last executing test programs: 12m57.461637057s ago: executing program 1 (id=9805): r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) 12m56.904885218s ago: executing program 1 (id=9811): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r0, 0x27, 0x36, 0x0, &(0x7f0000000880)="f8ad1dcc02cb29dcc8003200810066a286ddc6617f503e7457188353133a3d4070574ac945c1be1c9b296e268bd0fabb3a4ba7534035", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) 12m55.464897551s ago: executing program 1 (id=9821): r0 = add_key$fscrypt_v1(&(0x7f0000001000), &(0x7f0000000180)={'fscrypt:', @auto=[0x36, 0x33, 0x35, 0x38, 0x33, 0x37, 0x32, 0x35, 0x66, 0x33, 0x38, 0x34, 0x64, 0x62, 0x63, 0x61]}, &(0x7f0000001080)={0x0, "ddbccf094c545fdf7a3f745794103016e211332fbf001eb127ffbed6ccc50daa5600000000000000000000000000000000008100", 0x1d}, 0x48, 0xfffffffffffffffe) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='\xf3yz', r0) 12m55.068446228s ago: executing program 1 (id=9826): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001a00010029bd7000fdffffff02202000000000000020000008000200ac14141408000300", @ANYRES32], 0x3c}}, 0x0) 12m54.621788224s ago: executing program 1 (id=9830): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f8ffff09850000002d000000850000005000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r0}, 0xc) 12m54.027249542s ago: executing program 1 (id=9834): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000040)={0x4, 0x40000, 0x5, 0x86, 0x163, &(0x7f0000000880)="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"}) 12m39.736905536s ago: executing program 32 (id=9834): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000040)={0x4, 0x40000, 0x5, 0x86, 0x163, &(0x7f0000000880)="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"}) 5m25.544112011s ago: executing program 2 (id=15203): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="050000009f6000"/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYBLOB="0000000001"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x8800) 5m25.342976707s ago: executing program 2 (id=15206): r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read(r0, &(0x7f0000000080)=""/152, 0x98) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000040)=0x2) 5m25.091999176s ago: executing program 2 (id=15210): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001ec0), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000001f80)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000001f00)={0x28, r1, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 5m24.894774244s ago: executing program 2 (id=15213): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$nfs4(&(0x7f0000000040)='/', &(0x7f0000000080)='./file0\x00', 0x0, 0x197841, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8100, &(0x7f0000000000)={0x0, 0x0, 0x20000}, 0x20) 5m24.747879763s ago: executing program 2 (id=15215): splice(0xffffffffffffffff, &(0x7f0000000000)=0x40, 0xffffffffffffffff, &(0x7f0000000040)=0x6, 0xb6, 0x8) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b52, &(0x7f0000000000)) 5m23.812802311s ago: executing program 2 (id=15220): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@newqdisc={0x4c, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r1, {0x0, 0x2}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_netem={{0xa}, {0xfffffe01, 0x2, {{0x10, 0x3, 0x1, 0x3, 0x400, 0x8}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) 5m22.904995442s ago: executing program 33 (id=15220): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@newqdisc={0x4c, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r1, {0x0, 0x2}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_netem={{0xa}, {0xfffffe01, 0x2, {{0x10, 0x3, 0x1, 0x3, 0x400, 0x8}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) 2m5.048173742s ago: executing program 4 (id=17172): mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000440)='./file0\x00', 0x42800, 0x0) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000f40)=""/4096, 0x1000}], 0x1) 2m4.790062269s ago: executing program 4 (id=17177): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x5c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x421]}}]}]}, 0x5c}}, 0x0) 2m4.27294861s ago: executing program 4 (id=17182): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @remote}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x11}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x14040040}, 0x4000004) 2m3.968088879s ago: executing program 4 (id=17186): openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vim2m(&(0x7f00000002c0), 0x2000000f5, 0x2) ioctl$vim2m_VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000400)={0xf0f018, 0x1}) 2m3.677204094s ago: executing program 4 (id=17189): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) 2m3.404146572s ago: executing program 4 (id=17192): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=ANY=[@ANYBLOB="0403"], 0x13, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) 1m49.204013492s ago: executing program 34 (id=17192): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=ANY=[@ANYBLOB="0403"], 0x13, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) 1m28.263683999s ago: executing program 5 (id=17412): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_MAX_VCPU_ID(r1, 0x4068aea3, &(0x7f0000000200)={0xa8, 0xfdfd}) 1m27.630105607s ago: executing program 5 (id=17417): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) close(r0) 1m27.284973653s ago: executing program 5 (id=17421): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() setpgid(r0, r1) 1m26.914433265s ago: executing program 5 (id=17426): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$nfs(&(0x7f00000001c0)='..\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x85000, 0x0) mount$nfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) 1m26.432353548s ago: executing program 5 (id=17432): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000280)="1a0000000212a277", 0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x1, [0xff01]}, &(0x7f0000000100)=0x6) 1m24.872802403s ago: executing program 5 (id=17449): sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac0000000101010400000000000000000a0000003c0001802c0001"], 0xac}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac0200002d00010027bd7000000000000400000098021a"], 0x2ac}, 0x1, 0x0, 0x0, 0x4042804}, 0x84) 1m24.433896384s ago: executing program 35 (id=17449): sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac0000000101010400000000000000000a0000003c0001802c0001"], 0xac}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac0200002d00010027bd7000000000000400000098021a"], 0x2ac}, 0x1, 0x0, 0x0, 0x4042804}, 0x84) 25.285932109s ago: executing program 3 (id=17868): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_wakeup_irq', 0x0, 0xb) r1 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f0000000140)={r0, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) 24.78783126s ago: executing program 3 (id=17873): r0 = syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x172f, 0x501, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x8, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x0, 0x0, 0x7}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000003c0)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\b'], 0x0, 0x0, 0x0, 0x0}, 0x0) 23.267103753s ago: executing program 6 (id=17886): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x200000c0, 0xffffffff, 0xfffffff8}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000001a0001000000000000000000022820"], 0x24}}, 0x0) 23.068125639s ago: executing program 6 (id=17887): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000200)={0x30, r0, 0x10ada85e65c25349, 0x0, 0x0, {{0x67}, {@void, @val={0xc, 0x99, {0x2, 0x5f}}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x4}]}]}]}]}, 0x30}}, 0x0) 22.88115991s ago: executing program 7 (id=17890): munmap(&(0x7f0000001000/0x1000)=nil, 0x1000) r0 = socket$kcm(0x2, 0x2, 0x73) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000540)="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", 0xac1}], 0x2}, 0x900000000040195) 22.87796694s ago: executing program 6 (id=17900): unshare(0xc020680) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, 0x0, 0x0, 0x4}, 0x20) 22.804166686s ago: executing program 3 (id=17891): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x8000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000080)={0x1, 0x5, 0x1, 'queue0\x00', 0x4}) 22.054457731s ago: executing program 3 (id=17893): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)={0x2c, r1, 0x1, 0x0, 0x0, {0x1a}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}]}, 0x2c}}, 0x0) 21.96725138s ago: executing program 7 (id=17894): chdir(&(0x7f0000000480)='./cgroup\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000007c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 21.576087348s ago: executing program 3 (id=17895): pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) close(r0) 21.095674327s ago: executing program 7 (id=17896): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x21, &(0x7f0000000180)=[@in={0x2, 0x0, @local}], 0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 20.696782834s ago: executing program 3 (id=17897): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0xfffffffffffffe01, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x68, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TARGET_NAME={0x10, 0x1, 'CONNSECMARK\x00'}, @NFTA_TARGET_INFO={0x5, 0x3, "ef"}, @NFTA_TARGET_REV={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_COMPAT={0x4}]}], {0x14}}, 0x90}}, 0x0) 20.448365737s ago: executing program 7 (id=17898): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000180)='/dev/comedi3\x00', 0xc00, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x40404f26, 0x5, 0x2, 0x401, 0xc, 0x9, 0xfff, 0x0, 0x5, 0x3bf, 0x802, 0x1600, 0x1, 0x20000001, 0x9, 0xe1cb, 0x6, 0x2f, 0x400, 0x2000195, 0x6, 0x0, 0xb, 0x402, 0x9, 0x3, 0x41, 0x5, 0x6, 0x8000003, 0xdffffffa]}) 19.872141233s ago: executing program 6 (id=17902): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)={0x4c, r1, 0x1, 0x70bd2b, 0x4000, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0xfffffffa}, {0x6}}]}, 0x4c}}, 0x4040000) 19.804659885s ago: executing program 7 (id=17903): r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @local}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @local}, 0xc) 19.458373387s ago: executing program 0 (id=17904): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a010300000000000000000100fffd0900010073797a300000000040000000030a01020000000000000000010000000900030073797a3200000000140004800800024032658aeb08000140000000010900010073797a300000000044000000060a010400000000000001040100000008000b40000000000900010073797a30000000001c000480180001800d00010073796e70726f7879000000000400028014000000110001"], 0xcc}}, 0x0) syz_emit_ethernet(0x46, &(0x7f00000002c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x2, 0x38, 0x0, 0x0, 0x2, 0x6, 0x0, @empty, @empty}, {{0x10, 0x4e26, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0xc2, 0x1, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x4, 0xd}, @mss={0x2, 0x4, 0x5df4}, @sack={0x5, 0x2}]}}}}}}}, 0x0) 19.22956323s ago: executing program 6 (id=17906): r0 = syz_open_dev$media(&(0x7f00000000c0), 0x103, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000240)={0x1f}, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) 19.14543096s ago: executing program 7 (id=17907): unshare(0x22020600) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) 18.60660147s ago: executing program 6 (id=17909): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x5, 0x823, 0x0, {0x0, 0xea60}, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x1}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "ce7ffe681c735b5719cfc9142348341d2f4d55e5827a4fa9d907b30dee5f9af3dc029871384dcbed5f13a5464083101fd2055f2c4271f73e269eef4e7cc3151d"}}, 0x80}}, 0x0) 18.582587807s ago: executing program 0 (id=17910): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000002080)={0xf, {"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", 0x104d}}, 0x1006) 18.262042152s ago: executing program 8 (id=17911): syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xd) 16.916218341s ago: executing program 8 (id=17912): r0 = socket$netlink(0x10, 0x3, 0x10) setuid(0xee01) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 16.771598019s ago: executing program 0 (id=17913): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xb, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 16.519885969s ago: executing program 8 (id=17914): r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240)=[{{0x0, 0xfffffdef, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xfffffdef}], 0x4000095, 0x401eb94) 16.328152002s ago: executing program 0 (id=17915): r0 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000700)="201779a1e3309645a509eac688a2f05bd1779ca659ea7d04244c65e6e1b730a0054baf0e0000835dd76d445bedbd3e1431cae3883f98cf3d95d1305a1730bb481952440b2155af4f86cddaf1341da39b2785a52b0d8e4bffa9aeb0f6933d7637bcb4294d88e17348409f8c915000ef608958e462fd46814ee806b40dd7357b30e4fbd6105ee6c41182203f0acb2c2a7f800d0a35dfbbbfff451785572c1c7a1a92e961d5e841be9d06a115604c897b986674a276710dec146555c5ad2c52bba1000000000000000000", 0xc9, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='|', 0x1, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, r0, r1}, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)={'wp512\x00'}}) 15.544848193s ago: executing program 0 (id=17916): r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x102, 0x0) read$FUSE(r0, &(0x7f0000004200)={0x2020}, 0x2020) writev(r0, &(0x7f0000000280)=[{&(0x7f0000002080)='T01\n', 0x4}, {&(0x7f0000000180)="3139ead9afeed1fcd5c9a3bd2233ed38912c2fbcf4ad0ae859fb38bddbef7a9bb66a2d43daeb98a2f176075dcd1c31", 0x2f}], 0x2) 15.349781221s ago: executing program 8 (id=17917): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f00000000c0)=0x94a, 0x4) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x1, 0x6, '\x00\'$', 0x38, 0x3a, 0xff, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, {[], @time_exceed={0x3, 0x1, 0x0, 0x68, '\x00', {0xf, 0x6, "e9285b", 0x7, 0x3a, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @local, [], "1ceb6697187724c6"}}}}}}}, 0x0) 15.135974391s ago: executing program 0 (id=17918): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r1, {0x0, 0xffe0}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x4, 0x9fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x20, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x7, 0x0, 0x2, 0xffffffff, 0x2, 0x810, 0x20000000, 0x0, 0x0, 0x1ff, 0x1, 0x0, 0x0, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x400, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0xbab, 0x0, 0x272, 0xb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffe, 0x7, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0xfffffffa, 0x3, 0xfffffffc, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x400000, 0x7, 0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x1, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xa, 0x0, 0x8000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800, 0x0, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x5, 0x0, 0x1, 0x735, 0x0, 0x1, 0x1a2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x4000d79, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x100, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0xfffc, 0x6}, {0xff}, 0x0, 0x7f}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x240040c4}, 0x0) 15.104439386s ago: executing program 8 (id=17919): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000005740)={0x0, 0xea60}, 0x10) recvmsg(r0, &(0x7f0000006100)={0x0, 0x0, 0x0}, 0x0) 14.740836029s ago: executing program 8 (id=17920): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0x1e}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}, 0x1, 0x0, 0x0, 0x20000}, 0x0) 6.008148952s ago: executing program 36 (id=17897): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0xfffffffffffffe01, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x68, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TARGET_NAME={0x10, 