last executing test programs: 3m31.564756681s ago: executing program 2 (id=11053): r0 = socket(0xa, 0x3, 0xff) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0xfffffff9, 0x4) syz_emit_ethernet(0x4e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa3986dd6c370c8900182b01fe800000000000000000000000000025fe8000000000000000000000000000aaff"], 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000000)=0x6528, 0x4) recvmmsg$unix(r0, &(0x7f00000071c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=[@rights={{0x10}}], 0x10}}], 0x1, 0x120, 0x0) 3m30.171164628s ago: executing program 2 (id=11057): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000a00)={'syz1\x00', {0x9, 0x7, 0x5, 0x5}, 0x3f, [0x20009, 0x2, 0x18, 0x5, 0x2, 0x400, 0x80000000, 0x0, 0x8, 0x0, 0x20000006, 0x2, 0xfffffffb, 0x39, 0x747d5e13, 0x800, 0xfffffb9a, 0xfffffffe, 0x0, 0xfffffffb, 0x2004, 0x3, 0x0, 0xf250, 0x80, 0x4800, 0x300000, 0x7, 0xe, 0x4623f, 0x0, 0x10001, 0x1ff, 0x8000, 0x7, 0x3, 0xc, 0x3, 0xba55, 0x8da8, 0x2, 0x200, 0xfffffffe, 0x400, 0xe, 0x4, 0xffffffff, 0x6c, 0x8, 0x9, 0x1, 0x199d, 0x6, 0x2, 0x9, 0xffffffff, 0x4, 0x6, 0x1000, 0x5, 0x35, 0x8, 0xa, 0x5], [0x7, 0x1e, 0x3, 0x8000, 0xfffffffd, 0x3, 0x0, 0x200025, 0x7, 0xfffffffc, 0x8, 0x7fff, 0x72c, 0x1c32, 0x3, 0x5, 0x5, 0x400, 0x7ffd, 0x3, 0x1, 0x297, 0x5, 0x0, 0x981, 0x4, 0x0, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0x10, 0xfffffff9, 0xfffffffd, 0x68, 0x1, 0xffffffff, 0x6, 0x8, 0x800, 0xffff, 0x6, 0x96, 0x9, 0x2, 0x0, 0x200, 0x401, 0xc, 0x2, 0x379, 0x9, 0xe, 0x5, 0x7, 0x6, 0x2, 0x1, 0x1, 0x5, 0x7, 0x200, 0x3], [0x401, 0x8000c584, 0x5, 0xcd3, 0x7, 0x1f, 0x404, 0x4, 0x4008, 0xc, 0x7, 0x9, 0xe8b, 0x5, 0x80000001, 0x8, 0x3f92, 0x1000, 0x0, 0x10, 0x1, 0xfffffff9, 0x0, 0x1000, 0x80040101, 0x5, 0x4, 0x5, 0x200003, 0x6, 0x5, 0x80, 0x9, 0x7ffe, 0x10000, 0x0, 0x3, 0x400004, 0x3, 0x6d7e, 0xfffffffc, 0x8, 0x3, 0x3ff, 0x20000006, 0x9, 0x95e, 0xffffffff, 0x3ff, 0xe, 0x6, 0x100fffd, 0x2005, 0x9, 0x4, 0xea, 0x9, 0x20000005, 0x3, 0xd9, 0x0, 0x7d, 0x401, 0x5], [0x108e, 0x10002, 0x1, 0x3, 0x88, 0x2, 0xffffff80, 0x4, 0x50, 0x2, 0x763, 0xb, 0x402, 0x1, 0x5, 0x1000, 0x7f, 0x5, 0x3fa6, 0x4, 0x0, 0x5, 0x3, 0x6, 0xe47, 0x4, 0x3, 0x4, 0x200, 0x2851, 0x3b, 0x20000001, 0x5, 0x5, 0xfffff734, 0x65f413f9, 0x4, 0x20008, 0x8a5, 0x82, 0x44, 0x409, 0x3, 0x4, 0x4, 0xe, 0x4, 0xffffffff, 0x7fff, 0xffff8a33, 0xfffffff8, 0x401, 0x3, 0x200, 0x7, 0x1f3, 0xfffffffd, 0xa, 0xe, 0x101, 0xf, 0x1f, 0x136, 0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) readv(r0, &(0x7f0000001240)=[{&(0x7f00000012c0)=""/41, 0x29}], 0x1) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) 3m29.685375667s ago: executing program 1 (id=11058): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000170000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000009b00000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x5e}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00'}, 0x27) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 3m28.27682536s ago: executing program 3 (id=11064): socket$kcm(0x11, 0x20000000000000a, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400090000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000010000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e1a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080e71113610e10d858e8327edb1fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18c65ae1bd4f4390af9a9ceafd07ed00b0000002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a891588d818a0afc0b3116a130974cac0615232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72c7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c9068000000bc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b40000000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f3ca1664fe2f3ced8416dc180604b60c2499d16d7d9158ffffffff00000000ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d7676074a0bde4471414c99d4894ee7f8139dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8070000001fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491d04aaee0d409731091f4fb94c06006e3c1be2f633c1d987591ec3db58a7bb3042ec3f84e4272d2cc72d4e771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e1590bab105b0cb578af7dc7d5e87d48d376444e2de02f47c61e8e84ff828de457f34c2b08660b080efc707e676e1fb4d5865c0ca177a4c7fbb4e829ab0894a1062b445c00f576b2b5cc7f819abd0f885cc4806f47ffb966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329bb8cda690d192a070886df42b2708398773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5bfc182cb5e8380100632d03a7ca6f6d0339f9953c30930804fdc3690d10ecb65dc5b47481edbf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026def743f1213bf817becd9e5a225d67521d1128eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979030000007081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661351df747aa6a65872dfdcfa68f65bd06b4082d43e121861b5cc09b986bf56c747d9a1cc5b506892c3a16ff10feea20bdac89bfb758cf3500000000000000000000000000000098e6db5a96055e764a3bfd4ccb20d2e800994f4b602d25b2c076f21c7102687e054bb93b2d013be6227fd99902b074c0de00733128c81c48c5e140b17d71ac48f137d10798c4272826d2ba55bbda0059636528c132ed06759d880d1bc291a76456cd7ee8bcb392fdf886dbc74879ec4b831904d7c101ebbaef3c0ae6d0cf0000000000000000000000000000000011cb735f66a559ef0cdb5163a15c0bb986474bf5d9542e3e48805ce53127e4c076d69d868df543717aaaa07d7aca056f7f036c2bcba0795d1a64868a29ac5321b3cd6ef5b1a741afc7124ee3df3a35e8014d6cb5fd6c054a10bb2146174c1d68b45fcfd7e531090ceae2f05536a4d5d6a4081e743827fb9c031d1fc9f195c2da189c49eaed6c30c71da0452e502ef393efeb02ebe82b1851cae5fa7c958ba23110b5e0e5b890803f28a356b2920e74564e0f8377b0ba5187fed2882b4780a1bcb583f1cb1470003ef9b592b9461328cfc01ebfce0ecdcea714a517dc40000000000000000000000000006bd0561e1cc72880cc3ec1bdf35eb670a9040e3b53cd826b94ad8aeb014e74787fe89fb3247a87d8bfb6d400142369f88964708d1d4db5a5df9d62ea6d805dfce568b885a50ed8e2eaf8a932287a1d3bfac17774e58875a63b77e07298e4b4f515189c6fcac3cd35dac9240e633219bb6a5a25865e6ed8e16caa5406b56702afe0befcabbc9a2a772a1a087f0d633d457bceb695b2cba3a1a2daa2dda796373cc0fe0a53236d028fc1076bb746b2717c8b6052f58c91bb8cc19474ab9d4d2160773829f078727f6c684ca749136a7f46ca28b00bb4237695b4"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2e0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f91731dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2f}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x10}]}}}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xa4}}, 0x20050800) 3m27.975802796s ago: executing program 1 (id=11065): prlimit64(0x0, 0xf, &(0x7f0000000140)={0x8, 0x7}, 0x0) ptrace(0x10, 0x0) r0 = add_key$user(&(0x7f0000000380), &(0x7f0000000000), &(0x7f00000003c0)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200), &(0x7f00000005c0), &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r0, r1, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'streebog512-generic\x00'}}) 3m27.270361511s ago: executing program 2 (id=11068): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000100)=[{0x6, 0x40, 0xff, 0x7fff0000}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1d3) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f0000000240)='.\x00', 0x60000526) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 3m25.740494989s ago: executing program 1 (id=11070): mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000001, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00005d6000/0x4000)=nil, 0x4000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) munlockall() 3m25.288628609s ago: executing program 2 (id=11072): syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0xac5) syz_clone3(&(0x7f0000000900)={0x0, &(0x7f0000000040)=0xffffffffffffffff, 0x0, 0x0, {0x1b}, 0x0, 0x0, 0x0, 0x0}, 0x58) io_setup(0x8, &(0x7f0000000600)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x6, r0, 0x0}]) 3m25.228053857s ago: executing program 3 (id=11073): syz_usb_connect(0x3, 0xf5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000001000ffff26bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="15170000bcb7040008000a00", @ANYRES32=r1, @ANYBLOB="140012800c0001006d6163767461700004000280080005"], 0x44}, 0x1, 0x0, 0x0, 0x240448d5}, 0x8000002) 3m21.606588903s ago: executing program 2 (id=11079): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0xa}]}], {0x14}}, 0x64}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000100850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465cbf188ef10871b81ac7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6cd87cef9000000a39c15a7ef365cc27dfeac7b9b0e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19ea2eb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc089a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b11056969f486f80a35f7f2339704fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d0000000000000000000000004e1fa60acabcf0553910ca2e5ea499fd5889dde9261f0848a5b8af657bfc96049308e8953431b269053627a1523551c160c813969925a892d266792352ec0204596a37ce8d6d260b32239bddbce2e79f93cb5a0ad897adb53b397d07c50f84b74f2605a565ee149016aa75ea31c0087dcd821b47c8b36efc6da4fb2ea7f1f36c85856b73ac9872babc62149699b6b8c796a79d833eb4b5ca668d430db5653a2b3c5b87e17ca1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2f9, 0xffffca88, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632f77fb7f0200017f020001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 3m20.855323637s ago: executing program 1 (id=11082): r0 = syz_open_dev$loop(&(0x7f0000000100), 0xf01c, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file1/../file0', [], 0xa, "000278414808f90249a8974898280f3c430a34b2de9a57967d49c269449fc906"}, 0x34) write$UHID_INPUT(r1, &(0x7f00000007c0)={0x8, {"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", 0x1000}}, 0x1006) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1c, "fee8a2ab78fc5e3ed1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "9001001c551265406c7f306003d8a0f4bd0000000300"}}) 3m20.090208376s ago: executing program 2 (id=11085): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x101c01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r1, 0x400454cc, 0x306) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) 3m19.401128315s ago: executing program 1 (id=11088): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) listen(r0, 0x1) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f00000001c0), 0x8) listen(r1, 0x0) 3m18.943845606s ago: executing program 3 (id=11089): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) fallocate(r0, 0x0, 0xfea000, 0x2000402) lseek(r0, 0x1, 0x3) 3m17.292320245s ago: executing program 1 (id=11092): r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth0_macvtap\x00', 0x0}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [], 0x0, [0x1, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c4, 0x8000, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) r3 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xfffbffff, {0x0, 0x0, 0x0, r1, {0x0, 0x8}, {0xffff, 0xffff}, {0xc, 0xfff3}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x1c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x8001}]}]}, @TCA_TAPRIO_ATTR_SCHED_CLOCKID={0x8}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40001}, 0x10) 3m15.207841443s ago: executing program 3 (id=11095): timer_create(0x0, 0x0, &(0x7f0000000300)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x5031, 0xffffffffffffffff, 0xc2dcc000) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') timer_create(0x0, 0x0, &(0x7f0000000300)) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000200)=""/122, 0x7a}], 0x1, 0x45, 0x0) 3m6.623054325s ago: executing program 3 (id=11107): r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)=@multiplanar_overlay={0xe2, 0xd, 0x4, 0x8, 0x0, {0x0, 0x2710}, {0x3, 0x2, 0xa0, 0x6, 0x24, 0xff, "a580e4f4"}, 0x6, 0x3, {0x0}, 0x6}) r1 = syz_open_dev$swradio(&(0x7f0000000000), 0x0, 0x2) r2 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000280)={{0x3, 0x5, 0x263f, 0x0, '\x00', 0x20000000}, 0x0, [0x0, 0x0, 0x80, 0xfffdffffffffbffd, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000c19, 0xfffffffffffffffc, 0x7, 0x5, 0x0, 0x2, 0x6, 0x40, 0x0, 0x6, 0x100000000, 0x0, 0x0, 0xc, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x1000000000000c, 0x0, 0x0, 0x0, 0x0, 0x103, 0xc1, 0x3, 0x80100000000000, 0x0, 0x0, 0x3, 0x0, 0xe411, 0x10000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x10000000, 0x400, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffe, 0xffffffffffff8001, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8001, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x400, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x2000000, 0x0, 0x2, 0x6, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f00000001c0)={0xd, @vbi={0xf4, 0xff, 0x61f, 0x30385056, [0x0, 0x8], [0x6, 0x15], 0x1}}) 3m4.195709621s ago: executing program 3 (id=11110): r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 3m3.106452948s ago: executing program 32 (id=11085): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x101c01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r1, 0x400454cc, 0x306) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) 3m0.442662712s ago: executing program 33 (id=11092): r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth0_macvtap\x00', 0x0}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [], 0x0, [0x1, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c4, 0x8000, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) r3 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xfffbffff, {0x0, 0x0, 0x0, r1, {0x0, 0x8}, {0xffff, 0xffff}, {0xc, 0xfff3}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x1c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x8001}]}]}, @TCA_TAPRIO_ATTR_SCHED_CLOCKID={0x8}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40001}, 0x10) 3m0.323253927s ago: executing program 4 (id=11119): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text64={0x40, 0x0}], 0x1, 0x54, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0xb000) 2m59.1588809s ago: executing program 4 (id=11121): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000040000000400000001"], 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000001c0)={r2, 0xffffffffffffffff, 0x60000000}, 0xc) 2m56.815802188s ago: executing program 4 (id=11123): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000840)="a6e0775c40424ae2fa17e3edddc853", 0xf, 0x200080c0, &(0x7f00000001c0)={0xa, 0x2, 0x8000, @loopback, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='cdg', 0x3) shutdown(r0, 0x1) 2m55.226916222s ago: executing program 4 (id=11125): r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x14, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x7ff, 0x10, 0x8, 0x2}, 0x8) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)="a7", 0x1, 0x48d8, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @loopback, 0xe5f}, 0x1c) 2m53.114761549s ago: executing program 4 (id=11127): r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000018105e04da0700000000000109022400010000000009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000004c0)={0x24, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x22, 0x22, {[@global=@item_012={0x2, 0x1, 0x9, "0100"}, @global=@item_012={0x2, 0x1, 0x0, "0100"}, @main=@item_4={0x3, 0x0, 0x8}, @local=@item_012={0x2, 0x2, 0x2, "90a0"}, @global=@item_012={0x1, 0x1, 0x8, '8'}, @main=@item_4={0x3, 0x0, 0xb, "c83e2503"}, @local=@item_012={0x2, 0x2, 0x8, "3994"}, @local=@item_4={0x3, 0x2, 0x2, "b09ea549"}, @main=@item_4={0x3, 0x0, 0x8, "ce9abc16"}]}}, 0x0}, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x106f) 2m51.961535571s ago: executing program 4 (id=11129): syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d"], 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="034886dd0903"], 