last executing test programs: 8m25.037919604s ago: executing program 1 (id=13496): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001200000008000800000000000800090000000100180001801400020076657468305f746f5f626f6e640000000800070000000000080006"], 0x4c}}, 0x0) 8m24.631223688s ago: executing program 1 (id=13500): futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x0, &(0x7f0000fd7ff0), &(0x7f0000048000), 0x2) 8m23.763134718s ago: executing program 1 (id=13517): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x10) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000100000000000000080003000b000000", 0x24) 8m23.615117648s ago: executing program 1 (id=13519): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a88000000060a010400000000000000000a0000010900010073797a31000000005c000480580001800b0001007461726765740000480002802c000300000000000200000000000000d09dfb78c7699c74e891a0c70000000000000000000000000000000008000240000000000e00010049444c4554494d45520000000900020073797a32"], 0xb0}, 0x1, 0x0, 0x0, 0x4000850}, 0x20040040) 8m23.44098827s ago: executing program 1 (id=13522): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) 8m22.952228873s ago: executing program 1 (id=13525): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14, 0x10, 0x1, 0x0, 0x0, {0xa}}, [@NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x1c, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @dup_ipv4={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x70}}, 0x0) 8m8.540581558s ago: executing program 32 (id=13525): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14, 0x10, 0x1, 0x0, 0x0, {0xa}}, [@NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x1c, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @dup_ipv4={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x70}}, 0x0) 3m38.315207756s ago: executing program 2 (id=16414): r0 = syz_usb_connect$sierra_net(0x0, 0x3f, &(0x7f0000000080)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0x1199, 0x68a3, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x80, 0xfa, {{0x9, 0x4, 0x7, 0x0, 0x3, 0xff, 0x0, 0x0, 0x0, "", {{0x9, 0x5, 0x43978451d8f6fedb, 0x2, 0x40, 0x2, 0x1b, 0xfe}, {0x9, 0x5, 0x7, 0x2, 0x200, 0xc, 0x77, 0x3}, {0x9, 0x5, 0x81, 0x3, 0x20, 0x0, 0xfd, 0x32}}}}}}]}}, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, &(0x7f0000000100)={0x14, &(0x7f0000000000)={0x20, 0x21, 0x8, {0x8, 0x11, "e4ff14eca81f"}}, 0x0}, 0x0) 3m36.265876828s ago: executing program 2 (id=16435): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x14, r1, 0x1, 0x70bd25, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x40084) 3m35.869903583s ago: executing program 2 (id=16439): r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x7) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) 3m35.559415711s ago: executing program 2 (id=16442): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000000a010400000000000000000a0000040900010073797a310000000008000540000000020900020073"], 0xac}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 3m35.159226758s ago: executing program 2 (id=16446): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) 3m34.878523539s ago: executing program 2 (id=16450): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x34, r1, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa0}, @IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0x15}, @IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x1}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x40804) 3m20.329741097s ago: executing program 33 (id=16450): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x34, r1, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa0}, @IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0x15}, @IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x1}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x40804) 2m38.061605213s ago: executing program 3 (id=16874): syz_open_dev$amidi(&(0x7f0000000140), 0x2, 0x180) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) pselect6(0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, &(0x7f0000000240)={0x1f, 0x0, 0xffffffffffffffff}, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) 2m37.763029852s ago: executing program 3 (id=16879): r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000600)=0x2, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) 2m37.573711862s ago: executing program 3 (id=16881): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000740)=ANY=[@ANYBLOB="12010000ed3ec908cd0cb300042e010203010902120001000000000904"], 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000500)={0x34, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0}) 2m35.629471901s ago: executing program 3 (id=16894): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$nfs(&(0x7f00000001c0)='..