0x1, 'CONNSECMARK\x00'}, @NFTA_TARGET_INFO={0x5, 0x3, "ef"}, @NFTA_TARGET_REV={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_COMPAT={0x4}]}], {0x14}}, 0x90}}, 0x0) 4.556053691s ago: executing program 37 (id=17907): unshare(0x22020600) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) 3.285756447s ago: executing program 38 (id=17909): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x5, 0x823, 0x0, {0x0, 0xea60}, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x1}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "ce7ffe681c735b5719cfc9142348341d2f4d55e5827a4fa9d907b30dee5f9af3dc029871384dcbed5f13a5464083101fd2055f2c4271f73e269eef4e7cc3151d"}}, 0x80}}, 0x0) 139.507483ms ago: executing program 39 (id=17918): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r1, {0x0, 0xffe0}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x4, 0x9fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x20, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x7, 0x0, 0x2, 0xffffffff, 0x2, 0x810, 0x20000000, 0x0, 0x0, 0x1ff, 0x1, 0x0, 0x0, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x400, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0xbab, 0x0, 0x272, 0xb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffe, 0x7, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0xfffffffa, 0x3, 0xfffffffc, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x400000, 0x7, 0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x1, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xa, 0x0, 0x8000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800, 0x0, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x5, 0x0, 0x1, 0x735, 0x0, 0x1, 0x1a2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x4000d79, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x100, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0xfffc, 0x6}, {0xff}, 0x0, 0x7f}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x240040c4}, 0x0) 0s ago: executing program 40 (id=17920): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0x1e}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}, 0x1, 0x0, 0x0, 0x20000}, 0x0) kernel console output (not intermixed with test programs): async page read [ 1548.563303][T11794] Buffer I/O error on dev loop9, logical block 0, async page read [ 1548.563413][T11794] Buffer I/O error on dev loop9, logical block 0, async page read [ 1548.563490][T11794] ldm_validate_partition_table(): Disk read failed. [ 1548.563539][T11794] Buffer I/O error on dev loop9, logical block 0, async page read [ 1548.563656][T11794] Buffer I/O error on dev loop9, logical block 0, async page read [ 1548.563765][T11794] Buffer I/O error on dev loop9, logical block 0, async page read [ 1548.563935][T11794] Dev loop9: unable to read RDB block 0 [ 1548.564242][T11794] loop9: unable to read partition table [ 1548.564484][T11794] loop9: partition table beyond EOD, truncated [ 1548.564505][T11794] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 1548.564505][T11794] ) failed (rc=-5) [ 1549.369468][T10662] usb 4-1: new high-speed USB device number 65 using dummy_hcd [ 1549.372011][T11818] vxcan1: entered allmulticast mode [ 1549.538106][T10662] usb 4-1: Using ep0 maxpacket: 16 [ 1549.560600][T10662] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1549.560655][T10662] usb 4-1: New USB device found, idVendor=172f, idProduct=0501, bcdDevice= 0.00 [ 1549.560680][T10662] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1549.616438][T10662] usb 4-1: config 0 descriptor?? [ 1550.041204][T10662] waltop 0003:172F:0501.002E: unknown main item tag 0x0 [ 1550.041243][T10662] waltop 0003:172F:0501.002E: unknown main item tag 0x0 [ 1550.041275][T10662] waltop 0003:172F:0501.002E: unknown main item tag 0x0 [ 1550.041304][T10662] waltop 0003:172F:0501.002E: unknown main item tag 0x0 [ 1550.044864][T10662] waltop 0003:172F:0501.002E: unknown main item tag 0x0 [ 1550.074908][T10662] waltop 0003:172F:0501.002E: hidraw0: USB HID v0.08 Device [HID 172f:0501] on usb-dummy_hcd.3-1/input0 [ 1550.227594][T11323] udevd[11323]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1550.245240][T10662] usb 4-1: USB disconnect, device number 65 [ 1550.971358][ T37] kauditd_printk_skb: 16674 callbacks suppressed [ 1550.971380][ T37] audit: type=1400 audit(2000001167.757:1430259): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11846 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1550.971434][ T37] audit: type=1400 audit(2000001167.757:1430260): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11846 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1550.971481][ T37] audit: type=1400 audit(2000001167.757:1430261): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11846 comm="syz-executor" name="3627" dev="tmpfs" ino=18237 [ 1550.971527][ T37] audit: type=1400 audit(2000001167.757:1430262): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=11846 comm="syz-executor" opid=11846 ocomm="syz-executor" [ 1550.971573][ T37] audit: type=1400 audit(2000001167.757:1430263): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11846 comm="syz-executor" name="3627" dev="tmpfs" ino=18237 [ 1550.971620][ T37] audit: type=1400 audit(2000001167.757:1430264): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11846 comm="syz-executor" name="3627" dev="tmpfs" ino=18237 [ 1550.971666][ T37] audit: type=1400 audit(2000001167.757:1430265): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=11846 comm="syz-executor" name="3627" dev="tmpfs" ino=18237 [ 1550.971712][ T37] audit: type=1400 audit(2000001167.757:1430266): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11846 comm="syz-executor" name="3627" dev="tmpfs" ino=18237 [ 1550.971759][ T37] audit: type=1400 audit(2000001167.757:1430267): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11846 comm="syz-executor" name="3627" dev="tmpfs" ino=18237 [ 1550.971805][ T37] audit: type=1400 audit(2000001167.757:1430268): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=11846 comm="syz-executor" name="3627" dev="tmpfs" ino=18237 [ 1551.904986][ T6356] usb 9-1: new high-speed USB device number 5 using dummy_hcd [ 1552.063081][ T6356] usb 9-1: Using ep0 maxpacket: 32 [ 1552.088847][ T6356] usb 9-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1552.088882][ T6356] usb 9-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1552.088926][ T6356] usb 9-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 1552.088951][ T6356] usb 9-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1552.169159][ T6356] usb 9-1: config 0 descriptor?? [ 1552.200873][ T6356] hub 9-1:0.0: USB hub found [ 1552.493074][ T6356] hub 9-1:0.0: config failed, can't read hub descriptor (err -90) [ 1552.711706][ T6356] usbhid 9-1:0.0: can't add hid device: -71 [ 1552.711855][ T6356] usbhid 9-1:0.0: probe with driver usbhid failed with error -71 [ 1552.799918][ T6356] usb 9-1: USB disconnect, device number 5 [ 1553.523060][T11865] comedi comedi3: 8255: I/O port conflict (0x40404f26,4) [ 1553.523124][T11865] comedi comedi3: 8255: I/O port conflict (0x5,4) [ 1553.523180][T11865] comedi comedi3: 8255: I/O port conflict (0x2,4) [ 1553.523307][T11865] comedi comedi3: 8255: I/O port conflict (0xc,4) [ 1553.523359][T11865] comedi comedi3: 8255: I/O port conflict (0x9,4) [ 1555.647528][ T37] kauditd_printk_skb: 5439 callbacks suppressed [ 1555.647547][ T37] audit: type=1400 audit(2000001172.767:1435459): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop6" dev="sysfs" ino=15444 [ 1555.647596][ T37] audit: type=1400 audit(2000001172.778:1435460): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="power" dev="sysfs" ino=15479 [ 1555.647649][ T37] audit: type=1400 audit(2000001172.778:1435461): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1555.647693][ T37] audit: type=1400 audit(2000001172.778:1435462): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 1555.647738][ T37] audit: type=1400 audit(2000001172.778:1435463): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1555.647781][ T37] audit: type=1400 audit(2000001172.778:1435464): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1555.647825][ T37] audit: type=1400 audit(2000001172.778:1435465): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1555.648141][ T37] audit: type=1400 audit(2000001172.778:1435466): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop6" dev="sysfs" ino=15444 [ 1555.648415][ T37] audit: type=1400 audit(2000001172.778:1435467): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" name="power" dev="sysfs" ino=15479 [ 1555.662817][ T37] audit: type=1400 audit(2000001172.778:1435468): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/sys/devices/virtual/block/loop6/power" dev="sysfs" ino=15479 [ 1558.610466][T11906] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 1559.475048][T11203] udevd[11203]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1559.576727][T11322] udevd[11322]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1559.887712][T11323] udevd[11323]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1559.944683][T11322] udevd[11322]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1560.215102][T11203] udevd[11203]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1560.310689][ T37] kauditd_printk_skb: 9760 callbacks suppressed [ 1560.310708][ T37] audit: type=1400 audit(2000001177.788:1444278): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11201 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 1560.310757][ T37] audit: type=1400 audit(2000001177.788:1444279): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11201 comm="udevd" name="disk" dev="devtmpfs" ino=1395 [ 1560.312290][ T37] audit: type=1400 audit(2000001177.788:1444280): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=11323 comm="udevd" name="data" dev="tmpfs" ino=14 [ 1560.312342][ T37] audit: type=1400 audit(2000001177.788:1444281): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11323 comm="udevd" path="/run/udev/data/b7:8.tmp" dev="tmpfs" ino=21112 [ 1560.312389][ T37] audit: type=1400 audit(2000001177.788:1444282): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=11323 comm="udevd" path="/run/udev/data/b7:8.tmp" dev="tmpfs" ino=21112 [ 1560.313313][ T37] audit: type=1400 audit(2000001177.788:1444283): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=11321 comm="udevd" name="data" dev="tmpfs" ino=14 [ 1560.313362][ T37] audit: type=1400 audit(2000001177.788:1444284): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11321 comm="udevd" path="/run/udev/data/c10:232.tmp" dev="tmpfs" ino=21113 [ 1560.323868][ T37] audit: type=1400 audit(2000001177.788:1444285): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=11203 comm="udevd" name="data" dev="tmpfs" ino=14 [ 1560.323923][ T37] audit: type=1400 audit(2000001177.788:1444286): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=11201 comm="udevd" path="/dev/disk/by-diskseq" dev="devtmpfs" ino=1396 [ 1560.323972][ T37] audit: type=1400 audit(2000001177.788:1444287): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11323 comm="udevd" name="/" dev="sda1" ino=2 [ 1560.368672][T11201] udevd[11201]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1560.766249][T11203] udevd[11203]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1560.996891][T11911] udevd[11911]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1561.130526][T11203] udevd[11203]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1561.254820][T11912] fido_id[11912]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.3/usb4/report_descriptor': No such file or directory [ 1561.457755][T11911] udevd[11911]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1562.925249][T11915] fido_id[11915]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.8/usb9/report_descriptor': No such file or directory [ 1564.153356][T11911] udevd[11911]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1564.526937][T11916] udevd[11916]: symlink '../../loop9' '/dev/disk/by-diskseq/81.tmp-b7:9' failed: Read-only file system [ 1564.632562][T11911] udevd[11911]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1564.687644][T11918] fido_id[11918]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.3/usb4/report_descriptor': No such file or directory [ 1564.735735][T11201] udevd[11201]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1564.980643][ T37] kauditd_printk_skb: 19300 callbacks suppressed [ 1564.980664][ T37] audit: type=1400 audit(2000001182.788:1457210): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="/" dev="sda1" ino=2 [ 1564.980714][ T37] audit: type=1400 audit(2000001182.788:1457211): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 1564.980761][ T37] audit: type=1400 audit(2000001182.788:1457212): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=11911 comm="udevd" name="loop6" dev="devtmpfs" ino=653 [ 1564.980808][ T37] audit: type=1400 audit(2000001182.788:1457213): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11911 comm="udevd" path="/dev/loop6" dev="devtmpfs" ino=653 [ 1564.980854][ T37] audit: type=1400 audit(2000001182.788:1457214): lsm=SMACK fn=smack_file_lock action=granted subject="_" object="_" requested=l pid=11911 comm="udevd" path="/dev/loop6" dev="devtmpfs" ino=653 [ 1564.980901][ T37] audit: type=1400 audit(2000001182.788:1457215): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="/" dev="sda1" ino=2 [ 1564.980948][ T37] audit: type=1400 audit(2000001182.788:1457216): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="/" dev="sysfs" ino=1 [ 1564.980994][ T37] audit: type=1400 audit(2000001182.788:1457217): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1564.981048][ T37] audit: type=1400 audit(2000001182.788:1457218): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1564.981095][ T37] audit: type=1400 audit(2000001182.788:1457219): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1565.342238][T11201] udevd[11201]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1565.347647][T11911] udevd[11911]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1565.738798][T11911] udevd[11911]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1565.824373][T11201] udevd[11201]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1566.060990][T11911] udevd[11911]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1566.209759][T11201] udevd[11201]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1568.933255][T11911] udevd[11911]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1568.957751][T11201] udevd[11201]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1569.322887][T11201] udevd[11201]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1569.342161][T11911] udevd[11911]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1569.672394][ T37] kauditd_printk_skb: 12441 callbacks suppressed [ 1569.672418][ T37] audit: type=1400 audit(2000001187.723:1467579): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=11911 comm="udevd" path="/dev/loop7" dev="devtmpfs" ino=654 [ 1569.672471][ T37] audit: type=1400 audit(2000001187.809:1467724): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=11911 comm="udevd" path="/dev/loop7" dev="devtmpfs" ino=654 [ 1569.672521][ T37] audit: type=1400 audit(2000001187.809:1467725): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="/" dev="sda1" ino=2 [ 1569.672566][ T37] audit: type=1400 audit(2000001187.809:1467726): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="/" dev="sysfs" ino=1 [ 1569.672619][ T37] audit: type=1400 audit(2000001187.809:1467727): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="dev" dev="sysfs" ino=8 [ 1569.672663][ T37] audit: type=1400 audit(2000001187.809:1467728): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="block" dev="sysfs" ino=9 [ 1569.672708][ T37] audit: type=1400 audit(2000001187.809:1467729): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="block" dev="sysfs" ino=9 [ 1569.672754][ T37] audit: type=1400 audit(2000001187.809:1467730): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="dev" dev="sysfs" ino=8 [ 1569.672801][ T37] audit: type=1400 audit(2000001187.809:1467731): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="/" dev="sysfs" ino=1 [ 