0xfdef) 2m46.719546674s ago: executing program 34 (id=11110): r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 2m34.729581618s ago: executing program 35 (id=11129): syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d"], 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="034886dd0903"], 0xfdef) 1m30.719680385s ago: executing program 8 (id=11143): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = gettid() timer_create(0x7, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) landlock_restrict_self(0xffffffffffffffff, 0xc) 29.694760129s ago: executing program 0 (id=11252): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sched_setaffinity(0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$ENABLE_STATS(0x20, 0x0, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x83, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000003c0)={0x54, 0x0, 0x0, {0xfffc, 0x1}, {0x51, 0x2}, @const={0x6, {0x1003, 0x6, 0x5, 0x2}}}) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x2, 0x862b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x2250) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 28.467081597s ago: executing program 0 (id=11253): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x22, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x2}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = memfd_create(&(0x7f0000000040)='rootmode', 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) r2 = userfaultfd(0x80001) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x68}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) pwrite64(r1, &(0x7f0000000140)="b8c4", 0x2, 0xfff) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa07, &(0x7f0000000280)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}}) 27.832592849s ago: executing program 0 (id=11254): r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x7f, 0x4) bind$inet(r0, &(0x7f0000e15000)={0x2, 0x4e20, @multicast2}, 0x10) r1 = socket(0x1, 0x2, 0x0) listen(r0, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, r2) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000040)=0x7f, 0x4) bind$inet(r3, &(0x7f0000e15000)={0x2, 0x4e20, @empty}, 0x10) 26.749961744s ago: executing program 0 (id=11255): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_vhci(&(0x7f0000000280)=ANY=[@ANYBLOB="043e060c"], 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000004140)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40044}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x80}}], 0x2, 0x4) socket$qrtr(0x2a, 0x2, 0x0) io_setup(0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400}, 0x94) sendmsg$NFT_BATCH(r0, 0x0, 0x0) listen(0xffffffffffffffff, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_link_key_req={{0x17, 0x6}}}, 0x9) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_features={{0xb, 0xb}, {0x2, 0xc9, "707332d0aaa426c5"}}}, 0xe) 26.477808647s ago: executing program 0 (id=11256): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x8, 0xffffffffd24b2432, 0x6, 0xffff, 0x0, 0xabe6, 0x0, 0x0, 0x80, 0x8001}}, 0x50) syz_fuse_handle_req(r0, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d838aae8c05dd22d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000004200)="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", 0x2000, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x78, 0x0, 0x80, {0xc, 0x3, 0x0, {0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x0, 0x8, 0xffffffff, 0xfffffffe, 0x0, 0x80000, 0x8000, 0x0, 0x0, r2, 0x1, 0x3}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x109941, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000003c0)='n', 0xfdef}], 0x1) dup3(r0, r3, 0x6700000000000000) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r4, 0xffffffffffffffff, 0x0) 25.907767502s ago: executing program 0 (id=11257): prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = userfaultfd(0x1) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x2}) ioctl$UFFDIO_COPY(r3, 0xc028aa05, &(0x7f0000000180)={&(0x7f00002b9000/0x400000)=nil, &(0x7f0000359000/0xa000)=nil, 0x400000, 0x2, 0x2}) 0s ago: executing program 36 (id=11257): prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = userfaultfd(0x1) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x2}) ioctl$UFFDIO_COPY(r3, 0xc028aa05, &(0x7f0000000180)={&(0x7f00002b9000/0x400000)=nil, &(0x7f0000359000/0xa000)=nil, 0x400000, 0x2, 0x2}) kernel console output (not intermixed with test programs): t: type=1400 audit(1276.912:542388): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28758 comm="kworker/u8:6" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1356.458597][ T37] audit: type=1400 audit(1277.380:542389): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28758 comm="kworker/u8:6" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1356.818298][ T37] audit: type=1400 audit(1279.140:542390): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1122 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1356.818361][ T37] audit: type=1400 audit(1279.140:542391): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1122 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1356.825649][ T37] audit: type=1400 audit(1279.158:542392): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1122 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1356.825703][ T37] audit: type=1400 audit(1279.158:542393): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1122 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1356.883401][ T37] audit: type=1400 audit(1279.215:542394): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1122 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1357.926968][ C1] net_ratelimit: 7901 callbacks suppressed [ 1357.926987][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1357.927864][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1357.928294][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1357.929175][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1357.929557][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1357.930437][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1357.932490][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1357.933553][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1357.933998][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1357.935004][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1358.269700][ T37] kauditd_printk_skb: 217 callbacks suppressed [ 1358.269720][ T37] audit: type=1400 audit(1280.515:542612): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="/" dev="sda1" ino=2 [ 1358.271323][ T37] audit: type=1400 audit(1280.515:542613): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1358.271368][ T37] audit: type=1400 audit(1280.515:542614): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1358.273210][ T37] audit: type=1400 audit(1280.515:542615): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1358.273254][ T37] audit: type=1400 audit(1280.515:542616): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" name="queue" dev="tmpfs" ino=17245 [ 1358.273294][ T37] audit: type=1400 audit(1280.515:542617): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5172 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=17245 [ 1358.273335][ T37] audit: type=1400 audit(1280.515:542618): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" name="queue" dev="tmpfs" ino=17245 [ 1358.295779][ T37] audit: type=1400 audit(1280.525:542619): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1358.295833][ T37] audit: type=1400 audit(1280.534:542620): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28973 comm="udevd" name="/" dev="sda1" ino=2 [ 1358.349029][ T37] audit: type=1400 audit(1280.543:542621): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28973 comm="udevd" name="/" dev="proc" ino=1 [ 1359.719460][ T6286] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 1360.025204][ T6286] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 1360.028448][ T6286] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 1360.029542][ T6286] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 1360.045037][ T6286] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 [ 1360.451596][T24908] Bluetooth: hci10: unexpected cc 0x0c03 length: 249 > 1 [ 1360.611103][T24908] Bluetooth: hci10: unexpected cc 0x1003 length: 249 > 9 [ 1360.613615][T24908] Bluetooth: hci10: unexpected cc 0x1001 length: 249 > 9 [ 1360.617049][T24908] Bluetooth: hci10: unexpected cc 0x0c23 length: 249 > 4 [ 1360.758073][T24908] Bluetooth: hci10: unexpected cc 0x0c38 length: 249 > 2 [ 1362.359445][T28813] Bluetooth: hci9: command tx timeout [ 1362.826182][T24908] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1 [ 1363.097976][T24908] Bluetooth: hci10: command tx timeout [ 1363.128748][T24908] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9 [ 1363.214663][T24908] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9 [ 1363.278150][ C1] net_ratelimit: 5253 callbacks suppressed [ 1363.278173][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.278637][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.279414][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.279752][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.280835][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.281269][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.282183][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.282522][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.283262][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.283595][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1363.944854][ T37] kauditd_printk_skb: 1030 callbacks suppressed [ 1363.944882][ T37] audit: type=1400 audit(1285.822:543652): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1363.945566][ T37] audit: type=1400 audit(1285.822:543653): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1364.438621][ T37] audit: type=1400 audit(1286.281:543654): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1364.581956][T24908] Bluetooth: hci9: command tx timeout [ 1364.609860][ T37] audit: type=1400 audit(1286.440:543655): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5172 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1364.609906][ T37] audit: type=1400 audit(1286.440:543656): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="/" dev="sda1" ino=2 [ 1364.609943][ T37] audit: type=1400 audit(1286.440:543657): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="usr" dev="sda1" ino=1480 [ 1364.609981][ T37] audit: type=1400 audit(1286.440:543658): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="lib" dev="sda1" ino=1642 [ 1364.617309][ T37] audit: type=1400 audit(1286.449:543659): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="/" dev="sda1" ino=2 [ 1364.617404][ T37] audit: type=1400 audit(1286.449:543660): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="usr" dev="sda1" ino=1480 [ 1364.617449][ T37] audit: type=1400 audit(1286.449:543661): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="/" dev="sda1" ino=2 [ 1364.621832][T24908] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4 [ 1364.634468][T24908] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2 [ 1365.329618][T28813] Bluetooth: hci10: command tx timeout [ 1366.808415][T28813] Bluetooth: hci9: command tx timeout [ 1367.498652][T24908] Bluetooth: hci10: command tx timeout [ 1368.770715][ C1] net_ratelimit: 5660 callbacks suppressed [ 1368.770733][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1368.771101][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1368.771892][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1368.772239][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1368.772966][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1368.792356][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1368.793169][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1368.793511][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1368.794294][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1368.794650][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1369.037263][T24908] Bluetooth: hci9: command tx timeout [ 1369.511565][ T37] kauditd_printk_skb: 151 callbacks suppressed [ 1369.511626][ T37] audit: type=1400 audit(1290.501:543813): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28786 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1369.511747][ T37] audit: type=1400 audit(1290.932:543814): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28786 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1369.511854][ T37] audit: type=1400 audit(1290.960:543815): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28786 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1369.722683][T24908] Bluetooth: hci10: command tx timeout [ 1370.143661][ T37] audit: type=1400 audit(1291.625:543816): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28786 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1370.268190][ T37] audit: type=1400 audit(1291.737:543817): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" opid=28970 ocomm="udevd" [ 1370.268248][ T37] audit: type=1400 audit(1291.737:543818): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" opid=28973 ocomm="udevd" [ 1370.268294][ T37] audit: type=1400 audit(1291.737:543819): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" opid=28980 ocomm="udevd" [ 1370.268338][ T37] audit: type=1400 audit(1291.737:543820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="/" dev="sda1" ino=2 [ 1370.268383][ T37] audit: type=1400 audit(1291.737:543821): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="etc" dev="sda1" ino=116 [ 1370.268428][ T37] audit: type=1400 audit(1291.737:543822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="udev" dev="sda1" ino=259 [ 1371.013105][T24908] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1 [ 1371.022260][T24908] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9 [ 1371.051961][T24908] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9 [ 1371.053075][T24908] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4 [ 1371.075256][T24908] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2 [ 1373.624150][T24908] Bluetooth: hci11: command tx timeout [ 1374.123462][ C1] net_ratelimit: 4214 callbacks suppressed [ 1374.123484][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.124386][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.125134][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.125465][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.126195][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.126636][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.127510][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.127959][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.128821][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.129153][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1374.950690][ T37] kauditd_printk_skb: 423 callbacks suppressed [ 1374.950712][ T37] audit: type=1400 audit(1296.126:544177): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28 comm="rcuc/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1375.456182][ T37] audit: type=1400 audit(1296.594:544178): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28 comm="rcuc/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1375.632715][ T37] audit: type=1400 audit(1296.763:544179): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" opid=28999 ocomm="udevd" [ 1375.632764][ T37] audit: type=1400 audit(1296.763:544180): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" opid=28996 ocomm="udevd" [ 1375.632810][ T37] audit: type=1400 audit(1296.763:544181): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" opid=28997 ocomm="udevd" [ 1375.818120][ T37] audit: type=1400 audit(1296.931:544182): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="/" dev="sda1" ino=2 [ 1375.818175][ T37] audit: type=1400 audit(1296.931:544183): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="etc" dev="sda1" ino=116 [ 1375.818223][ T37] audit: type=1400 audit(1296.931:544184): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="udev" dev="sda1" ino=259 [ 1375.961663][ T37] audit: type=1400 audit(1297.062:544185): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1375.962284][ T37] audit: type=1400 audit(1297.071:544186): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1378.685754][T24908] Bluetooth: hci11: command tx timeout [ 1378.996179][ T1330] ieee802154 phy1 wpan1: encryption failed: -22 [ 1379.476575][ C1] net_ratelimit: 7142 callbacks suppressed [ 1379.476597][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1379.476952][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1379.477780][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1379.478157][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1379.479015][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1379.479411][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1379.480129][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1379.480466][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1379.481210][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1379.481789][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1380.553191][ T6284] audit_log_start: 106 callbacks suppressed [ 1380.553211][ T6284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1380.553225][ T6284] audit: audit_lost=68916 audit_rate_limit=0 audit_backlog_limit=64 [ 1380.553242][ T6284] audit: backlog limit exceeded [ 1380.553259][ T6284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1380.553273][ T6284] audit: audit_lost=68917 audit_rate_limit=0 audit_backlog_limit=64 [ 1380.553289][ T6284] audit: backlog limit exceeded [ 1380.553313][ T6284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1380.553327][ T6284] audit: audit_lost=68918 audit_rate_limit=0 audit_backlog_limit=64 [ 1380.553349][ T6284] audit: backlog limit exceeded [ 1380.553460][ T6284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1380.908243][T24908] Bluetooth: hci11: command tx timeout [ 1383.130644][T28813] Bluetooth: hci11: command tx timeout [ 1384.829847][ C1] net_ratelimit: 7798 callbacks suppressed [ 1384.829871][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1384.830372][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1384.831109][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1384.831501][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1384.832287][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1384.832641][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1384.833570][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1384.833967][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1384.834717][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1384.835055][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1385.970984][ T37] kauditd_printk_skb: 265 callbacks suppressed [ 1385.971003][ T37] audit: type=1400 audit(1306.430:544508): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29002 comm="kworker/u8:12" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1386.468092][ T37] audit: type=1400 audit(1306.908:544509): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29002 comm="kworker/u8:12" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1386.964590][ T37] audit: type=1400 audit(1307.366:544510): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29002 comm="kworker/u8:12" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1387.157172][ T37] audit: type=1400 audit(1307.535:544511): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=29008 comm="syz-executor" name="2905" dev="tmpfs" ino=14540 [ 1387.157220][ T37] audit: type=1400 audit(1307.544:544512): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29007 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 [ 1387.201567][ T37] audit: type=1400 audit(1307.582:544513): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29008 comm="syz-executor" name="2905" dev="tmpfs" ino=14540 [ 1387.201616][ T37] audit: type=1400 audit(1307.582:544514): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29008 comm="syz-executor" name="2905" dev="tmpfs" ino=14540 [ 1387.201655][ T37] audit: type=1400 audit(1307.582:544515): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=29008 comm="syz-executor" name="2905" dev="tmpfs" ino=14540 [ 1387.203570][ T37] audit: type=1400 audit(1307.591:544516): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29008 comm="syz-executor" name="2905" dev="tmpfs" ino=14540 [ 1387.203626][ T37] audit: type=1400 audit(1307.591:544517): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="/" dev="sda1" ino=2 [ 1387.350096][T24908] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1387.415074][T24908] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1387.442382][T24908] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1387.447012][T24908] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1387.469218][T24908] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1389.712580][T28813] Bluetooth: hci2: command tx timeout [ 1390.187762][ C1] net_ratelimit: 6050 callbacks suppressed [ 1390.187786][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1390.189132][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1390.189893][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1390.190229][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1390.250929][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1390.251343][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1390.252222][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1390.254255][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1390.255068][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1390.255425][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1391.347273][ T37] kauditd_printk_skb: 902 callbacks suppressed [ 1391.347293][ T37] audit: type=1400 audit(1311.466:545420): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="2911" dev="tmpfs" ino=14570 [ 1391.357956][ T37] audit: type=1400 audit(1311.475:545421): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=6284 comm="syz-executor" name="2911" dev="tmpfs" ino=14570 [ 1391.390018][ T37] audit: type=1400 audit(1311.503:545422): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=6284 comm="syz-executor" name="cgroup.net" dev="tmpfs" ino=14573 [ 1391.411622][ T37] audit: type=1400 audit(1311.522:545423): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=6284 comm="syz-executor" name="2911" dev="tmpfs" ino=14570 [ 1391.815011][ T37] audit: type=1400 audit(1311.559:545424): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1391.815067][ T37] audit: type=1400 audit(1311.578:545425): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1391.815107][ T37] audit: type=1400 audit(1311.606:545426): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="2911" dev="tmpfs" ino=14570 [ 1391.815147][ T37] audit: type=1400 audit(1311.606:545427): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1391.815192][ T37] audit: type=1400 audit(1311.615:545428): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1391.815233][ T37] audit: type=1400 audit(1311.615:545429): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1391.945697][T28813] Bluetooth: hci2: command tx timeout [ 1394.157736][T28813] Bluetooth: hci2: command tx timeout [ 1395.536353][ C1] net_ratelimit: 6478 callbacks suppressed [ 1395.536373][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1395.536783][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1395.537739][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1395.538214][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1395.539248][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1395.539636][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1395.540544][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1395.540948][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1395.541857][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1395.542336][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1396.379888][T28813] Bluetooth: hci2: command tx timeout [ 1396.807385][ T37] kauditd_printk_skb: 723 callbacks suppressed [ 1396.807411][ T37] audit: type=1400 audit(1315.799:546153): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=24443 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1396.807464][ T37] audit: type=1400 audit(1316.276:546154): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=24443 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1397.233060][ T37] audit: type=1400 audit(1316.735:546155): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29002 comm="kworker/u8:12" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1397.233123][ T37] audit: type=1400 audit(1316.959:546156): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29040 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1397.233171][ T37] audit: type=1400 audit(1316.959:546157): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29040 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1397.233219][ T37] audit: type=1400 audit(1316.959:546158): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29040 comm="syz-executor" name="2919" dev="tmpfs" ino=14610 [ 1397.233266][ T37] audit: type=1400 audit(1316.959:546159): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=29040 comm="syz-executor" opid=29040 ocomm="syz-executor" [ 1397.233312][ T37] audit: type=1400 audit(1316.959:546160): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29040 comm="syz-executor" name="2919" dev="tmpfs" ino=14610 [ 1397.233364][ T37] audit: type=1400 audit(1316.959:546161): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29040 comm="syz-executor" name="2919" dev="tmpfs" ino=14610 [ 1397.233410][ T37] audit: type=1400 audit(1316.959:546162): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=29040 comm="syz-executor" name="2919" dev="tmpfs" ino=14610 [ 1400.889802][ C1] net_ratelimit: 7496 callbacks suppressed [ 1400.889823][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1400.891211][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1400.891597][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1400.891928][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1400.892283][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1400.893017][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1400.893357][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1400.894040][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1400.894791][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1400.894885][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1402.395432][ T37] kauditd_printk_skb: 434 callbacks suppressed [ 1402.395454][ T37] audit: type=1400 audit(1320.310:546597): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=6284 comm="syz-executor" name="2922" dev="tmpfs" ino=14625 [ 1402.395500][ T37] audit: type=1400 audit(1320.375:546598): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5544 comm="crond" name="/" dev="sda1" ino=2 [ 1402.395543][ T37] audit: type=1400 audit(1320.553:546599): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28 comm="rcuc/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1402.395587][ T37] audit: type=1400 audit(1321.302:546600): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5544 comm="crond" name="etc" dev="sda1" ino=116 [ 1402.395629][ T37] audit: type=1400 audit(1321.302:546601): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5544 comm="crond" name="cron" dev="sda1" ino=120 [ 1402.395671][ T37] audit: type=1400 audit(1321.302:546602): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1402.395712][ T37] audit: type=1400 audit(1321.302:546603): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1402.395754][ T37] audit: type=1400 audit(1321.311:546604): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1402.395796][ T37] audit: type=1400 audit(1321.311:546605): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=6284 comm="syz-executor" name="2922" dev="tmpfs" ino=14625 [ 1402.395837][ T37] audit: type=1400 audit(1321.311:546606): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1406.242687][ C1] net_ratelimit: 7517 callbacks suppressed [ 1406.242713][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1406.243089][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1406.243854][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1406.245845][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1406.246595][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1406.246960][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1406.249393][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1406.249735][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1406.361575][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1406.361995][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1407.749971][ T37] kauditd_printk_skb: 634 callbacks suppressed [ 1407.749991][ T37] audit: type=1400 audit(1326.814:547187): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1408.092214][ T37] audit: type=1400 audit(1326.824:547188): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1408.092266][ T37] audit: type=1400 audit(1326.852:547189): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="2927" dev="tmpfs" ino=14650 [ 1408.092307][ T37] audit: type=1400 audit(1326.861:547190): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1408.092347][ T37] audit: type=1400 audit(1326.871:547191): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1408.092389][ T37] audit: type=1400 audit(1326.889:547192): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="2927" dev="tmpfs" ino=14650 [ 1408.092429][ T37] audit: type=1400 audit(1326.908:547193): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6284 comm="syz-executor" path="/2927/cgroup.cpu" dev="tmpfs" ino=14652 [ 1408.092469][ T37] audit: type=1400 audit(1326.917:547194): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1408.092510][ T37] audit: type=1400 audit(1326.927:547195): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1408.092558][ T37] audit: type=1400 audit(1326.936:547196): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="2927" dev="tmpfs" ino=14650 [ 1411.597243][T24908] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1411.659394][T24908] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1411.660860][T24908] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1411.669546][ C1] net_ratelimit: 6113 callbacks suppressed [ 1411.669561][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1411.734087][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1411.734550][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1411.735597][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1411.736065][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1411.737203][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1411.737644][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1411.738712][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1411.739129][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1411.740078][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1412.277850][T24908] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1412.406248][T24908] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1413.109625][ T37] kauditd_printk_skb: 1194 callbacks suppressed [ 1413.109643][ T37] audit: type=1400 audit(1331.831:548391): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29075 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1132 [ 1413.401056][ T37] audit: type=1400 audit(1332.112:548392): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=29075 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1132 [ 1413.515002][ T37] audit: type=1400 audit(1332.205:548393): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1413.883433][ T37] audit: type=1400 audit(1332.561:548394): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1413.883482][ T37] audit: type=1400 audit(1332.561:548395): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1413.883525][ T37] audit: type=1400 audit(1332.561:548396): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1413.883564][ T37] audit: type=1400 audit(1332.561:548397): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1413.883604][ T37] audit: type=1400 audit(1332.561:548398): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6284 comm="syz-executor" name="2935" dev="tmpfs" ino=14690 [ 1413.883643][ T37] audit: type=1400 audit(1332.561:548399): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6284 comm="syz-executor" path="/2935" dev="tmpfs" ino=14690 [ 1413.883683][ T37] audit: type=1400 audit(1332.561:548400): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6284 comm="syz-executor" path="/2935" dev="tmpfs" ino=14690 [ 1414.672532][T28813] Bluetooth: hci4: command tx timeout [ 1415.821634][T24908] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1416.135065][T24908] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1416.144091][T24908] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1416.145692][T24908] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1416.146495][T24908] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1416.894920][T28813] Bluetooth: hci4: command tx timeout [ 1417.012701][ C1] net_ratelimit: 5466 callbacks suppressed [ 1417.012722][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1417.013135][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1417.014800][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1417.015145][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1417.015924][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1417.016317][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1417.017116][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1417.017459][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1417.018372][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1417.018795][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1418.513832][ T37] kauditd_printk_skb: 676 callbacks suppressed [ 1418.513852][ T37] audit: type=1400 audit(1336.894:548858): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28786 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1418.576003][ T37] audit: type=1400 audit(1336.950:548859): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29093 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1418.576058][ T37] audit: type=1400 audit(1336.950:548860): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29093 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1418.576103][ T37] audit: type=1400 audit(1336.950:548861): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29093 comm="syz-executor" name="2938" dev="tmpfs" ino=14705 [ 1418.576147][ T37] audit: type=1400 audit(1336.950:548862): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=29093 comm="syz-executor" opid=29093 ocomm="syz-executor" [ 1418.576193][ T37] audit: type=1400 audit(1336.950:548863): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29093 comm="syz-executor" name="2938" dev="tmpfs" ino=14705 [ 1418.576238][ T37] audit: type=1400 audit(1336.950:548864): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29093 comm="syz-executor" name="2938" dev="tmpfs" ino=14705 [ 1418.576285][ T37] audit: type=1400 audit(1336.950:548865): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=29093 comm="syz-executor" name="2938" dev="tmpfs" ino=14705 [ 1418.641227][ T37] audit: type=1400 audit(1336.950:548866): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29093 comm="syz-executor" name="2938" dev="tmpfs" ino=14705 [ 1418.641278][ T37] audit: type=1400 audit(1336.950:548867): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29093 comm="syz-executor" name="2938" dev="tmpfs" ino=14705 [ 1419.118226][T28813] Bluetooth: hci4: command tx timeout [ 1421.523830][T28813] Bluetooth: hci4: command tx timeout [ 1422.366087][ C1] net_ratelimit: 6544 callbacks suppressed [ 1422.366109][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1422.366495][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1422.367377][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1422.367811][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1422.368782][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1422.369155][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1422.370083][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1422.370492][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1422.371341][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1422.371771][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1424.014985][ T37] kauditd_printk_skb: 1055 callbacks suppressed [ 1424.015004][ T37] audit: type=1400 audit(1341.564:549809): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1424.015051][ T37] audit: type=1400 audit(1341.574:549810): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1424.015096][ T37] audit: type=1400 audit(1341.574:549811): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1424.015141][ T37] audit: type=1400 audit(1341.574:549812): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1424.015196][ T37] audit: type=1400 audit(1342.041:549813): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1424.015238][ T37] audit: type=1400 audit(1342.041:549814): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1424.018227][ T37] audit: type=1400 audit(1342.041:549815): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="2947" dev="tmpfs" ino=14750 [ 1424.179364][ T37] audit: type=1400 audit(1342.051:549816): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=6284 comm="syz-executor" name="2947" dev="tmpfs" ino=14750 [ 1424.179414][ T37] audit: type=1400 audit(1342.191:549817): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=6284 comm="syz-executor" name="cgroup" dev="tmpfs" ino=14751 [ 1424.179456][ T37] audit: type=1400 audit(1342.191:549818): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=6284 comm="syz-executor" name="2947" dev="tmpfs" ino=14750 [ 1427.727965][ C1] net_ratelimit: 6855 callbacks suppressed [ 1427.727987][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1427.728863][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1427.729242][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1427.742603][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1427.761459][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1427.801114][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1427.801480][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1427.802227][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1427.843897][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1427.844704][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1428.225656][ T6286] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1428.279534][ T6286] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1428.298661][ T6286] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1428.311379][ T6286] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1428.312155][ T6286] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1429.513844][ T37] kauditd_printk_skb: 914 callbacks suppressed [ 1429.513868][ T37] audit: type=1400 audit(1346.927:550655): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29125 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1429.513915][ T37] audit: type=1400 audit(1346.946:550656): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29125 comm="syz-executor" name="/" dev="proc" ino=1 [ 1429.513958][ T37] audit: type=1400 audit(1346.964:550657): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29125 comm="syz-executor" name="sys" dev="proc" ino=4026531854 [ 1429.514000][ T37] audit: type=1400 audit(1346.974:550658): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29125 comm="syz-executor" name="kernel" dev="proc" ino=4133 [ 1429.514044][ T37] audit: type=1400 audit(1346.983:550659): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=29125 comm="syz-executor" name="shmmax" dev="proc" ino=83000 [ 1429.514088][ T37] audit: type=1400 audit(1346.992:550660): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29125 comm="syz-executor" path="/proc/sys/kernel/shmmax" dev="proc" ino=83000 [ 1429.514132][ T37] audit: type=1400 audit(1347.002:550661): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29125 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1429.514176][ T37] audit: type=1400 audit(1347.020:550662): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29125 comm="syz-executor" name="/" dev="proc" ino=1 [ 1429.514217][ T37] audit: type=1400 audit(1347.030:550663): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29125 comm="syz-executor" name="sys" dev="proc" ino=4026531854 [ 1429.514260][ T37] audit: type=1400 audit(1347.039:550664): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29125 comm="syz-executor" name="kernel" dev="proc" ino=4133 [ 1433.071815][ C1] net_ratelimit: 5781 callbacks suppressed [ 1433.071835][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1433.072306][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1433.073154][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1433.073567][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1433.074449][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1433.074881][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1433.075731][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1433.076119][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1433.076969][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1433.077356][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1434.869981][ T37] kauditd_printk_skb: 682 callbacks suppressed [ 1434.870004][ T37] audit: type=1400 audit(1352.130:551347): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1434.870046][ T37] audit: type=1400 audit(1352.140:551348): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1434.973609][ T37] audit: type=1400 audit(1352.290:551349): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1434.973768][ T37] audit: type=1400 audit(1352.290:551350): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1434.973809][ T37] audit: type=1400 audit(1352.290:551351): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6284 comm="syz-executor" name="2960" dev="tmpfs" ino=14815 [ 1434.973847][ T37] audit: type=1400 audit(1352.290:551352): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6284 comm="syz-executor" path="/2960" dev="tmpfs" ino=14815 [ 1434.973886][ T37] audit: type=1400 audit(1352.290:551353): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6284 comm="syz-executor" path="/2960" dev="tmpfs" ino=14815 [ 1434.973923][ T37] audit: type=1400 audit(1352.290:551354): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1434.973962][ T37] audit: type=1400 audit(1352.290:551355): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1434.974001][ T37] audit: type=1400 audit(1352.290:551356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6284 comm="syz-executor" name="2960" dev="tmpfs" ino=14815 [ 1438.425402][ C1] net_ratelimit: 7607 callbacks suppressed [ 1438.425424][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1438.426328][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1438.426702][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1438.427678][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1438.428111][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1438.429016][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1438.429350][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1438.430076][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1438.430405][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1438.431130][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1440.541779][ T37] kauditd_printk_skb: 301 callbacks suppressed [ 1440.541815][ T37] audit: type=1400 audit(1357.512:551655): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1441.039835][ T37] audit: type=1400 audit(1357.970:551656): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1441.545576][ T37] audit: type=1400 audit(1358.457:551657): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1442.040783][ T37] audit: type=1400 audit(1358.916:551658): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1442.544194][ T37] audit: type=1400 audit(1359.384:551659): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1442.554958][ T37] audit: type=1400 audit(1359.393:551660): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5788 comm="syz-executor" opid=29001 ocomm="syz-executor" [ 1442.593699][ T37] audit: type=1400 audit(1359.430:551661): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=29001 comm="syz-executor" opid=29007 ocomm="syz-executor" [ 1442.599944][ T37] audit: type=1400 audit(1359.430:551662): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=29153 comm="syz-executor" opid=29153 ocomm="syz-executor" [ 1442.602608][ T37] audit: type=1400 audit(1359.430:551663): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29153 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1442.683286][ T37] audit: type=1400 audit(1359.515:551664): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29153 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1443.778558][ C1] net_ratelimit: 8563 callbacks suppressed [ 1443.778581][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1443.778955][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1443.779686][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1443.780062][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1443.780864][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1443.781196][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1443.781976][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1443.782307][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1443.783033][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1443.783364][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1444.509973][ T1330] ieee802154 phy1 wpan1: encryption failed: -22 [ 1446.053140][ T37] kauditd_printk_skb: 18 callbacks suppressed [ 1446.053158][ T37] audit: type=1400 audit(1362.659:551683): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1446.549655][ T37] audit: type=1400 audit(1363.137:551684): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1447.047362][ T37] audit: type=1400 audit(1363.595:551685): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1447.549203][ T37] audit: type=1400 audit(1364.063:551686): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1448.048897][ T37] audit: type=1400 audit(1364.531:551687): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1448.551783][ T37] audit: type=1400 audit(1364.999:551688): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1449.055079][ T37] audit: type=1400 audit(1365.476:551689): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1449.131164][ C1] net_ratelimit: 8705 callbacks suppressed [ 1449.131185][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.131929][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.132272][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.132999][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.133334][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.134074][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.134406][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.135140][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.135470][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.136698][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1449.552816][ T37] audit: type=1400 audit(1365.944:551690): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1530 comm="kworker/u8:17" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1450.051506][ T37] audit: type=1400 audit(1366.412:551691): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1450.551687][ T37] audit: type=1400 audit(1366.871:551692): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=25411 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1451.578732][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 1451.578752][ T37] audit: type=1400 audit(1367.844:551694): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1452.059752][ T37] audit: type=1400 audit(1368.293:551695): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28786 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1452.560576][ T37] audit: type=1400 audit(1368.752:551696): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1453.056133][ T37] audit: type=1400 audit(1369.220:551697): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1453.561913][ T37] audit: type=1400 audit(1369.697:551698): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1454.058212][ T37] audit: type=1400 audit(1370.165:551699): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1454.485545][ C1] net_ratelimit: 8483 callbacks suppressed [ 1454.485567][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.485925][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.486755][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.487111][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.488019][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.488406][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.489186][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.489554][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.490280][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.490610][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1454.558062][ T37] audit: type=1400 audit(1370.624:551700): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1455.064949][ T37] audit: type=1400 audit(1371.101:551701): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29002 comm="kworker/u8:12" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1455.560405][ T37] audit: type=1400 audit(1371.560:551702): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=25411 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1456.279293][ T37] audit: type=1400 audit(1372.234:551703): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1457.063254][ T37] kauditd_printk_skb: 2 callbacks suppressed [ 1457.063276][ T37] audit: type=1400 audit(1372.973:551706): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1457.818064][ T37] audit: type=1400 audit(1373.441:551707): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28786 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1458.064331][ T37] audit: type=1400 audit(1373.909:551708): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1458.567699][ T37] audit: type=1400 audit(1374.386:551709): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1459.067617][ T37] audit: type=1400 audit(1374.845:551710): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28786 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1459.570027][ T37] audit: type=1400 audit(1375.313:551711): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1459.837863][ C1] net_ratelimit: 8328 callbacks suppressed [ 1459.837888][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1459.838284][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1459.839218][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1459.839552][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1459.840307][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1459.840653][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1459.841382][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1459.841711][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1459.842880][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1459.843312][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1460.507085][ T6284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1460.507106][ T6284] audit: audit_lost=69092 audit_rate_limit=0 audit_backlog_limit=64 [ 1460.507121][ T6284] audit: backlog limit exceeded [ 1460.507263][ T6284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1462.579868][ T37] kauditd_printk_skb: 117 callbacks suppressed [ 1462.579887][ T37] audit: type=1400 audit(1378.120:551812): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1465.190837][ C1] net_ratelimit: 7233 callbacks suppressed [ 1465.190861][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1465.191785][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1465.192168][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1465.192942][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1465.193281][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1465.194077][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1465.194478][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1465.195325][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1465.195681][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1465.196499][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1466.315423][ T37] audit: type=1400 audit(1378.607:551813): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1466.324926][ T37] audit: type=1400 audit(1379.066:551814): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1195 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1466.324976][ T37] audit: type=1400 audit(1379.524:551815): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1466.325027][ T37] audit: type=1400 audit(1380.002:551816): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=25411 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1466.325071][ T37] audit: type=1400 audit(1380.076:551817): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5544 comm="crond" name="/" dev="sda1" ino=2 [ 1466.325136][ T37] audit: type=1400 audit(1380.086:551818): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5544 comm="crond" name="etc" dev="sda1" ino=116 [ 1466.325211][ T37] audit: type=1400 audit(1380.095:551819): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5544 comm="crond" name="cron" dev="sda1" ino=120 [ 1466.325254][ T37] audit: type=1400 audit(1380.460:551820): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1466.325297][ T37] audit: type=1400 audit(1380.937:551821): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1468.065356][ T37] kauditd_printk_skb: 17 callbacks suppressed [ 1468.065416][ T37] audit: type=1400 audit(1383.268:551839): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=29155 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1468.119161][ T37] audit: type=1400 audit(1383.324:551840): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28758 comm="kworker/u8:6" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1468.223211][ T37] audit: type=1400 audit(1383.418:551841): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29153 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1468.257177][ T37] audit: type=1400 audit(1383.418:551842): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29153 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1468.257225][ T37] audit: type=1400 audit(1383.446:551843): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29153 comm="syz-executor" name="kernel" dev="sysfs" ino=7 [ 1468.257266][ T37] audit: type=1400 audit(1383.446:551844): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29153 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1468.257306][ T37] audit: type=1400 audit(1383.446:551845): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=29153 comm="syz-executor" name="kcov" dev="debugfs" ino=1132 [ 1468.257345][ T37] audit: type=1400 audit(1383.446:551846): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29153 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1132 [ 1468.259565][ T37] audit: type=1400 audit(1383.455:551847): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=29153 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1132 [ 1468.486125][ T37] audit: type=1400 audit(1383.661:551848): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29153 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1470.544491][ C1] net_ratelimit: 5095 callbacks suppressed [ 1470.544516][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1470.544985][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1470.546003][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1470.546421][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1470.547281][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1470.547703][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1470.548667][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1470.549078][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1470.550008][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1470.550385][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1471.050771][T28813] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 1472.125826][T29159] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 1472.129075][T29159] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 1472.151218][T29159] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 1472.151937][T29159] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 1472.879787][T29159] Bluetooth: hci12: unexpected cc 0x0c03 length: 249 > 1 [ 1473.140993][T29159] Bluetooth: hci12: unexpected cc 0x1003 length: 249 > 9 [ 1473.144724][T29159] Bluetooth: hci12: unexpected cc 0x1001 length: 249 > 9 [ 1473.175820][T29159] Bluetooth: hci12: unexpected cc 0x0c23 length: 249 > 4 [ 1473.176649][T29159] Bluetooth: hci12: unexpected cc 0x0c38 length: 249 > 2 [ 1473.425001][ T37] kauditd_printk_skb: 504 callbacks suppressed [ 1473.425020][ T37] audit: type=1400 audit(1388.284:552353): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" name="queue" dev="tmpfs" ino=17259 [ 1473.600054][ T37] audit: type=1400 audit(1388.453:552354): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1473.768479][ T37] audit: type=1400 audit(1388.602:552355): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29162 comm="udevd" name="/" dev="sda1" ino=2 [ 1473.768810][ T37] audit: type=1400 audit(1388.602:552356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29162 comm="udevd" name="/" dev="sysfs" ino=1 [ 1473.789684][ T37] audit: type=1400 audit(1388.612:552357): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29162 comm="udevd" name="devices" dev="sysfs" ino=18 [ 1473.789737][ T37] audit: type=1400 audit(1388.612:552358): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29162 comm="udevd" name="virtual" dev="sysfs" ino=1388 [ 1473.789779][ T37] audit: type=1400 audit(1388.612:552359): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29162 comm="udevd" name="bluetooth" dev="sysfs" ino=97056 [ 1473.789824][ T37] audit: type=1400 audit(1388.612:552360): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29162 comm="udevd" name="hci12" dev="sysfs" ino=196640 [ 1473.789882][ T37] audit: type=1400 audit(1388.612:552361): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29162 comm="udevd" name="hci12:200" dev="sysfs" ino=196681 [ 1473.789924][ T37] audit: type=1400 audit(1388.612:552362): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=29162 comm="udevd" name="uevent" dev="sysfs" ino=196682 [ 1475.899671][ C1] net_ratelimit: 5656 callbacks suppressed [ 1475.899692][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1475.900078][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1475.900946][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1475.901327][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1475.902178][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1475.902581][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1475.903491][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1475.903881][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1475.904804][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1475.905218][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1477.416713][T28813] Bluetooth: hci13: unexpected cc 0x0c03 length: 249 > 1 [ 1477.683656][T28813] Bluetooth: hci13: unexpected cc 0x1003 length: 249 > 9 [ 1477.861489][T29171] Bluetooth: hci13: unexpected cc 0x1001 length: 249 > 9 [ 1478.199752][T29173] Bluetooth: hci14: unexpected cc 0x0c03 length: 249 > 1 [ 1478.278469][T29173] Bluetooth: hci14: unexpected cc 0x1003 length: 249 > 9 [ 1478.289622][T29173] Bluetooth: hci14: unexpected cc 0x1001 length: 249 > 9 [ 1478.299512][T29173] Bluetooth: hci14: unexpected cc 0x0c23 length: 249 > 4 [ 1478.331093][T29173] Bluetooth: hci14: unexpected cc 0x0c38 length: 249 > 2 [ 1478.353820][T28813] Bluetooth: hci13: unexpected cc 0x0c23 length: 249 > 4 [ 1478.376730][T28813] Bluetooth: hci13: unexpected cc 0x0c38 length: 249 > 2 [ 1478.781972][ T37] kauditd_printk_skb: 432 callbacks suppressed [ 1478.781992][ T37] audit: type=1400 audit(1393.048:552795): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=29168 comm="syz-executor" name="msgmni" dev="proc" ino=83159 [ 1478.782035][ T37] audit: type=1400 audit(1393.057:552796): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29168 comm="syz-executor" path="/proc/sys/kernel/msgmni" dev="proc" ino=83159 [ 1478.782078][ T37] audit: type=1400 audit(1393.085:552797): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29168 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1478.782119][ T37] audit: type=1400 audit(1393.095:552798): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29168 comm="syz-executor" name="/" dev="proc" ino=1 [ 1478.782159][ T37] audit: type=1400 audit(1393.104:552799): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29168 comm="syz-executor" name="sys" dev="proc" ino=4026531854 [ 1478.782200][ T37] audit: type=1400 audit(1393.123:552800): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1195 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1478.782243][ T37] audit: type=1400 audit(1393.160:552801): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29168 comm="syz-executor" name="kernel" dev="proc" ino=4133 [ 1478.782283][ T37] audit: type=1400 audit(1393.170:552802): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=29168 comm="syz-executor" name="msgmnb" dev="proc" ino=83160 [ 1478.782323][ T37] audit: type=1400 audit(1393.198:552803): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29168 comm="syz-executor" path="/proc/sys/kernel/msgmnb" dev="proc" ino=83160 [ 1478.784726][ T37] audit: type=1400 audit(1393.198:552804): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29168 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1481.250580][ C1] net_ratelimit: 5937 callbacks suppressed [ 