last executing test programs: 1m17.172665233s ago: executing program 0 (id=5072): r0 = syz_open_dev$video(&(0x7f0000000180), 0x403, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000200)=0x1) 1m16.981181609s ago: executing program 0 (id=5076): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000ffffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f0000000640)="003fd06e6c0300000400a3f51300", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m16.242476199s ago: executing program 1 (id=5086): r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000000), 0xc) 1m16.026940796s ago: executing program 1 (id=5088): r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 1m15.928496084s ago: executing program 4 (id=5089): unshare(0x600) timerfd_gettime(0xffffffffffffffff, 0x0) 1m15.75426625s ago: executing program 0 (id=5091): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x1d}) 1m15.703375777s ago: executing program 1 (id=5092): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x78, 0x30, 0x17b, 0x0, 0x0, {}, [{0x64, 0x1, [@m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8}, {0x38, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x2, 0x0, 0x10000000}}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {0x6}]}]}, {0x4, 0x16}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x20011814) 1m15.519563709s ago: executing program 4 (id=5093): r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x47b, 0x2) ioctl$vim2m_VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000300)={0xf0f029, 0x6}) 1m15.152173015s ago: executing program 1 (id=5094): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$inet(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000580)=[{0x0, 0x1d}, {&(0x7f0000000400)='gH', 0x2}], 0x2}, 0x40080) 1m15.150357584s ago: executing program 0 (id=5104): prlimit64(0x0, 0x7, &(0x7f0000000140)={0x4, 0xc}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 1m14.936991241s ago: executing program 4 (id=5095): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x58, 0x10, 0x40d, 0x70bd2b, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8060}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_BC_QUEUE_LEN={0x8, 0x9, 0x3}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'macvlan0\x00'}]}, 0x58}}, 0x8000) 1m14.706486164s ago: executing program 1 (id=5096): r0 = syz_io_uring_setup(0x3ff1, &(0x7f0000000500)={0x0, 0x0, 0x40, 0x0, 0x4}, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x2000000, 0x0) 1m14.663143335s ago: executing program 4 (id=5097): r0 = syz_open_dev$radio(&(0x7f0000000000), 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x98f90f, 0x8000, '\x00', @p_u8=&(0x7f0000000240)}}) 1m14.662969654s ago: executing program 0 (id=5098): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'team0\x00', @ifru_mtu=0x5}) 1m14.028765809s ago: executing program 4 (id=5100): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_TABLE={0x8, 0xf, 0x7fff}]}, 0x24}}, 0x0) 1m14.00085081s ago: executing program 1 (id=5102): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="500000001000ffff2abd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="41150000a000000008000a00", @ANYRES32, @ANYBLOB="1400128009000100626f6e640000000004000280140003006e"], 0x50}, 0x1, 0x0, 0x0, 0x5}, 0x40880) 1m13.911926758s ago: executing program 0 (id=5103): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@ipv6_getaddr={0x64, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_RT_PRIORITY={0x8}, @IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_LOCAL={0x14, 0x2, @empty}, @IFA_CACHEINFO={0x3e}]}, 0x64}}, 0x0) 1m13.508418455s ago: executing program 4 (id=5105): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2107, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 51.8325815s ago: executing program 2 (id=5110): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents(r0, &(0x7f0000000ec0)=""/4096, 0x1000) 51.469561817s ago: executing program 32 (id=5103): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@ipv6_getaddr={0x64, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_RT_PRIORITY={0x8}, @IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_LOCAL={0x14, 0x2, @empty}, @IFA_CACHEINFO={0x3e}]}, 0x64}}, 0x0) 51.16590875s ago: executing program 33 (id=5102): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="500000001000ffff2abd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="41150000a000000008000a00", @ANYRES32, @ANYBLOB="1400128009000100626f6e640000000004000280140003006e"], 0x50}, 0x1, 0x0, 0x0, 0x5}, 0x40880) 50.807887692s ago: executing program 34 (id=5105): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2107, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 50.780839238s ago: executing program 2 (id=5115): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@ipv6_delrule={0x30, 0x18, 0x1, 0x0, 0x0, {0xa, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8}, [@FRA_DST={0x14, 0x1, @mcast2}]}, 0x30}}, 0x0) 50.227863666s ago: executing program 2 (id=5118): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_MAP$PAGES(r0, 0x3b85, &(0x7f0000000340)={0x28, 0x4, 0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x10}) 49.664706521s ago: executing program 3 (id=5119): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x222, &(0x7f0000000180)) 49.664356176s ago: executing program 2 (id=5120): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, 0x0, 0x0) 49.177790926s ago: executing program 3 (id=5121): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="e41200003e000701feffffff00000000017c0000040042800c00018006000600800a0000c0120280bc121780b8120180b4121980b01202"], 0x12e4}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x2000c000) 49.120052439s ago: executing program 2 (id=5122): futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000040), &(0x7f0000048000), 0x0) 48.627754443s ago: executing program 3 (id=5123): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000), 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x8, &(0x7f0000000100)=@framed={{0x18, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {0x5}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) 48.520606068s ago: executing program 2 (id=5124): r0 = socket$kcm(0x2, 0x5, 0x84) ioctl$SIOCSIFHWADDR(r0, 0x8931, &(0x7f0000000000)={'hsr0\x00'}) 47.991175862s ago: executing program 3 (id=5125): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) readlink(&(0x7f0000000080)='./cgroup\x00', &(0x7f00000000c0)=""/29, 0x1d) 46.996037686s ago: executing program 3 (id=5126): capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) 46.784938427s ago: executing program 3 (id=5127): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x359}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="410c49bc3c388e38d0da5a20564e", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 20.505198828s ago: executing program 35 (id=5124): r0 = socket$kcm(0x2, 0x5, 0x84) ioctl$SIOCSIFHWADDR(r0, 0x8931, &(0x7f0000000000)={'hsr0\x00'}) 0s ago: executing program 36 (id=5127): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x359}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="410c49bc3c388e38d0da5a20564e", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) kernel console output (not intermixed with test programs): [ 554.726343][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 554.726357][ T5845] audit: audit_lost=28636 audit_rate_limit=0 audit_backlog_limit=64 [ 554.726596][ T5845] audit: backlog limit exceeded [ 554.726951][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 554.765463][T15894] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 554.790635][T16515] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 554.797875][T16515] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 555.021501][ T6623] Error reading MAC address [ 555.054950][ T6623] usb 4-1: USB disconnect, device number 121 [ 555.251197][ T44] usb 2-1: new high-speed USB device number 115 using dummy_hcd [ 555.412038][ T44] usb 2-1: config 17 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 555.412077][ T44] usb 2-1: config 17 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 555.412107][ T44] usb 2-1: config 17 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 555.412152][ T44] usb 2-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 555.412176][ T44] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 555.519715][T16540] raw-gadget.1 gadget.1: fail, usb_ep_enable returned -22 [ 555.957293][ T44] aiptek 2-1:17.0: Aiptek using 400 ms programming speed [ 555.985879][ T44] input: Aiptek as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:17.0/input/input59 [ 556.304555][ T44] usb 2-1: USB disconnect, device number 115 [ 556.304647][ C1] aiptek 2-1:17.0: aiptek_irq - usb_submit_urb failed with result -19 [ 558.829193][T16690] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5024'. [ 558.830371][T16690] netlink: 32 bytes leftover after parsing attributes in process `syz.0.5024'. [ 559.006752][T16696] netlink: 'syz.4.5027': attribute type 13 has an invalid length. [ 559.427430][T16660] audit_log_start: 15226 callbacks suppressed [ 559.427450][T16660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 559.427465][T16660] audit: audit_lost=29892 audit_rate_limit=0 audit_backlog_limit=64 [ 559.427481][T16660] audit: backlog limit exceeded [ 559.427508][T16660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 559.427522][T16660] audit: audit_lost=29893 audit_rate_limit=0 audit_backlog_limit=64 [ 559.427547][T16660] audit: backlog limit exceeded [ 559.427578][T16660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 559.427592][T16660] audit: audit_lost=29894 audit_rate_limit=0 audit_backlog_limit=64 [ 559.427608][T16660] audit: backlog limit exceeded [ 559.427634][T16660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 559.727658][T16707] netlink: 'syz.1.5036': attribute type 10 has an invalid length. [ 559.968061][T16696] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 559.969241][T16707] batman_adv: batadv0: Adding interface: wlan0 [ 559.969258][T16707] batman_adv: batadv0: The MTU of interface wlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 559.969295][T16707] batman_adv: batadv0: Interface activated: wlan0 [ 560.152496][ T5848] usb 1-1: new high-speed USB device number 115 using dummy_hcd [ 560.172722][T16719] unsupported nlmsg_type 40 [ 560.311008][ T5848] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 560.311038][ T5848] usb 1-1: config 1 has an invalid descriptor of length 92, skipping remainder of the config [ 560.311059][ T5848] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 560.311081][ T5848] usb 1-1: config 1 has no interface number 0 [ 560.311116][ T5848] usb 1-1: too many endpoints for config 1 interface 1 altsetting 1: 32, using maximum allowed: 30 [ 560.311162][ T5848] usb 1-1: config 1 interface 1 altsetting 1 has 0 endpoint descriptors, different from the interface descriptor's value: 32 [ 560.325189][ T5848] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 560.325221][ T5848] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 560.325243][ T5848] usb 1-1: Product: syz [ 560.325258][ T5848] usb 1-1: Manufacturer: syz [ 560.325341][ T5848] usb 1-1: SerialNumber: syz [ 560.444053][ T5848] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 560.444104][ T5848] cdc_ncm 1-1:1.1: bind() failure [ 560.688865][ T5927] usb 1-1: USB disconnect, device number 115 [ 560.759495][T16745] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5045'. [ 560.814169][T16747] netlink: 'syz.4.5044': attribute type 1 has an invalid length. [ 560.814209][T16747] netlink: 'syz.4.5044': attribute type 1 has an invalid length. [ 561.041587][T16744] netdevsim netdevsim3 netdevsim0: entered promiscuous mode [ 561.041626][T16744] netdevsim netdevsim3 netdevsim0: entered allmulticast mode [ 561.196115][T16776] wireguard0: entered promiscuous mode [ 561.196149][T16776] wireguard0: entered allmulticast mode [ 562.674428][T16825] netlink: 'syz.4.5060': attribute type 1 has an invalid length. [ 562.674452][T16825] netlink: 224 bytes leftover after parsing attributes in process `syz.4.5060'. [ 563.827790][T16861] vivid-000: disconnect [ 563.833190][T16859] vivid-000: reconnect [ 564.061089][T16869] vim2m vim2m.0: Fourcc format (0x42474752) invalid. [ 564.107715][ T38] kauditd_printk_skb: 12961 callbacks suppressed [ 564.107737][ T38] audit: type=1400 audit(1756235465.680:236319): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5850 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 564.107788][ T38] audit: type=1400 audit(1756235465.680:236320): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5850 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 564.107847][ T38] audit: type=1400 audit(1756235465.680:236321): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5850 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 564.107894][ T38] audit: type=1400 audit(1756235465.680:236322): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5850 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 564.107942][ T38] audit: type=1400 audit(1756235465.680:236323): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5850 comm="syz-executor" name="1042" dev="tmpfs" ino=5232 [ 564.107988][ T38] audit: type=1400 audit(1756235465.680:236324): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5850 comm="syz-executor" path="/1042" dev="tmpfs" ino=5232 [ 564.108034][ T38] audit: type=1400 audit(1756235465.680:236325): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 564.108083][ T38] audit: type=1400 audit(1756235465.680:236326): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5850 comm="syz-executor" path="/1042" dev="tmpfs" ino=5232 [ 564.108130][ T38] audit: type=1400 audit(1756235465.680:236327): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5850 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 564.108177][ T38] audit: type=1400 audit(1756235465.680:236328): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5850 