1569.672847][ T37] audit: type=1400 audit(2000001187.809:1467732): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11911 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1570.050172][T11201] udevd[11201]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1570.092389][T11911] udevd[11911]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1570.357321][T11201] udevd[11201]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1570.576388][T11911] udevd[11911]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1570.777552][T11201] udevd[11201]: symlink '../../loop6' '/dev/disk/by-diskseq/76.tmp-b7:6' failed: Read-only file system [ 1570.990595][T31088] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 1571.048549][T31088] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 1571.052381][T31088] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 1571.054002][T31088] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 1571.055352][T31088] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 1571.099523][T11323] udevd[11323]: symlink '../../loop7' '/dev/disk/by-diskseq/79.tmp-b7:7' failed: Read-only file system [ 1572.983738][ T6286] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 1573.022574][ T6286] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 1573.031983][ T6286] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 1573.053272][ T6286] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 1573.058754][ T6286] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 1573.173303][ T6286] Bluetooth: hci5: command tx timeout [ 1573.231529][T31088] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 1573.275803][T31088] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 1573.277622][T31088] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 1573.278935][T31088] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 1573.307419][T31088] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 1574.374445][ T37] kauditd_printk_skb: 6859 callbacks suppressed [ 1574.374465][ T37] audit: type=1400 audit(2000001192.873:1473680): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11934 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1574.374517][ T37] audit: type=1400 audit(2000001192.873:1473681): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11934 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1574.374561][ T37] audit: type=1400 audit(2000001192.873:1473682): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11934 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1574.374607][ T37] audit: type=1400 audit(2000001192.873:1473683): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11934 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1574.374652][ T37] audit: type=1400 audit(2000001192.873:1473684): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=11934 comm="syz-executor" name="kcov" dev="debugfs" ino=79 [ 1574.374706][ T37] audit: type=1400 audit(2000001192.873:1473685): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11934 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=79 [ 1574.374770][ T37] audit: type=1400 audit(2000001192.873:1473686): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=11934 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=79 [ 1574.374815][ T37] audit: type=1400 audit(2000001192.873:1473687): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1574.683138][ T37] audit: type=1400 audit(2000001193.184:1473688): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=11933 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=79 [ 1574.761066][ T37] audit: type=1400 audit(2000001193.292:1473689): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11935 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1574.800430][ T6286] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 1574.847729][ T6286] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 1574.849732][ T6286] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 1574.869809][ T6286] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 1574.872043][ T6286] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 1575.032413][T31088] Bluetooth: hci6: command tx timeout [ 1575.092996][ T6286] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 1575.127765][ T6286] Bluetooth: hci5: command tx timeout [ 1575.140923][ T6286] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 1575.143822][ T6286] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 1575.145799][ T6286] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 1575.173587][ T6286] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 [ 1575.253313][T31088] Bluetooth: hci7: command tx timeout [ 1576.817519][ T6286] Bluetooth: hci8: command tx timeout [ 1576.969531][ T6286] Bluetooth: hci6: command tx timeout [ 1577.041331][ T6286] Bluetooth: hci5: command tx timeout [ 1577.196448][ T6286] Bluetooth: hci9: command tx timeout [ 1577.197502][ T6286] Bluetooth: hci7: command tx timeout [ 1578.756608][ T6286] Bluetooth: hci8: command tx timeout [ 1578.907809][ T6286] Bluetooth: hci6: command tx timeout [ 1578.982378][ T6286] Bluetooth: hci5: command tx timeout [ 1579.129099][T31088] Bluetooth: hci9: command tx timeout [ 1579.130049][ T6286] Bluetooth: hci7: command tx timeout [ 1579.378441][ T37] kauditd_printk_skb: 429 callbacks suppressed [ 1579.378461][ T37] audit: type=1400 audit(2000001198.238:1474119): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1579.531585][T11931] lo speed is unknown, defaulting to 1000 [ 1579.583599][ T37] audit: type=1400 audit(2000001198.452:1474120): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11940 comm="udevd" name="/" dev="sda1" ino=2 [ 1579.583908][ T37] audit: type=1400 audit(2000001198.463:1474121): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11940 comm="udevd" name="/" dev="proc" ino=1 [ 1579.584162][ T37] audit: type=1400 audit(2000001198.463:1474122): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11940 comm="udevd" name="/" dev="proc" ino=1 [ 1579.584524][ T37] audit: type=1400 audit(2000001198.463:1474123): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11940 comm="udevd" name="11940" dev="proc" ino=137039 [ 1579.688288][ T37] audit: type=1400 audit(2000001198.560:1474124): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1579.688344][ T37] audit: type=1400 audit(2000001198.560:1474125): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=11940 comm="udevd" name="oom_score_adj" dev="proc" ino=137041 [ 1579.688393][ T37] audit: type=1400 audit(2000001198.570:1474126): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1579.688438][ T37] audit: type=1400 audit(2000001198.570:1474127): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1579.688485][ T37] audit: type=1400 audit(2000001198.570:1474128): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1580.694865][ T6286] Bluetooth: hci8: command tx timeout [ 1580.775819][T11929] lo speed is unknown, defaulting to 1000 [ 1580.786524][T11931] wg1 speed is unknown, defaulting to 1000 [ 1580.843957][ T6286] Bluetooth: hci6: command tx timeout [ 1581.070710][ T6286] Bluetooth: hci7: command tx timeout [ 1581.070747][ T6286] Bluetooth: hci9: command tx timeout [ 1581.605263][T11937] lo speed is unknown, defaulting to 1000 [ 1581.658158][T11929] wg1 speed is unknown, defaulting to 1000 [ 1581.659110][T11931] chnl_net:caif_netlink_parms(): no params data found [ 1581.672941][ T1322] ieee802154 phy1 wpan1: encryption failed: -22 [ 1582.633638][T31088] Bluetooth: hci8: command tx timeout [ 1583.010231][T31088] Bluetooth: hci9: command tx timeout [ 1584.382786][ T37] kauditd_printk_skb: 412 callbacks suppressed [ 1584.382808][ T37] audit: type=1400 audit(2000001203.613:1474541): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1584.504251][ T37] audit: type=1400 audit(2000001203.742:1474542): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1584.504308][ T37] audit: type=1400 audit(2000001203.742:1474543): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1584.504355][ T37] audit: type=1400 audit(2000001203.742:1474544): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1584.504401][ T37] audit: type=1400 audit(2000001203.742:1474545): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1584.504448][ T37] audit: type=1400 audit(2000001203.742:1474546): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=21464 [ 1584.504495][ T37] audit: type=1400 audit(2000001203.742:1474547): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" name="queue" dev="tmpfs" ino=21464 [ 1584.504540][ T37] audit: type=1400 audit(2000001203.742:1474548): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1584.504587][ T37] audit: type=1400 audit(2000001203.742:1474549): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1584.504633][ T37] audit: type=1400 audit(2000001203.742:1474550): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1589.393619][ T37] kauditd_printk_skb: 89 callbacks suppressed [ 1589.393658][ T37] audit: type=1400 audit(2000001208.988:1474640): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1589.890081][ T37] audit: type=1400 audit(2000001209.514:1474641): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1590.223375][ T37] audit: type=1400 audit(2000001209.879:1474642): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1590.231472][ T37] audit: type=1400 audit(2000001209.879:1474643): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1590.231529][ T37] audit: type=1400 audit(2000001209.889:1474644): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1590.231596][ T37] audit: type=1400 audit(2000001209.889:1474645): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1590.231641][ T37] audit: type=1400 audit(2000001209.889:1474646): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=21465 [ 1590.289298][ T37] audit: type=1400 audit(2000001209.889:1474647): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" name="queue" dev="tmpfs" ino=21465 [ 1590.295721][ T37] audit: type=1400 audit(2000001209.954:1474648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1590.295777][ T37] audit: type=1400 audit(2000001209.954:1474649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1594.397772][ T37] kauditd_printk_skb: 118 callbacks suppressed [ 1594.397795][ T37] audit: type=1400 audit(2000001214.353:1474768): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1594.895916][ T37] audit: type=1400 audit(2000001214.889:1474769): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1595.396189][ T37] audit: type=1400 audit(2000001215.426:1474770): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1595.898727][ T37] audit: type=1400 audit(2000001215.962:1474771): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1596.398636][ T37] audit: type=1400 audit(2000001216.498:1474772): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1596.931256][ T37] audit: type=1400 audit(2000001217.035:1474773): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1597.042988][ T37] audit: type=1400 audit(2000001217.174:1474774): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1597.043052][ T37] audit: type=1400 audit(2000001217.196:1474775): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1597.043100][ T37] audit: type=1400 audit(2000001217.196:1474776): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1597.043149][ T37] audit: type=1400 audit(2000001217.196:1474777): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1597.202216][T11937] wg1 speed is unknown, defaulting to 1000 [ 1597.217373][T11935] lo speed is unknown, defaulting to 1000 [ 1599.403642][ T37] kauditd_printk_skb: 107 callbacks suppressed [ 1599.403664][ T37] audit: type=1400 audit(2000001219.728:1474885): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1599.902326][ T37] audit: type=1400 audit(2000001220.264:1474886): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1600.404046][ T37] audit: type=1400 audit(2000001220.801:1474887): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1600.468476][ T37] audit: type=1400 audit(2000001220.865:1474888): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=11947 ocomm="udevd" [ 1600.510296][ T37] audit: type=1400 audit(2000001220.865:1474889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1600.510389][ T37] audit: type=1400 audit(2000001220.865:1474890): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1600.510440][ T37] audit: type=1400 audit(2000001220.865:1474891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1600.510487][ T37] audit: type=1400 audit(2000001220.865:1474892): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1600.510534][ T37] audit: type=1400 audit(2000001220.865:1474893): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1600.510580][ T37] audit: type=1400 audit(2000001220.865:1474894): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1604.407862][ T37] kauditd_printk_skb: 35 callbacks suppressed [ 1604.407884][ T37] audit: type=1400 audit(2000001225.103:1474930): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1604.907973][ T37] audit: type=1400 audit(2000001225.629:1474931): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1605.416514][ T37] audit: type=1400 audit(2000001226.165:1474932): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1605.913879][ T37] audit: type=1400 audit(2000001226.712:1474933): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1606.408875][ T37] audit: type=1400 audit(2000001227.238:1474934): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1607.412116][ T37] audit: type=1400 audit(2000001228.322:1474935): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1607.910004][ T37] audit: type=1400 audit(2000001228.848:1474936): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1608.414315][ T37] audit: type=1400 audit(2000001229.384:1474937): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1610.413199][ T37] audit: type=1400 audit(2000001231.541:1474938): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1610.643102][ T37] audit: type=1400 audit(2000001231.755:1474939): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1610.643155][ T37] audit: type=1400 audit(2000001231.755:1474940): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1610.643191][ T37] audit: type=1400 audit(2000001231.755:1474941): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1610.643226][ T37] audit: type=1400 audit(2000001231.755:1474942): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1610.643261][ T37] audit: type=1400 audit(2000001231.755:1474943): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1610.643295][ T37] audit: type=1400 audit(2000001231.755:1474944): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1610.643330][ T37] audit: type=1400 audit(2000001231.755:1474945): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1610.643366][ T37] audit: type=1400 audit(2000001231.755:1474946): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1610.643401][ T37] audit: type=1400 audit(2000001231.755:1474947): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1615.417969][ T37] kauditd_printk_skb: 141 callbacks suppressed [ 1615.417989][ T37] audit: type=1400 audit(2000001236.905:1475089): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1615.730909][ T37] audit: type=1400 audit(2000001237.238:1475090): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1615.730971][ T37] audit: type=1400 audit(2000001237.238:1475091): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1615.731022][ T37] audit: type=1400 audit(2000001237.238:1475092): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1615.731069][ T37] audit: type=1400 audit(2000001237.238:1475093): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1615.731126][ T37] audit: type=1400 audit(2000001237.238:1475094): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=21469 [ 1615.731172][ T37] audit: type=1400 audit(2000001237.238:1475095): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" name="queue" dev="tmpfs" ino=21469 [ 1615.809690][ T37] audit: type=1400 audit(2000001237.248:1475096): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11953 comm="udevd" name="/" dev="sda1" ino=2 [ 1615.810217][ T37] audit: type=1400 