\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x85000, 0x0) mount$nfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) 2m35.392898984s ago: executing program 3 (id=16895): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xc0000000) 2m34.581467785s ago: executing program 3 (id=16900): r0 = landlock_create_ruleset(&(0x7f0000000040)={0x4, 0x3, 0x2}, 0x18, 0x0) landlock_restrict_self(r0, 0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) 2m33.950753808s ago: executing program 34 (id=16900): r0 = landlock_create_ruleset(&(0x7f0000000040)={0x4, 0x3, 0x2}, 0x18, 0x0) landlock_restrict_self(r0, 0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) 2m14.435102861s ago: executing program 5 (id=17067): r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000020c0)=""/4106, 0x8}], 0x8) 2m14.145807715s ago: executing program 5 (id=17069): r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x7) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xff) 2m13.335690665s ago: executing program 5 (id=17075): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x18) fsync(0xffffffffffffffff) 2m13.071397959s ago: executing program 7 (id=17077): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000680)='sys_exit\x00', r0, 0x0, 0x5}, 0x18) timerfd_gettime(0xffffffffffffffff, 0x0) 2m12.750346462s ago: executing program 5 (id=17079): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000200), 0x4) 2m12.624725541s ago: executing program 7 (id=17081): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x4200, 0x3, 0x5}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000010c0)=ANY=[@ANYBLOB="200000001600010a00000000000000000a000d"], 0x20}, 0x1, 0x0, 0x0, 0x20040041}, 0x0) 2m12.180988763s ago: executing program 7 (id=17084): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'dt2801\x00', [0x4f27, 0x5, 0x2, 0x401, 0x1, 0x2, 0xfff, 0x0, 0x1, 0x3ff, 0x9, 0x1601, 0x1, 0x1, 0x9, 0xe1cb, 0x6, 0x4, 0x0, 0x395, 0x8000008b, 0xfffffffe, 0xb, 0xfffffff5, 0xffffead7, 0x3, 0x3c, 0x1, 0x8, 0x8000001, 0xdffffffa]}) 2m11.720009528s ago: executing program 7 (id=17086): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000001180)=0x2000000) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f00000000c0)) 2m11.548737226s ago: executing program 5 (id=17088): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000800850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b91000000004268c989e14c3f078", 0x0, 0xffffffff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m11.101978367s ago: executing program 7 (id=17090): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000003c0)={[{@xino_auto}, {@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) 2m11.07019026s ago: executing program 0 (id=17091): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000140)="24000000010006", 0x7) 2m10.746426393s ago: executing program 6 (id=17092): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000000)={'rose0\x00', @ifru_mtu=0xd}) ioctl$sock_netdev_private(r0, 0x8914, &(0x7f0000000000)) 2m10.424964827s ago: executing program 0 (id=17093): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x20, r1, 0x50dc85624ea6cf59, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x6, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) 2m10.379238209s ago: executing program 7 (id=17094): r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001800), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000480), 0x84, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 2m10.220501918s ago: executing program 6 (id=17095): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001040)={0x7, {"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", 0x1000}}, 0x1006) 2m10.043193538s ago: executing program 0 (id=17096): r0 = syz_open_procfs(0x0, &(0x7f0000000400)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/42, 0x2a) getdents64(r0, &(0x7f0000000080)=""/147, 0x93) 2m9.563576464s ago: executing program 0 (id=17097): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) process_mrelease(r1, 0x0) 2m9.561981062s ago: executing program 6 (id=17098): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x8, 0x0, 0x2}, 0x10) write(r0, &(0x7f00000002c0)="240000001e005f0214fffffffffffff807000000ef0ee96be1914a76d65fd8fd05000818", 0x24) 2m9.167972103s ago: executing program 6 (id=17099): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x62, 0x8, 0x1}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}]}, 0x38}}, 0x0) 2m9.15507081s ago: executing program 0 (id=17100): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a74000000060a0b0400000000000000000200000048000480440001800a0001006d61746368000000340002801800030003000000a7906e8f58c2052fade1bc2c62cdeb7508000240000000000d00010064657667726f7570000000000900010073797a30000000000900020073797a32"], 0x9c}}, 0x0) 2m9.03715265s ago: executing program 4 (id=17101): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r0, &(0x7f00000011c0)={0xfc, {"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", 0x1000}}, 0xffbc) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000000)={0x26, 0x0}) 2m8.776706s ago: executing program 6 (id=17102): open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@multicast2}, {@in=@broadcast}, @in=@private, {}, {}, {}, 0x0, 0x0, 0x2}}}, 0xf8}}, 0x0) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32=0x0, @ANYBLOB="0400000000000000100000000000000020"], 0x2c, 0x0) 2m8.074252551s ago: executing program 6 (id=17103): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth1_macvtap\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) 2m7.518255926s ago: executing program 4 (id=17104): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x1c3902, 0x0) sendfile(r0, r0, 0x0, 0x200000) cachestat(r0, &(0x7f0000000000)={0x9}, &(0x7f0000000040), 0x0) 2m6.21893737s ago: executing program 4 (id=17105): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x81, 0xfffff034}, {0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000180), 0x4000190, 0x0) 2m5.734993223s ago: executing program 4 (id=17106): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000700)=ANY=[@ANYBLOB="1201000059d360205f0501d09288000000010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, &(0x7f00000002c0)={0x1c, &(0x7f0000000140)={0x0, 0x15, 0x2, "d74c"}, 0x0, 0x0}) 2m3.915875939s ago: executing program 4 (id=17107): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000005c0), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002ab97000ffdbdf25040000000800020005000000080007007f0000e0070008"], 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24004854) 2m3.461081741s ago: executing program 4 (id=17108): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000018105704da0700000000000109022400010000ba0009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x22, {[@main=@item_4={0x3, 0x0, 0x9, '(3qg'}, @main=@item_4={0x3, 0x0, 0xb, "1ce93ee9"}, @global=@item_4={0x3, 0x1, 0x7, '\f\x00'}, @local=@item_012={0x1, 0x2, 0x2, "90"}, @main=@item_4={0x3, 0x0, 0xb, "b9585dde"}, @global=@item_012={0x1, 0x1, 0x8, '\r'}, @local=@item_4={0x3, 0x2, 0x0, "01070100"}, @main=@item_4={0x3, 0x0, 0xb, "31654111"}]}}, 0x0}, 0x0) 2m3.309494154s ago: executing program 5 (id=17109): r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0xf, 0x8041) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f0000000000)={0x184a, 0x1, [{0x1, 0x1}]}) 2m3.165044395s ago: executing program 0 (id=17110): r0 = socket$phonet(0x23, 0x2, 0x1) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000140)={0x2, 0x2, 0x781, 0x5f, 0x3ff, 0xe1aa0}) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000040)=0x8) 1m47.339670235s ago: executing program 35 (id=17094): r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001800), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000480), 0x84, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 1m25.206495988s ago: executing program 36 (id=17110): r0 = socket$phonet(0x23, 0x2, 0x1) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000140)={0x2, 0x2, 0x781, 0x5f, 0x3ff, 0xe1aa0}) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000040)=0x8) 1m3.402242807s ago: executing program 37 (id=17109): r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0xf, 0x8041) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f0000000000)={0x184a, 0x1, [{0x1, 0x1}]}) 34.305338659s ago: executing program 38 (id=17103): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth1_macvtap\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) 0s ago: executing program 39 (id=17108): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000018105704da0700000000000109022400010000ba0009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x22, {[@main=@item_4={0x3, 0x0, 0x9, '(3qg'}, @main=@item_4={0x3, 0x0, 0xb, "1ce93ee9"}, @global=@item_4={0x3, 0x1, 0x7, '\f\x00'}, @local=@item_012={0x1, 0x2, 0x2, "90"}, @main=@item_4={0x3, 0x0, 0xb, "b9585dde"}, @global=@item_012={0x1, 0x1, 0x8, '\r'}, @local=@item_4={0x3, 0x2, 0x0, "01070100"}, @main=@item_4={0x3, 0x0, 0xb, "31654111"}]}}, 0x0}, 0x0) kernel console output (not intermixed with test programs): oduct=2, SerialNumber=3 [ 1333.578893][ T6046] usb 4-1: Product: syz [ 1333.578908][ T6046] usb 4-1: Manufacturer: syz [ 1333.578922][ T6046] usb 4-1: SerialNumber: syz [ 1333.694826][ T6046] cdc_ether 4-1:1.0: probe with driver cdc_ether failed with error -22 [ 1333.696655][ T6046] usbtest 4-1:1.0: Linux user mode ISO test driver [ 1333.696675][ T6046] usbtest 4-1:1.0: high-speed {control iso-in iso-out} tests (+alt) [ 1333.751741][ T37] kauditd_printk_skb: 6195 callbacks suppressed [ 1333.751758][ T37] audit: type=1400 audit(2000000860.087:1411425): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=5858 comm="syz-executor" name="3361" dev="tmpfs" ino=16891 [ 1333.751801][ T37] audit: type=1400 audit(2000000860.087:1411426): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5858 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1333.751838][ T37] audit: type=1400 audit(2000000860.087:1411427): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5858 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1333.751877][ T37] audit: type=1400 audit(2000000860.087:1411428): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5858 comm="syz-executor" name="3361" dev="tmpfs" ino=16891 [ 1333.751916][ T37] audit: type=1400 audit(2000000860.087:1411429): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5858 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1333.751955][ T37] audit: type=1400 audit(2000000860.087:1411430): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5858 