O port conflict (0xfffffffffffffffe,4) [ 1061.638296][ T837] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1061.638345][ T837] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1061.638395][ T837] comedi comedi3: 8255: I/O port conflict (0x2,4) [ 1061.638513][ T837] comedi comedi3: 8255: I/O port conflict (0x8,4) [ 1061.638562][ T837] comedi comedi3: 8255: I/O port conflict (0x400009,4) [ 1061.638615][ T837] comedi comedi3: 8255: I/O port conflict (0x3,4) [ 1061.638664][ T837] comedi comedi3: 8255: I/O port conflict (0x5,4) [ 1061.638801][ T837] comedi comedi3: 8255: I/O port conflict (0x80,4) [ 1061.638890][ T837] comedi comedi3: 8255: I/O port conflict (0x7,4) [ 1061.638939][ T837] comedi comedi3: 8255: I/O port conflict (0x2000e67,4) [ 1061.639036][ T837] comedi comedi3: 8255: I/O port conflict (0x8,4) [ 1061.706492][ T837] comedi comedi3: 8255: I/O port conflict (0xfffffffffffffffe,4) [ 1062.107891][ T844] netlink: 'syz.4.12891': attribute type 2 has an invalid length. [ 1062.318545][ T847] netlink: 20 bytes leftover after parsing attributes in process `syz.5.12892'. [ 1062.564050][ C0] net_ratelimit: 6734 callbacks suppressed [ 1062.564071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1062.564786][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1062.565448][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1062.566224][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1062.566876][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1062.567737][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1062.568436][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1062.569198][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1062.569829][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1062.570631][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1063.852882][ T37] kauditd_printk_skb: 5494 callbacks suppressed [ 1063.852901][ T37] audit: type=1400 audit(2000000564.981:383018): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1063.986694][ T37] audit: type=1400 audit(2000000565.117:383019): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6007 comm="syz-executor" opid=834 ocomm="syz.2.12888" [ 1063.986745][ T37] audit: type=1400 audit(2000000565.117:383020): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6007 comm="syz-executor" opid=834 ocomm="syz.2.12888" [ 1064.118067][ T37] audit: type=1400 audit(2000000565.264:383021): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1064.118336][ T37] audit: type=1400 audit(2000000565.264:383022): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1064.119208][ T37] audit: type=1400 audit(2000000565.264:383023): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="fs" dev="sysfs" ino=2 [ 1064.119525][ T37] audit: type=1400 audit(2000000565.264:383024): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="fuse" dev="sysfs" ino=5241 [ 1064.120222][ T37] audit: type=1400 audit(2000000565.264:383025): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" name="/" dev="fusectl" ino=1 [ 1064.120597][ T37] audit: type=1400 audit(2000000565.264:383026): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 1064.122499][ T37] audit: type=1400 audit(2000000565.264:383027): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 1065.373385][ T7387] usb 6-1: new high-speed USB device number 9 using dummy_hcd [ 1065.526381][ T7387] usb 6-1: Using ep0 maxpacket: 8 [ 1065.541401][ T7387] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 4 [ 1065.541452][ T7387] usb 6-1: New USB device found, idVendor=1b1c, idProduct=1b09, bcdDevice= 0.00 [ 1065.541476][ T7387] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1065.584442][ T7387] usb 6-1: config 0 descriptor?? [ 1066.080783][ T7387] corsair 0003:1B1C:1B09.0003: unbalanced collection at end of report description [ 1066.081701][ T7387] corsair 0003:1B1C:1B09.0003: parse failed [ 1066.081794][ T7387] corsair 0003:1B1C:1B09.0003: probe with driver corsair failed with error -22 [ 1066.271733][ T7387] usb 6-1: USB disconnect, device number 9 [ 1067.336462][ C0] net_ratelimit: 6815 callbacks suppressed [ 1067.336484][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1067.337159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1067.337910][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1067.338572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1067.339538][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1067.340161][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1067.340922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1067.341551][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1067.342313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1067.343002][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1068.861516][ T37] kauditd_printk_skb: 1913 callbacks suppressed [ 1068.861534][ T37] audit: type=1400 audit(2000000570.240:384941): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1069.371625][ T37] audit: type=1400 audit(2000000570.765:384942): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=30502 ocomm="udevd" [ 1069.373619][ T37] audit: type=1400 audit(2000000570.765:384943): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=30676 ocomm="udevd" [ 1069.373661][ T37] audit: type=1400 audit(2000000570.765:384944): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1069.488515][ T37] audit: type=1400 audit(2000000570.891:384945): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=31220 ocomm="udevd" [ 1069.488565][ T37] audit: type=1400 audit(2000000570.891:384946): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=30650 ocomm="udevd" [ 1069.488599][ T37] audit: type=1400 audit(2000000570.891:384947): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=30725 ocomm="udevd" [ 1069.488638][ T37] audit: type=1400 audit(2000000570.891:384948): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=31350 ocomm="udevd" [ 1069.488683][ T37] audit: type=1400 audit(2000000570.891:384949): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=30351 ocomm="udevd" [ 1069.488722][ T37] audit: type=1400 audit(2000000570.891:384950): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=30354 ocomm="udevd" [ 1072.108582][ C0] net_ratelimit: 8466 callbacks suppressed [ 1072.108604][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1072.109235][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1072.110024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1072.110683][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1072.111431][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1072.112064][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1072.112873][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1072.113500][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1072.114244][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1072.114806][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1073.641805][ C0] audit_log_start: 956 callbacks suppressed [ 1073.641823][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1073.641835][ C0] audit: audit_lost=60362 audit_rate_limit=0 audit_backlog_limit=64 [ 1073.641847][ C0] audit: backlog limit exceeded [ 1073.642286][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1073.642307][ C0] audit: audit_lost=60363 audit_rate_limit=0 audit_backlog_limit=64 [ 1073.642323][ C0] audit: backlog limit exceeded [ 1073.642471][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1073.642485][ C0] audit: audit_lost=60364 audit_rate_limit=0 audit_backlog_limit=64 [ 1073.642501][ C0] audit: backlog limit exceeded [ 1073.642640][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1074.641753][ T7387] usb 6-1: new high-speed USB device number 10 using dummy_hcd [ 1074.832379][ T7387] usb 6-1: Using ep0 maxpacket: 8 [ 1074.836364][ T7387] usb 6-1: config 0 interface 0 altsetting 218 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1074.836399][ T7387] usb 6-1: config 0 interface 0 altsetting 218 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 1074.836426][ T7387] usb 6-1: config 0 interface 0 has no altsetting 0 [ 1074.836460][ T7387] usb 6-1: New USB device found, idVendor=0c45, idProduct=760b, bcdDevice= 0.00 [ 1074.836484][ T7387] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1074.940129][ T7387] usb 6-1: config 0 descriptor?? [ 1075.490233][ T7387] redragon 0003:0C45:760B.0004: item fetching failed at offset 5/7 [ 1075.491143][ T7387] redragon 0003:0C45:760B.0004: probe with driver redragon failed with error -22 [ 1075.663401][ T7387] usb 6-1: USB disconnect, device number 10 [ 1076.880481][ C0] net_ratelimit: 6792 callbacks suppressed [ 1076.880503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1076.881137][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1076.881869][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1076.882515][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1076.883290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1076.883970][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1076.884725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1076.885365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1076.886156][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1076.886796][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1077.624151][ T1322] ieee802154 phy1 wpan1: encryption failed: -22 [ 1078.339658][ T942] sp0: Synchronizing with TNC [ 1078.411026][ T940] [U] [ 1078.431331][ T5504] audit_log_start: 6626 callbacks suppressed [ 1078.431348][ T5504] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1078.431361][ T5504] audit: audit_lost=60395 audit_rate_limit=0 audit_backlog_limit=64 [ 1078.431375][ T5504] audit: backlog limit exceeded [ 1078.431403][ T5504] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1078.431415][ T5504] audit: audit_lost=60396 audit_rate_limit=0 audit_backlog_limit=64 [ 1078.431428][ T5504] audit: backlog limit exceeded [ 1078.431542][ T5504] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1078.431554][ T5504] audit: audit_lost=60397 audit_rate_limit=0 audit_backlog_limit=64 [ 1078.431568][ T5504] audit: backlog limit exceeded [ 1078.431811][ T5504] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1078.538287][ T6069] usb 6-1: new high-speed USB device number 11 using dummy_hcd [ 1078.719638][ T6069] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1078.719671][ T6069] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1078.719699][ T6069] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 4 [ 1078.719748][ T6069] usb 6-1: New USB device found, idVendor=12ba, idProduct=0100, bcdDevice= 0.00 [ 1078.719772][ T6069] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1078.816326][ T6069] usb 6-1: config 0 descriptor?? [ 1079.373695][ T6069] sony 0003:12BA:0100.0005: unknown main item tag 0x0 [ 1079.500197][ T6069] sony 0003:12BA:0100.0005: hidraw0: USB HID v0.00 Device [HID 12ba:0100] on usb-dummy_hcd.5-1/input0 [ 1079.500234][ T6069] sony 0003:12BA:0100.0005: failed to claim input [ 1079.615226][ T6069] usb 6-1: USB disconnect, device number 11 [ 1080.139714][ T949] fido_id[949]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.5/usb6/report_descriptor': No such file or directory [ 1081.653337][ C0] net_ratelimit: 6833 callbacks suppressed [ 1081.653356][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1081.654133][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1081.654763][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1081.655541][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1081.656170][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1081.656907][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1081.657520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1081.658271][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1081.658896][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1081.659685][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1083.769231][ T37] kauditd_printk_skb: 2176 callbacks suppressed [ 1083.769259][ T37] audit: type=1400 audit(2000000585.483:394531): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1083.769307][ T37] audit: type=1400 audit(2000000585.546:394532): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=901 ocomm="udevd" [ 1083.769346][ T37] audit: type=1400 audit(2000000585.546:394533): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=948 ocomm="udevd" [ 1083.769385][ T37] audit: type=1400 audit(2000000585.546:394534): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=889 ocomm="udevd" [ 1083.769424][ T37] audit: type=1400 audit(2000000585.546:394535): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5209 comm="udevd" opid=888 ocomm="udevd" [ 1083.769463][ T37] audit: type=1400 audit(2000000585.557:394536): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1083.769503][ T37] audit: type=1400 audit(2000000585.557:394537): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="etc" dev="sda1" ino=116 [ 1083.769541][ T37] audit: type=1400 audit(2000000585.557:394538): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="udev" dev="sda1" ino=259 [ 1083.769581][ T37] audit: type=1400 audit(2000000585.735:394539): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1083.888182][ T37] audit: type=1400 audit(2000000585.977:394540): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1086.425353][ C0] net_ratelimit: 6762 callbacks suppressed [ 1086.425376][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1086.426132][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1086.426892][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1086.427671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1086.428300][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1086.429084][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1086.429735][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1086.430482][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1086.431124][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1086.431910][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1089.003147][ T37] kauditd_printk_skb: 45 callbacks suppressed [ 1089.003169][ T37] audit: type=1400 audit(2000000591.268:394586): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1089.947469][ T37] audit: type=1400 audit(2000000591.793:394587): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1090.424722][ T6007] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1090.424741][ T6007] audit: audit_lost=60413 audit_rate_limit=0 audit_backlog_limit=64 [ 1090.424755][ T6007] audit: backlog limit exceeded [ 1090.424770][ T6007] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1090.424782][ T6007] audit: audit_lost=60414 audit_rate_limit=0 audit_backlog_limit=64 [ 1090.424796][ T6007] audit: backlog limit exceeded [ 1090.425001][ T6007] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1090.425014][ T6007] audit: audit_lost=60415 audit_rate_limit=0 audit_backlog_limit=64 [ 1091.197609][ C0] net_ratelimit: 6387 callbacks suppressed [ 1091.197630][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.198320][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.199131][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.199866][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.200712][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.201524][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.202410][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.203099][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.203897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.204636][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1094.106096][ T37] kauditd_printk_skb: 133 callbacks suppressed [ 1094.106117][ T37] audit: type=1400 audit(2000000592.864:394588): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1094.106161][ T37] audit: type=1400 audit(2000000592.864:394589): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1094.106200][ T37] audit: type=1400 audit(2000000592.864:394590): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1094.106239][ T37] audit: type=1400 audit(2000000592.864:394591): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1094.106280][ T37] audit: type=1400 audit(2000000592.864:394592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" name="2718" dev="tmpfs" ino=13642 [ 1094.106314][ T37] audit: type=1400 audit(2000000592.864:394593): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" path="/2718" dev="tmpfs" ino=13642 [ 1094.106387][ T37] audit: type=1400 audit(2000000592.864:394594): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6007 comm="syz-executor" path="/2718" dev="tmpfs" ino=13642 [ 1094.106428][ T37] audit: type=1400 audit(2000000592.864:394595): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1094.106468][ T37] audit: type=1400 audit(2000000592.864:394596): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1094.106512][ T37] audit: type=1400 audit(2000000592.864:394597): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6007 comm="syz-executor" name="2718" dev="tmpfs" ino=13642 [ 1095.970397][ C0] net_ratelimit: 6235 callbacks suppressed [ 1095.970419][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1095.971178][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1095.971834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1095.972611][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1095.973245][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1095.974023][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1095.974645][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1095.975532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1095.976189][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1095.976940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.742356][ C0] net_ratelimit: 6341 callbacks suppressed [ 1100.742378][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.743075][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.743876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.744563][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.745375][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.746045][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.746849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.747549][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.748347][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1100.749045][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1101.378469][ T37] kauditd_printk_skb: 127 callbacks suppressed [ 1101.378495][ T37] audit: type=1400 audit(2000000604.369:394725): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5827 comm="syz-executor" opid=6000 ocomm="syz-executor" [ 1102.504909][ T37] audit: type=1400 audit(2000000604.432:394726): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6000 comm="syz-executor" opid=6006 ocomm="syz-executor" [ 1102.504962][ T37] audit: type=1400 audit(2000000604.453:394727): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1102.505003][ T37] audit: type=1400 audit(2000000604.453:394728): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1102.505043][ T37] audit: type=1400 audit(2000000604.453:394729): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1102.505083][ T37] audit: type=1400 audit(2000000604.464:394730): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1102.505133][ T37] audit: type=1400 audit(2000000604.464:394731): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1184 comm="irq/32-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1102.505173][ T37] audit: type=1400 audit(2000000604.464:394732): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1184 comm="irq/32-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1102.505218][ T37] audit: type=1400 audit(2000000604.464:394733): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1184 comm="irq/32-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1102.505257][ T37] audit: type=1400 audit(2000000604.464:394734): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1184 comm="irq/32-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1105.514886][ C0] net_ratelimit: 6313 callbacks suppressed [ 1105.514908][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1105.515679][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1105.516313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1105.518142][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1105.519071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1105.519845][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1105.520505][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1105.521283][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1105.521906][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1105.522681][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1106.609709][ T37] kauditd_printk_skb: 7 callbacks suppressed [ 1106.609730][ T37] audit: type=1400 audit(2000000608.842:394742): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1106.609777][ T37] audit: type=1400 audit(2000000609.146:394743): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1110.287026][ C0] net_ratelimit: 6318 callbacks suppressed [ 1110.287046][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.287828][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.288487][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.289257][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.289943][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.290734][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.291370][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.292137][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.292819][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.293715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1110.912816][ T37] audit: type=1400 audit(2000000613.303:394744): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1110.912869][ T37] audit: type=1400 audit(2000000613.303:394745): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1110.912911][ T37] audit: type=1400 audit(2000000613.303:394746): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1110.912952][ T37] audit: type=1400 audit(2000000613.303:394747): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1110.912995][ T37] audit: type=1400 audit(2000000613.303:394748): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1110.913037][ T37] audit: type=1400 audit(2000000613.303:394749): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1110.913075][ T37] audit: type=1400 audit(2000000613.324:394750): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1184 comm="irq/32-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1110.913116][ T37] audit: type=1400 audit(2000000613.324:394751): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1184 comm="irq/32-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1113.549533][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 1113.549553][ T37] audit: type=1400 audit(2000000616.201:394753): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1113.549600][ T37] audit: type=1400 audit(2000000616.201:394754): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1113.549642][ T37] audit: type=1400 audit(2000000616.211:394755): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1113.549692][ T37] audit: type=1400 audit(2000000616.211:394756): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1113.549733][ T37] audit: type=1400 audit(2000000616.211:394757): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1113.549775][ T37] audit: type=1400 audit(2000000616.505:394758): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1113.549816][ T37] audit: type=1400 audit(2000000617.019:394759): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1114.655970][ T37] audit: type=1400 audit(2000000617.555:394760): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1115.059215][ C0] net_ratelimit: 5999 callbacks suppressed [ 1115.059235][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.059705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.060321][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.060786][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.061351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.061868][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.062630][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.063269][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.064050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.064704][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1115.732589][ T37] audit: type=1400 audit(2000000618.867:394761): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1119.832145][ C0] net_ratelimit: 6340 callbacks suppressed [ 1119.832168][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.832836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.833589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.834241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.835003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.835639][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.836441][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.837105][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.837861][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.838549][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1120.314562][ T37] audit: type=1400 audit(2000000624.242:394762): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1122.268938][ T37] audit: type=1400 audit(2000000625.628:394763): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1122.268996][ T37] audit: type=1400 audit(2000000625.785:394764): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1122.269040][ T37] audit: type=1400 audit(2000000625.995:394765): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1122.269084][ T37] audit: type=1400 audit(2000000626.174:394766): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1122.269126][ T37] audit: type=1400 audit(2000000626.174:394767): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1122.269181][ T37] audit: type=1400 audit(2000000626.174:394768): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1122.269223][ T37] audit: type=1400 audit(2000000626.174:394769): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1122.269269][ T37] audit: type=1400 audit(2000000626.174:394770): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1123.009664][ T37] audit: type=1400 audit(2000000627.066:394771): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29769 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1124.603865][ C1] net_ratelimit: 6893 callbacks suppressed [ 1124.603888][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1124.603942][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.604833][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.605625][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.606254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.607045][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.607703][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.607813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1124.608443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.609116][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1127.342213][ T37] kauditd_printk_skb: 5 callbacks suppressed [ 1127.342233][ T37] audit: type=1400 audit(2000000631.559:394777): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29769 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 1128.899944][ T37] audit: type=1400 audit(2000000633.113:394778): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1129.376817][ C0] net_ratelimit: 7440 callbacks suppressed [ 1129.376839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.377601][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.378065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1129.378514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.379171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.379940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.380642][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.381391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.382224][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.382224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1131.251589][ T37] audit: type=1400 audit(2000000633.638:394779): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=29769 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 1134.148747][ C1] net_ratelimit: 7324 callbacks suppressed [ 1134.148769][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1134.148886][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.149671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.150310][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.151069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.151750][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.152510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.152606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1134.153146][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.153961][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1137.546610][ T37] audit: type=1400 audit(2000000642.320:394780): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="/" dev="sda1" ino=2 [ 1137.546664][ T37] audit: type=1400 audit(2000000642.320:394781): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="etc" dev="sda1" ino=116 [ 1137.546704][ T37] audit: type=1400 audit(2000000642.320:394782): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="cron" dev="sda1" ino=120 [ 1138.920783][ C0] net_ratelimit: 7430 callbacks suppressed [ 1138.920807][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1138.921452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1138.922229][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1138.922620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1138.922901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1138.923649][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1138.924309][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1138.925088][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1138.925718][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1138.926493][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1139.067920][ T37] audit: type=1400 audit(2000000643.863:394783): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1139.248764][ T1322] ieee802154 phy1 wpan1: encryption failed: -22 [ 1143.693289][ C1] net_ratelimit: 7100 callbacks suppressed [ 1143.693327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1143.693349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1143.694129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1143.694772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1143.695858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1143.696520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1143.697281][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1143.697335][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1143.697978][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1143.698728][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.750577][ T37] audit: type=1400 audit(2000000649.889:394784): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5583 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 1144.779559][ T37] audit: type=1400 audit(2000000649.941:394785): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="crontabs" dev="sda1" ino=121 [ 1147.313342][ T37] audit: type=1400 audit(2000000652.587:394786): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="/" dev="sda1" ino=2 [ 1147.313393][ T37] audit: type=1400 audit(2000000652.597:394787): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="etc" dev="sda1" ino=116 [ 1148.465889][ C0] net_ratelimit: 7032 callbacks suppressed [ 1148.465910][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1148.466671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1148.467347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1148.467711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1148.468094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1148.468724][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1148.469515][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1148.470146][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1148.470901][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1148.471534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1153.238395][ C1] net_ratelimit: 7304 callbacks suppressed [ 1153.238416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1153.238469][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1153.239231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1153.240004][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1153.240819][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1153.241455][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1153.242403][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1153.242690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1153.243069][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1153.243895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1155.645235][ T37] audit: type=1400 audit(2000000661.311:394788): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1155.645291][ T37] audit: type=1400 audit(2000000661.311:394789): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1155.645333][ T37] audit: type=1400 audit(2000000661.311:394790): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1155.645372][ T37] audit: type=1400 audit(2000000661.311:394791): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1155.645411][ T37] audit: type=1400 audit(2000000661.311:394792): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1155.645453][ T37] audit: type=1400 audit(2000000661.311:394793): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1155.645493][ T37] audit: type=1400 audit(2000000661.311:394794): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1155.645536][ T37] audit: type=1400 audit(2000000661.311:394795): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1156.216759][ T37] audit: type=1400 audit(2000000661.772:394796): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1156.216814][ T37] audit: type=1400 audit(2000000661.772:394797): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1158.010444][ C0] net_ratelimit: 7075 callbacks suppressed [ 1158.010466][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1158.011134][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1158.011137][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1158.011917][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1158.012616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1158.013421][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1158.014065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1158.015008][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1158.015581][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1158.015635][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1162.782761][ C0] net_ratelimit: 7258 callbacks suppressed [ 1162.782783][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1162.783618][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1162.784353][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1162.785273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1162.785427][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1162.785944][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1162.786724][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1162.787028][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1162.787393][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1162.788178][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1167.555205][ C0] net_ratelimit: 7521 callbacks suppressed [ 1167.555228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1167.555355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1167.556016][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1167.556651][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1167.557410][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1167.558045][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1167.558393][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1167.558903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1167.559532][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1167.560040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1172.327419][ C1] net_ratelimit: 7761 callbacks suppressed [ 1172.327441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1172.327495][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1172.328245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1172.328879][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1172.329038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1172.329636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1172.330273][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1172.331007][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1172.331794][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1172.332441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1177.101372][ C1] net_ratelimit: 7991 callbacks suppressed [ 1177.101395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1177.104507][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1177.106024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1177.108945][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1177.110574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1177.113492][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1177.114957][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1177.118218][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1177.120106][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1177.123253][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1181.823675][ T37] kauditd_printk_skb: 18 callbacks suppressed [ 1181.823697][ T37] audit: type=1400 audit(2000000688.773:394816): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1181.823748][ T37] audit: type=1400 audit(2000000688.794:394817): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="etc" dev="sda1" ino=116 [ 1181.823788][ T37] audit: type=1400 audit(2000000688.794:394818): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="udev" dev="sda1" ino=259 [ 1181.872487][ C0] net_ratelimit: 7760 callbacks suppressed [ 1181.872508][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.873139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.873924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.874590][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.874785][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1181.875357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.875986][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.876755][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.877293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1181.877623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1184.594865][ T37] audit: type=1400 audit(2000000690.715:394819): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5209 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1184.724668][ T37] audit: type=1400 audit(2000000691.765:394820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1184.724722][ T37] audit: type=1400 audit(2000000691.786:394821): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="lib" dev="sda1" ino=264 [ 1184.724762][ T37] audit: type=1400 audit(2000000691.786:394822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1186.607809][ T37] audit: type=1400 audit(2000000693.844:394823): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=37960 netif=eth0 [ 1186.645187][ C0] net_ratelimit: 7876 callbacks suppressed [ 1186.645212][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.645849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.645900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.646630][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.647294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.647479][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1186.648085][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.648705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.649456][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.650293][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.983580][ T37] audit: type=1400 audit(2000000694.201:394824): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5209 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1188.597964][ T37] audit: type=1400 audit(2000000695.922:394825): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1188.598018][ T37] audit: type=1400 audit(2000000695.922:394826): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1188.598058][ T37] audit: type=1400 audit(2000000695.922:394827): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1191.416991][ C0] net_ratelimit: 8091 callbacks suppressed [ 1191.417013][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.417717][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1191.417792][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.418445][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.419264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1191.419280][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.419924][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.420717][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.421349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.422118][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1193.055302][ T37] audit: type=1400 audit(2000000698.557:394828): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5209 comm="udevd" path="/run/udev/rules.d" dev="tmpfs" ino=11 [ 1194.696377][ T37] audit: type=1400 audit(2000000702.305:394829): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="/" dev="sda1" ino=2 [ 1194.696432][ T37] audit: type=1400 audit(2000000702.305:394830): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="etc" dev="sda1" ino=116 [ 1194.696475][ T37] audit: type=1400 audit(2000000702.305:394831): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="cron" dev="sda1" ino=120 [ 1194.702952][ T37] audit: type=1400 audit(2000000702.337:394832): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1194.703004][ T37] audit: type=1400 audit(2000000702.337:394833): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="lib" dev="sda1" ino=264 [ 1194.703045][ T37] audit: type=1400 audit(2000000702.337:394834): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1196.189155][ C1] net_ratelimit: 7972 callbacks suppressed [ 