audit(2000001237.334:1475097): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11953 comm="udevd" name="/" dev="proc" ino=1 [ 1615.810272][ T37] audit: type=1400 audit(2000001237.334:1475098): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11953 comm="udevd" name="/" dev="proc" ino=1 [ 1620.423640][ T37] kauditd_printk_skb: 68 callbacks suppressed [ 1620.423661][ T37] audit: type=1400 audit(2000001242.280:1475167): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1620.923950][ T37] audit: type=1400 audit(2000001242.817:1475168): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1621.429432][ T37] audit: type=1400 audit(2000001243.353:1475169): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1621.925314][ T37] audit: type=1400 audit(2000001243.890:1475170): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1622.426331][ T37] audit: type=1400 audit(2000001244.426:1475171): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1622.926856][ T37] audit: type=1400 audit(2000001244.973:1475172): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1623.427663][ T37] audit: type=1400 audit(2000001245.499:1475173): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1623.938867][ T37] audit: type=1400 audit(2000001246.035:1475174): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1623.938933][ T37] audit: type=1400 audit(2000001246.046:1475175): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5825 comm="syz-executor" opid=11921 ocomm="syz-executor" [ 1624.054044][ T37] audit: type=1400 audit(2000001246.164:1475176): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=11921 comm="syz-executor" opid=11927 ocomm="syz-executor" [ 1625.095657][ T37] kauditd_printk_skb: 120 callbacks suppressed [ 1625.095677][ T37] audit: type=1400 audit(2000001247.291:1475297): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=11955 comm="syz-executor" path="socket:[137203]" dev="sockfs" ino=137203 [ 1625.134809][ T6286] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1625.168400][ T6286] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1625.170246][ T6286] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1625.171658][ T6286] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1625.198756][ T6286] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1625.236867][ T37] audit: type=1400 audit(2000001247.441:1475298): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=11955 comm="syz-executor" path="socket:[137203]" dev="sockfs" ino=137203 [ 1625.303047][ T37] audit: type=1400 audit(2000001247.505:1475299): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11955 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1625.303104][ T37] audit: type=1400 audit(2000001247.505:1475300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11955 comm="syz-executor" name="/" dev="proc" ino=1 [ 1625.303150][ T37] audit: type=1400 audit(2000001247.505:1475301): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11955 comm="syz-executor" name="/" dev="proc" ino=1 [ 1625.303207][ T37] audit: type=1400 audit(2000001247.505:1475302): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11955 comm="syz-executor" name="11955" dev="proc" ino=137210 [ 1625.303253][ T37] audit: type=1400 audit(2000001247.505:1475303): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11955 comm="syz-executor" name="ns" dev="proc" ino=137211 [ 1625.303301][ T37] audit: type=1400 audit(2000001247.505:1475304): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=11955 comm="syz-executor" dev="nsfs" ino=4026531833 [ 1625.303347][ T37] audit: type=1400 audit(2000001247.505:1475305): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11955 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 [ 1625.303394][ T37] audit: type=1400 audit(2000001247.505:1475306): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11955 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1626.801386][ T6286] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1626.829648][ T6286] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1626.854753][ T6286] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1626.856879][ T6286] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1626.882971][ T6286] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1627.148494][T31088] Bluetooth: hci0: command tx timeout [ 1628.030931][ T6286] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1628.070189][ T6286] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1628.079774][ T6286] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1628.101823][ T6286] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1628.102625][ T6286] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1628.789019][ T6286] Bluetooth: hci1: command tx timeout [ 1629.087577][ T6286] Bluetooth: hci0: command tx timeout [ 1629.939686][ T37] kauditd_printk_skb: 780 callbacks suppressed [ 1629.939710][ T37] audit: type=1400 audit(2000001252.494:1476087): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1629.992215][ T37] audit: type=1400 audit(2000001252.494:1476088): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5825 comm="syz-executor" opid=11933 ocomm="syz-executor" [ 1630.057021][ T6286] Bluetooth: hci2: command tx timeout [ 1630.075447][ T37] audit: type=1400 audit(2000001252.612:1476089): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=11933 comm="syz-executor" opid=11935 ocomm="syz-executor" [ 1630.109301][ T37] audit: type=1400 audit(2000001252.666:1476090): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=11966 comm="syz-executor" opid=11966 ocomm="syz-executor" [ 1630.145614][ T37] audit: type=1400 audit(2000001252.666:1476091): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11966 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1630.145668][ T37] audit: type=1400 audit(2000001252.709:1476092): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11966 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1630.145722][ T37] audit: type=1400 audit(2000001252.709:1476093): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11966 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1630.145772][ T37] audit: type=1400 audit(2000001252.709:1476094): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11966 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 1630.145818][ T37] audit: type=1400 audit(2000001252.709:1476095): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11966 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1630.145871][ T37] audit: type=1400 audit(2000001252.709:1476096): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11966 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1630.738449][ T6286] Bluetooth: hci1: command tx timeout [ 1631.025874][ T6286] Bluetooth: hci0: command tx timeout [ 1631.742159][T31088] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1631.770516][T31088] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1631.780328][T31088] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1631.789433][T31088] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1631.829456][T31088] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1631.995414][T31088] Bluetooth: hci2: command tx timeout [ 1632.666691][T31088] Bluetooth: hci1: command tx timeout [ 1632.800841][ T6286] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1632.829892][ T6286] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1632.831749][ T6286] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1632.850603][ T6286] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1632.851520][ T6286] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1632.968133][ T6286] Bluetooth: hci0: command tx timeout [ 1633.785150][T31088] Bluetooth: hci3: command tx timeout [ 1633.934504][T31088] Bluetooth: hci2: command tx timeout [ 1634.606680][T31088] Bluetooth: hci1: command tx timeout [ 1634.902894][T31088] Bluetooth: hci4: command tx timeout [ 1634.941848][ T37] kauditd_printk_skb: 686 callbacks suppressed [ 1634.941868][ T37] audit: type=1400 audit(2000001257.859:1476720): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1635.443127][ T37] audit: type=1400 audit(2000001258.384:1476721): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1635.722965][T31088] Bluetooth: hci3: command tx timeout [ 1635.872753][T31088] Bluetooth: hci2: command tx timeout [ 1635.891041][ T37] audit: type=1400 audit(2000001258.857:1476722): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=11957 ocomm="udevd" [ 1635.891101][ T37] audit: type=1400 audit(2000001258.857:1476723): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=11958 ocomm="udevd" [ 1635.891147][ T37] audit: type=1400 audit(2000001258.857:1476724): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=11960 ocomm="udevd" [ 1635.891193][ T37] audit: type=1400 audit(2000001258.857:1476725): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1635.891239][ T37] audit: type=1400 audit(2000001258.857:1476726): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1635.891286][ T37] audit: type=1400 audit(2000001258.857:1476727): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1635.891333][ T37] audit: type=1400 audit(2000001258.857:1476728): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1635.891381][ T37] audit: type=1400 audit(2000001258.857:1476729): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1636.843374][T31088] Bluetooth: hci4: command tx timeout [ 1637.665497][T31088] Bluetooth: hci3: command tx timeout [ 1638.780312][T31088] Bluetooth: hci4: command tx timeout [ 1638.940200][ T1322] ieee802154 phy1 wpan1: encryption failed: -22 [ 1639.600898][T31088] Bluetooth: hci3: command tx timeout [ 1639.950128][ T37] kauditd_printk_skb: 44 callbacks suppressed [ 1639.950150][ T37] audit: type=1400 audit(2000001263.234:1476774): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1640.452940][ T37] audit: type=1400 audit(2000001263.760:1476775): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1640.728353][T31088] Bluetooth: hci4: command tx timeout [ 1640.949149][ T37] audit: type=1400 audit(2000001264.296:1476776): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1641.449542][ T37] audit: type=1400 audit(2000001264.843:1476777): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1641.950417][ T37] audit: type=1400 audit(2000001265.380:1476778): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1642.451380][ T37] audit: type=1400 audit(2000001265.906:1476779): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1642.952408][ T37] audit: type=1400 audit(2000001266.453:1476780): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1643.453299][ T37] audit: type=1400 audit(2000001266.989:1476781): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1643.954330][ T37] audit: type=1400 audit(2000001267.526:1476782): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1644.455176][ T37] audit: type=1400 audit(2000001268.062:1476783): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1644.956087][ T37] audit: type=1400 audit(2000001268.599:1476784): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1645.456115][ T37] audit: type=1400 audit(2000001269.135:1476785): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1645.956407][ T37] audit: type=1400 audit(2000001269.671:1476786): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1646.458667][ T37] audit: type=1400 audit(2000001270.208:1476787): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1646.958670][ T37] audit: type=1400 audit(2000001270.744:1476788): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1647.458147][ T37] audit: type=1400 audit(2000001271.281:1476789): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1647.958637][ T37] audit: type=1400 audit(2000001271.817:1476790): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1648.459702][ T37] audit: type=1400 audit(2000001272.354:1476791): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1648.960649][ T37] audit: type=1400 audit(2000001272.901:1476792): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1649.460669][ T37] audit: type=1400 audit(2000001273.427:1476793): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1649.961805][ T37] audit: type=1400 audit(2000001273.974:1476794): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1650.463650][ T37] audit: type=1400 audit(2000001274.510:1476795): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1650.963004][ T37] audit: type=1400 audit(2000001275.047:1476796): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1651.462839][ T37] audit: type=1400 audit(2000001275.583:1476797): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1651.963217][ T37] audit: type=1400 audit(2000001276.120:1476798): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1652.467146][ T37] audit: type=1400 audit(2000001276.656:1476799): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1652.964215][ T37] audit: type=1400 audit(2000001277.192:1476800): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1653.464941][ T37] audit: type=1400 audit(2000001277.729:1476801): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1653.967802][ T37] audit: type=1400 audit(2000001278.265:1476802): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1654.468362][ T37] audit: type=1400 audit(2000001278.813:1476803): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1654.967081][ T37] audit: type=1400 audit(2000001279.338:1476804): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1655.467411][ T37] audit: type=1400 audit(2000001279.875:1476805): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1655.968534][ T37] audit: type=1400 audit(2000001280.422:1476806): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1656.469567][ T37] audit: type=1400 audit(2000001280.948:1476807): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1656.969904][ T37] audit: type=1400 audit(2000001281.484:1476808): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1657.471537][ T37] audit: type=1400 audit(2000001282.031:1476809): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1657.970281][ T37] audit: type=1400 audit(2000001282.557:1476810): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1658.471481][ T37] audit: type=1400 audit(2000001283.104:1476811): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1658.972300][ T37] audit: type=1400 audit(2000001283.641:1476812): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1659.473016][ T37] audit: type=1400 audit(2000001284.177:1476813): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1659.973216][ T37] audit: type=1400 audit(2000001284.713:1476814): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1660.478568][ T37] audit: type=1400 audit(2000001285.250:1476815): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1660.974999][ T37] audit: type=1400 audit(2000001285.786:1476816): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1661.504195][ T37] audit: type=1400 audit(2000001286.344:1476817): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1661.975258][ T37] audit: type=1400 audit(2000001286.859:1476818): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1662.475980][ T37] audit: type=1400 audit(2000001287.396:1476819): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1662.979653][ T37] audit: type=1400 audit(2000001287.932:1476820): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1663.477323][ T37] audit: type=1400 audit(2000001288.469:1476821): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1663.977423][ T37] audit: type=1400 audit(2000001289.005:1476822): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1664.479332][ T37] audit: type=1400 audit(2000001289.552:1476823): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1664.980542][ T37] audit: type=1400 audit(2000001290.078:1476824): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1665.483814][ T37] audit: type=1400 audit(2000001290.614:1476825): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1665.979580][ T37] audit: type=1400 audit(2000001291.162:1476826): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1666.479639][ T37] audit: type=1400 audit(2000001291.687:1476827): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1666.981932][ T37] audit: type=1400 