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 564.774872][ T989] usb 3-1: new high-speed USB device number 120 using dummy_hcd [ 564.935289][ T989] usb 3-1: Using ep0 maxpacket: 16 [ 564.948481][ T989] usb 3-1: config 0 has an invalid interface number: 251 but max is 0 [ 564.948511][ T989] usb 3-1: config 0 has no interface number 0 [ 564.948562][ T989] usb 3-1: config 0 interface 251 altsetting 0 bulk endpoint 0x4 has invalid maxpacket 16 [ 564.948588][ T989] usb 3-1: config 0 interface 251 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 64 [ 565.001281][ T989] usb 3-1: New USB device found, idVendor=0b95, idProduct=172a, bcdDevice=f7.f4 [ 565.001314][ T989] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 565.001336][ T989] usb 3-1: Product: syz [ 565.001352][ T989] usb 3-1: Manufacturer: syz [ 565.001367][ T989] usb 3-1: SerialNumber: syz [ 565.051229][ T989] usb 3-1: config 0 descriptor?? [ 565.068316][T16879] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 565.068585][T16879] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 565.242970][T16899] program syz.0.5091 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 565.313890][T16879] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 565.323357][T16879] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 565.537788][ T989] asix 3-1:0.251 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -71 [ 565.537840][ T989] asix 3-1:0.251 (unnamed net_device) (uninitialized): Failed to read MAC address: -71 [ 565.538149][ T989] asix 3-1:0.251: probe with driver asix failed with error -5 [ 565.591263][ T989] usb 3-1: USB disconnect, device number 120 [ 566.025633][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.027103][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.027492][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.027853][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.028184][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.028519][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.028861][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.029192][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.029526][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.029868][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 567.050559][T16940] netlink: 20 bytes leftover after parsing attributes in process `syz.0.5103'. [ 567.899092][T16980] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 567.899117][T16980] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 568.129466][T16982] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5108'. [ 568.129492][T16982] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5108'. [ 568.558146][ T5927] usb 4-1: new high-speed USB device number 122 using dummy_hcd [ 568.698045][ T5927] usb 4-1: Using ep0 maxpacket: 8 [ 568.703380][ T5927] usb 4-1: config 179 has an invalid interface number: 65 but max is 0 [ 568.703413][ T5927] usb 4-1: config 179 has no interface number 0 [ 568.703467][ T5927] usb 4-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 568.703498][ T5927] usb 4-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 568.703530][ T5927] usb 4-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 568.703559][ T5927] usb 4-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 41728, setting to 1024 [ 568.703589][ T5927] usb 4-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 568.703636][ T5927] usb 4-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 568.703659][ T5927] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 568.815045][ T38] kauditd_printk_skb: 8954 callbacks suppressed [ 568.815067][ T38] audit: type=1400 audit(1756235470.734:242907): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=33 comm="kdevtmpfs" name="/" dev="devtmpfs" ino=1 [ 568.815121][ T38] audit: type=1400 audit(1756235470.734:242908): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=33 comm="kdevtmpfs" name="bus" dev="devtmpfs" ino=718 [ 568.815169][ T38] audit: type=1400 audit(1756235470.734:242909): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=33 comm="kdevtmpfs" name="usb" dev="devtmpfs" ino=719 [ 568.815217][ T38] audit: type=1400 audit(1756235470.734:242910): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=33 comm="kdevtmpfs" name="004" dev="devtmpfs" ino=729 [ 568.815274][ T38] audit: type=1400 audit(1756235470.734:242911): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=33 comm="kdevtmpfs" name="004" dev="devtmpfs" ino=729 [ 568.815321][ T38] audit: type=1400 audit(1756235470.734:242912): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=33 comm="kdevtmpfs" name="122" dev="devtmpfs" ino=4478 [ 568.968137][ T38] audit: type=1400 audit(1756235470.895:242913): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 568.968200][ T38] audit: type=1400 audit(1756235470.895:242914): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="tmpfs" ino=1 [ 568.968249][ T38] audit: type=1400 audit(1756235470.895:242915): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 568.968296][ T38] audit: type=1400 audit(1756235470.895:242916): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 568.973988][T16984] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 569.845343][T16984] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 569.845378][T16984] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 569.846438][T16984] vhci_hcd vhci_hcd.0: Device attached [ 570.078049][T16992] vhci_hcd: connection closed [ 570.080646][T16671] vhci_hcd: stop threads [ 570.080671][T16671] vhci_hcd: release socket [ 570.471830][T16671] vhci_hcd: disconnect device [ 570.687849][ T5927] vhci_hcd: vhci_device speed not set [ 570.691679][ C1] net_ratelimit: 9902 callbacks suppressed [ 570.691703][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 570.692126][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 570.692526][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 570.692878][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 570.693996][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 570.694489][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 570.694932][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 570.695390][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 570.695855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 570.696306][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.651312][ T38] kauditd_printk_skb: 284 callbacks suppressed [ 573.651742][ T38] audit: type=1400 audit(1756235475.928:243201): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 573.993323][ T38] audit: type=1400 audit(1756235476.293:243202): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 574.150894][ T38] audit: type=1400 audit(1756235476.454:243203): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 574.691691][ T38] audit: type=1400 audit(1756235477.033:243204): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 575.287572][ T38] audit: type=1400 audit(1756235477.548:243205): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 575.360633][ C1] net_ratelimit: 10117 callbacks suppressed [ 575.360657][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.361148][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.361619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.362093][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.362529][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.362997][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.363433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.363878][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.364368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.364813][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 575.783933][ T38] audit: type=1400 audit(1756235478.085:243206): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 575.992369][ T38] audit: type=1400 audit(1756235478.439:243207): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=16995 comm="kworker/u8:14" name="/" dev="sda1" ino=2 [ 576.186524][ T38] audit: type=1400 audit(1756235478.611:243208): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 576.636944][ T38] audit: type=1400 audit(1756235479.040:243209): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5845 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 576.637008][ T38] audit: type=1400 audit(1756235479.040:243210): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5845 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 578.655634][ T38] kauditd_printk_skb: 64 callbacks suppressed [ 578.655865][ T38] audit: type=1400 audit(1756235481.293:243275): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 579.160015][ T38] audit: type=1400 audit(1756235481.830:243276): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 579.536301][ T38] audit: type=1400 audit(1756235482.152:243277): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 579.666292][ T38] audit: type=1400 audit(1756235482.377:243278): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 579.761823][ T38] audit: type=1400 audit(1756235482.484:243279): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 579.908800][ T38] audit: type=1400 audit(1756235482.613:243280): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=16996 comm="kworker/u8:19" name="/" dev="sda1" ino=2 [ 580.029351][ C1] net_ratelimit: 9698 callbacks suppressed [ 580.029377][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.029848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.030363][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.030804][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.031241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.031687][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.032124][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.032601][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.033073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.033505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 580.156916][ T38] audit: type=1400 audit(1756235482.903:243281): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 580.546934][ T38] audit: type=1400 audit(1756235483.010:243282): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 580.548014][ T38] audit: type=1400 audit(1756235483.010:243283): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 580.548651][ T38] audit: type=1400 audit(1756235483.010:243284): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="tmpfs" ino=1 [ 583.670691][ T38] kauditd_printk_skb: 309 callbacks suppressed [ 583.670896][ T38] audit: type=1400 audit(1756235486.669:243450): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 584.171662][ T38] audit: type=1400 audit(1756235487.217:243451): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 584.546380][ T38] audit: type=1400 audit(1756235487.528:243452): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5838 comm="syz-executor" path="/1033" dev="tmpfs" ino=5192 [ 584.696701][ T38] audit: type=1400 audit(1756235487.753:243453): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 584.698374][ C1] net_ratelimit: 9993 callbacks suppressed [ 584.698394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.698982][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.699432][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.699869][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.700314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.700778][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.701252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.701894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.702354][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.702794][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 585.170923][ T38] audit: type=1400 audit(1756235488.290:243454): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 585.350027][T16939] n (unregistering): Released all slaves [ 585.778821][ T38] audit: type=1400 audit(1756235488.826:243455): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 586.222611][ T38] audit: type=1400 audit(1756235489.352:243456): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 586.708803][ T38] audit: type=1400 audit(1756235489.910:243457): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 587.172846][ T38] audit: type=1400 audit(1756235490.436:243458): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 587.740620][ T38] audit: type=1400 audit(1756235490.962:243459): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 588.372148][ C0] xpad 4-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 588.372228][ C0] xpad 4-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 588.372306][ T10] usb 4-1: USB disconnect, device number 122 [ 588.444171][ T38] kauditd_printk_skb: 2 callbacks suppressed [ 588.444193][ T38] audit: type=1400 audit(1756235491.788:243462): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=9726 [ 588.444244][ T38] audit: type=1400 audit(1756235491.788:243463): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5205 comm="udevd" name="queue" dev="tmpfs" ino=9726 [ 588.444292][ T38] audit: type=1400 audit(1756235491.788:243464): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 588.444339][ T38] audit: type=1400 audit(1756235491.788:243465): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="etc" dev="sda1" ino=116 [ 588.479784][ T5838] audit: audit_backlog=65 > audit_backlog_limit=64 [ 588.479805][ T5838] audit: audit_lost=31610 audit_rate_limit=0 audit_backlog_limit=64 [ 588.479823][ T5838] audit: backlog limit exceeded [ 588.479937][ T5838] audit: audit_backlog=65 > audit_backlog_limit=64 [ 588.479952][ T5838] audit: audit_lost=31611 audit_rate_limit=0 audit_backlog_limit=64 [ 588.479968][ T5838] audit: backlog limit exceeded [ 589.367882][ C1] net_ratelimit: 9889 callbacks suppressed [ 589.367905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 589.368371][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 589.368807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 589.369251][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 