1196.189177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.189285][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.190196][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.190770][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1196.190920][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.191846][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.192581][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.193464][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.193825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.194167][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1200.189507][ T37] audit: type=1400 audit(2000000707.932:394835): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5583 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 1200.961753][ C1] net_ratelimit: 7909 callbacks suppressed [ 1200.961776][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1200.961853][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1200.962474][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1200.963249][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1200.963359][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1200.963907][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1200.964688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1200.965313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1200.966092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1200.966339][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1205.608401][ T37] audit: type=1400 audit(2000000709.906:394836): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=984 comm="syz-executor" opid=984 ocomm="syz-executor" [ 1205.608457][ T37] audit: type=1400 audit(2000000711.407:394837): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5209 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1205.608499][ T37] audit: type=1400 audit(2000000711.711:394838): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="crontabs" dev="sda1" ino=121 [ 1205.619294][ T37] audit: type=1400 audit(2000000713.801:394839): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1205.619347][ T37] audit: type=1400 audit(2000000713.801:394840): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="lib" dev="sda1" ino=264 [ 1205.619385][ T37] audit: type=1400 audit(2000000713.801:394841): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1205.733399][ C0] net_ratelimit: 8097 callbacks suppressed [ 1205.733420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1205.734175][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1205.734809][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1205.735604][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1205.735871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1205.736233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1205.737102][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1205.737441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1205.737776][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1205.738527][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1206.397453][ T1322] ieee802154 phy1 wpan1: encryption failed: -22 [ 1208.504733][ T37] audit: type=1400 audit(2000000716.834:394842): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="/" dev="sda1" ino=2 [ 1208.504784][ T37] audit: type=1400 audit(2000000716.834:394843): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5583 comm="crond" name="etc" dev="sda1" ino=116 [ 1209.781989][ T37] audit: type=1400 audit(2000000718.168:394844): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=984 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1209.782047][ T37] audit: type=1400 audit(2000000718.168:394845): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=984 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1210.506250][ C0] net_ratelimit: 8067 callbacks suppressed [ 1210.506273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1210.506954][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1210.507558][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1210.507733][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1210.508351][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1210.509087][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1210.509309][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1210.509936][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1210.510706][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1210.511381][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1210.791724][ T37] kauditd_printk_skb: 6 callbacks suppressed [ 1210.791742][ T37] audit: type=1400 audit(2000000718.199:394852): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1210.791794][ T37] audit: type=1400 audit(2000000719.228:394853): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="usr" dev="sda1" ino=1480 [ 1210.791832][ T37] audit: type=1400 audit(2000000719.228:394854): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="/" dev="sda1" ino=2 [ 1210.791869][ T37] audit: type=1400 audit(2000000719.228:394855): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="etc" dev="sda1" ino=116 [ 1210.791907][ T37] audit: type=1400 audit(2000000719.228:394856): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5209 comm="udevd" name="udev" dev="sda1" ino=259 [ 1212.801602][ T37] audit: type=1400 audit(2000000721.338:394857): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5209 comm="udevd" path="/etc/udev/hwdb.bin" dev="sda1" ino=260 [ 1215.278906][ C0] net_ratelimit: 8020 callbacks suppressed [ 1215.278929][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1215.279547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1215.280346][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1215.280419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1215.281009][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1215.281825][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1215.282316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1215.282479][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1215.283270][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1215.283901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1215.793535][ T37] audit: type=1400 audit(2000000724.487:394858): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=984 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1215.793804][ T37] audit: type=1400 audit(2000000724.487:394859): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=984 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1217.783503][ T37] audit: type=1400 audit(2000000726.545:394860): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=984 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1217.784593][ T37] audit: type=1400 audit(2000000726.577:394861): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5827 comm="syz-executor" opid=6004 ocomm="syz-executor" [ 1220.051029][ C0] net_ratelimit: 7898 callbacks suppressed [ 1220.051051][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1220.051374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1220.051889][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1220.052618][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1220.053481][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1220.054215][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1220.054767][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1220.055350][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1220.056070][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1220.056472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1221.359173][ T37] audit: type=1400 audit(2000000728.277:394862): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6004 comm="syz-executor" opid=6015 ocomm="syz-executor" [ 1224.822942][ C0] net_ratelimit: 8075 callbacks suppressed [ 1224.822962][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.823483][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1224.823754][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.824385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.825132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:b7:c6:4c:ce:bb, vlan:0) [ 1224.825180][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.825809][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.826703][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.827529][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.828603][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1225.779123][ T38] INFO: task dhcpcd:5503 blocked for more than 144 seconds. [ 1225.779149][ T38] Not tainted syzkaller #0 [ 1225.779160][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1225.779169][ T38] task:dhcpcd state:D stack:25208 pid:5503 tgid:5503 ppid:1 task_flags:0x400140 flags:0x00004002 [ 1225.779219][ T38] Call Trace: [ 1225.779226][ T38] [ 1225.779240][ T38] __schedule+0x16f3/0x4c20 [ 1225.779280][ T38] ? sched_clock+0x3f/0x60 [ 1225.779303][ T38] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 1225.779336][ T38] ? __pfx___schedule+0x10/0x10 [ 1225.779384][ T38] rt_mutex_schedule+0x77/0xf0 [ 1225.779403][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 1225.779440][ T38] ? rt_mutex_slowlock_block+0x351/0x6d0 [ 1225.779466][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 1225.779490][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 1225.779513][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 1225.779533][ T38] ? __lock_acquire+0xab9/0xd20 [ 1225.779567][ T38] ? vlan_ioctl_handler+0xd0/0x650 [ 1225.779608][ T38] ? vlan_ioctl_handler+0xd0/0x650 [ 1225.779631][ T38] mutex_lock_nested+0x16a/0x1d0 [ 1225.779658][ T38] vlan_ioctl_handler+0xd0/0x650 [ 1225.779690][ T38] ? __pfx_vlan_ioctl_handler+0x10/0x10 [ 1225.779733][ T38] ? mutex_lock_nested+0x154/0x1d0 [ 1225.779753][ T38] ? sock_ioctl+0x5f1/0x790 [ 1225.779777][ T38] ? __pfx_vlan_ioctl_handler+0x10/0x10 [ 1225.779801][ T38] sock_ioctl+0x610/0x790 [ 1225.779825][ T38] ? __pfx_sock_ioctl+0x10/0x10 [ 1225.779857][ T38] ? bpf_lsm_file_ioctl+0x9/0x20 [ 1225.779879][ T38] ? __pfx_sock_ioctl+0x10/0x10 [ 1225.779899][ T38] __se_sys_ioctl+0xff/0x170 [ 1225.779924][ T38] do_syscall_64+0xfa/0x3b0 [ 1225.779942][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1225.779966][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1225.779984][ T38] ? clear_[ 1225.779984][ T38] ? clear_bhb_loop+0x60/0xb0 [ 1225.780007][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1225.780026][ T38] RIP: 0033:0x7f00080c5378 [ 1225.780044][ T38] RSP: 002b:00007fff8c8fe798 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1225.780064][ T38] RAX: ffffffffffffffda RBX: 000055a1bfca5810 RCX: 00007f00080c5378 [ 1225.780080][ T38] RDX: 00007fff8c8fe7a0 RSI: 0000000000008982 RDI: 000000000000000f [ 1225.780093][ T38] RBP: 00007fff8c8fe7a0 R08: 0000000000000000 R09: 0000000000000000 [ 1225.780106][ T38] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1225.780118][ T38] R13: 000055a1bfd45bd8 R14: 