audit(2000001292.224:1476828): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1667.481021][ T37] audit: type=1400 audit(2000001292.771:1476829): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1667.981656][ T37] audit: type=1400 audit(2000001293.297:1476830): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1668.482282][ T37] audit: type=1400 audit(2000001293.844:1476831): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1668.982564][ T37] audit: type=1400 audit(2000001294.380:1476832): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1669.484584][ T37] audit: type=1400 audit(2000001294.917:1476833): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1669.983201][ T37] audit: type=1400 audit(2000001295.453:1476834): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1670.483822][ T37] audit: type=1400 audit(2000001295.990:1476835): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1670.984567][ T37] audit: type=1400 audit(2000001296.526:1476836): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1671.485372][ T37] audit: type=1400 audit(2000001297.063:1476837): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1671.986386][ T37] audit: type=1400 audit(2000001297.599:1476838): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1672.487390][ T37] audit: type=1400 audit(2000001298.135:1476839): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1672.987480][ T37] audit: type=1400 audit(2000001298.683:1476840): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1673.488277][ T37] audit: type=1400 audit(2000001299.208:1476841): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1673.991099][ T37] audit: type=1400 audit(2000001299.745:1476842): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1674.491636][ T37] audit: type=1400 audit(2000001300.292:1476843): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1674.990794][ T37] audit: type=1400 audit(2000001300.818:1476844): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1675.133706][ T37] audit: type=1400 audit(2000001300.979:1476845): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="/" dev="sda1" ino=2 [ 1675.133764][ T37] audit: type=1400 audit(2000001300.979:1476846): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="etc" dev="sda1" ino=116 [ 1675.133811][ T37] audit: type=1400 audit(2000001300.979:1476847): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="cron" dev="sda1" ino=120 [ 1675.133858][ T37] audit: type=1400 audit(2000001300.979:1476848): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5580 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 1675.133907][ T37] audit: type=1400 audit(2000001300.979:1476849): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="crontabs" dev="sda1" ino=121 [ 1675.133958][ T37] audit: type=1400 audit(2000001300.979:1476850): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="/" dev="sda1" ino=2 [ 1675.134004][ T37] audit: type=1400 audit(2000001300.979:1476851): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="etc" dev="sda1" ino=116 [ 1675.491054][ T37] audit: type=1400 audit(2000001301.354:1476852): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1675.991445][ T37] audit: type=1400 audit(2000001301.901:1476853): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1677.106624][ C1] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1679.996173][ T37] kauditd_printk_skb: 7 callbacks suppressed [ 1679.996194][ T37] audit: type=1400 audit(2000001306.193:1476861): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1680.496696][ T37] audit: type=1400 audit(2000001306.729:1476862): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1680.527159][ T37] audit: type=1400 audit(2000001306.762:1476863): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5825 comm="syz-executor" opid=11954 ocomm="syz-executor" [ 1680.598359][ T37] audit: type=1400 audit(2000001306.837:1476864): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=11954 comm="syz-executor" opid=11955 ocomm="syz-executor" [ 1680.635279][ T37] audit: type=1400 audit(2000001306.880:1476865): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=11972 comm="syz-executor" opid=11972 ocomm="syz-executor" [ 1680.635340][ T37] audit: type=1400 audit(2000001306.880:1476866): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11972 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1680.635387][ T37] audit: type=1400 audit(2000001306.880:1476867): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11972 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1680.635433][ T37] audit: type=1400 audit(2000001306.880:1476868): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11972 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1680.635481][ T37] audit: type=1400 audit(2000001306.880:1476869): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11972 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 1680.635557][ T37] audit: type=1400 audit(2000001306.880:1476870): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11972 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1682.798545][ T6286] Bluetooth: hci10: unexpected cc 0x0c03 length: 249 > 1 [ 1682.863034][ T6286] Bluetooth: hci10: unexpected cc 0x1003 length: 249 > 9 [ 1682.874160][ T6286] Bluetooth: hci10: unexpected cc 0x1001 length: 249 > 9 [ 1683.570286][T11931] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wg0": -EINTR [ 1683.787820][T11939] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1 [ 1683.839231][T11939] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9 [ 1683.841770][T11939] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9 [ 1683.847706][T11939] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4 [ 1683.873980][T11939] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2 [ 1683.991103][ T6286] Bluetooth: hci10: unexpected cc 0x0c23 length: 249 > 4 [ 1684.010116][ T6286] Bluetooth: hci10: unexpected cc 0x0c38 length: 249 > 2 [ 1684.568359][ T6286] Bluetooth: hci12: unexpected cc 0x0c03 length: 249 > 1 [ 1684.597322][ T6286] Bluetooth: hci12: unexpected cc 0x1003 length: 249 > 9 [ 1684.599170][ T6286] Bluetooth: hci12: unexpected cc 0x1001 length: 249 > 9 [ 1684.622957][ T6286] Bluetooth: hci12: unexpected cc 0x0c23 length: 249 > 4 [ 1684.624316][ T6286] Bluetooth: hci12: unexpected cc 0x0c38 length: 249 > 2 [ 1684.665098][ T37] kauditd_printk_skb: 721 callbacks suppressed [ 1684.665119][ T37] audit: type=1400 audit(2000001311.203:1477592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1684.665173][ T37] audit: type=1400 audit(2000001311.203:1477593): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1684.665228][ T37] audit: type=1400 audit(2000001311.203:1477594): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1684.665280][ T37] audit: type=1400 audit(2000001311.203:1477595): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1684.665331][ T37] audit: type=1400 audit(2000001311.203:1477596): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1684.665382][ T37] audit: type=1400 audit(2000001311.203:1477597): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1684.665431][ T37] audit: type=1400 audit(2000001311.203:1477598): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1684.665486][ T37] audit: type=1400 audit(2000001311.203:1477599): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1684.665535][ T37] audit: type=1400 audit(2000001311.203:1477600): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1684.665582][ T37] audit: type=1400 audit(2000001311.203:1477601): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1685.906781][ T6286] Bluetooth: hci11: command tx timeout [ 1686.129167][ T6286] Bluetooth: hci10: command tx timeout [ 1686.810886][T11986] Bluetooth: hci12: command tx timeout [ 1687.843961][T11986] Bluetooth: hci11: command tx timeout [ 1688.067368][T11986] Bluetooth: hci10: command tx timeout [ 1688.227404][T11939] Bluetooth: hci13: unexpected cc 0x0c03 length: 249 > 1 [ 1688.259244][T11939] Bluetooth: hci13: unexpected cc 0x1003 length: 249 > 9 [ 1688.270966][T11939] Bluetooth: hci13: unexpected cc 0x1001 length: 249 > 9 [ 1688.280166][T11939] Bluetooth: hci13: unexpected cc 0x0c23 length: 249 > 4 [ 1688.299459][T11939] Bluetooth: hci13: unexpected cc 0x0c38 length: 249 > 2 [ 1688.437824][T11939] Bluetooth: hci14: unexpected cc 0x0c03 length: 249 > 1 [ 1688.470705][T11994] Bluetooth: hci14: unexpected cc 0x1003 length: 249 > 9 [ 1688.473313][T11994] Bluetooth: hci14: unexpected cc 0x1001 length: 249 > 9 [ 1688.477255][T11994] Bluetooth: hci14: unexpected cc 0x0c23 length: 249 > 4 [ 1688.518269][T11994] Bluetooth: hci14: unexpected cc 0x0c38 length: 249 > 2 [ 1688.665416][T11991] Bluetooth: hci5: command 0x0406 tx timeout [ 1688.665459][T11991] Bluetooth: hci6: command 0x0406 tx timeout [ 1688.665486][T11991] Bluetooth: hci7: command 0x0406 tx timeout [ 1688.740465][T11995] Bluetooth: hci12: command tx timeout [ 1689.511414][ T37] kauditd_printk_skb: 538 callbacks suppressed [ 1689.511530][ T37] audit: type=1400 audit(2000001316.396:1478140): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1689.783660][T11994] Bluetooth: hci11: command tx timeout [ 1689.923684][ T37] audit: type=1400 audit(2000001316.847:1478141): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1689.923814][ T37] audit: type=1400 audit(2000001316.847:1478142): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1689.923937][ T37] audit: type=1400 audit(2000001316.847:1478143): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1689.924063][ T37] audit: type=1400 audit(2000001316.847:1478144): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" name="queue" dev="tmpfs" ino=21484 [ 1689.924340][ T37] audit: type=1400 audit(2000001316.847:1478145): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=21484 [ 1689.924525][ T37] audit: type=1400 audit(2000001316.847:1478146): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" name="queue" dev="tmpfs" ino=21484 [ 1689.975831][ T37] audit: type=1400 audit(2000001316.847:1478147): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1689.975909][ T37] audit: type=1400 audit(2000001316.847:1478148): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1689.975964][ T37] audit: type=1400 audit(2000001316.847:1478149): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1690.007083][T11994] Bluetooth: hci10: command tx timeout [ 1690.677435][T11995] Bluetooth: hci12: command tx timeout [ 1691.721214][T11998] Bluetooth: hci11: command tx timeout [ 1691.944787][T11998] Bluetooth: hci10: command tx timeout [ 1692.616159][T11998] Bluetooth: hci12: command tx timeout [ 1693.389828][T11998] Bluetooth: hci8: command 0x0406 tx timeout [ 1693.389873][T11998] Bluetooth: hci9: command 0x0406 tx timeout [ 1694.517583][ T37] kauditd_printk_skb: 267 callbacks suppressed [ 1694.517603][ T37] audit: type=1400 audit(2000001321.782:1478417): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1695.020358][ T37] audit: type=1400 audit(2000001322.308:1478418): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1695.520929][ T37] audit: type=1400 audit(2000001322.844:1478419): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1696.021677][ T37] audit: type=1400 audit(2000001323.392:1478420): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1696.204740][ T1322] ieee802154 phy1 wpan1: encryption failed: -22 [ 1696.522139][ T37] audit: type=1400 audit(2000001323.928:1478421): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1697.028379][ T37] audit: type=1400 audit(2000001324.464:1478422): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1697.522875][ T37] audit: type=1400 audit(2000001325.001:1478423): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1698.023838][ T37] audit: type=1400 audit(2000001325.537:1478424): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1698.526207][ T37] audit: type=1400 audit(2000001326.074:1478425): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1699.033887][ T37] audit: type=1400 audit(2000001326.610:1478426): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1699.527784][ T37] audit: type=1400 audit(2000001327.147:1478427): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1700.028879][ T37] audit: type=1400 audit(2000001327.694:1478428): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1700.529689][ T37] audit: type=1400 audit(2000001328.230:1478429): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1701.030062][ T37] audit: type=1400 audit(2000001328.756:1478430): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1701.480036][ T37] audit: type=1400 audit(2000001329.239:1478431): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1701.480098][ T37] audit: type=1400 audit(2000001329.239:1478432): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1701.480148][ T37] audit: type=1400 audit(2000001329.239:1478433): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1701.480199][ T37] audit: type=1400 audit(2000001329.239:1478434): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1701.480247][ T37] audit: type=1400 audit(2000001329.239:1478435): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1701.480295][ T37] audit: type=1400 audit(2000001329.239:1478436): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1704.495952][ T37] kauditd_printk_skb: 57 callbacks suppressed [ 1704.495973][ T37] audit: type=1400 audit(2000001332.479:1478494): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=12000 ocomm="udevd" [ 1704.497006][ T37] audit: type=1400 audit(2000001332.479:1478495): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1704.497266][ T37] audit: type=1400 audit(2000001332.479:1478496): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1704.535268][ T37] audit: type=1400 audit(2000001332.479:1478497): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1704.535330][ T37] audit: type=1400 audit(2000001332.522:1478498): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1704.657807][ T37] audit: type=1400 audit(2000001332.651:1478499): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1704.657869][ T37] audit: type=1400 audit(2000001332.651:1478500): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1704.657921][ T37] audit: type=1400 audit(2000001332.651:1478501): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1704.657967][ T37] audit: type=1400 audit(2000001332.651:1478502): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1704.658015][ T37] audit: type=1400 audit(2000001332.651:1478503): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1709.543219][ T37] kauditd_printk_skb: 126 callbacks suppressed [ 1709.543238][ T37] audit: type=1400 audit(2000001337.897:1478630): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1710.043873][ T37] audit: type=1400 audit(2000001338.434:1478631): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1710.097501][ T37] audit: type=1400 audit(2000001338.487:1478632): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=12001 ocomm="udevd" [ 1710.097559][ T37] audit: type=1400 audit(2000001338.487:1478633): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=12002 ocomm="udevd" [ 1710.097608][ T37] audit: type=1400 audit(2000001338.487:1478634): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1710.097659][ T37] audit: type=1400 audit(2000001338.487:1478635): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1710.097709][ T37] audit: type=1400 audit(2000001338.487:1478636): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1710.097766][ T37] audit: type=1400 audit(2000001338.487:1478637): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1710.097814][ T37] audit: type=1400 audit(2000001338.487:1478638): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1710.097862][ T37] audit: type=1400 audit(2000001338.487:1478639): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1714.552164][ T37] kauditd_printk_skb: 40 callbacks suppressed [ 1714.552184][ T37] audit: type=1400 audit(2000001343.272:1478680): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1715.055825][ T37] audit: type=1400 audit(2000001343.809:1478681): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1715.556694][ T37] audit: type=1400 