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1333.751996][ T37] audit: type=1400 audit(2000000860.087:1411431): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5858 comm="syz-executor" name="3361" dev="tmpfs" ino=16891 [ 1333.752036][ T37] audit: type=1400 audit(2000000860.087:1411432): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5858 comm="syz-executor" path="/3361/cgroup.net" dev="tmpfs" ino=16894 [ 1333.752077][ T37] audit: type=1400 audit(2000000860.087:1411433): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5858 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1333.752117][ T37] audit: type=1400 audit(2000000860.087:1411434): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5858 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1333.932172][ T1232] usb 4-1: USB disconnect, device number 82 [ 1334.291294][T14596] hsr_slave_0: entered promiscuous mode [ 1334.292718][T14596] hsr_slave_1: entered promiscuous mode [ 1334.558063][T15424] xt_l2tp: v2 sid > 0xffff: 1114112 [ 1335.100697][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1335.197786][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1335.383609][ T8447] udevd[8447]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1335.460647][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1335.526134][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1336.327931][T14596] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1336.412542][T14596] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1336.479685][T14596] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1336.560196][T14596] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1336.673712][T15534] __vm_enough_memory: pid: 15534, comm: syz.0.16771, bytes: 21199803166720 not enough memory for the allocation [ 1337.206640][T14596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1337.296960][ T6024] udevd[6024]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1337.388498][T14596] 8021q: adding VLAN 0 to HW filter on device team0 [ 1337.405080][T10647] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.405289][T10647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1337.456047][T23580] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.456187][T23580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1337.503950][T15557] netlink: 24 bytes leftover after parsing attributes in process `syz.4.16778'. [ 1337.529859][T15556] vxcan1: entered allmulticast mode [ 1337.913628][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1338.273384][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1338.318942][T15581] netlink: 76 bytes leftover after parsing attributes in process `syz.0.16785'. [ 1338.511538][ T6024] udevd[6024]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1338.525628][ T37] kauditd_printk_skb: 15764 callbacks suppressed [ 1338.525645][ T37] audit: type=1400 audit(2000000865.084:1424123): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1338.525691][ T37] audit: type=1400 audit(2000000865.084:1424124): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="links" dev="tmpfs" ino=152 [ 1338.525732][ T37] audit: type=1400 audit(2000000865.084:1424125): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6024 comm="udevd" path="/run/udev/links/\x2fdisk\x2fby-diskseq\x2f77" dev="tmpfs" ino=12587 [ 1338.525776][ T37] audit: type=1400 audit(2000000865.084:1424126): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="/" dev="sda1" ino=2 [ 1338.525816][ T37] audit: type=1400 audit(2000000865.084:1424127): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1338.525855][ T37] audit: type=1400 audit(2000000865.084:1424128): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1338.525894][ T37] audit: type=1400 audit(2000000865.084:1424129): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="links" dev="tmpfs" ino=152 [ 1338.525934][ T37] audit: type=1400 audit(2000000865.084:1424130): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="\x2fdisk\x2fby-diskseq\x2f77" dev="tmpfs" ino=12587 [ 1338.525974][ T37] audit: type=1400 audit(2000000865.084:1424131): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=6024 comm="udevd" name="b7:0" dev="tmpfs" ino=12588 [ 1338.526014][ T37] audit: type=1400 audit(2000000865.084:1424132): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6024 comm="udevd" path="/run/udev/links/\x2fdisk\x2fby-diskseq\x2f77/b7:0" dev="tmpfs" ino=12588 [ 1338.549762][ T9682] udevd[9682]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1338.856974][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1339.055672][T14596] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1339.072746][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1339.155499][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1339.284184][T15600] comedi comedi3: 8255: I/O port conflict (0x5,4) [ 1339.284244][T15600] comedi comedi3: 8255: I/O port conflict (0x2,4) [ 1339.284341][T15600] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1339.284475][T15600] comedi comedi3: 8255: I/O port conflict (0x5c952399,4) [ 1339.284526][T15600] comedi