00007fff8c90ebb0 R15: 000055a1bfca5810 [ 1225.780149][ T38] [ 1225.780211][ T38] INFO: task syz.5.12932:962 blocked for more than 144 seconds. [ 1225.780225][ T38] Not tainted syzkaller #0 [ 1225.780234][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1225.780244][ T38] task:syz.5.12932 state:D stack:27688 pid:962 tgid:961 ppid:29769 task_flags:0x400140 flags:0x00004004 [ 1225.780290][ T38] Call Trace: [ 1225.780296][ T38] [ 1225.780309][ T38] __schedule+0x16f3/0x4c20 [ 1225.780343][ T38] ? __lock_acquire+0xab9/0xd20 [ 1225.780474][ T38] ? __pfx___schedule+0x10/0x10 [ 1225.780520][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 1225.780550][ T38] rt_mutex_schedule+0x77/0xf0 [ 1225.780569][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 1225.780590][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 1225.780630][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 1225.780656][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 1225.780679][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 1225.780698][ T38] ? __lock_acquire+0xab9/0xd20 [ 1225.780733][ T38] ? rtnetlink_rcv_msg+0x71c/0xb70 [ 1225.780781][ T38] ? rtnetlink_rcv_msg+0x71c/0xb70 [ 1225.780802][ T38] mutex_lock_nested+0x16a/0x1d0 [ 1225.780830][ T38] rtnetlink_rcv_msg+0x71c/0xb70 [ 1225.780859][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 1225.780883][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1225.780904][ T38] ? ref_tracker_free+0x61e/0x7c0 [ 1225.780930][ T38] ? __asan_memcpy+0x40/0x70 [ 1225.780950][ T38] ? __pfx_ref_tracker_free+0x10/0x10 [ 1225.780973][ T38] ? __skb_clone+0x63/0x7a0 [ 1225.781000][ T38] netlink_rcv_skb+0x205/0x470 [ 1225.781027][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1225.781052][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1225.781088][ T38] ? netlink_deliver_tap+0x2e/0x1b0 [ 1225.781121][ T38] netlink_unicast+0x843/0xa10 [ 1225.781154][ T38] ? __pfx_netlink_unicast+0x10/0x10 [ 1225.781178][ T38] ? netlink_sendmsg+0x642/0xb30 [ 1225.781200][ T38] ? skb_put+0x11b/0x210 [ 1225.781229][ T38] netlink_sendmsg+0x805/0xb30 [ 1225.781264][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1225.781297][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1225.781316][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1225.781341][ T38] __sock_sendmsg+0x219/0x270 [ 1225.781368][ T38] ____sys_sendmsg+0x508/0x820 [ 1225.781395][ T38] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1225.781426][ T38] ? import_iovec+0x74/0xa0 [ 1225.781453][ T38] ___sys_sendmsg+0x21f/0x2a0 [ 1225.781476][ T38] ? __pfx____sys_sendmsg+0x10/0x10 [ 1225.781536][ T38] ? __fget_files+0x2a/0x420 [ 1225.781560][ T38] ? __fget_files+0x3a6/0x420 [ 1225.781595][ T38] __x64_sys_sendmsg+0x1a1/0x260 [ 1225.781618][ T38] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1225.781651][ T38] ? rcu_is_watching+0x15/0xb0 [ 1225.781684][ T38] ? do_syscall_64+0xbe/0x3b0 [ 1225.781709][ T38] do_syscall_64+0xfa/0x3b0 [ 1225.781726][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1225.781758][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1225.781778][ T38] ? clear_bhb_loop+0x60/0xb0 [ 1225.781801][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1225.781820][ T38] RIP: 0033:0x7f6c1d2dec29 [ 1225.781837][ T38] RSP: 002b:00007f6c1b53e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1225.781859][ T38] RAX: ffffffffffffffda RBX: 00007f6c1d525fa0 RCX: 00007f6c1d2dec29 [ 1225.781874][ T38] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1225.781886][ T38] RBP: 00007f6c1d361e41 R08: 0000000000000000 R09: 0000000000000000 [ 1225.781899][ T38] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1225.781911][ T38] R13: 00007f6c1d526038 R14: 00007f6c1d525fa0 R15: 00007ffce025d408 [ 1225.781944][ T38] [ 1225.781976][ T38] [ 1225.781976][ T38] Showing all locks held in the system: [ 1225.781987][ T38] 4 locks held by kworker/0:0/9: [ 1225.781998][ T38] #0: ffff88805d2d3538 ((wq_completion)wg-crypt-wg2#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.782053][ T38] #1: ffffc900000e7bc0 ((work_completion)(&peer->transmit_packet_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.782104][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.782151][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.782196][ T38] 4 locks held by kworker/0:1/10: [ 1225.782209][ T38] #0: ffff88805d2d3538 ((wq_completion)wg-crypt-wg2#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.782258][ T38] #1: ffffc900000f7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.782318][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.782363][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.782409][ T38] 5 locks held by kworker/u8:0/12: [ 1225.782420][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.782466][ T38] #1: ffffc90000117bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.782513][ T38] #2: ffff88807d910898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1225.782560][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.782605][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.782652][ T38] 4 locks held by kworker/u8:1/13: [ 1225.782662][ T38] #0: ffff88814db89138 ((wq_completion)bat_events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.782705][ T38] #1: ffffc90000127bc0 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.782759][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.782802][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.782849][ T38] 2 locks held by ksoftirqd/0/15: [ 1225.782860][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.782901][ T38] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.782945][ T38] 8 locks held by ktimers/0/16: [ 1225.782956][ T38] 4 locks held by pr/legacy/17: [ 1225.782968][ T38] 2 locks held by rcuc/0/20: [ 1225.782979][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.783018][ T38] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.783057][ T38] 2 locks held by ksoftirqd/1/30: [ 1225.783067][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.783111][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.783157][ T38] 1 lock held by khungtaskd/38: [ 1225.783168][ T38] #0: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 1225.783212][ T38] 6 locks held by kworker/u8:2/43: [ 1225.783224][ T38] #0: ffff8880325bf938 ((wq_completion)wg-kex-wg1#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.783275][ T38] #1: ffffc90000b47bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.783319][ T38] #2: ffff88805d4055f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 1225.783366][ T38] #3: ffff88805e25ce20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 1225.783409][ T38] #4: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.783453][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.783501][ T38] 6 locks held by kworker/u8:3/57: [ 1225.783512][ T38] #0: ffff88806093b138 ((wq_completion)wg-kex-wg2#11){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.783561][ T38] #1: ffffc9000123fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.783609][ T38] #2: ffff888037cb95f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 1225.783654][ T38] #3: ffff88806631ae58 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 1225.783699][ T38] #4: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.783751][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.783797][ T38] 2 locks held by kworker/u8:4/67: [ 1225.783817][ T38] 2 locks held by aoe_tx0/1322: [ 1225.783828][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.783871][ T38] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.783916][ T38] 4 locks held by kworker/u8:6/1364: [ 1225.783928][ T38] #0: ffff88805cda9138 ((wq_completion)wg-kex-wg1){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.783975][ T38] #1: ffffc900050f7bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.784020][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.784063][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.784109][ T38] 7 locks held by kworker/u8:8/2243: [ 1225.784121][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.784167][ T38] #1: ffffc90005f5fbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.784213][ T38] #2: ffff88805e257300 (&devlink->lock_key#3){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 1225.784267][ T38] #3: ffff88805ec61d20 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 1225.784315][ T38] #4: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 1225.784360][ T38] #5: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.784404][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.784460][ T38] 3 locks held by kworker/R-ipv6_/3226: [ 1225.784472][ T38] #0: ffff888030047138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.784517][ T38] #1: ffffc9000d0efba0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.784563][ T38] #2: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 1225.784611][ T38] 5 locks held by kworker/u8:9/3584: [ 1225.784622][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.784669][ T38] #1: ffffc9000d8afbc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.784715][ T38] #2: ffff888074b10898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1225.784769][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.784813][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.784858][ T38] 5 locks held by kworker/u8:12/3745: [ 1225.784869][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.784915][ T38] #1: ffffc9000ddafbc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.873784][ T38] #2: ffff8880662d0898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1225.873837][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.873883][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.873929][ T38] 4 locks held by kworker/u8:13/3871: [ 1225.873941][ T38] #0: ffff88805cdab938 ((wq_completion)wg-kex-wg2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.873985][ T38] #1: ffffc9000e2bfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.874031][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.874075][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.874121][ T38] 2 locks held by klogd/5198: [ 1225.874133][ T38] 1 lock held by udevd/5209: [ 1225.874144][ T38] 2 locks held by dhcpcd/5503: [ 1225.874155][ T38] #0: ffffffff8ecb7d58 (vlan_ioctl_mutex){+.+.