audit(2000001344.335:1478682): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1716.057406][ T37] audit: type=1400 audit(2000001344.882:1478683): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1716.554062][ T37] audit: type=1400 audit(2000001345.418:1478684): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1717.056279][ T37] audit: type=1400 audit(2000001345.955:1478685): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1717.556010][ T37] audit: type=1400 audit(2000001346.491:1478686): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1718.058729][ T37] audit: type=1400 audit(2000001347.027:1478687): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1718.562489][ T37] audit: type=1400 audit(2000001347.564:1478688): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1719.062871][ T37] audit: type=1400 audit(2000001348.111:1478689): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1719.558977][ T37] audit: type=1400 audit(2000001348.637:1478690): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1720.067096][ T37] audit: type=1400 audit(2000001349.184:1478691): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1720.165209][ T37] audit: type=1400 audit(2000001349.281:1478692): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1720.165273][ T37] audit: type=1400 audit(2000001349.281:1478693): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1720.165322][ T37] audit: type=1400 audit(2000001349.281:1478694): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1720.165368][ T37] audit: type=1400 audit(2000001349.281:1478695): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1720.165413][ T37] audit: type=1400 audit(2000001349.281:1478696): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1720.165460][ T37] audit: type=1400 audit(2000001349.281:1478697): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1720.165507][ T37] audit: type=1400 audit(2000001349.281:1478698): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1720.165554][ T37] audit: type=1400 audit(2000001349.281:1478699): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1724.572300][ T37] kauditd_printk_skb: 93 callbacks suppressed [ 1724.572322][ T37] audit: type=1400 audit(2000001354.023:1478793): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1724.728543][ T37] audit: type=1400 audit(2000001354.194:1478794): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1724.728821][ T37] audit: type=1400 audit(2000001354.194:1478795): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1724.729070][ T37] audit: type=1400 audit(2000001354.194:1478796): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1724.733561][ T37] audit: type=1400 audit(2000001354.194:1478797): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1724.733618][ T37] audit: type=1400 audit(2000001354.194:1478798): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12004 comm="udevd" name="/" dev="sda1" ino=2 [ 1724.733666][ T37] audit: type=1400 audit(2000001354.194:1478799): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=21488 [ 1724.733713][ T37] audit: type=1400 audit(2000001354.194:1478800): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" name="queue" dev="tmpfs" ino=21488 [ 1724.889166][ T37] audit: type=1400 audit(2000001354.194:1478801): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12004 comm="udevd" name="/" dev="proc" ino=1 [ 1724.889474][ T37] audit: type=1400 audit(2000001354.355:1478802): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12004 comm="udevd" name="/" dev="proc" ino=1 [ 1725.724323][T11927] lo speed is unknown, defaulting to 1000 [ 1725.731774][T11935] wg1 speed is unknown, defaulting to 1000 [ 1727.589117][T11995] Bluetooth: hci13: command tx timeout [ 1727.590317][T11994] Bluetooth: hci14: command tx timeout [ 1729.525184][T11995] Bluetooth: hci13: command tx timeout [ 1729.526161][T11994] Bluetooth: hci14: command tx timeout [ 1729.582480][ T37] kauditd_printk_skb: 141 callbacks suppressed [ 1729.582503][ T37] audit: type=1400 audit(2000001359.387:1478944): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1730.091357][ T37] audit: type=1400 audit(2000001359.934:1478945): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1730.302669][ T37] audit: type=1400 audit(2000001360.160:1478946): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=12004 ocomm="udevd" [ 1730.303581][ T37] audit: type=1400 audit(2000001360.160:1478947): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1730.303634][ T37] audit: type=1400 audit(2000001360.160:1478948): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1730.303683][ T37] audit: type=1400 audit(2000001360.160:1478949): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1730.303731][ T37] audit: type=1400 audit(2000001360.160:1478950): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1730.303809][ T37] audit: type=1400 audit(2000001360.160:1478951): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1730.303856][ T37] audit: type=1400 audit(2000001360.160:1478952): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1730.303924][ T37] audit: type=1400 audit(2000001360.160:1478953): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1731.463799][T11994] Bluetooth: hci14: command tx timeout [ 1731.463837][T11994] Bluetooth: hci13: command tx timeout [ 1733.403106][T11995] Bluetooth: hci13: command tx timeout [ 1733.403145][T11995] Bluetooth: hci14: command tx timeout [ 1734.592021][ T37] kauditd_printk_skb: 43 callbacks suppressed [ 1734.592043][ T37] audit: type=1400 audit(2000001364.763:1478997): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1735.087055][ T37] audit: type=1400 audit(2000001365.299:1478998): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1735.589272][ T37] audit: type=1400 audit(2000001365.835:1478999): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1736.089449][ T37] audit: type=1400 audit(2000001366.383:1479000): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1736.593421][ T37] audit: type=1400 audit(2000001366.908:1479001): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1736.593488][ T37] audit: type=1400 audit(2000001366.919:1479002): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5825 comm="syz-executor" opid=11972 ocomm="syz-executor" [ 1736.696986][ T37] audit: type=1400 audit(2000001367.026:1479003): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=11972 comm="syz-executor" opid=11973 ocomm="syz-executor" [ 1736.734590][ T37] audit: type=1400 audit(2000001367.059:1479004): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=12005 comm="syz-executor" opid=12005 ocomm="syz-executor" [ 1736.734649][ T37] audit: type=1400 audit(2000001367.069:1479005): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12005 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1736.734698][ T37] audit: type=1400 audit(2000001367.069:1479006): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12005 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1737.920624][T11995] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 1737.946964][T11995] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 1737.948721][T11995] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 1737.970704][T11995] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 1738.016332][T11995] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 1739.265198][ T37] kauditd_printk_skb: 445 callbacks suppressed [ 1739.265221][ T37] audit: type=1400 audit(2000001369.762:1479452): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12010 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1739.265277][ T37] audit: type=1400 audit(2000001369.784:1479453): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12010 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1739.265324][ T37] audit: type=1400 audit(2000001369.784:1479454): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12010 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1739.265374][ T37] audit: type=1400 audit(2000001369.784:1479455): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12010 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1739.265423][ T37] audit: type=1400 audit(2000001369.784:1479456): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=12010 comm="syz-executor" name="kcov" dev="debugfs" ino=79 [ 1739.265472][ T37] audit: type=1400 audit(2000001369.784:1479457): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=12010 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=79 [ 1739.265530][ T37] audit: type=1400 audit(2000001369.784:1479458): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=12010 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=79 [ 1739.428664][ T37] audit: type=1400 audit(2000001369.816:1479459): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12012 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1739.428729][ T37] audit: type=1400 audit(2000001369.955:1479460): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12012 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1739.428796][ T37] audit: type=1400 audit(2000001369.955:1479461): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12012 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1739.966714][T11939] Bluetooth: hci7: command tx timeout [ 1740.013336][T11986] Bluetooth: hci15: unexpected cc 0x0c03 length: 249 > 1 [ 1740.056839][T11986] Bluetooth: hci15: unexpected cc 0x1003 length: 249 > 9 [ 1740.066048][T11986] Bluetooth: hci15: unexpected cc 0x1001 length: 249 > 9 [ 1740.113820][T11986] Bluetooth: hci15: unexpected cc 0x0c23 length: 249 > 4 [ 1740.114679][T11986] Bluetooth: hci15: unexpected cc 0x0c38 length: 249 > 2 [ 1740.640830][T11939] Bluetooth: hci16: unexpected cc 0x0c03 length: 249 > 1 [ 1740.678720][T11939] Bluetooth: hci16: unexpected cc 0x1003 length: 249 > 9 [ 1740.680518][T11939] Bluetooth: hci16: unexpected cc 0x1001 length: 249 > 9 [ 1740.803436][T11939] Bluetooth: hci16: unexpected cc 0x0c23 length: 249 > 4 [ 1740.804347][T11939] Bluetooth: hci16: unexpected cc 0x0c38 length: 249 > 2 [ 1741.097206][T11986] Bluetooth: hci1: command 0x0406 tx timeout [ 1741.110821][T11939] Bluetooth: hci0: command 0x0406 tx timeout [ 1741.903172][T11939] Bluetooth: hci7: command tx timeout [ 1742.051970][T11939] Bluetooth: hci15: command tx timeout [ 1742.732394][T11939] Bluetooth: hci16: command tx timeout [ 1743.841830][T11939] Bluetooth: hci7: command tx timeout [ 1743.945181][ T37] kauditd_printk_skb: 639 callbacks suppressed [ 1743.945201][ T37] audit: type=1400 audit(2000001374.805:1480101): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1743.945256][ T37] audit: type=1400 audit(2000001374.805:1480102): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1743.945305][ T37] audit: type=1400 audit(2000001374.805:1480103): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1743.989952][ T6286] Bluetooth: hci15: command tx timeout [ 1744.051652][ T37] audit: type=1400 audit(2000001374.923:1480104): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1744.051711][ T37] audit: type=1400 audit(2000001374.923:1480105): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1744.051769][ T37] audit: type=1400 audit(2000001374.923:1480106): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1744.110888][ T37] audit: type=1400 audit(2000001374.977:1480107): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1744.176911][ T37] audit: type=1400 audit(2000001375.052:1480108): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12018 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1744.176978][ T37] audit: type=1400 audit(2000001375.052:1480109): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12018 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1744.177027][ T37] audit: type=1400 audit(2000001375.052:1480110): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12018 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1744.505257][T31088] Bluetooth: hci17: unexpected cc 0x0c03 length: 249 > 1 [ 1744.543008][T31088] Bluetooth: hci17: unexpected cc 0x1003 length: 249 > 9 [ 1744.546802][T31088] Bluetooth: hci17: unexpected cc 0x1001 length: 249 > 9 [ 1744.548032][T31088] Bluetooth: hci17: unexpected cc 0x0c23 length: 249 > 4 [ 1744.584201][T31088] Bluetooth: hci17: unexpected cc 0x0c38 length: 249 > 2 [ 1744.661788][T31088] Bluetooth: hci16: command tx timeout [ 1745.102157][ T8348] Bluetooth: hci18: unexpected cc 0x0c03 length: 249 > 1 [ 1745.136205][ T8348] Bluetooth: hci18: unexpected cc 0x1003 length: 249 > 9 [ 1745.148966][ T8348] Bluetooth: hci18: unexpected cc 0x1001 length: 249 > 9 [ 1745.152310][ T8348] Bluetooth: hci18: unexpected cc 0x0c23 length: 249 > 4 [ 1745.154893][ T8348] Bluetooth: hci18: unexpected cc 0x0c38 length: 249 > 2 [ 1745.781359][T31088] Bluetooth: hci7: command tx timeout [ 1745.863066][T11999] Bluetooth: hci3: command 0x0406 tx timeout [ 1745.863127][T31088] Bluetooth: hci2: command 0x0406 tx timeout [ 1745.935856][T31088] Bluetooth: hci15: command tx timeout [ 1746.603768][T31088] Bluetooth: hci16: command tx timeout [ 1747.867604][T31088] Bluetooth: hci15: command tx timeout [ 1748.539102][T31088] Bluetooth: hci16: command tx timeout [ 1748.619306][ T37] kauditd_printk_skb: 411 callbacks suppressed [ 1748.619326][ T37] audit: type=1400 audit(2000001379.815:1480522): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1749.119752][ T37] audit: type=1400 audit(2000001380.362:1480523): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1749.621206][ T37] audit: type=1400 audit(2000001380.888:1480524): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1750.123526][ T37] audit: type=1400 audit(2000001381.425:1480525): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1750.621600][ T37] audit: type=1400 audit(2000001381.972:1480526): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1750.638763][T31088] Bluetooth: hci4: command 0x0406 tx timeout [ 1751.122348][ T37] audit: type=1400 audit(2000001382.508:1480527): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1751.626385][ T37] audit: type=1400 audit(2000001383.034:1480528): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1752.123815][ T37] audit: type=1400 audit(2000001383.581:1480529): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1752.490799][ T37] audit: type=1400 audit(2000001383.967:1480530): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1752.490867][ T37] audit: type=1400 audit(2000001383.967:1480531): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1753.468910][ T1322] ieee802154 phy1 wpan1: encryption failed: -22 [ 1753.626216][ T37] kauditd_printk_skb: 111 callbacks suppressed [ 1753.626236][ T37] audit: type=1400 audit(2000001385.191:1480643): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1754.126250][ T37] audit: type=1400 audit(2000001385.727:1480644): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1754.191578][ T37] audit: type=1400 audit(2000001385.781:1480645): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12025 comm="udevd" name="/" dev="sda1" ino=2 [ 1754.191641][ T37] audit: type=1400 audit(2000001385.802:1480646): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12025 comm="udevd" name="/" dev="proc" ino=1 [ 1754.191694][ T37] audit: type=1400 audit(2000001385.802:1480647): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12025 comm="udevd" name="/" dev="proc" ino=1 [ 1754.191742][ T37] audit: type=1400 audit(2000001385.802:1480648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=12025 comm="udevd" name="12025" dev="proc" ino=138903 [ 1754.191790][ T37] audit: type=1400 audit(2000001385.802:1480649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=12025 comm="udevd" name="oom_score_adj" dev="proc" ino=138904 [ 1754.191838][ T37] audit: type=1400 audit(2000001385.802:1480650): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=12025 comm="udevd" path="/proc/12025/oom_score_adj" dev="proc" ino=138904 [ 1754.191887][ T37] audit: type=1400 audit(2000001385.802:1480651): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=12025 comm="udevd" name="oom_score_adj" dev="proc" ino=138904 [ 1754.191936][ T37] audit: type=1400 audit(2000001385.802:1480652): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=12025 