589.369721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 589.370150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 589.370585][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 589.371055][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 589.371508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 589.371972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 590.146095][T17045] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 590.146114][T17045] IPv6: NLM_F_CREATE should be set when creating new route [ 590.147804][T17045] IPv6: NLM_F_CREATE should be set when creating new route [ 592.362224][ T5154] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 592.408113][ T5154] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 592.410627][ T5154] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 592.412470][ T5154] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 592.413442][ T5154] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 592.790021][ T5154] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 592.824058][ T5154] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 592.837661][ T5154] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 592.842623][ T5154] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 592.859076][ T5154] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 593.121186][ T38] kauditd_printk_skb: 3407 callbacks suppressed [ 593.121207][ T38] audit: type=1400 audit(1756235496.810:246303): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17078 comm="kworker/u8:15" name="/" dev="sda1" ino=2 [ 593.122662][ T38] audit: type=1400 audit(1756235496.810:246304): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 593.167065][ T38] audit: type=1400 audit(1756235496.810:246305): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="tmpfs" ino=1 [ 593.167123][ T38] audit: type=1400 audit(1756235496.810:246306): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 593.167172][ T38] audit: type=1400 audit(1756235496.810:246307): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 593.245838][ T38] audit: type=1400 audit(1756235496.917:246308): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=9738 [ 593.245897][ T38] audit: type=1400 audit(1756235496.939:246309): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5892 comm="udevd" name="/" dev="sda1" ino=2 [ 593.245955][ T38] audit: type=1400 audit(1756235496.939:246310): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5205 comm="udevd" name="queue" dev="tmpfs" ino=9738 [ 593.246003][ T38] audit: type=1400 audit(1756235496.939:246311): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 593.246050][ T38] audit: type=1400 audit(1756235496.939:246312): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="tmpfs" ino=1 [ 593.392804][T15894] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 593.415124][T15894] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 593.416551][T15894] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 593.417978][T15894] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 593.418946][T15894] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 594.036401][ C1] net_ratelimit: 9903 callbacks suppressed [ 594.036425][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.036932][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.037424][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.037911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.038345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.038775][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.039222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.039769][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.040234][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.040761][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.353218][ T5154] Bluetooth: hci5: command tx timeout [ 594.800620][ T5154] Bluetooth: hci6: command tx timeout [ 595.398278][ T5154] Bluetooth: hci7: command tx timeout [ 596.291478][ T5154] Bluetooth: hci5: command tx timeout [ 596.739123][ T5154] Bluetooth: hci6: command tx timeout [ 597.335889][ T5154] Bluetooth: hci7: command tx timeout [ 598.200710][ T38] kauditd_printk_skb: 460 callbacks suppressed [ 598.200730][ T38] audit: type=1400 audit(1756235502.261:246773): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 598.240515][ T5154] Bluetooth: hci5: command tx timeout [ 598.678176][T15894] Bluetooth: hci6: command tx timeout [ 598.704763][ T38] audit: type=1400 audit(1756235502.787:246774): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 598.705819][ C1] net_ratelimit: 10304 callbacks suppressed [ 598.705838][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.706283][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.706736][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.707199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.707663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.708141][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.708631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.709145][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.709633][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.710416][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 599.196033][ T38] audit: type=1400 audit(1756235503.334:246775): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 599.274195][T15894] Bluetooth: hci7: command tx timeout [ 599.799053][ T38] audit: type=1400 audit(1756235503.935:246776): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 600.214842][ T38] audit: type=1400 audit(1756235504.396:246777): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 600.277484][T15894] Bluetooth: hci5: command tx timeout [ 600.697313][ T38] audit: type=1400 audit(1756235504.922:246778): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 600.697520][T15894] Bluetooth: hci6: command tx timeout [ 601.232645][ T38] audit: type=1400 audit(1756235505.480:246779): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 601.232750][T15894] Bluetooth: hci7: command tx timeout [ 601.721021][ T38] audit: type=1400 audit(1756235506.006:246780): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 602.229263][ T38] audit: type=1400 audit(1756235506.543:246781): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 602.764817][ T38] audit: type=1400 audit(1756235507.101:246782): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 603.183873][ T38] audit: type=1400 audit(1756235507.616:246783): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 603.374741][ C1] net_ratelimit: 9912 callbacks suppressed [ 603.374769][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.375819][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.376310][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.376751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.377202][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.377712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.378151][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.378627][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.379095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.379549][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.750505][ T38] audit: type=1400 audit(1756235508.174:246784): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 604.236779][ T38] audit: type=1400 audit(1756235508.699:246785): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 604.710121][ T38] audit: type=1400 audit(1756235509.225:246786): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 605.261991][ T38] audit: type=1400 audit(1756235509.762:246787): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 605.498979][ T1319] ieee802154 phy0 wpan0: encryption failed: -22 [ 605.543794][ T1319] ieee802154 phy1 wpan1: encryption failed: -22 [ 605.722388][ T38] audit: type=1400 audit(1756235510.309:246788): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 606.225026][ T38] audit: type=1400 audit(1756235510.846:246789): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 606.727386][ T38] audit: type=1400 audit(1756235511.382:246790): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 607.546849][ T38] audit: type=1400 audit(1756235511.919:246791): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 607.546915][ T38] audit: type=1400 audit(1756235512.176:246792): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 607.861417][ T38] audit: type=1400 audit(1756235512.434:246793): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 608.043415][ C1] net_ratelimit: 9560 callbacks suppressed [ 608.043439][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.043946][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.044419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.044895][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.045367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.045874][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.046371][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.046853][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.047321][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.047799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 609.896743][ T38] audit: type=1400 audit(1756235514.730:246794): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1032 comm="irq/29-virtio0-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 609.896809][ T38] audit: type=1400 audit(1756235514.730:246795): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1032 comm="irq/29-virtio0-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 611.117596][ T38] audit: type=1400 audit(1756235516.061:246796): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 612.712175][ C1] net_ratelimit: 9484 callbacks suppressed [ 612.712200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.712648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.713125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.713563][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.714001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.714622][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.715081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.715525][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.716034][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.716495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 616.521661][ T38] audit: type=1400 audit(1756235521.168:246797): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/34-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 616.521728][ T38] audit: type=1400 audit(1756235521.168:246798): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/34-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 616.521780][ T38] audit: type=1400 audit(1756235521.201:246799): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 616.521831][ T38] audit: type=1400 audit(1756235521.201:246800): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 616.521889][ T38] audit: type=1400 audit(1756235521.587:246801): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 616.758433][ T38] audit: type=1400 audit(1756235522.123:246802): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 616.838802][ T38] audit: type=1400 audit(1756235522.252:246803): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="/" dev="sda1" ino=2 [ 616.838877][ T38] audit: type=1400 audit(1756235522.263:246804): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="etc" dev="sda1" ino=116 [ 616.838934][ T38] audit: type=1400 audit(1756235522.263:246805): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="cron" dev="sda1" ino=120 [ 617.312350][ T38] audit: type=1400 audit(1756235522.671:246806): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 617.381076][ C1] net_ratelimit: 9525 callbacks suppressed [ 617.381104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.381547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.381992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.382434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.382873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.383311][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.383756][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.384199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.384640][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.385088][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 621.992058][ T38] kauditd_printk_skb: 27 callbacks suppressed [ 621.992080][ T38] audit: type=1400 audit(1756235526.834:246834): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17089 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 621.992139][ T38] audit: type=1400 audit(1756235526.963:246835): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 621.992188][ T38] audit: type=1400 audit(1756235527.489:246836): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 621.992238][ T38] audit: type=1400 audit(1756235527.800:246837): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5835 comm="syz-executor" opid=5844 ocomm="syz-executor" [ 621.992292][ T38] audit: type=1400 audit(1756235527.800:246838): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17089 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 622.049845][ C1] net_ratelimit: 9453 callbacks suppressed [ 622.049868][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.050470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.050939][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.051389][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.051867][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.052305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.052767][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.053199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.053631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.054074][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.970260][ T38] audit: type=1400 audit(1756235528.025:246839): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 