}-{4:4}, at: sock_ioctl+0x5f1/0x790 [ 1225.874199][ T38] #1: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: vlan_ioctl_handler+0xd0/0x650 [ 1225.874249][ T38] 2 locks held by getty/5596: [ 1225.874260][ T38] #0: ffff88823bf640a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1225.874309][ T38] #1: ffffc90003e832e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x444/0x1410 [ 1225.874355][ T38] 3 locks held by syz-executor/5827: [ 1225.874366][ T38] #0: ffff88802799c050 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x21/0x50 [ 1225.874411][ T38] #1: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.874455][ T38] #2: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.874503][ T38] 4 locks held by kworker/R-wg-cr/6053: [ 1225.874515][ T38] #0: ffff88805d2e6938 ((wq_completion)wg-crypt-wg1#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.874565][ T38] #1: ffffc900046d7ba0 ((work_completion)(&peer->transmit_packet_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.874611][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.874672][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.874717][ T38] 2 locks held by kworker/1:4/6069: [ 1225.874737][ T38] 5 locks held by kworker/1:7/7387: [ 1225.874749][ T38] 4 locks held by kworker/0:9/12045: [ 1225.874760][ T38] #0: ffff88805d2d3538 ((wq_completion)wg-crypt-wg2#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.874811][ T38] #1: ffffc90004837bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.874876][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.874921][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.874964][ T38] 4 locks held by kworker/u9:0/18880: [ 1225.874976][ T38] #0: ffff8880309f1138 ((wq_completion)krxrpcd){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.875025][ T38] #1: ffffc90003e0fbc0 ((work_completion)(&rxnet->peer_keepalive_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.875071][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.875115][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.875161][ T38] 2 locks held by kworker/u8:7/19570: [ 1225.875173][ T38] 4 locks held by kworker/0:10/19742: [ 1225.875183][ T38] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.875229][ T38] #1: ffffc90005cc7bc0 ((work_completion)(&(&tbl->gc_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.875275][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.875319][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.875366][ T38] 2 locks held by kworker/1:0/29653: [ 1225.875381][ T38] 4 locks held by kworker/0:3/30565: [ 1225.875392][ T38] #0: ffff88802fbdd138 ((wq_completion)wg-kex-wg2#12){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.875443][ T38] #1: ffffc90005717bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.875503][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.875548][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.875595][ T38] 6 locks held by kworker/0:4/841: [ 1225.875606][ T38] #0: ffff888036533d38 ((wq_completion)wg-kex-wg1#12){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.875656][ T38] #1: ffffc9001113fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.875714][ T38] #2: ffff888052ab95f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_response+0x115/0x970 [ 1225.875768][ T38] #3: ffff88806631a3c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_response+0x126/0x970 [ 1225.875812][ T38] #4: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.875856][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.875900][ T38] 4 locks held by kworker/u8:5/856: [ 1225.875911][ T38] #0: ffff88806195f938 ((wq_completion)wg-kex-wg1#14){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.875961][ T38] #1: ffffc900110afbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.876007][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.876050][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.876095][ T38] 7 locks held by kworker/u8:10/857: [ 1225.876106][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.876151][ T38] #1: ffffc90011d97bc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.876198][ T38] #2: ffff888037a55300 (&devlink->lock_key#9){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 1225.876252][ T38] #3: ffff88805ecaa920 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 1225.876300][ T38] #4: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 1225.876345][ T38] #5: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.876388][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.876434][ T38] 4 locks held by kworker/0:5/870: [ 1225.876445][ T38] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.876490][ T38] #1: ffffc90011e17bc0 ((work_completion)(&(&tbl->managed_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.876537][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.876582][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.876628][ T38] 2 locks held by syz.6.12927/940: [ 1225.876639][ T38] #0: ffff88803243e0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_release+0x110/0x200 [ 1225.876682][ T38] #1: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_dev_lock+0x257/0x2f0 [ 1225.876736][ T38] 1 lock held by syz.5.12932/962: [ 1225.876748][ T38] #0: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: rtnetlink_rcv_msg+0x71c/0xb70 [ 1225.876794][ T38] 2 locks held by kworker/u8:14/963: [ 1225.876806][ T38] 5 locks held by kworker/u8:15/964: [ 1225.876818][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.876863][ T38] #1: ffffc90010a27bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.876909][ T38] #2: ffff8880766c0898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1225.876956][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.876999][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.877044][ T38] 4 locks held by kworker/u8:16/965: [ 1225.877054][ T38] #0: ffff888032016138 ((wq_completion)wg-kex-wg0){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.877099][ T38] #1: ffffc90010a17bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.877145][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.877189][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.877234][ T38] 4 locks held by kworker/u8:17/966: [ 1225.877245][ T38] #0: ffff88806195f938 ((wq_completion)wg-kex-wg1#14){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.877294][ T38] #1: ffffc900109f7bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.877340][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.877383][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.877428][ T38] 7 locks held by kworker/u8:18/967: [ 1225.877439][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.877483][ T38] #1: ffffc900109d7bc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.877529][ T38] #2: ffff88805e33b300 (&devlink->lock_key#2){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 1225.877582][ T38] #3: ffff88805f471120 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 1225.877630][ T38] #4: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 1225.877674][ T38] #5: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.877719][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.877771][ T38] 7 locks held by kworker/u8:19/968: [ 1225.877783][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.877827][ T38] #1: ffffc90010997bc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.877874][ T38] #2: ffff888038a0d300 (&devlink->lock_key#8){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 1225.877926][ T38] #3: ffff888034020920 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 1225.877974][ T38] #4: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 1225.878017][ T38] #5: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.878062][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.878107][ T38] 4 locks held by kworker/u8:20/969: [ 1225.878119][ T38] #0: ffff88805cda9138 ((wq_completion)wg-kex-wg1){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.878164][ T38] #1: ffffc90010987bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.878214][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.878259][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.878304][ T38] 6 locks held by kworker/u8:21/970: [ 1225.878316][ T38] #0: ffff888026227938 ((wq_completion)wg-kex-wg2#13){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.878365][ T38] #1: ffffc90010977bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.878411][ T38] #2: ffff8880327415f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 1225.878456][ T38] #3: ffff88806631ce20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 1225.878499][ T38] #4: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.878544][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.878589][ T38] 4 locks held by kworker/u8:22/971: [ 1225.878601][ T38] 4 locks held by kworker/u8:25/974: [ 1225.878612][ T38] #0: ffff8880325bf938 ((wq_completion)wg-kex-wg1#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.878662][ T38] #1: ffffc90010befbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.878707][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.878757][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.878801][ T38] 4 locks held by kworker/u8:26/975: [ 1225.878813][ T38] #0: ffff88806093e938 ((wq_completion)wg-kex-wg0#11){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.878862][ T38] #1: ffffc900057d7bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.878907][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.878950][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.878996][ T38] 4 locks held by kworker/u8:28/977: [ 1225.879007][ T38] #0: ffff88805d493938 ((wq_completion)wg-kex-wg2#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.879058][ T38] #1: ffffc90010b2fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.879109][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.879154][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.879200][ T38] 4 locks held by kworker/u8:29/978: [ 1225.879211][ T38] #0: ffff888028878138 ((wq_completion)wg-kex-wg1#11){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.879259][ T38] #1: ffffc900110efbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.879306][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.879349][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.879395][ T38] 4 locks held by kworker/0:6/979: [ 1225.879406][ T38] #0: ffff8880374af538 ((wq_completion)wg-crypt-wg0#6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.879456][ T38] #1: ffffc90010bbfbc0 ((work_completion)(&peer->transmit_packet_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.879502][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.879546][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.879591][ T38] 5 locks held by kworker/u8:30/980: [ 1225.879603][ T38] 5 locks held by kworker/u8:31/982: [ 1225.879615][ T38] 7 locks held by kworker/u8:32/983: [ 1225.879626][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.879671][ T38] #1: ffffc90011e47bc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.879723][ T38] #2: ffff888030817300 (&devlink->lock_key#4){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 1225.879782][ T38] #3: ffff88805e4a8d20 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 1225.879830][ T38] #4: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 1225.879874][ T38] #5: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1225.879919][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1225.879965][ T38] 3 locks held by syz-executor/984: [ 1225.879977][ T38] 6 locks held by kworker/u8:33/985: [ 1225.879987][ T38] #0: ffff888026227938 ((wq_completion)wg-kex-wg2#13){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1225.880036][ T38] #1: ffffc90005637bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1225.880081][ T38] #2: ffff8880327415f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 1225.880127][ T38] #3: ffff88803948a3c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 1225.880172][ T38] #4: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: raw_spin_rq_lock_nested+0x2a/0x140 [ 1228.957107][ T38] #5: ffff8880b8824088 (psi_seq){-...