comm="udevd" path="/proc/12025/oom_score_adj" dev="proc" ino=138904 [ 1758.638518][ T37] kauditd_printk_skb: 71 callbacks suppressed [ 1758.638540][ T37] audit: type=1400 audit(2000001390.566:1480724): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1759.135268][ T37] audit: type=1400 audit(2000001391.102:1480725): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1759.173747][ T37] audit: type=1400 audit(2000001391.134:1480726): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=12026 ocomm="udevd" [ 1759.183144][ T37] audit: type=1400 audit(2000001391.134:1480727): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=12027 ocomm="udevd" [ 1759.183208][ T37] audit: type=1400 audit(2000001391.145:1480728): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=12025 ocomm="udevd" [ 1759.183256][ T37] audit: type=1400 audit(2000001391.145:1480729): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1759.183302][ T37] audit: type=1400 audit(2000001391.145:1480730): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1759.183353][ T37] audit: type=1400 audit(2000001391.145:1480731): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1759.183403][ T37] audit: type=1400 audit(2000001391.145:1480732): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1759.374618][ T37] audit: type=1400 audit(2000001391.360:1480733): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1763.644056][ T37] kauditd_printk_skb: 66 callbacks suppressed [ 1763.644079][ T37] audit: type=1400 audit(2000001395.941:1480800): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1764.145080][ T37] audit: type=1400 audit(2000001396.477:1480801): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1764.197681][ T37] audit: type=1400 audit(2000001396.520:1480802): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=12028 ocomm="udevd" [ 1764.207120][ T37] audit: type=1400 audit(2000001396.542:1480803): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1764.207183][ T37] audit: type=1400 audit(2000001396.542:1480804): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1764.207235][ T37] audit: type=1400 audit(2000001396.542:1480805): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1764.207284][ T37] audit: type=1400 audit(2000001396.542:1480806): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1764.207334][ T37] audit: type=1400 audit(2000001396.542:1480807): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1764.207385][ T37] audit: type=1400 audit(2000001396.542:1480808): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1764.207433][ T37] audit: type=1400 audit(2000001396.542:1480809): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1766.189938][ T8348] Bluetooth: hci18: command tx timeout [ 1766.198720][ T6286] Bluetooth: hci17: command tx timeout [ 1768.081878][T11986] Bluetooth: hci17: command tx timeout [ 1768.082674][T11986] Bluetooth: hci18: command tx timeout [ 1768.651566][ T37] kauditd_printk_skb: 64 callbacks suppressed [ 1768.651588][ T37] audit: type=1400 audit(2000001401.306:1480874): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1769.128236][ T37] audit: type=1400 audit(2000001401.820:1480875): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" opid=12029 ocomm="udevd" [ 1769.128310][ T37] audit: type=1400 audit(2000001401.820:1480876): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1769.128361][ T37] audit: type=1400 audit(2000001401.820:1480877): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="etc" dev="sda1" ino=116 [ 1769.128428][ T37] audit: type=1400 audit(2000001401.820:1480878): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=259 [ 1769.154420][ T37] audit: type=1400 audit(2000001401.853:1480879): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1769.269140][ T37] audit: type=1400 audit(2000001401.971:1480880): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1769.269206][ T37] audit: type=1400 audit(2000001401.971:1480881): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 1769.269255][ T37] audit: type=1400 audit(2000001401.971:1480882): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="lib" dev="sda1" ino=264 [ 1769.269306][ T37] audit: type=1400 audit(2000001401.971:1480883): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1770.013340][T11986] Bluetooth: hci17: command tx timeout [ 1770.091588][T11986] Bluetooth: hci18: command tx timeout [ 1771.952243][T11986] Bluetooth: hci17: command tx timeout [ 1772.034841][T11986] Bluetooth: hci18: command tx timeout [ 1773.663056][ T37] kauditd_printk_skb: 36 callbacks suppressed [ 1773.663079][ T37] audit: type=1400 audit(2000001406.691:1480920): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1774.159396][ T37] audit: type=1400 audit(2000001407.217:1480921): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1774.659863][ T37] audit: type=1400 audit(2000001407.764:1480922): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1775.162801][ T37] audit: type=1400 audit(2000001408.301:1480923): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1775.660804][ T37] audit: type=1400 audit(2000001408.827:1480924): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1776.162494][ T37] audit: type=1400 audit(2000001409.374:1480925): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1776.666551][ T37] audit: type=1400 audit(2000001409.910:1480926): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1777.169416][ T37] audit: type=1400 audit(2000001410.436:1480927): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1777.662660][ T37] audit: type=1400 audit(2000001410.983:1480928): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1778.163926][ T37] audit: type=1400 audit(2000001411.520:1480929): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1778.664219][ T37] audit: type=1400 audit(2000001412.056:1480930): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1779.164251][ T37] audit: type=1400 audit(2000001412.592:1480931): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1779.667830][ T37] audit: type=1400 audit(2000001413.129:1480932): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1779.707424][ T38] INFO: task syz.0.17918:11906 blocked for more than 143 seconds. [ 1779.707452][ T38] Not tainted syzkaller #0 [ 1779.707465][ T38] Blocked by coredump. [ 1779.707472][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1779.707483][ T38] task:syz.0.17918 state:D stack:20424 pid:11906 tgid:11905 ppid:6276 task_flags:0x40054c flags:0x00004002 [ 1779.707542][ T38] Call Trace: [ 1779.707550][ T38] [ 1779.707567][ T38] __schedule+0x16f3/0x4c20 [ 1779.707631][ T38] ? __lock_acquire+0xab9/0xd20 [ 1779.707664][ T38] ? __pfx___schedule+0x10/0x10 [ 1779.707714][ T38] ? schedule+0x91/0x360 [ 1779.707750][ T38] schedule+0x165/0x360 [ 1779.707785][ T38] schedule_timeout+0x9a/0x270 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1779.707816][ T38] ? __pfx_schedule_timeout+0x10/0x10 [ 1779.707863][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 1779.707896][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1779.707927][ T38] ? wait_for_completion+0x267/0x5d0 [ 1779.707965][ T38] wait_for_completion+0x2bf/0x5d0 [ 1779.708013][ T38] ? __pfx_wait_for_completion+0x10/0x10 [ 1779.708054][ T38] ? __init_swait_queue_head+0xa9/0x150 [ 1779.708087][ T38] rcu_barrier+0x463/0x570 [ 1779.708119][ T38] ? __pfx_tun_chr_close+0x10/0x10 [ 1779.708154][ T38] netdev_run_todo+0x327/0xea0 [ 1779.708189][ T38] ? __pfx_netif_state_change+0x10/0x10 [ 1779.708220][ T38] ? __pfx_netdev_run_todo+0x10/0x10 [ 1779.708241][ T38] ? kasan_quarantine_put+0xdd/0x220 [ 1779.708268][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1779.708312][ T38] ? netdev_state_change+0x1ca/0x220 [ 1779.708345][ T38] ? __pfx_tun_chr_close+0x10/0x10 [ 1779.708379][ T38] tun_chr_close+0x13f/0x1c0 [ 1779.708414][ T38] __fput+0x45b/0xa80 [ 1779.708450][ T38] task_work_run+0x1d4/0x260 [ 1779.708477][ T38] ? __pfx_task_work_run+0x10/0x10 [ 1779.708501][ T38] ? do_exit+0x6b0/0x2300 [ 1779.708521][ T38] ? kmem_cache_free+0x195/0x510 [ 1779.708559][ T38] do_exit+0x6b5/0x2300 [ 1779.708579][ T38] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 1779.708620][ T38] ? __lock_acquire+0xab9/0xd20 [ 1779.708653][ T38] ? __pfx_do_exit+0x10/0x10 [ 1779.708670][ T38] ? rt_mutex_slowunlock+0x493/0x8a0 [ 1779.708704][ T38] ? rt_spin_lock+0x1bb/0x2c0 [ 1779.708743][ T38] do_group_exit+0x21c/0x2d0 [ 1779.708771][ T38] get_signal+0x125e/0x1310 [ 1779.708825][ T38] arch_do_signal_or_restart+0x9a/0x750 [ 1779.708854][ T38] ? __x64_sys_sendmsg+0x236/0x260 [ 1779.708880][ T38] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1779.708924][ T38] ? exit_to_user_mode_loop+0x40/0x110 [ 1779.708958][ T38] exit_to_user_mode_loop+0x75/0x110 [ 1779.708989][ T38] do_syscall_64+0x2bd/0x3b0 [ 1779.709010][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1779.709043][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1779.709066][ T38] ? clear_bhb_loop+0x60/0xb0 [ 1779.709092][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1779.709115][ T38] RIP: 0033:0x7f46cb40eec9 [ 1779.709135][ T38] RSP: 002b:00007f46c9676038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1779.709157][ T38] RAX: 000000000000045c RBX[ 1779.709157][ T38] RAX: 000000000000045c RBX: 00007f46cb665fa0 RCX: 00007f46cb40eec9 [ 1779.709181][ T38] RDX: 0000000000000000 RSI: 0000200000001200 RDI: 0000000000000003 [ 1779.709196][ T38] RBP: 00007f46cb491f91 R08: 0000000000000000 R09: 0000000000000000 [ 1779.709210][ T38] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1779.709224][ T38] R13: 00007f46cb666038 R14: 00007f46cb665fa0 R15: 00007ffcc892c5e8 [ 1779.709261][ T38] [ 1779.709279][ T38] INFO: task syz-executor:11968 blocked for more than 143 seconds. [ 1779.709294][ T38] Not tainted syzkaller #0 [ 1779.709305][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1779.709316][ T38] task:syz-executor state:D stack:26952 pid:11968 tgid:11968 ppid:1 task_flags:0x400140 flags:0x00004004 [ 1779.709378][ T38] Call Trace: [ 1779.709386][ T38] [ 1779.709400][ T38] __schedule+0x16f3/0x4c20 [ 1779.709462][ T38] ? __pfx___schedule+0x10/0x10 [ 1779.709516][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 1779.709553][ T38] rt_mutex_schedule+0x77/0xf0 [ 1779.709575][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 1779.709603][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 1779.709651][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 1779.709682][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 1779.709711][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 1779.709738][ T38] ? __lock_acquire+0xab9/0xd20 [ 1779.709779][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0 [ 1779.709813][ T38] ? is_bpf_text_address+0x26/0x2b0 [ 1779.709849][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0 [ 1779.709871][ T38] mutex_lock_nested+0x16a/0x1d0 [ 1779.709906][ T38] inet_rtm_newaddr+0x3b0/0x18b0 [ 1779.709941][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10 [ 1779.709987][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10 [ 1779.710011][ T38] rtnetlink_rcv_msg+0x7cc/0xb70 [ 1779.710042][ T38] ? __lock_acquire+0xab9/0xd20 [ 1779.710074][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 1779.710104][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1779.710154][ T38] netlink_rcv_skb+0x208/0x470 [ 1779.710192][ T38] ? __lock_acquire+0xab9/0xd20 [ 1779.710222][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1779.710255][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1779.710300][ T38] ? netlink_deliver_tap+0x2e/0x1b0 [ 1779.710340][ T38] netlink_unicast+0x846/0xa10 [ 1779.710379][ T38] ? __pfx_netlink_unicast+0x10/0x10 [ 1779.710409][ T38] ? netlink_sendmsg+0x642/0xb30 [ 1779.710439][ T38] ? skb_put+0x11b/0x210 [ 1779.710477][ T38] netlink_sendmsg+0x805/0xb30 [ 1779.710538][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1779.710581][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1779.710604][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1779.710639][ T38] __sock_sendmsg+0x219/0x270 [ 1779.710672][ T38] __sys_sendto+0x3c7/0x520 [ 1779.710710][ T38] ? __pfx___sys_sendto+0x10/0x10 [ 1779.710776][ T38] ? exc_page_fault+0x76/0xf0 [ 1779.710816][ T38] ? do_user_addr_fault+0xc8a/0x1390 [ 1779.710850][ T38] __x64_sys_sendto+0xde/0x100 [ 1779.710889][ T38] do_syscall_64+0xfa/0x3b0 [ 1779.710910][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1779.710945][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1779.710968][ T38] ? clear_bhb_loop+0x60/0xb0 [ 1779.710997][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1779.711019][ T38] RIP: 0033:0x7f901b5e0d5c [ 1779.711038][ T38] RSP: 002b:00007ffdd1a8b2f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1779.711061][ T38] RAX: ffffffffffffffda RBX: 00007f901c364620 RCX: 00007f901b5e0d5c [ 1779.711078][ T38] RDX: 0000000000000028 RSI: 00007f901c364670 RDI: 0000000000000003 [ 1779.711094][ T38] RBP: 0000000000000000 R08: 00007ffdd1a8b344 R09: 000000000000000c [ 1779.711109][ T38] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1779.711123][ T38] R13: 0000000000000000 R14: 00007f901c364670 R15: 0000000000000000 [ 1779.711158][ T38] [ 1779.711168][ T38] INFO: task syz-executor:11970 blocked for more than 143 seconds. [ 1779.711190][ T38] Not tainted syzkaller #0 [ 1779.711202][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1779.711212][ T38] task:syz-executor state:D stack:26952 pid:11970 tgid:11970 ppid:1 task_flags:0x400140 flags:0x00004004 [ 1779.711276][ T38] Call Trace: [ 1779.711284][ T38] [ 1779.711298][ T38] __schedule+0x16f3/0x4c20 [ 1779.711362][ T38] ? __pfx___schedule+0x10/0x10 [ 1779.711418][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 1779.711456][ T38] rt_mutex_schedule+0x77/0xf0 [ 1779.711479][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 1779.711509][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 1779.711558][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 1779.711591][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 1779.711622][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 1779.711648][ T38] ? __lock_acquire+0xab9/0xd20 [ 1779.711692][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0 [ 1779.711739][ T38] ? is_bpf_text_address+0x26/0x2b0 [ 1779.711775][ T38] ? inet_rtm_newaddr+0x3b0/0x18b0 [ 1779.711797][ T38] mutex_lock_nested+0x16a/0x1d0 [ 1779.711831][ T38] inet_rtm_newaddr+0x3b0/0x18b0 [ 1779.711867][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10 [ 1779.711913][ T38] ? __pfx_inet_rtm_newaddr+0x10/0x10 [ 1779.711938][ T38] rtnetlink_rcv_msg+0x7cc/0xb70 [ 1779.711973][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 1779.712003][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1779.712038][ T38] ? __pfx_rcu_preempt_deferred_qs_irqrestore+0x10/0x10 [ 1779.712081][ T38] netlink_rcv_skb+0x208/0x470 [ 1779.712110][ T38] ? __lock_acquire+0xab9/0xd20 [ 1779.712140][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1779.712173][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1779.712224][ T38] ? netlink_deliver_tap+0x2e/0x1b0 [ 1779.712264][ T38] netlink_unicast+0x846/0xa10 [ 1779.712303][ T38] ? __pfx_netlink_unicast+0x10/0x10 [ 1779.712334][ T38] ? netlink_sendmsg+0x642/0xb30 [ 1779.712363][ T38] ? skb_put+0x11b/0x210 [ 1779.712401][ T38] netlink_sendmsg+0x805/0xb30 [ 1779.712443][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1779.712484][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1779.712507][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1779.712539][ T38] __sock_sendmsg+0x219/0x270 [ 1779.712571][ T38] __sys_sendto+0x3c7/0x520 [ 1779.712626][ T38] ? __pfx___sys_sendto+0x10/0x10 [ 1779.712691][ T38] ? exc_page_fault+0x76/0xf0 [ 1779.712731][ T38] ? do_user_addr_fault+0xc8a/0x1390 [ 1779.712765][ T38] __x64_sys_sendto+0xde/0x100 [ 1779.712804][ T38] do_syscall_64+0xfa/0x3b0 [ 1779.712826][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1779.712861][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1779.712884][ T38] ? clear_bhb_loop+0x60/0xb0 [ 1779.712934][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1779.712957][ T38] RIP: 0033:0x7f232b980d5c [ 1779.712976][ T38] RSP: 002b:00007ffd59171c80 