622.970326][ T38] audit: type=1400 audit(1756235528.573:246840): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 623.591665][ T38] audit: type=1400 audit(1756235529.109:246841): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 623.865286][ T38] audit: type=1400 audit(1756235529.656:246842): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 625.132078][ T38] audit: type=1400 audit(1756235531.169:246843): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=17089 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 626.453234][ T30] sched: DL replenish lagged too much [ 626.719117][ C1] net_ratelimit: 9843 callbacks suppressed [ 626.719141][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.719609][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.720062][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.720496][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.720970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.721406][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.721849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.722314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.722768][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.723377][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 627.582865][ T38] kauditd_printk_skb: 20 callbacks suppressed [ 627.582888][ T38] audit: type=1400 audit(1756235532.629:246864): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 627.582951][ T38] audit: type=1400 audit(1756235532.629:246865): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 627.583002][ T38] audit: type=1400 audit(1756235532.629:246866): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 627.583050][ T38] audit: type=1400 audit(1756235532.629:246867): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 627.583101][ T38] audit: type=1400 audit(1756235532.629:246868): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 627.583150][ T38] audit: type=1400 audit(1756235532.833:246869): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17089 comm="syz-executor" name="/" dev="sda1" ino=2 [ 627.583199][ T38] audit: type=1400 audit(1756235532.833:246870): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17089 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 627.583246][ T38] audit: type=1400 audit(1756235532.833:246871): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17089 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 627.583293][ T38] audit: type=1400 audit(1756235532.833:246872): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17089 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 627.583340][ T38] audit: type=1400 audit(1756235532.833:246873): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17089 comm="syz-executor" name="kcov" dev="debugfs" ino=1072 [ 631.387627][ C1] net_ratelimit: 9233 callbacks suppressed [ 631.387651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.388104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.388558][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.389013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.389505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.389963][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.390459][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.390911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.391369][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.391805][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.269056][ T38] kauditd_printk_skb: 48 callbacks suppressed [ 633.269076][ T38] audit: type=1400 audit(1756235539.893:246922): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=17089 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1072 [ 634.185243][ T38] audit: type=1400 audit(1756235540.881:246923): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17090 comm="syz-executor" name="/" dev="sda1" ino=2 [ 634.185514][ T38] audit: type=1400 audit(1756235540.881:246924): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17090 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 634.185784][ T38] audit: type=1400 audit(1756235540.881:246925): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17090 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 [ 634.186157][ T38] audit: type=1400 audit(1756235540.881:246926): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17090 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 [ 634.189349][ T38] audit: type=1400 audit(1756235540.881:246927): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 634.189602][ T38] audit: type=1400 audit(1756235540.881:246928): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="etc" dev="sda1" ino=116 [ 634.189838][ T38] audit: type=1400 audit(1756235540.881:246929): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="sda1" ino=259 [ 634.190206][ T38] audit: type=1400 audit(1756235540.881:246930): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 634.190501][ T38] audit: type=1400 audit(1756235540.881:246931): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 634.214569][T15894] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 636.056880][ C1] net_ratelimit: 9544 callbacks suppressed [ 636.056905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.057395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.057890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.058375][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.058900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.059390][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.059970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.060455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.060949][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.061473][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.853571][T15894] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 639.454791][ T5154] Bluetooth: hci8: Opcode 0x1001 failed: -110 [ 640.725042][ C1] net_ratelimit: 9640 callbacks suppressed [ 640.725066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.725580][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.726050][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.726524][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.727053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.727530][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.727985][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.728469][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.728939][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.729446][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 641.508482][ T38] kauditd_printk_skb: 27 callbacks suppressed [ 641.508509][ T38] audit: type=1400 audit(1756235548.081:246959): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 641.508581][ T38] audit: type=1400 audit(1756235548.081:246960): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 641.508637][ T38] audit: type=1400 audit(1756235548.081:246961): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 641.508694][ T38] audit: type=1400 audit(1756235548.682:246962): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17093 comm="kworker/u8:4" name="/" dev="sda1" ino=2 [ 642.007436][T17094] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 643.875679][ T38] audit: type=1400 audit(1756235550.828:246963): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 645.394241][ C1] net_ratelimit: 9421 callbacks suppressed [ 645.394266][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.394732][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.395229][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.395713][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.396225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.396687][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.397158][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.397627][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.398144][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.398604][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.929490][ T5154] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 648.165254][ T5854] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 649.080863][ T5854] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 649.118149][ T38] audit: type=1400 audit(1756235556.901:246964): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 649.118422][ T38] audit: type=1400 audit(1756235556.901:246965): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="tmpfs" ino=1 [ 649.118718][ T38] audit: type=1400 audit(1756235556.901:246966): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 649.119138][ T38] audit: type=1400 audit(1756235556.901:246967): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 649.119806][ T38] audit: type=1400 audit(1756235556.901:246968): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=9739 [ 649.120135][ T38] audit: type=1400 audit(1756235556.901:246969): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5205 comm="udevd" name="queue" dev="tmpfs" ino=9739 [ 650.063420][ C1] net_ratelimit: 9481 callbacks suppressed [ 650.063446][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.063892][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.064330][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.064803][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.065268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.065711][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.066151][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.066591][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.067036][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.067505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 652.076555][T17096] audit: audit_backlog=65 > audit_backlog_limit=64 [ 652.076576][T17096] audit: audit_lost=31802 audit_rate_limit=0 audit_backlog_limit=64 [ 652.076593][T17096] audit: backlog limit exceeded [ 652.076618][T17096] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.451984][ T5854] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 653.452910][ T5854] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 654.060998][ T38] kauditd_printk_skb: 222 callbacks suppressed [ 654.061019][ T38] audit: type=1400 audit(1756235561.559:247037): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=17090 comm="syz-executor" path="socket:[41946]" dev="sockfs" ino=41946 [ 654.061073][ T38] audit: type=1400 audit(1756235561.870:247038): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 654.061123][ T38] audit: type=1400 audit(1756235562.202:247039): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=17098 comm="syz-executor" opid=17098 ocomm="syz-executor" [ 654.077528][ T38] audit: type=1400 audit(1756235562.224:247040): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 654.077778][ T38] audit: type=1400 audit(1756235562.224:247041): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 654.078045][ T38] audit: type=1400 audit(1756235562.224:247042): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 654.078460][ T38] audit: type=1400 audit(1756235562.224:247043): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17098 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 654.345477][ T38] audit: type=1400 audit(1756235562.406:247044): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 654.345546][ T38] audit: type=1400 audit(1756235562.492:247045): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 654.345595][ T38] audit: type=1400 audit(1756235562.492:247046): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 654.731905][ C1] net_ratelimit: 9289 callbacks suppressed [ 654.731931][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.732407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.732872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.733350][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.733878][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.734354][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.734849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.735324][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.735794][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.736372][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.753924][ T38] kauditd_printk_skb: 42 callbacks suppressed [ 658.753954][ T38] audit: type=1400 audit(1756235567.235:247089): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 659.267084][ T38] audit: type=1400 audit(1756235567.782:247090): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 659.402537][ C1] net_ratelimit: 9373 callbacks suppressed [ 659.402562][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.403035][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.403492][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.403987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.404444][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.404939][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.405395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.405862][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.406326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.406842][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.830280][ T38] audit: type=1400 audit(1756235568.319:247091): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 660.272253][ T38] audit: type=1400 audit(1756235568.845:247092): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 660.658105][ T38] audit: type=1400 audit(1756235569.220:247093): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 660.658170][ T38] audit: type=1400 audit(1756235569.220:247094): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="etc" dev="sda1" ino=116 [ 660.658218][ T38] audit: type=1400 audit(1756235569.220:247095): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="sda1" ino=259 [ 660.835246][ T38] audit: type=1400 audit(1756235569.381:247096): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 