}-{0:0}, at: psi_task_switch+0x53/0x880 [ 1228.957157][ T38] [ 1228.957163][ T38] ============================================= [ 1228.957163][ T38] [ 1228.957184][ T38] NMI backtrace for cpu 0 [ 1228.957204][ T38] CPU: 0 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1228.957255][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1228.957279][ T38] Call Trace: [ 1228.957297][ T38] [ 1228.957315][ T38] dump_stack_lvl+0x189/0x250 [ 1228.957352][ T38] ? __pfx_dump_stack_lvl+0x10/0x10 [ 1228.957375][ T38] ? __pfx__printk+0x10/0x10 [ 1228.957408][ T38] nmi_cpu_backtrace+0x39e/0x3d0 [ 1228.957435][ T38] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 1228.957459][ T38] ? __pfx__printk+0x10/0x10 [ 1228.957483][ T38] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1228.957507][ T38] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 1228.957532][ T38] watchdog+0xf93/0xfe0 [ 1228.957559][ T38] ? watchdog+0x1de/0xfe0 [ 1228.957586][ T38] kthread+0x70e/0x8a0 [ 1228.957613][ T38] ? __pfx_watchdog+0x10/0x10 [ 1228.957634][ T38] ? __pfx_kthread+0x10/0x10 [ 1228.957662][ T38] ? __pfx_kthread+0x10/0x10 [ 1228.957694][ T38] ret_from_fork+0x436/0x7d0 [ 1228.957737][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 1228.957765][ T38] ? __switch_to_asm+0x39/0x70 [ 1228.957782][ T38] ? __switch_to_asm+0x33/0x70 [ 1228.957798][ T38] ? __pfx_kthread+0x10/0x10 [ 1228.957822][ T38] ret_from_fork_asm+0x1a/0x30 [ 1228.957854][ T38] [ 1228.957862][ T38] Sending NMI from CPU 0 to CPUs 1: [ 1228.957888][ C1] NMI backtrace for cpu 1 [ 1228.957902][ C1] CPU: 1 UID: 0 PID: 29 Comm: ktimers/1 Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1228.957921][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1228.957931][ C1] RIP: 0010:rcu_is_watching+0x5a/0xb0 [ 1228.957955][ C1] Code: f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 dc 9c 78 00 48 c7 c3 18 74 f7 91 49 03 1e 48 89 d8 48 c1 e8 03 42 0f b6 04 38 <84> c0 75 34 8b 03 65 ff 0d 19 28 51 10 74 11 83 e0 04 c1 e8 02 5b [ 1228.957968][ C1] RSP: 0018:ffffc90000a3e8f8 EFLAGS: 00000a02 [ 1228.957983][ C1] RAX: 0000000000000000 RBX: ffff8880b8933418 RCX: 23ecff2e1c581c00 [ 1228.957995][ C1] RDX: ffffffff8fa18698 RSI: ffffffff8b621660 RDI: ffffffff8b621620 [ 1228.958007][ C1] RBP: dffffc0000000000 R08: 0000000000000015 R09: ffffffff8172c165 [ 1228.958019][ C1] R10: ffffc90000a3ea38 R11: ffffffff81aaf310 R12: 1ffff92000147d3d [ 1228.958032][ C1] R13: ffffc90000a3ea38 R14: ffffffff8d252d18 R15: dffffc0000000000 [ 1228.958044][ C1] FS: 0000000000000000(0000) GS:ffff8881269bc000(0000) knlGS:0000000000000000 [ 1228.958058][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1228.958070][ C1] CR2: 00007f4d61137ff8 CR3: 000000000d7a6000 CR4: 00000000003526f0 [ 1228.958085][ C1] Call Trace: [ 1228.958092][ C1] [ 1228.958099][ C1] ? unwind_next_frame+0xa5/0x2390 [ 1228.958118][ C1] unwind_next_frame+0x1965/0x2390 [ 1228.958140][ C1] ? unwind_next_frame+0xa5/0x2390 [ 1228.958158][ C1] ? ret_from_fork_asm+0x1a/0x30 [ 1228.958176][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1228.958193][ C1] arch_stack_walk+0x11c/0x150 [ 1228.958221][ C1] ? ret_from_fork_asm+0x1a/0x30 [ 1228.958238][ C1] stack_trace_save+0x9c/0xe0 [ 1228.958253][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 1228.958278][ C1] kasan_save_track+0x3e/0x80 [ 1228.958295][ C1] ? kasan_save_track+0x3e/0x80 [ 1228.958310][ C1] ? __kasan_slab_alloc+0x6c/0x80 [ 1228.958326][ C1] ? kmem_cache_alloc_node_noprof+0x14e/0x330 [ 1228.958344][ C1] ? __alloc_skb+0x112/0x2d0 [ 1228.958364][ C1] ? fdb_notify+0xa6/0x160 [ 1228.958380][ C1] ? br_fdb_update+0x4cb/0x690 [ 1228.958397][ C1] ? br_handle_frame_finish+0x573/0x19b0 [ 1228.958410][ C1] ? br_nf_hook_thresh+0x3c6/0x4a0 [ 1228.958430][ C1] ? br_nf_pre_routing_finish_ipv6+0x948/0xd00 [ 1228.958452][ C1] ? br_nf_pre_routing_ipv6+0x37e/0x6b0 [ 1228.958467][ C1] ? br_handle_frame+0x985/0x14d0 [ 1228.958480][ C1] ? __netif_receive_skb_core+0x10b9/0x4020 [ 1228.958498][ C1] ? __netif_receive_skb+0x72/0x380 [ 1228.958514][ C1] ? process_backlog+0x31e/0x900 [ 1228.958530][ C1] ? __napi_poll+0xb6/0x540 [ 1228.958546][ C1] ? net_rx_action+0x707/0xe00 [ 1228.958562][ C1] ? handle_softirqs+0x22f/0x710 [ 1228.958578][ C1] ? run_ktimerd+0xcf/0x190 [ 1228.958595][ C1] ? smpboot_thread_fn+0x53f/0xa60 [ 1228.958611][ C1] ? kthread+0x70e/0x8a0 [ 1228.958629][ C1] ? ret_from_fork+0x436/0x7d0 [ 1228.958645][ C1] ? ret_from_fork_asm+0x1a/0x30 [ 1228.958676][ C1] ? __alloc_skb+0x112/0x2d0 [ 1228.958695][ C1] __kasan_slab_alloc+0x6c/0x80 [ 1228.958712][ C1] ? __alloc_skb+0x112/0x2d0 [ 1228.958730][ C1] kmem_cache_alloc_node_noprof+0x14e/0x330 [ 1228.958751][ C1] __alloc_skb+0x112/0x2d0 [ 1228.958771][ C1] fdb_notify+0xa6/0x160 [ 1228.958789][ C1] br_fdb_update+0x4cb/0x690 [ 1228.958809][ C1] ? __pfx_br_fdb_update+0x10/0x10 [ 1228.958832][ C1] br_handle_frame_finish+0x573/0x19b0 [ 1228.958848][ C1] ? __pfx_get_l4proto+0x10/0x10 [ 1228.958864][ C1] ? kasan_save_track+0x3e/0x80 [ 1228.958879][ C1] ? __kasan_slab_alloc+0x6c/0x80 [ 1228.958896][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1228.958911][ C1] ? nf_conntrack_handle_icmp+0xe9/0x180 [ 1228.958931][ C1] ? nf_conntrack_in+0x1346/0x15d0 [ 1228.958950][ C1] ? nf_hook_slow+0x176/0x220 [ 1228.958970][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1228.958983][ C1] br_nf_hook_thresh+0x3c6/0x4a0 [ 1228.959008][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 1228.959028][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1228.959049][ C1] br_nf_pre_routing_finish_ipv6+0x948/0xd00 [ 1228.959065][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1228.959083][ C1] ? br_nf_pre_routing_ipv6+0x42f/0x6b0 [ 1228.959099][ C1] br_nf_pre_routing_ipv6+0x37e/0x6b0 [ 1228.959116][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 1228.959133][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 1228.959148][ C1] ? br_nf_pre_routing+0x720/0x1470 [ 1228.959170][ C1] ? __pfx_br_nf_pre_routing+0x10/0x10 [ 1228.959189][ C1] br_handle_frame+0x985/0x14d0 [ 1228.959209][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 1228.959222][ C1] ? try_to_take_rt_mutex+0x840/0xb00 [ 1228.959243][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1228.959261][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 1228.959276][ C1] __netif_receive_skb_core+0x10b9/0x4020 [ 1228.959294][ C1] ? __lock_acquire+0xab9/0xd20 [ 1228.959316][ C1] ? do_raw_spin_lock+0x121/0x290 [ 1228.959337][ C1] ? _raw_spin_unlock_irqrestore+0x85/0x110 [ 1228.959357][ C1] ? __pfx___netif_receive_skb_core+0x10/0x10 [ 1228.959375][ C1] ? _raw_spin_unlock_irqrestore+0xad/0x110 [ 1228.959395][ C1] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 1228.959417][ C1] ? __lock_acquire+0xab9/0xd20 [ 1228.959445][ C1] ? process_backlog+0x27b/0x900 [ 1228.959464][ C1] ? process_backlog+0x27b/0x900 [ 1228.959481][ C1] __netif_receive_skb+0x72/0x380 [ 1228.959498][ C1] ? rt_spin_unlock+0x65/0x80 [ 1228.959516][ C1] ? process_backlog+0x27b/0x900 [ 1228.959533][ C1] process_backlog+0x31e/0x900 [ 1228.959558][ C1] __napi_poll+0xb6/0x540 [ 1228.959577][ C1] net_rx_action+0x707/0xe00 [ 1228.959604][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 1228.959625][ C1] ? kvm_sched_clock_read+0x11/0x20 [ 1228.959649][ C1] ? __pfx_sched_clock_cpu+0x10/0x10 [ 1228.959671][ C1] handle_softirqs+0x22f/0x710 [ 1228.959693][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 1228.959714][ C1] run_ktimerd+0xcf/0x190 [ 1228.959731][ C1] ? __pfx_run_ktimerd+0x10/0x10 [ 1228.959748][ C1] ? schedule+0x91/0x360 [ 1228.959770][ C1] ? smpboot_thread_fn+0x4d/0xa60 [ 1228.959787][ C1] smpboot_thread_fn+0x53f/0xa60 [ 1228.959805][ C1] ? smpboot_thread_fn+0x4d/0xa60 [ 1228.959827][ C1] kthread+0x70e/0x8a0 [ 1228.959848][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 1228.959865][ C1] ? __pfx_kthread+0x10/0x10 [ 1228.959886][ C1] ? __pfx_kthread+0x10/0x10 [ 1228.959906][ C1] ret_from_fork+0x436/0x7d0 [ 1228.959925][ C1] ? __pfx_ret_from_fork+0x10/0x10 [ 1228.959945][ C1] ? __switch_to_asm+0x39/0x70 [ 1228.959959][ C1] ? __switch_to_asm+0x33/0x70 [ 1228.959972][ C1] ? __pfx_kthread+0x10/0x10 [ 1228.959992][ C1] ret_from_fork_asm+0x1a/0x30 [ 1228.960014][ C1] [ 1228.960902][ T38] Kernel panic - not syncing: hung_task: blocked tasks [ 1228.960922][ T38] CPU: 0 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1228.960945][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1228.960956][ T38] Call Trace: [ 1228.960965][ T38] [ 1228.960975][ T38] dump_stack_lvl+0x99/0x250 [ 1228.961002][ T38] ? __asan_memcpy+0x40/0x70 [ 1228.961023][ T38] ? __pfx_dump_stack_lvl+0x10/0x10 [ 1228.961046][ T38] ? __pfx__printk+0x10/0x10 [ 1228.961079][ T38] vpanic+0x281/0x750 [ 1228.961105][ T38] ? __pfx_vpanic+0x10/0x10 [ 1228.961126][ T38] ? __x2apic_send_IPI_mask+0x1e4/0x260 [ 1228.961146][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1228.961182][ T38] panic+0xb9/0xc0 [ 1228.961205][ T38] ? __pfx_panic+0x10/0x10 [ 1228.961230][ T38] ? irq_work_queue+0xc3/0x140 [ 1228.961256][ T38] ? nmi_trigger_cpumask_backtrace+0x234/0x300 [ 1228.961282][ T38] watchdog+0xfd2/0xfe0 [ 1228.961309][ T38] ? watchdog+0x1de/0xfe0 [ 1228.961335][ T38] kthread+0x70e/0x8a0 [ 1228.961374][ T38] ? __pfx_watchdog+0x10/0x10 [ 1228.961394][ T38] ? __pfx_kthread+0x10/0x10 [ 1228.961423][ T38] ? __pfx_kthread+0x10/0x10 [ 1228.961447][ T38] ret_from_fork+0x436/0x7d0 [ 1228.961473][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 1228.961500][ T38] ? __switch_to_asm+0x39/0x70 [ 1228.961518][ T38] ? __switch_to_asm+0x33/0x70 [ 1228.961535][ T38] ? __pfx_kthread+0x10/0x10 [ 1228.961560][ T38] ret_from_fork_asm+0x1a/0x30 [ 1228.961595][ T38] [ 1228.962124][ T38] Kernel Offset: disabled