[ 67.999733][ T36] audit: type=1400 audit(1655813898.049:184): avc: denied { read } for pid=5836 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=1443 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 68.031625][ T36] audit: type=1400 audit(1655813898.069:185): avc: denied { open } for pid=5836 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1443 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 68.124878][ T36] audit: type=1400 audit(1655813898.169:186): avc: denied { create } for pid=5833 comm="dhcpcd-run-hook" name="resolv.conf.lapb8.ipv4ll" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 68.173494][ T36] audit: type=1400 audit(1655813898.179:187): avc: denied { write } for pid=5833 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.lapb8.ipv4ll" dev="tmpfs" ino=1530 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 68.236089][ T36] audit: type=1400 audit(1655813898.179:188): avc: denied { append } for pid=5833 comm="dhcpcd-run-hook" name="resolv.conf.lapb8.ipv4ll" dev="tmpfs" ino=1530 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 68.284861][ T36] audit: type=1400 audit(1655813898.219:189): avc: denied { unlink } for pid=5844 comm="rm" name="resolv.conf.lapb8.ipv4ll" dev="tmpfs" ino=1530 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.150538][ T3142] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.10.59' (ECDSA) to the list of known hosts. 2022/06/21 12:18:24 parsed 1 programs [ 74.863682][ T36] audit: type=1400 audit(1655813904.909:190): avc: denied { mounton } for pid=5870 comm="syz-executor" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 74.866908][ T5870] cgroup: Unknown subsys name 'net' [ 74.897560][ T5870] cgroup: Unknown subsys name 'rlimit' 2022/06/21 12:18:25 executed programs: 0 [ 74.906650][ T36] audit: type=1400 audit(1655813904.959:191): avc: denied { mounton } for pid=5870 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 74.932098][ T36] audit: type=1400 audit(1655813904.959:192): avc: denied { mount } for pid=5870 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 74.957211][ T36] audit: type=1400 audit(1655813904.959:193): avc: denied { write } for pid=5870 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.986552][ T36] audit: type=1400 audit(1655813904.959:194): avc: denied { read } for pid=5870 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.028974][ T36] audit: type=1400 audit(1655813906.079:195): avc: denied { ioctl } for pid=5874 comm="syz-executor.0" path="socket:[27922]" dev="sockfs" ino=27922 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 76.054653][ T36] audit: type=1400 audit(1655813906.079:196): avc: denied { mounton } for pid=5874 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 76.061037][ T5874] IPVS: ftp: loaded support on port[0] = 21 [ 76.131920][ T5874] chnl_net:caif_netlink_parms(): no params data found [ 76.169181][ T5874] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.176658][ T5874] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.184521][ T5874] device bridge_slave_0 entered promiscuous mode [ 76.192702][ T5874] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.201187][ T5874] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.209414][ T5874] device bridge_slave_1 entered promiscuous mode [ 76.227136][ T5874] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.239482][ T5874] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.260240][ T5874] team0: Port device team_slave_0 added [ 76.269444][ T5874] team0: Port device team_slave_1 added [ 76.284376][ T5874] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.291372][ T5874] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.318295][ T5874] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.330786][ T5874] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.338062][ T5874] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.364871][ T5874] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.388230][ T5874] device hsr_slave_0 entered promiscuous mode [ 76.395731][ T5874] device hsr_slave_1 entered promiscuous mode [ 76.450833][ T5874] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.458326][ T5874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.467507][ T5874] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.474872][ T5874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.511680][ T5874] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.523419][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.533037][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.541563][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.549687][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 76.562925][ T5874] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.573080][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.582184][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.589415][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.601161][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.610397][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.618390][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.636902][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.646264][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.661387][ T5874] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 76.672744][ T5874] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 76.686265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.694273][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.704512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.714382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.733279][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 76.741363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 76.753233][ T5874] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.773526][ T36] audit: type=1400 audit(1655813906.819:197): avc: denied { sys_module } for pid=5874 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.855058][ T3142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 76.869247][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.877882][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.886579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.897540][ T5874] device veth0_vlan entered promiscuous mode [ 76.908458][ T5874] device veth1_vlan entered promiscuous mode [ 76.924557][ T3142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 76.933699][ T3142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 76.942983][ T3142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.954403][ T5874] device veth0_macvtap entered promiscuous mode [ 76.964312][ T5874] device veth1_macvtap entered promiscuous mode [ 76.979717][ T5874] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 76.987685][ T5436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.997410][ T5436] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 77.009520][ T5874] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.017153][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 77.068013][ T52] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.078911][ T52] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.093115][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 77.104212][ T52] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.113141][ T52] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.124399][ T5436] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 77.136982][ T36] audit: type=1400 audit(1655813907.189:198): avc: denied { mounton } for pid=5874 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=2311 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 77.188642][ T5887] [ 77.191290][ T5887] ============================================ [ 77.198952][ T5887] WARNING: possible recursive locking detected [ 77.205731][ T5887] 5.11.0-syzkaller #0 Not tainted [ 77.211044][ T5887] -------------------------------------------- [ 77.218032][ T5887] syz-executor.0/5887 is trying to acquire lock: [ 77.225807][ T5887] ffff888010b41398 (_xmit_ETHER#2){+.