661.301124][ T38] audit: type=1400 audit(1756235569.918:247097): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 661.898353][ T38] audit: type=1400 audit(1756235570.476:247098): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 663.598279][ T38] kauditd_printk_skb: 2 callbacks suppressed [ 663.598303][ T38] audit: type=1400 audit(1756235572.075:247101): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 664.034877][ T38] audit: type=1400 audit(1756235572.611:247102): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 664.071170][ C1] net_ratelimit: 5620 callbacks suppressed [ 664.071194][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.072675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.074165][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.075624][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.077080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.078534][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.080125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.081644][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.083196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.084640][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.591048][ T38] audit: type=1400 audit(1756235573.051:247103): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 664.591120][ T38] audit: type=1400 audit(1756235573.158:247104): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 664.619536][ T38] audit: type=1400 audit(1756235573.534:247105): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 664.794641][ T38] audit: type=1400 audit(1756235573.684:247106): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 664.859796][ T38] audit: type=1400 audit(1756235573.727:247107): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 664.859857][ T38] audit: type=1400 audit(1756235573.727:247108): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="lib" dev="sda1" ino=264 [ 664.859905][ T38] audit: type=1400 audit(1756235573.727:247109): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="sda1" ino=1222 [ 665.529969][ T38] audit: type=1400 audit(1756235574.221:247110): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 666.706031][ T5154] Bluetooth: hci8: command tx timeout [ 668.573464][ T38] kauditd_printk_skb: 25 callbacks suppressed [ 668.573489][ T38] audit: type=1400 audit(1756235577.751:247136): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/run/udev/rules.d" dev="tmpfs" ino=11 [ 668.739269][ C1] net_ratelimit: 2718 callbacks suppressed [ 668.739295][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.741049][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.742586][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.744182][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.745804][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.747391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.751530][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.753106][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.754692][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.756265][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.764829][ T38] audit: type=1400 audit(1756235577.858:247137): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 668.764890][ T38] audit: type=1400 audit(1756235577.858:247138): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="lib" dev="sda1" ino=264 [ 668.764937][ T38] audit: type=1400 audit(1756235577.858:247139): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="sda1" ino=1222 [ 668.764988][ T38] audit: type=1400 audit(1756235577.858:247140): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 668.765035][ T38] audit: type=1400 audit(1756235577.858:247141): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 668.765083][ T38] audit: type=1400 audit(1756235577.858:247142): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="lib" dev="sda1" ino=264 [ 668.765130][ T38] audit: type=1400 audit(1756235577.858:247143): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="sda1" ino=1222 [ 668.765177][ T38] audit: type=1400 audit(1756235577.858:247144): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 668.765227][ T38] audit: type=1400 audit(1756235577.858:247145): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 668.765590][ T5154] Bluetooth: hci8: command tx timeout [ 671.429917][ T5154] Bluetooth: hci8: command tx timeout [ 673.409001][ C1] net_ratelimit: 2712 callbacks suppressed [ 673.409033][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.410579][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.412117][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.413670][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.415249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.416807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.418268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.419779][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.421354][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.422803][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.724309][ T5154] Bluetooth: hci8: command tx timeout [ 675.302666][ T38] kauditd_printk_skb: 22 callbacks suppressed [ 675.302686][ T38] audit: type=1400 audit(1756235584.887:247168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17101 comm="kworker/u8:20" name="/" dev="sda1" ino=2 [ 675.474795][ T38] audit: type=1400 audit(1756235585.177:247169): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 676.108620][ T38] audit: type=1400 audit(1756235585.756:247170): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="sda1" ino=2 [ 676.108687][ T38] audit: type=1400 audit(1756235585.756:247171): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 676.108735][ T38] audit: type=1400 audit(1756235585.756:247172): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 676.108785][ T38] audit: type=1400 audit(1756235585.756:247173): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 676.108847][ T38] audit: type=1400 audit(1756235585.756:247174): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17098 comm="syz-executor" name="kcov" dev="debugfs" ino=1072 [ 676.108895][ T38] audit: type=1400 audit(1756235585.756:247175): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17098 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1072 [ 676.108944][ T38] audit: type=1400 audit(1756235585.756:247176): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17098 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1072 [ 676.108993][ T38] audit: type=1400 audit(1756235585.799:247177): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="sda1" ino=2 [ 678.076386][ C1] net_ratelimit: 2708 callbacks suppressed [ 678.076410][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.077920][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.079403][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.080917][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.082419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.083863][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.085367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.086897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.088374][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.130428][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 680.912203][ T38] kauditd_printk_skb: 24 callbacks suppressed [ 680.912224][ T38] audit: type=1400 audit(1756235591.025:247202): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="sda1" ino=2 [ 680.912485][ T38] audit: type=1400 audit(1756235591.025:247203): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 680.912759][ T38] audit: type=1400 audit(1756235591.025:247204): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 680.913016][ T38] audit: type=1400 audit(1756235591.025:247205): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 680.913255][ T38] audit: type=1400 audit(1756235591.025:247206): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17098 comm="syz-executor" name="kcov" dev="debugfs" ino=1072 [ 681.906479][ T38] audit: type=1400 audit(1756235592.077:247207): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17098 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1072 [ 681.906546][ T38] audit: type=1400 audit(1756235592.087:247208): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17098 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1072 [ 682.745369][ C1] net_ratelimit: 2767 callbacks suppressed [ 682.745394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.746898][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.748369][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.749845][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.751760][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.753293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.754819][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.756279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.757867][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.759340][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.859057][ T38] audit: type=1400 audit(1756235592.098:247209): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17102 comm="udevd" name="/" dev="sda1" ino=2 [ 682.859373][ T38] audit: type=1400 audit(1756235593.117:247210): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17102 comm="udevd" name="/" dev="proc" ino=1 [ 682.873352][ T38] audit: type=1400 audit(1756235593.128:247211): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17102 comm="udevd" name="/" dev="proc" ino=1 [ 685.755134][ T38] kauditd_printk_skb: 23 callbacks suppressed [ 685.755158][ T38] audit: type=1400 audit(1756235596.101:247235): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 685.787136][ T38] audit: type=1400 audit(1756235596.186:247236): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="tmpfs" ino=1 [ 685.787193][ T38] audit: type=1400 audit(1756235596.186:247237): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 687.414936][ C1] net_ratelimit: 2863 callbacks suppressed [ 687.414961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.416549][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.418187][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.419747][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.421370][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.422995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.424596][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.426255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.427840][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 687.430345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 688.046206][ T38] audit: type=1400 audit(1756235598.472:247238): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="sda1" ino=2 [ 688.046282][ T38] audit: type=1400 audit(1756235598.472:247239): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 688.046336][ T38] audit: type=1400 audit(1756235598.472:247240): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 688.046389][ T38] audit: type=1400 audit(1756235598.472:247241): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 688.046441][ T38] audit: type=1400 audit(1756235598.472:247242): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17098 comm="syz-executor" name="kcov" dev="debugfs" ino=1072 [ 688.046494][ T38] audit: type=1400 audit(1756235598.504:247243): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17098 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1072 [ 688.877176][ T38] audit: type=1400 audit(1756235599.556:247244): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 692.054595][ T38] kauditd_printk_skb: 1 callbacks suppressed [ 692.054618][ T38] audit: type=1400 audit(1756235601.756:247246): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="sda1" ino=2 [ 692.054671][ T38] audit: type=1400 audit(1756235602.786:247247): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 692.054718][ T38] audit: type=1400 audit(1756235602.786:247248): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 692.054767][ T38] audit: type=1400 audit(1756235602.786:247249): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17098 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 692.054813][ T38] audit: type=1400 audit(1756235602.786:247250): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17098 comm="syz-executor" name="kcov" dev="debugfs" ino=1072 [ 692.054861][ T38] audit: type=1400 audit(1756235602.786:247251): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17098 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1072 [ 692.083097][ C1] net_ratelimit: 2753 callbacks suppressed [ 692.083123][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.084614][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.086063][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.087556][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.089031][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.090526][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.092010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.094251][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.095714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.097186][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 692.331971][ T38] audit: type=1400 audit(1756235602.786:247252): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17098 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1072 [ 693.991697][ T38] audit: type=1400 audit(1756235604.953:247253): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=9740 [ 693.991760][ T38] audit: type=1400 audit(1756235604.953:247254): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5205 comm="udevd" name="queue" dev="tmpfs" ino=9740 [ 693.991810][ T38] audit: type=1400 audit(1756235604.953:247255): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 696.752541][ C1] net_ratelimit: 2823 callbacks suppressed [ 