1481.250602][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1481.250945][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1481.251763][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1481.252104][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1481.252877][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1481.253215][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1481.253938][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1481.254279][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1481.255056][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1481.255408][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1484.606983][ T37] kauditd_printk_skb: 207 callbacks suppressed [ 1484.607001][ T37] audit: type=1400 audit(1398.757:553012): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=25411 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1485.246301][ T37] audit: type=1400 audit(1399.225:553013): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1195 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1485.833967][ T37] audit: type=1400 audit(1399.693:553014): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=25411 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1486.607601][ C1] net_ratelimit: 7818 callbacks suppressed [ 1486.607627][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.608084][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.609125][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.656412][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.670456][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.670846][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.671748][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.672131][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.673038][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.673450][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1486.799343][ T37] audit: type=1400 audit(1400.161:553015): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=25411 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1486.935272][ T37] audit: type=1400 audit(1400.713:553016): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1487.113564][ T37] audit: type=1400 audit(1401.097:553017): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1488.341771][ T37] audit: type=1400 audit(1401.565:553018): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1530 comm="kworker/u8:17" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1488.341826][ T37] audit: type=1400 audit(1402.033:553019): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1530 comm="kworker/u8:17" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1488.402548][ T37] audit: type=1400 audit(1402.304:553020): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1488.611079][ T37] audit: type=1400 audit(1402.491:553021): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1490.115296][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 1490.115315][ T37] audit: type=1400 audit(1403.904:553023): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1490.116057][ T37] audit: type=1400 audit(1403.904:553024): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5788 comm="syz-executor" opid=29117 ocomm="syz-executor" [ 1490.222440][ T37] audit: type=1400 audit(1404.007:553025): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=29117 comm="syz-executor" opid=29125 ocomm="syz-executor" [ 1490.281671][ T37] audit: type=1400 audit(1404.064:553026): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=29179 comm="syz-executor" opid=29179 ocomm="syz-executor" [ 1490.327751][ T37] audit: type=1400 audit(1404.101:553027): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29179 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1490.329456][ T37] audit: type=1400 audit(1404.101:553028): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29179 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1490.373935][ T37] audit: type=1400 audit(1404.129:553029): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29179 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1490.374005][ T37] audit: type=1400 audit(1404.148:553030): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29179 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 1490.443664][ T37] audit: type=1400 audit(1404.213:553031): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29179 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1490.486131][ T37] audit: type=1400 audit(1404.251:553032): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29179 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1491.967672][ C1] net_ratelimit: 7524 callbacks suppressed [ 1491.967697][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1491.968190][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1491.969142][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1491.969543][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1491.970357][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1491.977775][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1491.978727][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1491.979082][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1491.979884][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1491.980216][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1493.696618][T29172] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1493.750717][T29172] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1495.326624][T29185] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1495.330728][T29185] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1495.347434][T29185] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1495.624057][ T37] kauditd_printk_skb: 246 callbacks suppressed [ 1495.624076][ T37] audit: type=1400 audit(1409.061:553279): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=12 comm="kworker/u8:0" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1495.820982][ T37] audit: type=1400 audit(1409.220:553280): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29180 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 [ 1495.903155][ T37] audit: type=1400 audit(1409.323:553281): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29180 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1495.903210][ T37] audit: type=1400 audit(1409.323:553282): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29180 comm="syz-executor" name="/" dev="proc" ino=1 [ 1495.903251][ T37] audit: type=1400 audit(1409.323:553283): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29180 comm="syz-executor" name="sys" dev="proc" ino=4026531854 [ 1495.903294][ T37] audit: type=1400 audit(1409.323:553284): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29180 comm="syz-executor" name="kernel" dev="proc" ino=4133 [ 1495.903336][ T37] audit: type=1400 audit(1409.323:553285): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=29180 comm="syz-executor" name="shmmax" dev="proc" ino=83210 [ 1495.903392][ T37] audit: type=1400 audit(1409.323:553286): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29180 comm="syz-executor" path="/proc/sys/kernel/shmmax" dev="proc" ino=83210 [ 1495.931102][ T37] audit: type=1400 audit(1409.323:553287): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29180 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1495.931160][ T37] audit: type=1400 audit(1409.323:553288): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29180 comm="syz-executor" name="/" dev="proc" ino=1 [ 1497.320358][ C1] net_ratelimit: 6727 callbacks suppressed [ 1497.320382][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.320718][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.321449][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.321832][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.322628][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.322979][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.324618][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.324955][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.325773][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.326134][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1497.506741][T29184] Bluetooth: hci10: command 0x0406 tx timeout [ 1497.506800][T29185] Bluetooth: hci9: command 0x0406 tx timeout [ 1501.131661][ T37] kauditd_printk_skb: 79 callbacks suppressed [ 1501.131681][ T37] audit: type=1400 audit(1414.209:553368): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1501.633979][ T37] audit: type=1400 audit(1414.686:553369): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1502.131302][ T37] audit: type=1400 audit(1415.154:553370): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1502.673349][ C1] net_ratelimit: 8232 callbacks suppressed [ 1502.673372][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1502.673773][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1502.674783][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1502.675161][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1502.676019][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1502.676432][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1502.677315][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1502.677755][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1502.678816][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1502.679218][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1503.641427][ T37] audit: type=1400 audit(1415.622:553371): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28776 comm="kworker/u8:7" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1503.780563][ T37] audit: type=1400 audit(1416.090:553372): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28758 comm="kworker/u8:6" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1503.780614][ T37] audit: type=1400 audit(1416.558:553373): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1504.135008][ T37] audit: type=1400 audit(1417.026:553374): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1504.640581][ T37] audit: type=1400 audit(1417.503:553375): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1505.139598][ T37] audit: type=1400 audit(1417.962:553376): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1505.634364][ T37] audit: type=1400 audit(1418.430:553377): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1506.638492][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 1506.638512][ T37] audit: type=1400 audit(1419.375:553379): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1506.913031][T29185] Bluetooth: hci11: command 0x0406 tx timeout [ 1507.136917][ T37] audit: type=1400 audit(1419.833:553380): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1507.153437][ T37] audit: type=1400 audit(1419.843:553381): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5788 comm="syz-executor" opid=29153 ocomm="syz-executor" [ 1507.181944][ T37] audit: type=1400 audit(1419.871:553382): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=29153 comm="syz-executor" opid=29157 ocomm="syz-executor" [ 1507.188971][ T37] audit: type=1400 audit(1419.880:553383): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=29188 comm="syz-executor" opid=29188 ocomm="syz-executor" [ 1507.192073][ T37] audit: type=1400 audit(1419.880:553384): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29188 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1507.192118][ T37] audit: type=1400 audit(1419.880:553385): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29188 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1507.192157][ T37] audit: type=1400 audit(1419.880:553386): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29188 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1507.192198][ T37] audit: type=1400 audit(1419.880:553387): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29188 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 1507.193186][ T37] audit: type=1400 audit(1419.880:553388): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29188 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1508.026476][ C1] net_ratelimit: 8305 callbacks suppressed [ 1508.026495][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1508.030825][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1508.032845][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1508.033637][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1508.035681][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1508.036634][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1508.041463][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1508.042329][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1508.042689][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1508.047037][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1509.128956][T29183] Bluetooth: hci15: unexpected cc 0x0c03 length: 249 > 1 [ 1509.166440][T29183] Bluetooth: hci15: unexpected cc 0x1003 length: 249 > 9 [ 1509.173822][T29183] Bluetooth: hci15: unexpected cc 0x1001 length: 249 > 9 [ 1509.197839][T29183] Bluetooth: hci15: unexpected cc 0x0c23 length: 249 > 4 [ 1509.200123][T29183] Bluetooth: hci15: unexpected cc 0x0c38 length: 249 > 2 [ 1510.157953][ T1330] ieee802154 phy1 wpan1: encryption failed: -22 [ 1512.423004][ T37] kauditd_printk_skb: 297 callbacks suppressed [ 1512.423022][ T37] audit: type=1400 audit(1424.766:553686): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1512.457719][ T37] audit: type=1400 audit(1424.812:553687): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1512.597002][ T37] audit: type=1400 audit(1424.943:553688): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1513.033990][ T37] audit: type=1400 audit(1425.355:553689): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1530 comm="kworker/u8:17" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1513.120244][ T37] audit: type=1400 audit(1425.430:553690): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" opid=29193 ocomm="udevd" [ 1513.122661][ T37] audit: type=1400 audit(1425.430:553691): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5172 comm="udevd" opid=29192 ocomm="udevd" [ 1513.182938][ T37] audit: type=1400 audit(1425.430:553692): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="/" dev="sda1" ino=2 [ 1513.182984][ T37] audit: type=1400 audit(1425.477:553693): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="etc" dev="sda1" ino=116 [ 1513.183024][ T37] audit: type=1400 audit(1425.477:553694): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5172 comm="udevd" name="udev" dev="sda1" ino=259 [ 1513.183074][ T37] audit: type=1400 audit(1425.477:553695): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5172 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1513.770450][ C1] net_ratelimit: 6132 callbacks suppressed [ 1513.770472][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1513.770885][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1513.771935][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1513.772280][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1513.773021][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1513.773352][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1513.774096][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1513.774424][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1513.775224][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1513.775568][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1518.155798][ T37] kauditd_printk_skb: 43 callbacks suppressed [ 1518.155817][ T37] audit: type=1400 audit(1430.156:553739): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1518.657933][ T37] audit: type=1400 audit(1430.615:553740): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1519.117618][ C1] net_ratelimit: 7821 callbacks suppressed [ 1519.117643][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1519.118536][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1519.118937][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1519.119763][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1519.120139][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1519.121066][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1519.121485][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1519.122253][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1519.122610][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1519.123385][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1520.288094][ T37] audit: type=1400 audit(1431.130:553741): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1178 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1520.288162][ T37] audit: type=1400 audit(1431.551:553742): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1178 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1520.288220][ T37] audit: type=1400 audit(1432.019:553743): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1178 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1520.288271][ T37] audit: type=1400 audit(1432.094:553744): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1196 comm="irq/34-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1520.747442][ T37] audit: type=1400 audit(1432.506:553745): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1178 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1521.291710][ T37] audit: type=1400 audit(1432.964:553746): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1195 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1522.743540][ T37] audit: type=1400 audit(1433.423:553747): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28857 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1522.743594][ T37] audit: type=1400 audit(1433.891:553748): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29092 comm="kworker/u8:13" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1523.537626][ T37] kauditd_printk_skb: 3 callbacks suppressed [ 1523.537646][ T37] audit: type=1400 audit(1435.182:553752): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="ksoftirqd/1" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1524.471376][ C1] net_ratelimit: 7551 callbacks suppressed [ 1524.471401][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.471832][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.472774][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.473149][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.473978][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.474403][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.475263][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.475636][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.476443][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.476835][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1524.556029][ T37] audit: type=1400 audit(1436.137:553753): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=28857 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.0.238 dest=55850 netif=eth0 [ 1525.282564][T29190] Bluetooth: hci2: command 0x0406 tx timeout [ 1526.331808][ T37] audit: type=1400 audit(1437.803:553754): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5788 comm="syz-executor" opid=29155 ocomm="syz-executor" [ 1526.382657][ T37] audit: type=1400 audit(1437.840:553755): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=29155 comm="syz-executor" opid=29161 ocomm="syz-executor" [ 1526.389401][ T37] audit: type=1400 audit(1437.850:553756): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=29195 comm="syz-executor" opid=29195 ocomm="syz-executor" [ 1526.392429][ T37] audit: type=1400 audit(1437.850:553757): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29195 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1526.392707][ T37] audit: type=1400 audit(1437.850:553758): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29195 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1526.392963][ T37] audit: type=1400 audit(1437.850:553759): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29195 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1526.393267][ T37] audit: type=1400 audit(1437.850:553760): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29195 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 1526.401641][ T37] audit: type=1400 audit(1437.859:553761): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29195 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1529.253960][ T37] kauditd_printk_skb: 30 callbacks suppressed [ 1529.253981][ T37] audit: type=1400 audit(1440.517:553792): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29195 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1529.254032][ T37] audit: type=1400 audit(1440.536:553793): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29195 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1529.254081][ T37] audit: type=1400 audit(1440.536:553794): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29195 comm="syz-executor" name="kernel" dev="sysfs" ino=7 [ 1529.254127][ T37] audit: type=1400 audit(1440.536:553795): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29195 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1529.254174][ T37] audit: type=1400 audit(1440.536:553796): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=29195 comm="syz-executor" name="kcov" dev="debugfs" ino=1132 [ 1529.254221][ T37] audit: type=1400 audit(1440.536:553797): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29195 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1132 [ 1529.254268][ T37] audit: type=1400 audit(1440.536:553798): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=29195 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1132 [ 1529.616386][ T37] audit: type=1400 audit(1440.873:553799): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5544 comm="crond" name="/" dev="sda1" ino=2 [ 1529.628113][ T37] audit: type=1400 audit(1440.882:553800): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5544 comm="crond" name="etc" dev="sda1" ino=116 [ 1529.639565][ T37] audit: type=1400 audit(1440.891:553801): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5544 comm="crond" name="cron" dev="sda1" ino=120 [ 1529.824038][ C1] net_ratelimit: 7490 callbacks suppressed [ 1529.824061][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1529.824430][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1529.825282][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1529.825635][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1529.826412][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1529.826763][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1529.827539][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1529.827946][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1529.828904][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1529.829757][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1531.989104][T29194] Bluetooth: hci16: unexpected cc 0x0c03 length: 249 > 1 [ 1532.473978][T29194] Bluetooth: hci16: unexpected cc 0x1003 length: 249 > 9 [ 1532.477364][T29194] Bluetooth: hci16: unexpected cc 0x1001 length: 249 > 9 [ 1532.501141][T29194] Bluetooth: hci16: unexpected cc 0x0c23 length: 249 > 4 [ 1532.501798][T29194] Bluetooth: hci16: unexpected cc 0x0c38 length: 249 > 2 [ 1535.144055][ T37] kauditd_printk_skb: 164 callbacks suppressed [ 1535.144073][ T37] audit: type=1400 audit(1446.048:553966): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29200 comm="udevd" name="hci16" dev="sysfs" ino=196856 [ 1535.144118][ T37] audit: type=1400 audit(1446.048:553967): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=29200 comm="udevd" name="uevent" dev="sysfs" ino=196857 [ 1535.144160][ T37] audit: type=1400 audit(1446.048:553968): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=29200 comm="udevd" path="/sys/devices/virtual/bluetooth/hci16/uevent" dev="sysfs" ino=196857 [ 1535.144203][ T37] audit: type=1400 audit(1446.048:553969): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=29200 comm="udevd" path="/sys/devices/virtual/bluetooth/hci16/uevent" dev="sysfs" ino=196857 [ 1535.144243][ T37] audit: type=1400 audit(1446.048:553970): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29200 comm="udevd" name="/" dev="sda1" ino=2 [ 1535.144282][ T37] audit: type=1400 audit(1446.048:553971): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29200 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1535.144320][ T37] audit: type=1400 audit(1446.048:553972): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29200 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1535.144372][ T37] audit: type=1400 audit(1446.048:553973): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29200 comm="udevd" name="data" dev="tmpfs" ino=14 [ 1535.187816][ C1] net_ratelimit: 5981 callbacks suppressed [ 1535.187839][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1535.188791][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1535.189139][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1535.286361][ T37] audit: type=1400 audit(1446.179:553974): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29200 comm="udevd" name="/" dev="sda1" ino=2 [ 1535.286411][ T37] audit: type=1400 audit(1446.179:553975): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=29200 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1535.381423][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1535.381847][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1535.429830][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1535.430231][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1535.464836][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1535.476142][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1535.494817][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:0e:49:b8:c3:b3:fa, vlan:0) [ 1536.138795][ T38] INFO: task syz-executor:28988 blocked for more than 143 seconds. [ 1536.138826][ T38] Not tainted syzkaller #0 [ 1536.138839][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1536.138850][ T38] task:syz-executor state:D stack:22680 pid:28988 tgid:28988 ppid:1 task_flags:0x400140 flags:0x00080002 [ 1536.138927][ T38] Call Trace: [ 1536.138936][ T38] [ 1536.138953][ T38] __schedule+0x1681/0x54c0 [ 1536.139022][ T38] ? __pfx___schedule+0x10/0x10 [ 1536.139067][ T38] rt_mutex_schedule+0x76/0xf0 [ 1536.139103][ T38] rt_mutex_slowlock_block+0x508/0x680 [ 1536.139161][ T38] rt_mutex_slowlock+0x2dc/0x780 [ 1536.139187][ T38] ? rt_mutex_slowlock+0x1fd/0x780 [ 1536.139212][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 1536.139250][ T38] ? inet_rtm_newaddr+0x404/0x1ad0 [ 1536.139291][ T38] ? inet_rtm_newaddr+0x404/0x1ad0 [ 1536.139332][ T38] ? inet_rtm_newaddr+0x404/0x1ad0 [ 1536.139365][ T38] mutex_lock_nested+0x168/0x1d0 [ 1536.139409][ T38] inet_rtm_newaddr+0x404/0x1ad0 [ 1536.139445][ T38] ? __kernel_text_address+0xd/0x30 [ 1536.139488][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10 [ 1536.139542][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10 [ 1536.139578][ T38] rtnetlink_rcv_msg+0x7d5/0xbe0 [ 1536.139613][ T38] ? kasan_save_track+0x3e/0x80 [ 1536.139653][ T38] ? kmem_cache_alloc_node_noprof+0x22a/0x6e0 [ 1536.139692][ T38] ? rtnetlink_rcv_msg+0x1b9/0xbe0 [ 1536.139727][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1536.139765][ T38] ? __lock_acquire+0x6b5/0x2cf0 [ 1536.139817][ T38] netlink_rcv_skb+0x232/0x4b0 [ 1536.139852][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1536.139887][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1536.139950][ T38] ? netlink_deliver_tap+0x2e/0x1b0 [ 1536.139985][ T38] ? netlink_deliver_tap+0x2e/0x1b0 [ 1536.140025][ T38] netlink_unicast+0x780/0x920 [ 1536.140207][ T38] netlink_sendmsg+0x813/0xb40 [ 1536.140241][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1536.140273][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1536.140307][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1536.140330][ T38] __sys_sendto+0x67f/0x710 [ 1536.140359][ T38] ? __pfx___sys_sendto+0x10/0x10 [ 1536.140407][ T38] ? exc_page_fault+0x6a/0xc0 [ 1536.140440][ T38] ? do_user_addr_fault+0xc6f/0x1340 [ 1536.140480][ T38] __x64_sys_sendto+0xde/0x100 [ 1536.140503][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1536.140528][ T38] do_syscall_64+0x15f/0xf80 [ 1536.140556][ T38] ? trace_irq_disable+0x3b/0x140 [ 1536.140580][ T38] ? clear_bhb_loop+0x40/0x90 [ 1536.140607][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1536.140643][ T38] RIP: 0033:0x7f6bdcbfd04e [ 1536.140664][ T38] RSP: 002b:00007fff1c8f26e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1536.140687][ T38] RAX: ffffffffffffffda RBX: 0000555593db6500 RCX: 00007f6bdcbfd04e [ 1536.140705][ T38] RDX: 0000000000000028 RSI: 00007f6bdd9e4670 RDI: 0000000000000003 [ 1536.140719][ T38] RBP: 0000000000000001 R08: 00007fff1c8f2764 R09: 000000000000000c [ 1536.140734][ T38] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1536.140748][ T38] R13: 0000000000000000 R14: 00007f6bdd9e4670 R15: 0000000000000000 [ 1536.140779][ T38] [ 1536.140815][ T38] [ 1536.140815][ T38] Showing all locks held in the system: [ 1536.140827][ T38] 6 locks held by kworker/0:1/10: [ 1536.140841][ T38] 6 locks held by ksoftirqd/0/15: [ 1536.140854][ T38] 4 locks held by ktimers/0/16: [ 1536.140868][ T38] 3 locks held by ksoftirqd/1/30: [ 1536.140880][ T38] 1 lock held by khungtaskd/38: [ 1536.140892][ T38] #0: ffffffff8dfc80c0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 1536.140954][ T38] 3 locks held by kworker/u8:4/66: [ 1536.140968][ T38] #0: ffff8880328bf938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.141035][ T38] #1: ffffc9000151fc40 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.141100][ T38] #2: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 1536.141162][ T38] 6 locks held by kworker/u8:17/1530: [ 1536.141188][ T38] 2 locks held by getty/5561: [ 1536.141200][ T38] #0: ffff8880383030a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1536.141258][ T38] #1: ffffc90003cbe2e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x462/0x13a0 [ 1536.141310][ T38] 1 lock held by syz-executor/6284: [ 1536.141323][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x41/0x1c0 [ 1536.141376][ T38] 4 locks held by kworker/u9:2/6286: [ 1536.141389][ T38] #0: ffff888044a28938 ((wq_completion)hci1#4){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.141458][ T38] #1: ffffc90004907c40 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.141536][ T38] #2: ffff88803f0a40b0 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x950 [ 1536.141598][ T38] #3: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x54c/0x950 [ 1536.141671][ T38] 3 locks held by kworker/0:6/6395: [ 1536.141686][ T38] 3 locks held by kworker/u8:2/24443: [ 1536.141698][ T38] #0: ffff88801a08c138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.143348][ T38] #1: ffffc9000fd77c40 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.143412][ T38] #2: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60 [ 1536.143468][ T38] 4 locks held by kworker/u9:0/24908: [ 1536.143481][ T38] #0: ffff88803ea27138 ((wq_completion)hci3#4){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.143551][ T38] #1: ffffc90009407c40 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.143614][ T38] #2: ffff8880745740b0 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x950 [ 1536.143682][ T38] #3: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x54c/0x950 [ 1536.143766][ T38] 1 lock held by syz.2.11085/28730: [ 1536.143780][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x41/0x1c0 [ 1536.143836][ T38] 1 lock held by syz.1.11092/28748: [ 1536.143850][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x41/0x1c0 [ 1536.143917][ T38] 1 lock held by syz.3.11110/28791: [ 1536.143930][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x41/0x1c0 [ 1536.143983][ T38] 2 locks held by syz-executor/28808: [ 1536.143995][ T38] #0: ffff88807b5b4f80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_unregister_dev+0x212/0x5a0 [ 1536.144057][ T38] #1: ffff88807b5b40b0 (&hdev->lock){+.