-.}-{2:2}, at: sch_direct_xmit+0x1ad/0x10c0 [ 77.235266][ T5887] [ 77.235266][ T5887] but task is already holding lock: [ 77.243336][ T5887] ffff88801aebb898 (_xmit_ETHER#2){+.-.}-{2:2}, at: sch_direct_xmit+0x1ad/0x10c0 [ 77.252622][ T5887] [ 77.252622][ T5887] other info that might help us debug this: [ 77.261296][ T5887] Possible unsafe locking scenario: [ 77.261296][ T5887] [ 77.269090][ T5887] CPU0 [ 77.272343][ T5887] ---- [ 77.275696][ T5887] lock(_xmit_ETHER#2); [ 77.280115][ T5887] lock(_xmit_ETHER#2); [ 77.284343][ T5887] [ 77.284343][ T5887] *** DEADLOCK *** [ 77.284343][ T5887] [ 77.292554][ T5887] May be due to missing lock nesting notation [ 77.292554][ T5887] [ 77.301114][ T5887] 9 locks held by syz-executor.0/5887: [ 77.306558][ T5887] #0: ffffffff8a7684e0 (rcu_read_lock_bh){....}-{1:2}, at: ip_finish_output2+0x220/0x1d50 [ 77.317244][ T5887] #1: ffffffff8a7684e0 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x1be/0x2670 [ 77.327578][ T5887] #2: ffff888014739258 (&sch->seqlock){+...}-{2:2}, at: __dev_queue_xmit+0xf74/0x2670 [ 77.337470][ T5887] #3: ffff888014739148 (dev->qdisc_running_key ?: &qdisc_running_key){+...}-{0:0}, at: ip_finish_output2+0x66f/0x1d50 [ 77.350071][ T5887] #4: ffff88801aebb898 (_xmit_ETHER#2){+.-.}-{2:2}, at: sch_direct_xmit+0x1ad/0x10c0 [ 77.360726][ T5887] #5: ffffffff8a7684e0 (rcu_read_lock_bh){....}-{1:2}, at: ip_finish_output2+0x220/0x1d50 [ 77.371733][ T5887] #6: ffffffff8a7684e0 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x1be/0x2670 [ 77.382684][ T5887] #7: ffff8880242fb258 (&sch->seqlock){+...}-{2:2}, at: __dev_queue_xmit+0xf74/0x2670 [ 77.392812][ T5887] #8: ffff8880242fb148 (dev->qdisc_running_key ?: &qdisc_running_key){+...}-{0:0}, at: ip_finish_output2+0x66f/0x1d50 [ 77.407330][ T5887] [ 77.407330][ T5887] stack backtrace: [ 77.413516][ T5887] CPU: 1 PID: 5887 Comm: syz-executor.0 Not tainted 5.11.0-syzkaller #0 [ 77.421937][ T5887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.432283][ T5887] Call Trace: [ 77.435557][ T5887] dump_stack+0x9a/0xcc [ 77.439694][ T5887] __lock_acquire.cold+0x117/0x3ab [ 77.445401][ T5887] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 77.451695][ T5887] ? save_trace+0x43/0x9f0 [ 77.456116][ T5887] lock_acquire+0x1a8/0x720 [ 77.460716][ T5887] ? sch_direct_xmit+0x1ad/0x10c0 [ 77.465902][ T5887] ? lock_release+0x710/0x710 [ 77.470751][ T5887] ? validate_xmit_skb+0x7ca/0xb70 [ 77.475844][ T5887] _raw_spin_lock+0x2a/0x40 [ 77.480339][ T5887] ? sch_direct_xmit+0x1ad/0x10c0 [ 77.485338][ T5887] sch_direct_xmit+0x1ad/0x10c0 [ 77.490285][ T5887] ? dev_watchdog+0xa10/0xa10 [ 77.495596][ T5887] __qdisc_run+0x3d9/0x1470 [ 77.500647][ T5887] __dev_queue_xmit+0x1073/0x2670 [ 77.505952][ T5887] ? ip_finish_output2+0x66f/0x1d50 [ 77.511129][ T5887] ? netdev_core_pick_tx+0x290/0x290 [ 77.516848][ T5887] ? eth_header+0x121/0x190 [ 77.521333][ T5887] ? neigh_resolve_output+0x3b2/0x6e0 [ 77.526689][ T5887] ip_finish_output2+0x66f/0x1d50 [ 77.531686][ T5887] ? ip_mc_finish_output+0x370/0x370 [ 77.537015][ T5887] ? ip_fragment.constprop.0+0x230/0x230 [ 77.542630][ T5887] ? __ip_finish_output+0x14d/0x530 [ 77.547905][ T5887] iptunnel_xmit+0x533/0x970 [ 77.552661][ T5887] ? skb_split+0x1080/0x1580 [ 77.558679][ T5887] ip_tunnel_xmit+0x13c6/0x23a0 [ 77.563805][ T5887] ? ip_md_tunnel_xmit+0x1500/0x1500 [ 77.569088][ T5887] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 77.575142][ T5887] ? __gre_xmit+0x133/0x8c0 [ 77.579710][ T5887] erspan_xmit+0xe13/0x2610 [ 77.584626][ T5887] dev_hard_start_xmit+0x1a5/0x6f0 [ 77.590992][ T5887] sch_direct_xmit+0x223/0x10c0 [ 77.595922][ T5887] ? dev_watchdog+0xa10/0xa10 [ 77.600822][ T5887] __qdisc_run+0x3d9/0x1470 [ 77.605327][ T5887] __dev_queue_xmit+0x1073/0x2670 [ 77.610435][ T5887] ? ip_finish_output2+0x66f/0x1d50 [ 77.616001][ T5887] ? lock_downgrade+0x6d0/0x6d0 [ 77.621184][ T5887] ? do_raw_write_lock+0x11a/0x280 [ 77.626327][ T5887] ? netdev_core_pick_tx+0x290/0x290 [ 77.631811][ T5887] ? eth_header+0x121/0x190 [ 77.636466][ T5887] ? neigh_resolve_output+0x3b2/0x6e0 [ 77.641983][ T5887] ip_finish_output2+0x66f/0x1d50 [ 77.647098][ T5887] ? ip_mc_finish_output+0x370/0x370 [ 77.652796][ T5887] ? ip_make_skb+0x1ef/0x270 [ 77.657359][ T5887] ? ip_fragment.constprop.0+0x230/0x230 [ 77.662983][ T5887] ? __ip_finish_output+0x14d/0x530 [ 77.668514][ T5887] ip_send_skb+0x9f/0x1c0 [ 77.672903][ T5887] udp_send_skb+0x5d8/0x14d0 [ 77.677464][ T5887] udp_sendmsg+0x173e/0x1fe0 [ 77.682032][ T5887] ? ip_frag_init+0x410/0x410 [ 77.686692][ T5887] ? udp_setsockopt+0x30/0x30 [ 77.693464][ T5887] ? mark_lock+0xee/0x1720 [ 77.697876][ T5887] ? lock_chain_count+0x20/0x20 [ 77.702718][ T5887] ? find_held_lock+0x2d/0x110 [ 77.707533][ T5887] ? avc_has_perm_noaudit+0x167/0x2c0 [ 77.713006][ T5887] ? lock_downgrade+0x6d0/0x6d0 [ 77.719617][ T5887] udpv6_sendmsg+0x5c6/0x2920 [ 77.724279][ T5887] ? avc_has_perm_noaudit+0x17f/0x2c0 [ 77.730240][ T5887] ? security_shm_shmctl+0x11/0x70 [ 77.735334][ T5887] ? udp_v6_push_pending_frames+0x320/0x320 [ 77.741378][ T5887] ? avc_has_perm+0x8f/0x140 [ 77.746050][ T5887] ? avc_has_perm_noaudit+0x2c0/0x2c0 [ 77.751430][ T5887] ? find_held_lock+0x2d/0x110 [ 77.756164][ T5887] ? sock_has_perm+0x1c8/0x260 [ 77.760911][ T5887] ? selinux_add_mnt_opt+0x2b0/0x2b0 [ 77.766173][ T5887] ? tomoyo_socket_bind_permission+0x270/0x270 [ 77.772432][ T5887] ? __copy_msghdr_from_user+0x86/0x3e0 [ 77.778336][ T5887] ? inet6_compat_ioctl+0x250/0x250 [ 77.784109][ T5887] sock_sendmsg+0xab/0xe0 [ 77.789198][ T5887] ____sys_sendmsg+0x392/0x7a0 [ 77.793945][ T5887] ? kernel_sendmsg+0x30/0x30 [ 77.798601][ T5887] ? do_recvmmsg+0x540/0x540 [ 77.803190][ T5887] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 77.809417][ T5887] ___sys_sendmsg+0xd3/0x150 [ 77.814180][ T5887] ? sendmsg_copy_msghdr+0x110/0x110 [ 77.819582][ T5887] ? find_held_lock+0x2d/0x110 [ 77.824489][ T5887] ? __fget_files+0x193/0x2b0 [ 77.829329][ T5887] ? lock_downgrade+0x6d0/0x6d0 [ 77.834851][ T5887] ? lock_chain_count+0x20/0x20 [ 77.839690][ T5887] ? lock_chain_count+0x20/0x20 [ 77.844537][ T5887] ? __fget_files+0x1ab/0x2b0 [ 77.849221][ T5887] ? __fget_light+0xbe/0x220 [ 77.854515][ T5887] __sys_sendmmsg+0x141/0x300 [ 77.859181][ T5887] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 77.864195][ T5887] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 77.870539][ T5887] ? find_held_lock+0x2d/0x110 [ 77.876071][ T5887] ? __context_tracking_exit+0x80/0x90 [ 77.881513][ T5887] ? lock_downgrade+0x6d0/0x6d0 [ 77.886786][ T5887] __x64_sys_sendmmsg+0x94/0x100 [ 77.891779][ T5887] ? syscall_enter_from_user_mode+0x27/0x70 [ 77.897991][ T5887] do_syscall_64+0x2d/0x40 [ 77.902658][ T5887] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.908884][ T5887] RIP: 0033:0x7f79b93c5109 [ 77.913524][ T5887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 77.933529][ T5887] RSP: 002b:00007f79b8b3a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 77.942715][ T5887] RAX: ffffffffffffffda RBX: 00007f79b94d7f60 RCX: 00007f79b93c5109 [ 77.951327][ T5887] RDX: 0000000000000001 RSI: 0000000020004d80 RDI: 0000000000000004 [ 77.959481][ T5887] RBP: 00007f79b941f05d R08: 0000000000000000 R09: 0000000000000000 [ 77.967458][ T5887] R10: 0000000004000000 R11: 0000000000000246 R12: 0000000000000000 [ 77.975477][ T5887] R13: 00007fff7857447f R14: 00007f79b8b3a300 R15: 0000000000022000 [ 78.104989][ T5436] Bluetooth: hci0: command 0x0409 tx timeout [ 78.958189][ T6034] syz-executor.0 (6034) used greatest stack depth: 22848 bytes left 2022/06/21 12:18:30 executed programs: 153 [ 80.184749][ T5436] Bluetooth: hci0: command 0x041b tx timeout [ 82.264715][ T3142] Bluetooth: hci0: command 0x040f tx timeout [ 84.345346][ T5436] Bluetooth: hci0: command 0x0419 tx timeout 2022/06/21 12:18:35 executed programs: 557