696.752565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.754073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.755516][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.757043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.758513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.759994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.761514][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.763024][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.764497][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.766011][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 699.827592][ T38] kauditd_printk_skb: 40 callbacks suppressed [ 699.827616][ T38] audit: type=1400 audit(1756235610.340:247296): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=9740 [ 699.828009][ T38] audit: type=1400 audit(1756235611.327:247297): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5205 comm="udevd" name="queue" dev="tmpfs" ino=9740 [ 700.879838][ T38] audit: type=1400 audit(1756235611.359:247298): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=17098 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1072 [ 700.879900][ T38] audit: type=1400 audit(1756235611.960:247299): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17102 comm="udevd" name="hci8:201" dev="sysfs" ino=208119 [ 701.420952][ C1] net_ratelimit: 2757 callbacks suppressed [ 701.420978][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.422498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.423957][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.425460][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.426955][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.428437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.430004][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.431498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.433011][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.434479][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 702.790604][ T38] audit: type=1400 audit(1756235614.493:247300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 702.790662][ T38] audit: type=1400 audit(1756235614.493:247301): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="etc" dev="sda1" ino=116 [ 702.790710][ T38] audit: type=1400 audit(1756235614.493:247302): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="sda1" ino=259 [ 702.823016][ T38] audit: type=1400 audit(1756235614.525:247303): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=17102 comm="udevd" name="uevent" dev="sysfs" ino=208120 [ 702.823075][ T38] audit: type=1400 audit(1756235614.536:247304): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17102 comm="udevd" path="/sys/devices/virtual/bluetooth/hci8/hci8:201/uevent" dev="sysfs" ino=208120 [ 702.823126][ T38] audit: type=1400 audit(1756235614.536:247305): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=17102 comm="udevd" path="/sys/devices/virtual/bluetooth/hci8/hci8:201/uevent" dev="sysfs" ino=208120 [ 704.831489][ T38] kauditd_printk_skb: 50 callbacks suppressed [ 704.831512][ T38] audit: type=1400 audit(1756235615.630:247356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="tmpfs" ino=1 [ 704.831564][ T38] audit: type=1400 audit(1756235616.682:247357): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 705.069428][ T38] audit: type=1400 audit(1756235616.950:247358): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17105 comm="syz-executor" name="/" dev="sda1" ino=2 [ 705.069700][ T38] audit: type=1400 audit(1756235616.950:247359): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17105 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 705.069981][ T38] audit: type=1400 audit(1756235616.950:247360): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17105 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 [ 705.070349][ T38] audit: type=1400 audit(1756235616.950:247361): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17105 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 [ 705.085068][ T38] audit: type=1400 audit(1756235616.961:247362): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17106 comm="kworker/u8:27" name="/" dev="sda1" ino=2 [ 705.088020][ T38] audit: type=1400 audit(1756235616.961:247363): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17107 comm="kworker/u8:1" name="/" dev="sda1" ino=2 [ 705.093455][ T38] audit: type=1400 audit(1756235616.972:247364): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=17105 comm="syz-executor" path="socket:[42527]" dev="sockfs" ino=42527 [ 705.211318][T17109] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 705.413244][T17109] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 705.416008][T17109] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 705.417395][T17109] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 705.418259][T17109] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 [ 706.090686][ C1] net_ratelimit: 2783 callbacks suppressed [ 706.090712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.092221][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.093692][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.095242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.096710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.098231][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.099722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.101243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.102768][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.104212][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.201398][ T38] audit: type=1400 audit(1756235618.152:247365): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 706.780566][T17109] Bluetooth: hci5: command 0x0406 tx timeout [ 710.758610][ C1] net_ratelimit: 2802 callbacks suppressed [ 710.758643][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.760157][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.761652][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.763127][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.764647][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.766146][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.767710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.769191][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.770854][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.772390][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 711.566672][ T38] kauditd_printk_skb: 93 callbacks suppressed [ 711.566697][ T38] audit: type=1400 audit(1756235623.893:247459): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 711.774181][ T38] audit: type=1400 audit(1756235624.129:247460): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17105 comm="syz-executor" name="17105" dev="proc" ino=42533 [ 712.698912][ T38] audit: type=1400 audit(1756235625.030:247461): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17090 comm="syz-executor" name="/" dev="sda1" ino=2 [ 712.698974][ T38] audit: type=1400 audit(1756235625.030:247462): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17090 comm="syz-executor" name="/" dev="proc" ino=1 [ 712.808589][ T38] audit: type=1400 audit(1756235625.245:247463): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17090 comm="syz-executor" name="/" dev="proc" ino=1 [ 713.388183][ T38] audit: type=1400 audit(1756235625.771:247464): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1183 comm="irq/31-virtio1-" saddr=10.128.0.169 src=41764 daddr=10.128.1.223 dest=22 netif=eth0 [ 714.381024][ T1319] ieee802154 phy0 wpan0: encryption failed: -22 [ 714.432077][ T1319] ieee802154 phy1 wpan1: encryption failed: -22 [ 715.427723][ C1] net_ratelimit: 2900 callbacks suppressed [ 715.427748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.429487][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.431183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.432873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.434592][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.436289][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.438085][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.439765][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.441476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.443194][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 715.676420][T17112] Bluetooth: hci6: command 0x0406 tx timeout [ 715.676465][T17112] Bluetooth: hci7: command tx timeout [ 716.638748][ T38] audit: type=1400 audit(1756235629.355:247465): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 716.657383][ T38] audit: type=1400 audit(1756235629.376:247466): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 716.657442][ T38] audit: type=1400 audit(1756235629.376:247467): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="tmpfs" ino=1 [ 716.657490][ T38] audit: type=1400 audit(1756235629.376:247468): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 717.842555][ T38] audit: type=1400 audit(1756235630.653:247469): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17090 comm="syz-executor" name="17090" dev="proc" ino=42534 [ 718.753994][ T38] audit: type=1400 audit(1756235631.597:247470): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 718.754061][ T38] audit: type=1400 audit(1756235631.597:247471): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 718.755741][ T38] audit: type=1400 audit(1756235631.597:247472): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 718.755797][ T38] audit: type=1400 audit(1756235631.597:247473): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 718.755866][ T38] audit: type=1400 audit(1756235631.597:247474): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 720.096462][ C1] net_ratelimit: 2820 callbacks suppressed [ 720.096488][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 720.098034][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 720.099636][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 720.101193][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 720.102757][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 720.105056][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 720.106798][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 720.108440][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 720.110043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 720.111674][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 722.398553][ T38] kauditd_printk_skb: 15 callbacks suppressed [ 722.398576][ T38] audit: type=1400 audit(1756235634.870:247490): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=17090 comm="syz-executor" dev="nsfs" ino=4026531833 [ 722.398634][ T38] audit: type=1400 audit(1756235635.450:247491): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 722.398686][ T38] audit: type=1400 audit(1756235635.450:247492): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 722.695631][ T38] audit: type=1400 audit(1756235635.858:247493): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 722.695691][ T38] audit: type=1400 audit(1756235635.858:247494): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="lib" dev="sda1" ino=264 [ 722.695739][ T38] audit: type=1400 audit(1756235635.858:247495): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="udev" dev="sda1" ino=1222 [ 722.861366][ T38] audit: type=1400 audit(1756235635.986:247496): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 723.405689][ T38] audit: type=1400 audit(1756235636.512:247497): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 724.000700][ T38] audit: type=1400 audit(1756235637.070:247498): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 724.194156][ T38] audit: type=1400 audit(1756235637.349:247499): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=17105 comm="syz-executor" dev="nsfs" ino=4026531833 [ 724.765362][ C1] net_ratelimit: 2808 callbacks suppressed [ 724.765390][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.766905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.768464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.769961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.771490][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.772991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.774536][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.776065][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.777589][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.779067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 727.188471][ T38] kauditd_printk_skb: 7 callbacks suppressed [ 727.188493][ T38] audit: type=1400 audit(1756235640.665:247507): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5205 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 727.335731][ T38] audit: type=1400 audit(1756235640.686:247508): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="/" dev="sda1" ino=2 [ 727.335792][ T38] audit: type=1400 audit(1756235640.686:247509): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17105 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 [ 727.335841][ T38] audit: type=1400 audit(1756235640.697:247510): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="/" dev="sda1" ino=2 [ 727.335887][ T38] audit: type=1400 audit(1756235640.826:247511): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 727.821833][ T38] audit: type=1400 audit(1756235641.352:247512): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 728.341619][ T38] audit: type=1400 audit(1756235641.910:247513): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 728.455872][ T38] audit: type=1400 audit(1756235642.038:247514): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="etc" dev="sda1" ino=116 [ 728.455929][ T38] audit: type=1400 audit(1756235642.038:247515): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="cron" dev="sda1" ino=120 [ 728.651095][ T38] audit: type=1400 audit(1756235642.242:247516): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="lib" dev[ 728.651095][ T38] audit: type=1400 audit(1756235642.242:247516): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5205 