+.}-{4:4}, at: hci_dev_close_sync+0x640/0x10e0 [ 1536.144111][ T38] 4 locks held by kworker/u9:1/28813: [ 1536.144124][ T38] #0: ffff88804e68c938 ((wq_completion)hci0#4){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.144194][ T38] #1: ffffc90015497c40 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.144258][ T38] #2: ffff8880681d80b0 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x950 [ 1536.144319][ T38] #3: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x54c/0x950 [ 1536.144382][ T38] 3 locks held by syz-executor/28822: [ 1536.144394][ T38] #0: ffff888087f9cf80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_unregister_dev+0x212/0x5a0 [ 1536.144455][ T38] #1: ffff888087f9c0b0 (&hdev->lock){+.+.}-{4:4}, at: hci_dev_close_sync+0x640/0x10e0 [ 1536.144507][ T38] #2: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_hash_flush+0xa1/0x260 [ 1536.144563][ T38] 4 locks held by kworker/u9:3/28828: [ 1536.144576][ T38] #0: ffff888057331138 ((wq_completion)hci8#2){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.144668][ T38] #1: ffffc90015477c40 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.144761][ T38] #2: ffff88803ebf80b0 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x950 [ 1536.146398][ T38] #3: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x54c/0x950 [ 1536.146467][ T38] 1 lock held by syz.4.11129/28837: [ 1536.146482][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x41/0x1c0 [ 1536.146539][ T38] 4 locks held by syz-executor/28851: [ 1536.146554][ T38] #0: ffff888031bc8f80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_unregister_dev+0x212/0x5a0 [ 1536.146626][ T38] #1: ffff888031bc80b0 (&hdev->lock){+.+.}-{4:4}, at: hci_dev_close_sync+0x640/0x10e0 [ 1536.146684][ T38] #2: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_hash_flush+0xa1/0x260 [ 1536.146744][ T38] #3: ffff88803ccad370 (&conn->lock#2){+.+.}-{4:4}, at: l2cap_conn_del+0x92/0x570 [ 1536.146809][ T38] 7 locks held by kworker/u8:10/28857: [ 1536.146823][ T38] 1 lock held by syz-executor/28965: [ 1536.146837][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x883/0x1bb0 [ 1536.146904][ T38] 1 lock held by syz-executor/28968: [ 1536.146918][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x883/0x1bb0 [ 1536.146985][ T38] 1 lock held by syz-executor/28988: [ 1536.146998][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.147065][ T38] 1 lock held by syz-executor/29007: [ 1536.147079][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.147144][ T38] 1 lock held by syz-executor/29074: [ 1536.147158][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.147224][ T38] 1 lock held by syz-executor/29087: [ 1536.147238][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.147305][ T38] 1 lock held by syz-executor/29125: [ 1536.147318][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.147383][ T38] 4 locks held by kworker/0:4/29156: [ 1536.147398][ T38] 1 lock held by syz-executor/29157: [ 1536.147411][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.147478][ T38] 4 locks held by kworker/u9:4/29159: [ 1536.147492][ T38] #0: ffff88805873e138 ((wq_completion)hci12#2){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.147601][ T38] #1: ffffc90005a3fc40 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.147684][ T38] #2: ffff888021e840b0 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x950 [ 1536.147752][ T38] #3: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x54c/0x950 [ 1536.147835][ T38] 4 locks held by kworker/u9:5/29160: [ 1536.340745][ T38] #0: ffff88803a36c938 ((wq_completion)hci14#2){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.340822][ T38] #1: ffffc9000574fc40 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.340883][ T38] #2: ffff88803929c0b0 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x950 [ 1536.340940][ T38] #3: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x54c/0x950 [ 1536.340999][ T38] 1 lock held by syz-executor/29161: [ 1536.341013][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.341071][ T38] 1 lock held by syz-executor/29168: [ 1536.341084][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.341141][ T38] 1 lock held by syz-executor/29170: [ 1536.341153][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.341223][ T38] 5 locks held by kworker/u9:6/29171: [ 1536.341235][ T38] #0: ffff888038c02138 ((wq_completion)hci9){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.341437][ T38] #1: ffffc90013e37c40 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.341498][ T38] #2: ffff88807afe4f80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d3/0x400 [ 1536.341554][ T38] #3: ffff88807afe40b0 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0xa6f/0x1190 [ 1536.341604][ T38] #4: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x340 [ 1536.341652][ T38] 5 locks held by kworker/u9:7/29172: [ 1536.341666][ T38] #0: ffff888041922138 ((wq_completion)hci10){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.341732][ T38] #1: ffffc90005177c40 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.341792][ T38] #2: ffff88808f564f80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d3/0x400 [ 1536.341848][ T38] #3: ffff88808f5640b0 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0xa6f/0x1190 [ 1536.341895][ T38] #4: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x340 [ 1536.341946][ T38] 4 locks held by kworker/u9:8/29173: [ 1536.341958][ T38] #0: ffff8880508bb938 ((wq_completion)hci13#2){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.342023][ T38] #1: ffffc900050d7c40 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.342083][ T38] #2: ffff8880395780b0 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x950 [ 1536.342140][ T38] #3: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x54c/0x950 [ 1536.342210][ T38] 1 lock held by dhcpcd/29175: [ 1536.342223][ T38] #0: ffff888051a28358 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xe10 [ 1536.342298][ T38] 1 lock held by dhcpcd/29176: [ 1536.342310][ T38] #0: ffff88802b470358 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xe10 [ 1536.460311][ T38] 1 lock held by dhcpcd/29177: [ 1536.460325][ T38] #0: ffff88802972c358 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xe10 [ 1536.460386][ T38] 1 lock held by dhcpcd/29178: [ 1536.460400][ T38] #0: ffff888020af2358 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xe10 [ 1536.460461][ T38] 1 lock held by syz-executor/29180: [ 1536.460473][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.460536][ T38] 4 locks held by kworker/u9:9/29183: [ 1536.460548][ T38] #0: ffff888034acb938 ((wq_completion)hci15#2){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.460619][ T38] #1: ffffc90004fc7c40 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.460690][ T38] #2: ffff8880354cc0b0 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x950 [ 1536.460752][ T38] #3: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x54c/0x950 [ 1536.460815][ T38] 5 locks held by kworker/u9:10/29184: [ 1536.460828][ T38] #0: ffff88804e44e938 ((wq_completion)hci11){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.460891][ T38] #1: ffffc90004fb7c40 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.460954][ T38] #2: ffff888085ee0f80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d3/0x400 [ 1536.461013][ T38] #3: ffff888085ee00b0 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0xa6f/0x1190 [ 1536.461065][ T38] #4: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x340 [ 1536.461118][ T38] 5 locks held by kworker/u9:11/29185: [ 1536.461131][ T38] #0: ffff888057c89138 ((wq_completion)hci2#2){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1536.461199][ T38] #1: ffffc90004f97c40 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1536.461263][ T38] #2: ffff888031be0f80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d3/0x400 [ 1536.461322][ T38] #3: ffff888031be00b0 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0xa6f/0x1190 [ 1536.461375][ T38] #4: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x340 [ 1536.461428][ T38] 1 lock held by dhcpcd/29186: [ 1536.461441][ T38] #0: ffff88806f8ea358 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xe10 [ 1536.461501][ T38] 1 lock held by dhcpcd/29187: [ 1536.461514][ T38] #0: ffff888066520358 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xe10 [ 1536.461574][ T38] 1 lock held by syz-executor/29189: [ 1536.461587][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1536.461682][ T38] 4 locks held by kworker/u9:12/29190: [ 1536.461695][ T38] #0: ffff88803ca93938 ((wq_completion)hci16#2){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860 [ 1537.217731][ T38] #1: ffffc90004f67c40 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860 [ 1537.217823][ T38] #2: ffff8880349400b0 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x950 [ 1537.217900][ T38] #3: ffffffff8f4f2df8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x54c/0x950 [ 1537.217972][ T38] 1 lock held by dhcpcd/29196: [ 1537.217986][ T38] #0: ffff8880255fe358 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xe10 [ 1537.218056][ T38] 1 lock held by syz-executor/29197: [ 1537.218071][ T38] #0: ffffffff8f367a78 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x404/0x1ad0 [ 1537.218143][ T38] [ 1537.218150][ T38] ============================================= [ 1537.218150][ T38] [ 1537.218173][ T38] NMI backtrace for cpu 1 [ 1537.218195][ T38] CPU: 1 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1537.218222][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1537.218237][ T38] Call Trace: [ 1537.218247][ T38] [ 1537.218258][ T38] dump_stack_lvl+0xe8/0x150 [ 1537.218300][ T38] nmi_cpu_backtrace+0x274/0x2d0 [ 1537.218340][ T38] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1537.218381][ T38] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 1537.218423][ T38] sys_info+0x135/0x170 [ 1537.218456][ T38] watchdog+0xfd3/0x1030 [ 1537.218488][ T38] ? watchdog+0x1c9/0x1030 [ 1537.218534][ T38] kthread+0x388/0x470 [ 1537.218564][ T38] ? __pfx_watchdog+0x10/0x10 [ 1537.218585][ T38] ? __pfx_kthread+0x10/0x10 [ 1537.218615][ T38] ret_from_fork+0x514/0xb70 [ 1537.218657][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 1537.218696][ T38] ? __switch_to+0xc79/0x1410 [ 1537.218733][ T38] ? __pfx_kthread+0x10/0x10 [ 1537.218763][ T38] ret_from_fork_asm+0x1a/0x30 [ 1537.218807][ T38] [ 1537.218818][ T38] Sending NMI from CPU 1 to CPUs 0: [ 1537.218856][ C0] NMI backtrace for cpu 0 [ 1537.218871][ C0] CPU: 0 UID: 0 PID: 16 Comm: ktimers/0 Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1537.218892][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1537.218904][ C0] RIP: 0010:native_apic_msr_write+0x39/0x50 [ 1537.218930][ C0] Code: 74 2a 83 ff 30 74 25 eb 10 81 ff d0 00 00 00 74 1b 81 ff e0 00 00 00 74 13 c1 ef 04 81 c7 00 08 00 00 89 f9 89 f0 31 d2 0f 30 <66> 90 c3 cc cc cc cc cc 89 f6 31 d2 e9 e6 4b 68 03 66 0f 1f 44 00 [ 1537.218947][ C0] RSP: 0000:ffffc90000157990 EFLAGS: 00000046 [ 1537.218964][ C0] RAX: 000000000000efdb RBX: ffff8880b8823e40 RCX: 0000000000000838 [ 1537.218977][ C0] RDX: 0000000000000000 RSI: 000000000000efdb RDI: 0000000000000838 [ 1537.218989][ C0] RBP: ffffc90000157a48 R08: 0000000000000000 R09: 0000000000000100 [ 1537.219002][ C0] R10: 0000000000000100 R11: ffffffff817456a0 R12: 000000000000efdb [ 1537.219015][ C0] R13: dffffc0000000000 R14: 0000000010005df3 R15: 0000000000000020 [ 1537.219028][ C0] FS: 0000000000000000(0000) GS:ffff888126109000(0000) knlGS:0000000000000000 [ 1537.219044][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1537.219057][ C0] CR2: 00007fb640c374a0 CR3: 0000000039988000 CR4: 00000000003526f0 [ 1537.219073][ C0] Call Trace: [ 1537.219081][ C0] [ 1537.219088][ C0] lapic_next_event+0x11/0x20 [ 1537.219108][ C0] clockevents_program_event+0x385/0x5f0 [ 1537.219137][ C0] ? __pfx_clockevents_program_event+0x10/0x10 [ 1537.219165][ C0] ? tick_program_event+0x8f/0x120 [ 1537.219186][ C0] __hrtimer_rearm_deferred+0x273/0x460 [ 1537.219216][ C0] irqentry_exit+0x6a0/0x730 [ 1537.219239][ C0] ? trace_irq_disable+0x3b/0x140 [ 1537.219261][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1537.219282][ C0] RIP: 0010:_raw_spin_unlock_irqrestore+0x47/0x80 [ 1537.219308][ C0] Code: f7 e8 4d fc 72 f6 f7 c3 00 02 00 00 74 05 e8 30 96 9e f6 9c 58 a9 00 02 00 00 75 27 f7 c3 00 02 00 00 74 01 fb bf 01 00 00 00 84 8b 65 f6 65 8b 05 dd 43 43 07 85 c0 74 18 5b 41 5e e9 01 3c [ 1537.219324][ C0] RSP: 0000:ffffc90000157ba8 EFLAGS: 00000206 [ 1537.219339][ C0] RAX: 0000000000000006 RBX: 0000000000000246 RCX: 0000000080000002 [ 1537.219351][ C0] RDX: 0000000000000002 RSI: ffffffff8d63094a RDI: 0000000000000001 [ 1537.219364][ C0] RBP: ffffc90000157c80 R08: ffffffff8f8b8bf7 R09: 1ffffffff1f1717e [ 1537.219378][ C0] R10: dffffc0000000000 R11: fffffbfff1f1717f R12: 1ffff9200002af81 [ 1537.219393][ C0] R13: 0000000000000246 R14: ffff8880392cb1d8 R15: ffffc90000157c00 [ 1537.219418][ C0] rt_spin_lock+0x17a/0x400 [ 1537.219438][ C0] ? __pfx_rt_spin_lock+0x10/0x10 [ 1537.219462][ C0] net_tx_action+0x6d5/0xc30 [ 1537.219490][ C0] ? net_tx_action+0x5b6/0xc30 [ 1537.219518][ C0] handle_softirqs+0x1de/0x6d0 [ 1537.219552][ C0] ? smpboot_thread_fn+0x4d/0xa50 [ 1537.219570][ C0] run_ktimerd+0x69/0x100 [ 1537.219596][ C0] smpboot_thread_fn+0x541/0xa50 [ 1537.219616][ C0] ? smpboot_thread_fn+0x4d/0xa50 [ 1537.219640][ C0] kthread+0x388/0x470 [ 1537.219661][ C0] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 1537.219691][ C0] ? __pfx_kthread+0x10/0x10 [ 1537.219712][ C0] ret_from_fork+0x514/0xb70 [ 1537.219741][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 1537.219768][ C0] ? __switch_to+0xc79/0x1410 [ 1537.219793][ C0] ? __pfx_kthread+0x10/0x10 [ 1537.219814][ C0] ret_from_fork_asm+0x1a/0x30 [ 1537.219846][ C0] [ 1537.220861][ T38] Kernel panic - not syncing: hung_task: blocked tasks [ 1537.220880][ T38] CPU: 1 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1537.220906][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1537.220919][ T38] Call Trace: [ 1537.220929][ T38] [ 1537.220939][ T38] vpanic+0x56c/0xa60 [ 1537.220968][ T38] ? __pfx_vpanic+0x10/0x10 [ 1537.221003][ T38] panic+0xc5/0xd0 [ 1537.221026][ T38] ? __pfx_panic+0x10/0x10 [ 1537.221060][ T38] ? nmi_trigger_cpumask_backtrace+0x234/0x300 [ 1537.221102][ T38] watchdog+0x102c/0x1030 [ 1537.221132][ T38] ? watchdog+0x1c9/0x1030 [ 1537.221161][ T38] kthread+0x388/0x470 [ 1537.221188][ T38] ? __pfx_watchdog+0x10/0x10 [ 1537.221209][ T38] ? __pfx_kthread+0x10/0x10 [ 1537.221239][ T38] ret_from_fork+0x514/0xb70 [ 1537.221279][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 1537.221318][ T38] ? __switch_to+0xc79/0x1410 [ 1537.221353][ T38] ? __pfx_kthread+0x10/0x10 [ 1537.221393][ T38] ret_from_fork_asm+0x1a/0x30 [ 1537.221433][ T38] [ 1537.221592][ T38] Kernel Offset: disabled