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1779.713000][ T38] RAX: ffffffffffffffda RBX: 00007f232c704620 RCX: 00007f232b980d5c [ 1779.713018][ T38] RDX: 0000000000000028 RSI: 00007f232c704670 RDI: 0000000000000003 [ 1779.713033][ T38] RBP: 0000000000000000 R08: 00007ffd59171cd4 R09: 000000000000000c [ 1779.713048][ T38] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1779.713061][ T38] R13: 0000000000000000 R14: 00007f232c704670 R15: 0000000000000000 [ 1779.713097][ T38] [ 1779.713124][ T38] [ 1779.713124][ T38] Showing all locks held in the system: [ 1779.713136][ T38] 2 locks held by ksoftirqd/0/15: [ 1779.713151][ T38] 7 locks held by rcuc/0/20: [ 1779.713166][ T38] 1 lock held by khungtaskd/38: [ 1779.713184][ T38] #0: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 1779.713253][ T38] 2 locks held by kworker/0:2/1895: [ 1779.713279][ T38] 3 locks held by kworker/u8:13/3621: [ 1779.713292][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1779.713352][ T38] #1: ffffc9000d4afbc0 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1779.713409][ T38] #2: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60 [ 1779.713463][ T38] 1 lock held by klogd/5196: [ 1779.713476][ T38] 2 locks held by getty/5598: [ 1779.713489][ T38] #0: ffff88823bf560a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1779.713553][ T38] #1: ffffc90003e832e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x444/0x1410 [ 1779.713615][ T38] 3 locks held by kworker/1:5/6356: [ 1779.713628][ T38] #0: ffff888019898538 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1779.713684][ T38] #1: ffffc9000c2a7bc0 (deferred_process_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1779.713741][ T38] #2: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20 [ 1779.713800][ T38] 1 lock held by syz-executor/5759: [ 1779.713813][ T38] #0: ffffffff8d9ae730 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1779.713866][ T38] 3 locks held by kworker/u8:1/5834: [ 1779.713879][ T38] #0: ffff888030051938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1779.713937][ T38] #1: ffffc9000e49fbc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1779.713996][ T38] #2: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 1779.714056][ T38] 1 lock held by syz-executor/10398: [ 1779.714069][ T38] #0: ffffffff8d9ae730 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1779.714135][ T38] 2 locks held by kworker/1:4/11521: [ 1779.714148][ T38] #0: ffff888019898538 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1779.714209][ T38] #1: ffffc9000dcffbc0 (free_ipc_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1779.714266][ T38] 1 lock held by syz.3.17897/11863: [ 1779.714279][ T38] #0: ffffffff8d9ae730 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1779.714330][ T38] 1 lock held by syz.0.17918/11906: [ 1779.714344][ T38] #0: ffffffff8d9ae730 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1779.714395][ T38] 1 lock held by syz.8.17920/11910: [ 1779.714408][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x41/0x1c0 [ 1779.714468][ T38] 2 locks held by kworker/u8:7/11920: [ 1779.714482][ T38] 3 locks held by kworker/0:9/11926: [ 1779.714495][ T38] 5 locks held by syz-executor/11927: [ 1779.714508][ T38] #0: ffffffff8ecc6a20 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 1779.714566][ T38] #1: ffffffff8ea22e60 (devices_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x19a/0x270 [ 1779.714625][ T38] #2: ffffffff8ea230a0 (rdma_nets_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x1d2/0x270 [ 1779.714681][ T38] #3: ffff888035ab5118 (&device->compat_devs_mutex){+.+.}-{4:4}, at: add_one_compat_dev+0xee/0x5c0 [ 1779.714737][ T38] #4: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: ib_get_eth_speed+0x151/0x7b0 [ 1779.714789][ T38] 2 locks held by syz-executor/11929: [ 1779.714802][ T38] #0: ffffffff8ecc6a20 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 1779.714859][ T38] #1: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: wg_netns_pre_exit+0x1c/0x1d0 [ 1779.714913][ T38] 1 lock held by syz-executor/11931: [ 1779.714925][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x41/0x1c0 [ 1779.715005][ T38] 2 locks held by syz-executor/11935: [ 1779.715019][ T38] #0: ffffffff8ecc6a20 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 1779.715077][ T38] #1: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: ip_tunnel_init_net+0x2ab/0x800 [ 1779.715134][ T38] 2 locks held by syz-executor/11937: [ 1779.715147][ T38] #0: ffffffff8ecc6a20 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 1779.715214][ T38] #1: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: ip_tunnel_init_net+0x2ab/0x800 [ 1779.715273][ T38] 4 locks held by syz-executor/11955: [ 1779.715286][ T38] #0: ffff88805a858e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_unregister_dev+0x212/0x510 [ 1779.715344][ T38] #1: ffff88805a8580a8 (&hdev->lock){+.+.}-{4:4}, at: hci_dev_close_sync+0x66a/0x1330 [ 1779.715406][ T38] #2: ffffffff8ee3b3d8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_hash_flush+0xa1/0x230 [ 1779.715459][ T38] #3: ffff888032259358 (&conn->lock#2){+.+.}-{4:4}, at: l2cap_conn_del+0x70/0x680 [ 1779.715514][ T38] 3 locks held by syz-executor/11962: [ 1779.715528][ T38] #0: ffff88804b08ce80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_unregister_dev+0x212/0x510 [ 1779.715585][ T38] #1: ffff88804b08c0a8 (&hdev->lock){+.+.}-{4:4}, at: hci_dev_close_sync+0x66a/0x1330 [ 1779.715645][ T38] #2: ffffffff8ee3b3d8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_hash_flush+0xa1/0x230 [ 1779.715699][ T38] 3 locks held by syz-executor/11964: [ 1779.715712][ T38] #0: ffff888052474e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_unregister_dev+0x212/0x510 [ 1779.715768][ T38] #1: ffff8880524740a8 (&hdev->lock){+.+.}-{4:4}, at: hci_dev_close_sync+0x66a/0x1330 [ 1779.715840][ T38] #2: ffffffff8ee3b3d8 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_hash_flush+0xa1/0x230 [ 1779.715890][ T38] 1 lock held by syz-executor/11968: [ 1779.715903][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1779.799966][ T37] audit: type=1400 audit(2000001413.247:1480933): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.224 dest=46828 netif=eth0 [ 1779.893193][ T37] audit: type=1400 audit(2000001413.365:1480934): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/33-virtio1-" saddr=10.128.0.169 src=44024 daddr=10.128.0.224 dest=22 netif=eth0 [ 1780.059937][ T38] 1 lock held by syz-executor/11970: [ 1780.059955][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060020][ T38] 1 lock held by syz-executor/11973: [ 1780.060038][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060089][ T38] 1 lock held by syz-executor/11979: [ 1780.060102][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060145][ T38] 1 lock held by syz-executor/11982: [ 1780.060166][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060212][ T38] 1 lock held by syz-executor/11988: [ 1780.060223][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060263][ T38] 1 lock held by syz-executor/11992: [ 1780.060273][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060311][ T38] 4 locks held by kworker/u9:9/11999: [ 1780.060321][ T38] 1 lock held by syz-executor/12006: [ 1780.060329][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060371][ T38] 1 lock held by syz-executor/12013: [ 1780.060380][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060425][ T38] 1 lock held by syz-executor/12015: [ 1780.060435][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060493][ T38] 1 lock held by syz-executor/12019: [ 1780.060503][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060545][ T38] 1 lock held by syz-executor/12023: [ 1780.060556][ T38] #0: ffffffff8ecd3938 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1780.060603][ T38] [ 1780.060609][ T38] ============================================= [ 1780.060609][ T38] [ 1780.060627][ T38] NMI backtrace for cpu 0 [ 1780.060643][ T38] CPU: 0 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1780.060664][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1780.060675][ T38] Call Trace: [ 1780.060684][ T38] [ 1780.060694][ T38] dump_stack_lvl+0x189/0x250 [ 1780.060727][ T38] ? __pfx_dump_stack_lvl+0x10/0x10 [ 1780.060757][ T38] ? __pfx__printk+0x10/0x10 [ 1780.060795][ T38] nmi_cpu_backtrace+0x39e/0x3d0 [ 1780.060825][ T38] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 1780.060854][ T38] ? __pfx__printk+0x10/0x10 [ 1780.060882][ T38] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1780.060911][ T38] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 1780.060942][ T38] watchdog+0xf93/0xfe0 [ 1780.060971][ T38] ? watchdog+0x1de/0xfe0 [ 1780.061001][ T38] kthread+0x70e/0x8a0 [ 1780.061029][ T38] ? __pfx_watchdog+0x10/0x10 [ 1780.061049][ T38] ? __pfx_kthread+0x10/0x10 [ 1780.061078][ T38] ? __pfx_kthread+0x10/0x10 [ 1780.061103][ T38] ret_from_fork+0x436/0x7d0 [ 1780.061128][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 1780.061164][ T38] ? __switch_to_asm+0x39/0x70 [ 1780.061179][ T38] ? __switch_to_asm+0x33/0x70 [ 1780.061194][ T38] ? __pfx_kthread+0x10/0x10 [ 1780.061220][ T38] ret_from_fork_asm+0x1a/0x30 [ 1780.061249][ T38] [ 1780.061292][ T38] Sending NMI from CPU 0 to CPUs 1: [ 1780.061316][ C1] NMI backtrace for cpu 1 [ 1780.061332][ C1] CPU: 1 UID: 0 PID: 11999 Comm: kworker/u9:9 Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1780.061353][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1780.061367][ C1] Workqueue: hci4 hci_cmd_sync_work [ 1780.061390][ C1] RIP: 0010:validate_chain+0xfd0/0x2140 [ 1780.061421][ C1] Code: 13 2b 05 63 9d 62 13 25 ff 0f 00 00 39 05 24 9d 61 11 73 06 89 05 1c 9d 61 11 49 8b 04 24 48 89 de 48 39 e8 0f 84 33 fe ff ff <4c> 89 68 30 48 8b 00 48 39 e8 75 f4 48 89 de e9 1f fe ff ff 48 c7 [ 1780.061438][ C1] RSP: 0018:ffffc9000542ef78 EFLAGS: 00000002 [ 1780.061453][ C1] RAX: ffffffff95860b08 RBX: 00000000000003cd RCX: 0000000000000033 [ 1780.061466][ C1] RDX: 0000000000000008 RSI: 00000000000003cd RDI: ffff888026428000 [ 1780.061478][ C1] RBP: ffffffff929faea0 R08: ffffc9000542ef40 R09: 0000000000000020 [ 1780.061490][ C1] R10: dffffc0000000000 R11: ffffffff819c7580 R12: ffffffff95823078 [ 1780.061503][ C1] R13: ffffffff95857878 R14: ffff888026428c10 R15: 0000000000000032 [ 1780.061516][ C1] FS: 0000000000000000(0000) GS:ffff8881269bc000(0000) knlGS:0000000000000000 [ 1780.061530][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1780.061542][ C1] CR2: 00007ffecb094fdc CR3: 000000000d7a6000 CR4: 00000000003526f0 [ 1780.061560][ C1] Call Trace: [ 1780.061568][ C1] [ 1780.061589][ C1] __lock_acquire+0xab9/0xd20 [ 1780.061619][ C1] ? psi_task_switch+0x53/0x880 [ 1780.061636][ C1] lock_acquire+0x120/0x360 [ 1780.061659][ C1] ? psi_task_switch+0x53/0x880 [ 1780.061703][ C1] ? rcu_read_lock_sched_held+0x89/0x100 [ 1780.061733][ C1] ? update_rt_rq_load_avg+0x550/0x940 [ 1780.061759][ C1] psi_write_begin+0xab/0x160 [ 1780.061776][ C1] ? psi_task_switch+0x53/0x880 [ 1780.061793][ C1] psi_task_switch+0x53/0x880 [ 1780.061811][ C1] ? psi_account_irqtime+0x175/0x750 [ 1780.061833][ C1] __schedule+0x2243/0x4c20 [ 1780.061863][ C1] ? check_path+0x21/0x40 [ 1780.061879][ C1] ? check_noncircular+0xe0/0x160 [ 1780.061928][ C1] ? validate_chain+0x897/0x2140 [ 1780.061955][ C1] ? __pfx___schedule+0x10/0x10 [ 1780.061982][ C1] ? check_path+0x21/0x40 [ 1780.061996][ C1] ? check_noncircular+0xe0/0x160 [ 1780.062028][ C1] ? preempt_schedule_irq+0xaa/0x150 [ 1780.062056][ C1] preempt_schedule_irq+0xb5/0x150 [ 1780.062083][ C1] ? __pfx_preempt_schedule_irq+0x10/0x10 [ 1780.062114][ C1] ? rcu_irq_exit_check_preempt+0xdf/0x210 [ 1780.062144][ C1] irqentry_exit+0x6f/0x90 [ 1780.062160][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1780.062180][ C1] RIP: 0010:lock_acquire+0x175/0x360 [ 1780.062203][ C1] Code: 00 00 00 00 9c 8f 44 24 30 f7 44 24 30 00 02 00 00 0f 85 cd 00 00 00 f7 44 24 08 00 02 00 00 74 01 fb 65 48 8b 05 db 3a 5a 10 <48> 3b 44 24 58 0f 85 f2 00 00 00 48 83 c4 60 5b 41 5c 41 5d 41 5e [ 1780.062220][ C1] RSP: 0018:ffffc9000542f5e8 EFLAGS: 00000206 [ 1780.062234][ C1] RAX: 7cc0624aa8190c00 RBX: 0000000000000000 RCX: 7cc0624aa8190c00 [ 1780.062248][ C1] RDX: 0000000000030000 RSI: ffffffff8d21b11b RDI: ffffffff8b621680 [ 1780.062261][ C1] RBP: ffffffff8581fc52 R08: ffffc9000542f408 R09: 0000000000000020 [ 1780.062274][ C1] R10: dffffc0000000000 R11: ffffffff819c7580 R12: 0000000000000000 [ 1780.062287][ C1] R13: ffffffff8e2a3158 R14: 0000000000000001 R15: 0000000000000246 [ 1780.062302][ C1] ? dev_pm_qos_constraints_destroy+0x32/0x480 [ 1780.062330][ C1] ? __pfx_hlock_conflict+0x10/0x10 [ 1780.062353][ C1] ? __pfx_rt_mutex_slowunlock+0x10/0x10 [ 1780.062376][ C1] ? dev_pm_qos_constraints_destroy+0x32/0x480 [ 1780.062402][ C1] mutex_lock_nested+0x5a/0x1d0 [ 1780.062423][ C1] ? dev_pm_qos_constraints_destroy+0x32/0x480 [ 1780.062452][ C1] dev_pm_qos_constraints_destroy+0x32/0x480 [ 1780.062481][ C1] dpm_sysfs_remove+0x67/0xd0 [ 1780.062501][ C1] device_del+0x251/0x8e0 [ 1780.062523][ C1] ? __pfx_device_del+0x10/0x10 [ 1780.062538][ C1] ? rt_mutex_slowunlock+0x239/0x2e0 [ 1780.062561][ C1] ? __pfx_rt_mutex_slowunlock+0x10/0x10 [ 1780.062587][ C1] device_unregister+0x20/0xc0 [ 1780.062604][ C1] hci_conn_del+0xc33/0x11b0 [ 1780.062634][ C1] ? hci_abort_conn_sync+0x24e/0xe30 [ 1780.062660][ C1] hci_abort_conn_sync+0x658/0xe30 [ 1780.062692][ C1] ? __pfx_hci_abort_conn_sync+0x10/0x10 [ 1780.062720][ C1] ? hci_conn_valid+0x21/0x230 [ 1780.062738][ C1] ? hci_conn_valid+0x21/0x230 [ 1780.062755][ C1] ? hci_conn_valid+0x21/0x230 [ 1780.062774][ C1] ? hci_conn_valid+0x211/0x230 [ 1780.062793][ C1] ? __pfx_abort_conn_sync+0x10/0x10 [ 1780.062813][ C1] hci_cmd_sync_work+0x210/0x3a0 [ 1780.062835][ C1] ? process_scheduled_works+0x9ef/0x17b0 [ 1780.062859][ C1] process_scheduled_works+0xade/0x17b0 [ 1780.062895][ C1] ? __pfx_process_scheduled_works+0x10/0x10 [ 1780.062935][ C1] worker_thread+0x8a0/0xda0 [ 1780.062959][ C1] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 1780.062990][ C1] ? __kthread_parkme+0x7b/0x200 [ 1780.063018][ C1] kthread+0x70e/0x8a0 [ 1780.063046][ C1] ? __pfx_worker_thread+0x10/0x10 [ 1780.063069][ C1] ? __pfx_kthread+0x10/0x10 [ 1780.063099][ C1] ? __pfx_kthread+0x10/0x10 [ 1780.063126][ C1] ret_from_fork+0x436/0x7d0 [ 1780.063150][ C1] ? __pfx_ret_from_fork+0x10/0x10 [ 1780.063177][ C1] ? __switch_to_asm+0x39/0x70 [ 1780.063193][ C1] ? __switch_to_asm+0x33/0x70 [ 1780.063210][ C1] ? __pfx_kthread+0x10/0x10 [ 1780.063238][ C1] ret_from_fork_asm+0x1a/0x30 [ 1780.063263][ C1] [ 1780.063326][ T38] Kernel panic - not syncing: hung_task: blocked tasks [ 1780.063339][ T38] CPU: 0 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1780.063357][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1780.063366][ T38] Call Trace: [ 1780.063374][ T38] [ 1780.063380][ T38] dump_stack_lvl+0x99/0x250 [ 1780.063406][ T38] ? __asan_memcpy+0x40/0x70 [ 1780.063424][ T38] ? __pfx_dump_stack_lvl+0x10/0x10 [ 1780.063447][ T38] ? __pfx__printk+0x10/0x10 [ 1780.063475][ T38] vpanic+0x281/0x750 [ 1780.063501][ T38] ? __pfx_vpanic+0x10/0x10 [ 1780.063522][ T38] ? __x2apic_send_IPI_mask+0x1e4/0x260 [ 1780.063539][ T38] ? preempt_schedule+0xae/0xc0 [ 1780.063563][ T38] ? preempt_schedule_common+0x83/0xd0 [ 1780.063593][ T38] panic+0xb9/0xc0 [ 1780.063615][ T38] ? __pfx_panic+0x10/0x10 [ 1780.063640][ T38] ? preempt_schedule_thunk+0x16/0x30 [ 1780.063663][ T38] ? nmi_trigger_cpumask_backtrace+0x2bb/0x300 [ 1780.063687][ T38] watchdog+0xfd2/0xfe0 [ 1780.063713][ T38] ? watchdog+0x1de/0xfe0 [ 1780.063738][ T38] kthread+0x70e/0x8a0 [ 1780.063765][ T38] ? __pfx_watchdog+0x10/0x10 [ 1780.063784][ T38] ? __pfx_kthread+0x10/0x10 [ 1780.063813][ T38] ? __pfx_kthread+0x10/0x10 [ 1780.063838][ T38] ret_from_fork+0x436/0x7d0 [ 1780.063861][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 1780.063887][ T38] ? __switch_to_asm+0x39/0x70 [ 1780.063903][ T38] ? __switch_to_asm+0x33/0x70 [ 1780.063919][ T38] ? __pfx_kthread+0x10/0x10 [ 1780.063944][ T38] ret_from_fork_asm+0x1a/0x30 [ 1780.063972][ T38] [ 1780.066449][ T38] Kernel Offset: disabled