comm="udevd" name="lib" dev="sda1" ino=264 [ 729.434480][ C1] net_ratelimit: 2712 callbacks suppressed [ 729.434505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.436155][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.499693][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.501364][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.503016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.504582][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.505802][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.507107][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.508837][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.510504][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 733.068473][ T38] kauditd_printk_skb: 6 callbacks suppressed [ 733.068494][ T38] audit: type=1400 audit(1756235645.118:247523): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 733.068549][ T38] audit: type=1400 audit(1756235645.236:247524): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5580 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 733.068599][ T38] audit: type=1400 audit(1756235645.644:247525): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 733.068651][ T38] audit: type=1400 audit(1756235646.180:247526): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.223 dest=54340 netif=eth0 [ 733.832611][ T39] INFO: task kworker/u8:11:3622 blocked for more than 143 seconds. [ 733.832640][ T39] Not tainted syzkaller #0 [ 733.832653][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 733.832665][ T39] task:kworker/u8:11 state:D stack:21384 pid:3622 tgid:3622 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 733.832729][ T39] Workqueue: events_unbound free_mem_alloc_deferred [ 733.832764][ T39] Call Trace: [ 733.832772][ T39] [ 733.832790][ T39] __schedule+0x16f3/0x4c20 [ 733.832832][ T39] ? validate_chain+0x897/0x2140 [ 733.832880][ T39] ? __lock_acquire+0xab9/0xd20 [ 733.832911][ T39] ? __pfx___schedule+0x10/0x10 [ 733.832958][ T39] ? schedule+0x91/0x360 [ 733.832988][ T39] schedule+0x165/0x360 [ 733.833018][ T39] schedule_timeout+0x9a/0x270 [ 733.833045][ T39] ? __pfx_schedule_timeout+0x10/0x10 [ 733.833085][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 733.833114][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 733.833141][ T39] ? wait_for_completion+0x267/0x5d0 [ 733.833172][ T39] wait_for_completion+0x2bf/0x5d0 [ 733.833216][ T39] ? __pfx_wait_for_completion+0x10/0x10 [ 733.833247][ T39] ? _raw_spin_unlock_irqrestore+0xad/0x110 [ 733.833278][ T39] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 733.833311][ T39] ? __init_swait_queue_head+0xa9/0x150 [ 733.833355][ T39] rcu_barrier+0x463/0x570 [ 733.833392][ T39] free_mem_alloc_deferred+0x16/0x30 [ 733.833420][ T39] ? process_scheduled_works+0x9ef/0x17b0 [ 733.833447][ T39] process_scheduled_works+0xade/0x17b0 [ 733.833511][ T39] ? __pfx_process_scheduled_works+0x10/0x10 [ 733.833562][ T39] worker_thread+0x8a0/0xda0 [ 733.833595][ T39] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 733.833635][ T39] ? __kthread_parkme+0x7b/0x200 [ 733.833679][ T39] kthread+0x711/0x8a0 [ 733.833717][ T39] ? __pfx_worker_thread+0x10/0x10 [ 733.833746][ T39] ? __pfx_kthread+0x10/0x10 [ 733.833786][ T39] ? __pfx_kthread+0x10/0x10 [ 733.833823][ T39] ret_from_fork+0x3fc/0x770 [ 733.833857][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 733.833894][ T39] ? __switch_to_asm+0x39/0x70 [ 733.833916][ T39] ? __switch_to_asm+0x33/0x70 [ 733.833937][ T39] ? __pfx_kthread+0x10/0x10 [ 733.833973][ T39] ret_from_fork_asm+0x1a/0x30 [ 733.834015][ T39] [ 733.834100][ T39] [ 733.834100][ T39] Showing all locks held in the system: [ 733.834112][ T39] 2 locks held by ksoftirqd/0/15: [ 733.834126][ T39] #0: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.834188][ T39] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.834248][ T39] 7 locks held by ktimers/0/16: [ 733.834261][ T39] 4 locks held by pr/legacy/17: [ 733.834276][ T39] 6 locks held by rcuc/1/28: [ 733.834289][ T39] 2 locks held by ksoftirqd/1/30: [ 733.834303][ T39] 1 lock held by khungtaskd/39: [ 733.834315][ T39] #0: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 733.834379][ T39] 7 locks held by kworker/u8:3/57: [ 733.834391][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.834451][ T39] #1: ffffc9000123fbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.834512][ T39] #2: ffff888037383300 (&devlink->lock_key#3){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 733.834578][ T39] #3: ffff88805c68c920 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 733.834638][ T39] #4: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 733.834691][ T39] #5: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.834747][ T39] #6: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.834807][ T39] 7 locks held by kworker/u8:5/85: [ 733.834820][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.834878][ T39] #1: ffffc900015dfbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.834947][ T39] #2: ffff88805c1ef300 (&devlink->lock_key){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 733.835007][ T39] #3: ffff88805c128120 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 733.835067][ T39] #4: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 733.835118][ T39] #5: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.835172][ T39] #6: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.835256][ T39] 5 locks held by kworker/u8:6/1107: [ 733.835269][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.835339][ T39] #1: ffffc900048cfbc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.835398][ T39] #2: ffff88805de50898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 733.835454][ T39] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.835511][ T39] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.835573][ T39] 2 locks held by aoe_tx0/1319: [ 733.835585][ T39] #0: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.835642][ T39] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.835702][ T39] 3 locks held by kworker/u8:9/2139: [ 733.835716][ T39] #0: ffff88814d14b138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.835774][ T39] #1: ffffc90005d27bc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.835833][ T39] #2: ffffffff8ecd1f38 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 733.835898][ T39] 6 locks held by kworker/u8:10/3200: [ 733.835911][ T39] #0: ffff88805ab97138 ((wq_completion)wg-kex-wg1#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.835976][ T39] #1: ffffc9000d02fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.836035][ T39] #2: ffff888035e615f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 733.836105][ T39] #3: ffff88805c70ede8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 733.836173][ T39] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.836230][ T39] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.836290][ T39] 3 locks held by kworker/u8:11/3622: [ 733.836304][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.836369][ T39] #1: ffffc9000d8afbc0 ((work_completion)(©->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.836427][ T39] #2: ffffffff8d9ae530 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 733.836480][ T39] 5 locks held by kworker/u8:12/4314: [ 733.836493][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.836550][ T39] #1: ffffc9000e81fbc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.836608][ T39] #2: ffff88805dcf0898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 733.836663][ T39] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.836719][ T39] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.836779][ T39] 4 locks held by kworker/u9:1/5154: [ 733.836792][ T39] #0: ffff888027bcb938 ((wq_completion)hci9#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.836856][ T39] #1: ffffc9000fa9fbc0 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.836914][ T39] #2: ffff8880625b80a8 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x8e0 [ 733.836967][ T39] #3: ffffffff8ee39838 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x516/0x8e0 [ 733.837020][ T39] 2 locks held by klogd/5194: [ 733.837033][ T39] #0: ffffffff8dac5368 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60 [ 733.837088][ T39] #1: ffff88801d2d6b58 (&n->list_lock){+.+.}-{3:3}, at: __slab_free+0x19e/0x390 [ 733.837141][ T39] 3 locks held by udevd/5205: [ 733.837155][ T39] #0: ffffffff8e0afdb0 (tomoyo_ss){.+.+}-{0:0}, at: tomoyo_path_perm+0x1e3/0x4b0 [ 733.837210][ T39] #1: ffffffff8dac5368 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60 [ 733.837263][ T39] #2: ffff88801d2d6b58 (&n->list_lock){+.+.}-{3:3}, at: __slab_free+0x19e/0x390 [ 733.837317][ T39] 2 locks held by dhcpcd/5499: [ 733.837336][ T39] #0: ffffffff8dac5368 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60 [ 733.837388][ T39] #1: ffff88801d2d6b58 (&n->list_lock){+.+.}-{3:3}, at: __slab_free+0x19e/0x390 [ 733.837441][ T39] 5 locks held by dhcpcd/5500: [ 733.837456][ T39] 2 locks held by crond/5580: [ 733.837468][ T39] #0: ffffffff8dac5368 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60 [ 733.837521][ T39] #1: ffff88801d2d6b58 (&n->list_lock){+.+.}-{3:3}, at: __slab_free+0x19e/0x390 [ 733.837573][ T39] 2 locks held by getty/5601: [ 733.837586][ T39] #0: ffff88823bf7a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 733.837649][ T39] #1: ffffc90003e7e2e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x444/0x1410 [ 733.837705][ T39] 3 locks held by syz-executor/5825: [ 733.837719][ T39] 4 locks held by kworker/u9:5/5854: [ 733.837733][ T39] #0: ffff888030aaf138 ((wq_completion)krxrpcd){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.837791][ T39] #1: ffffc90004edfbc0 ((work_completion)(&rxnet->peer_keepalive_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.837851][ T39] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.837909][ T39] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.837971][ T39] 2 locks held by kworker/1:4/5912: [ 733.837985][ T39] #0: ffff888019898538 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.838042][ T39] #1: ffffc900051bfbc0 (free_ipc_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.838101][ T39] 4 locks held by kworker/0:5/5927: [ 733.838116][ T39] 6 locks held by kworker/u8:13/6773: [ 733.838128][ T39] #0: ffff88805afc0938 ((wq_completion)wg-kex-wg1#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.838192][ T39] #1: ffffc900052cfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.838252][ T39] #2: ffff88805af455f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 733.838326][ T39] #3: ffff88805c76ce20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 733.838393][ T39] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.838451][ T39] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.838510][ T39] 5 locks held by kworker/u9:0/15894: [ 733.838523][ T39] #0: ffff8880381cf138 ((wq_completion)hci6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.838581][ T39] #1: ffffc9000d0efbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.838641][ T39] #2: ffff8880723fce80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0 [ 733.838705][ T39] #3: ffff8880723fc0a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30 [ 733.838762][ T39] #4: ffffffff8ee39838 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310 [ 733.838820][ T39] 6 locks held by kworker/u8:14/16668: [ 733.838834][ T39] #0: ffff88805ab90938 ((wq_completion)wg-kex-wg0#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.838897][ T39] #1: ffffc90005c9fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.838957][ T39] #2: ffff88805ab855f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 733.839025][ T39] #3: ffff88805c70e350 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 733.839092][ T39] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.839150][ T39] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.839209][ T39] 4 locks held by kworker/u8:15/16671: [ 733.839223][ T39] #0: ffff88814d397138 ((wq_completion)bat_events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.839282][ T39] #1: ffffc90005c7fbc0 ((work_completion)(&(&bat_priv->dat.work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.839350][ T39] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.839407][ T39] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.839472][ T39] 5 locks held by kworker/u8:16/16674: [ 733.839486][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.839543][ T39] #1: ffffc90005b8fbc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.839601][ T39] #2: ffff88805eab0898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 733.839657][ T39] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.839714][ T39] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.839773][ T39] 5 locks held by kworker/u8:17/16676: [ 733.839787][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.839845][ T39] #1: ffffc90005b3fbc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.839904][ T39] #2: ffff88805e4c0898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 733.839959][ T39] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.840015][ T39] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.840074][ T39] 7 locks held by kworker/u8:18/16678: [ 733.840089][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.840147][ T39] #1: ffffc90005b0fbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.840206][ T39] #2: ffff888037928300 (&devlink->lock_key#4){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 733.840272][ T39] #3: ffff88805c6a1d20 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 733.840339][ T39] #4: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 733.840390][ T39] #5: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.840448][ T39] #6: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.840505][ T39] 7 locks held by kworker/u8:19/16680: [ 733.840519][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.840578][ T39] #1: ffffc90005ac7bc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.840639][ T39] #2: ffff88803738d300 (&devlink->lock_key#5){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 733.840704][ T39] #3: ffff88805c9d9920 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 733.840765][ T39] #4: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 733.840816][ T39] #5: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.840872][ T39] #6: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.840929][ T39] 4 locks held by kworker/u8:21/16685: [ 733.840942][ T39] #0: ffff88805aea5138 ((wq_completion)wg-kex-wg0#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.841005][ T39] #1: ffffc90005e07bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.841070][ T39] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.841125][ T39] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.841184][ T39] 4 locks held by kworker/u8:22/16687: [ 733.841198][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.841253][ T39] #1: ffffc900058bfbc0 ((work_completion)(&port->bc_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.841306][ T39] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.841384][ T39] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.841442][ T39] 4 locks held by kworker/u8:23/16697: [ 733.841456][ T39] #0: ffff888060210138 ((wq_completion)bond1){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.841514][ T39] #1: ffffc9000571fbc0 ((work_completion)(&(&bond->ad_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.841573][ T39] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.841630][ T39] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.841688][ T39] 2 locks held by syz.1.5102/16939: [ 733.841702][ T39] #0: ffffffff8f1d5b18 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x23/0x250 [ 733.841815][ T39] #1: ffffffff8d9ae530 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 733.841876][ T39] 4 locks held by kworker/1:8/16994: [ 733.841889][ T39] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.841948][ T39] #1: ffffc90004d0fbc0 ((work_completion)(&(&gc->dwork)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.842006][ T39] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.842063][ T39] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.842123][ T39] 5 locks held by syz-executor/17060: [ 733.842137][ T39] #0: ffff88803d525a38 (&sb->s_type->i_mutex_key#10){+.+.}-{4:4}, at: sock_close+0x9b/0x240 [ 733.842194][ T39] #1: ffff88802f496be8 (&u->lock){+.+.}-{3:3}, at: unix_release_sock+0x411/0xd60 [ 733.842245][ T39] #2: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 733.842297][ T39] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.842361][ T39] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.842420][ T39] 4 locks held by syz-executor/17069: [ 733.842433][ T39] #0: ffffffff8ecd1f38 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8db/0x1c70 [ 733.842488][ T39] #1: ffffffff8ecc8cc0 (dev_addr_sem){++++}-{4:4}, at: do_setlink+0x713/0x41c0 [ 733.842547][ T39] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.842603][ T39] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.842661][ T39] 1 lock held by syz-executor/17077: [ 733.842674][ T39] #0: ffffffff8ecd1f38 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8db/0x1c70 [ 733.842732][ T39] 1 lock held by syz.3.5127/17086: [ 733.842746][ T39] #0: ffffffff8ecd51d8 (bpf_dispatcher_xdp.mutex){+.+.}-{4:4}, at: bpf_dispatcher_change_prog+0x9c/0xc90 [ 733.842810][ T39] 1 lock held by dhcpcd/17088: [ 733.842823][ T39] #0: ffff888030a12350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 733.842878][ T39] 3 locks held by syz-executor/17090: [ 733.842891][ T39] #0: ffffffff8daeb3c0 (namespace_sem){++++}-{4:4}, at: copy_mnt_ns+0x124/0x880 [ 733.842951][ T39] #1: ffffffff8dac5368 (remove_cache_srcu){.+.+}-{0:0}, at: srcu_read_lock+0x27/0x60 [ 733.843005][ T39] #2: ffff88801d2d6b58 (&n->list_lock){+.+.}-{3:3}, at: __slab_free+0x19e/0x390 [ 733.843057][ T39] 6 locks held by kworker/u9:2/17094: [ 733.843071][ T39] #0: ffff8880350d2138 ((wq_completion)hci5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.843130][ T39] #1: ffffc9000576fbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.843190][ T39] #2: ffff8880723f4e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0 [ 733.843254][ T39] #3: ffff8880723f40a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30 [ 733.843311][ T39] #4: ffffffff8ee39838 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310 [ 733.843374][ T39] #5: ffff88805f588358 (&conn->lock#2){+.+.}-{4:4}, at: l2cap_conn_del+0x70/0x680 [ 733.843437][ T39] 1 lock held by dhcpcd/17095: [ 733.843451][ T39] #0: ffff888030a16350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 733.843503][ T39] 6 locks held by kworker/u8:25/17097: [ 733.843517][ T39] #0: ffff88805afc0938 ((wq_completion)wg-kex-wg1#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.843580][ T39] #1: ffffc9001f1efbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.843639][ T39] #2: ffff88805af455f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 733.843708][ T39] #3: ffff888039e4c388 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 733.843776][ T39] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.843833][ T39] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.843892][ T39] 6 locks held by kworker/u8:26/17100: [ 733.843906][ T39] #0: ffff88805aea5138 ((wq_completion)wg-kex-wg0#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.843969][ T39] #1: ffffc90000117bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.844027][ T39] #2: ffff88805af415f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 733.844106][ T39] #3: ffff88805c76c388 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 733.844173][ T39] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.844230][ T39] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.844290][ T39] 1 lock held by dhcpcd/17103: [ 733.844303][ T39] #0: ffff888034984350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 733.844364][ T39] 4 locks held by kworker/u8:27/17104: [ 733.844378][ T39] #0: ffff888035ea0138 ((wq_completion)wg-kex-wg1){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.844436][ T39] #1: ffffc9001ef6fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.844495][ T39] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 733.844552][ T39] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 733.844611][ T39] 1 lock held by syz-executor/17105: [ 733.844624][ T39] #0: ffffffff8daeb3c0 (namespace_sem){++++}-{4:4}, at: copy_mnt_ns+0x124/0x880 [ 733.844684][ T39] 5 locks held by kworker/u9:3/17109: [ 733.844698][ T39] #0: ffff888028716138 ((wq_completion)hci7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 733.844755][ T39] #1: ffffc9001ee5fbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 733.844814][ T39] #2: ffff888072408e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0 [ 733.844876][ T39] #3: ffff8880724080a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30 [ 733.844932][ T39] #4: ffffffff8ee39838 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310 [ 733.844992][ T39] [ 733.844998][ T39] ============================================= [ 733.844998][ T39] [ 733.845023][ T39] NMI backtrace for cpu 1 [ 733.845043][ T39] CPU: 1 UID: 0 PID: 39 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 733.845081][ T39] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 733.845095][ T39] Call Trace: [ 733.845105][ T39] [ 733.845117][ T39] dump_stack_lvl+0x189/0x250 [ 733.845155][ T39] ? __pfx_dump_stack_lvl+0x10/0x10 [ 733.845189][ T39] ? __pfx__printk+0x10/0x10 [ 733.845228][ T39] nmi_cpu_backtrace+0x39e/0x3d0 [ 733.845257][ T39] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 733.845285][ T39] ? __pfx__printk+0x10/0x10 [ 733.845315][ T39] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 733.845357][ T39] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 733.845385][ T39] watchdog+0xf93/0xfe0 [ 733.845420][ T39] ? watchdog+0x1de/0xfe0 [ 733.845454][ T39] kthread+0x711/0x8a0 [ 733.845491][ T39] ? __pfx_watchdog+0x10/0x10 [ 733.845519][ T39] ? __pfx_kthread+0x10/0x10 [ 733.845558][ T39] ? __pfx_kthread+0x10/0x10 [ 733.845592][ T39] ret_from_fork+0x3fc/0x770 [ 733.845625][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 733.845661][ T39] ? __switch_to_asm+0x39/0x70 [ 733.845682][ T39] ? __switch_to_asm+0x33/0x70 [ 733.845702][ T39] ? __pfx_kthread+0x10/0x10 [ 733.845737][ T39] ret_from_fork_asm+0x1a/0x30 [ 733.845777][ T39] [ 733.845786][ T39] Sending NMI from CPU 1 to CPUs 0: [ 733.845818][ C0] NMI backtrace for cpu 0 [ 733.845837][ C0] CPU: 0 UID: 0 PID: 16 Comm: ktimers/0 Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 733.845871][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 733.845889][ C0] RIP: 0010:debug_lockdep_rcu_enabled+0x2a/0x40 [ 733.845917][ C0] Code: f3 0f 1e fa 31 c0 83 3d 97 ed 26 04 00 74 1e 83 3d 8a fd 26 04 00 74 15 65 48 8b 0c 25 08 e0 f5 91 31 c0 83 b9 1c 0b 00 00 00 <0f> 94 c0 e9 0e a7 03 00 cc cc cc cc cc cc cc cc cc cc cc cc cc cc [ 733.845934][ C0] RSP: 0018:ffffc90000156f18 EFLAGS: 00000246 [ 733.845951][ C0] RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffff88801ae85940 [ 733.845964][ C0] RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000100 [ 733.845976][ C0] RBP: ffffc90000157078 R08: 0000000000000000 R09: 0000000000000100 [ 733.845988][ C0] R10: ffffc90000157000 R11: fffff5200002ae02 R12: 1ffff1100ba9ca8c [ 733.846002][ C0] R13: dffffc0000000000 R14: ffff88805d4d6400 R15: ffffc90000157178 [ 733.846017][ C0] FS: 0000000000000000(0000) GS:ffff8881268c2000(0000) knlGS:0000000000000000 [ 733.846032][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 733.846046][ C0] CR2: 00007ffcdd046f68 CR3: 000000000d7a6000 CR4: 00000000003526f0 [ 733.846062][ C0] Call Trace: [ 733.846075][ C0] [ 733.846082][ C0] __find_rr_leaf+0x331/0x6d0 [ 733.846114][ C0] ? __pfx___find_rr_leaf+0x10/0x10 [ 733.846137][ C0] ? __pfx_fib6_node_lookup+0x10/0x10 [ 733.846153][ C0] ? br_handle_frame+0x982/0x14d0 [ 733.846180][ C0] ? run_ktimerd+0xcf/0x190 [ 733.846210][ C0] fib6_table_lookup+0x3a2/0xa80 [ 733.846252][ C0] ? __pfx_fib6_table_lookup+0x10/0x10 [ 733.846284][ C0] ? ip6_pol_route+0x162/0x1180 [ 733.846310][ C0] ip6_pol_route+0x222/0x1180 [ 733.846342][ C0] ? __pfx_ip6_pol_route+0x10/0x10 [ 733.846378][ C0] fib6_rule_lookup+0x52f/0x6f0 [ 733.846408][ C0] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 733.846436][ C0] ? __pfx_fib6_rule_lookup+0x10/0x10 [ 733.846468][ C0] ? br_handle_frame+0xbff/0x14d0 [ 733.846500][ C0] ip6_route_input+0x6ce/0xa50 [ 733.846532][ C0] ? __pfx_ip6_route_input+0x10/0x10 [ 733.846565][ C0] ? __lock_acquire+0xab9/0xd20 [ 733.846599][ C0] ? ip6_rcv_finish_core+0x222/0x420 [ 733.846623][ C0] ip6_rcv_finish+0x141/0x2e0 [ 733.846646][ C0] NF_HOOK+0x30c/0x3a0 [ 733.846665][ C0] ? skb_orphan+0xaf/0xd0 [ 733.846686][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 733.846706][ C0] ? NF_HOOK+0x9a/0x3a0 [ 733.846725][ C0] ? __pfx_NF_HOOK+0x10/0x10 [ 733.846747][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 733.846774][ C0] __netif_receive_skb+0xd3/0x380 [ 733.846794][ C0] ? rt_spin_unlock+0x65/0x80 [ 733.846814][ C0] ? process_backlog+0x27b/0x900 [ 733.846834][ C0] process_backlog+0x31e/0x900 [ 733.846862][ C0] __napi_poll+0xb3/0x540 [ 733.846884][ C0] net_rx_action+0x707/0xe00 [ 733.846904][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 733.846957][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 733.846998][ C0] handle_softirqs+0x22c/0x710 [ 733.847027][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 733.847056][ C0] run_ktimerd+0xcf/0x190 [ 733.847089][ C0] ? __pfx_run_ktimerd+0x10/0x10 [ 733.847114][ C0] ? schedule+0x91/0x360 [ 733.847138][ C0] ? smpboot_thread_fn+0x4d/0xa60 [ 733.847161][ C0] smpboot_thread_fn+0x542/0xa60 [ 733.847184][ C0] ? smpboot_thread_fn+0x4d/0xa60 [ 733.847211][ C0] kthread+0x711/0x8a0 [ 733.847240][ C0] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 733.847262][ C0] ? __pfx_kthread+0x10/0x10 [ 733.847292][ C0] ? __pfx_kthread+0x10/0x10 [ 733.847320][ C0] ret_from_fork+0x3fc/0x770 [ 733.847346][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 733.847373][ C0] ? __switch_to_asm+0x39/0x70 [ 733.847390][ C0] ? __switch_to_asm+0x33/0x70 [ 733.847407][ C0] ? __pfx_kthread+0x10/0x10 [ 733.847434][ C0] ret_from_fork_asm+0x1a/0x30 [ 733.847462][ C0] [ 733.847823][ T39] Kernel panic - not syncing: hung_task: blocked tasks [ 733.847841][ T39] CPU: 1 UID: 0 PID: 39 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 733.847867][ T39] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 733.847881][ T39] Call Trace: [ 733.847890][ T39] [ 733.847899][ T39] dump_stack_lvl+0x99/0x250 [ 733.847933][ T39] ? __asan_memcpy+0x40/0x70 [ 733.847958][ T39] ? __pfx_dump_stack_lvl+0x10/0x10 [ 733.848000][ T39] ? __pfx__printk+0x10/0x10 [ 733.848038][ T39] vpanic+0x281/0x750 [ 733.848075][ T39] ? __pfx_vpanic+0x10/0x10 [ 733.848104][ T39] ? __x2apic_send_IPI_mask+0x1e4/0x260 [ 733.848127][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 733.848169][ T39] panic+0xb9/0xc0 [ 733.848200][ T39] ? __pfx_panic+0x10/0x10 [ 733.848235][ T39] ? irq_work_queue+0xc3/0x140 [ 733.848269][ T39] ? nmi_trigger_cpumask_backtrace+0x234/0x300 [ 733.848297][ T39] watchdog+0xfd2/0xfe0 [ 733.848337][ T39] ? watchdog+0x1de/0xfe0 [ 733.848373][ T39] kthread+0x711/0x8a0 [ 733.848410][ T39] ? __pfx_watchdog+0x10/0x10 [ 733.848438][ T39] ? __pfx_kthread+0x10/0x10 [ 733.848476][ T39] ? __pfx_kthread+0x10/0x10 [ 733.848511][ T39] ret_from_fork+0x3fc/0x770 [ 733.848543][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 733.848579][ T39] ? __switch_to_asm+0x39/0x70 [ 733.848599][ T39] ? __switch_to_asm+0x33/0x70 [ 733.848619][ T39] ? __pfx_kthread+0x10/0x10 [ 733.848654][ T39] ret_from_fork_asm+0x1a/0x30 [ 733.848695][ T39] [ 733.849032][ T39] Kernel Offset: disabled