comedi3: 8255: I/O port conflict (0x5,4) [ 1339.284577][T15600] comedi comedi3: 8255: I/O port conflict (0x3ff,4) [ 1339.284706][T15600] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1339.284757][T15600] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1339.284806][T15600] comedi comedi3: 8255: I/O port conflict (0x9,4) [ 1339.284896][T15600] comedi comedi3: 8255: I/O port conflict (0x6,4) [ 1339.284946][T15600] comedi comedi3: 8255: I/O port conflict (0x4,4) [ 1339.284991][T15600] comedi comedi3: 8255: I/O port conflict (0x3,4) [ 1339.385123][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1339.589498][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1340.286185][T15626] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16800'. [ 1340.878292][T14596] veth0_vlan: entered promiscuous mode [ 1340.923724][T14596] veth1_vlan: entered promiscuous mode [ 1341.052530][T14596] veth0_macvtap: entered promiscuous mode [ 1341.069417][T14596] veth1_macvtap: entered promiscuous mode [ 1341.098090][T14596] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1341.116121][T14596] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1341.171230][ T3614] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1341.189970][ T3614] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1341.203380][ T3614] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1341.209358][ T3614] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1341.950832][T15670] xt_l2tp: invalid flags combination: 0 [ 1342.095793][ T4697] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1342.095813][ T4697] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1342.339397][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1342.358377][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1342.382316][T15377] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1342.382335][T15377] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1342.447206][T15686] openvswitch: netlink: IPv4 frag type 255 is out of range max 2 [ 1342.617423][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1342.819878][ T5854] usb 4-1: new high-speed USB device number 83 using dummy_hcd [ 1342.986325][ T5854] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1342.986356][ T5854] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1342.986394][ T5854] usb 4-1: New USB device found, idVendor=04b4, idProduct=de61, bcdDevice= 0.00 [ 1342.986417][ T5854] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1342.993811][ T5854] usb 4-1: config 0 descriptor?? [ 1343.104251][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1343.116301][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1343.294589][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1343.303635][ T8447] audit_log_start: 18995 callbacks suppressed [ 1343.303655][ T8447] audit: audit_backlog=67 > audit_backlog_limit=64 [ 1343.303668][ T8447] audit: audit_lost=175535 audit_rate_limit=0 audit_backlog_limit=64 [ 1343.303683][ T8447] audit: backlog limit exceeded [ 1343.303710][ T8447] audit: audit_backlog=67 > audit_backlog_limit=64 [ 1343.303723][ T8447] audit: audit_lost=175536 audit_rate_limit=0 audit_backlog_limit=64 [ 1343.303743][ T8447] audit: backlog limit exceeded [ 1343.303834][ T8447] audit: audit_backlog=67 > audit_backlog_limit=64 [ 1343.303847][ T8447] audit: audit_lost=175537 audit_rate_limit=0 audit_backlog_limit=64 [ 1343.303861][ T8447] audit: backlog limit exceeded [ 1343.303884][ T8447] audit: audit_backlog=67 > audit_backlog_limit=64 [ 1343.462050][ T8447] udevd[8447]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1343.526741][ T5854] cypress 0003:04B4:DE61.0055: unknown main item tag 0x0 [ 1343.526779][ T5854] cypress 0003:04B4:DE61.0055: unknown main item tag 0x0 [ 1343.526807][ T5854] cypress 0003:04B4:DE61.0055: unknown main item tag 0x0 [ 1343.571036][ T5854] cypress 0003:04B4:DE61.0055: hidraw0: USB HID v0.00 Device [HID 04b4:de61] on usb-dummy_hcd.3-1/input0 [ 1343.648556][ T5854] usb 4-1: USB disconnect, device number 83 [ 1344.248980][T15730] "syz.6.16825" (15730) uses obsolete ecb(arc4) skcipher [ 1344.289770][T15735] fido_id[15735]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.3/usb4/report_descriptor': No such file or directory [ 1344.776057][T15773] netlink: 36 bytes leftover after parsing attributes in process `syz.6.16840'. [ 1344.919756][ T5854] usb 5-1: new high-speed USB device number 79 using dummy_hcd [ 1345.058725][ T5854] usb 5-1: Using ep0 maxpacket: 8 [ 1345.069004][ T5854] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1345.069054][ T5854] usb 5-1: New USB device found, idVendor=044f, idProduct=b654, bcdDevice= 0.00 [ 1345.069077][ T5854] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1345.084994][ T5854] usb 5-1: config 0 descriptor?? [ 1345.500813][ T5854] thrustmaster 0003:044F:B654.0056: item fetching failed at offset 0/2 [ 1345.501610][ T5854] thrustmaster 0003:044F:B654.0056: parse failed [ 1345.501682][ T5854] thrustmaster 0003:044F:B654.0056: probe with driver thrustmaster failed with error -22 [ 1345.705197][ T1232] usb 5-1: USB disconnect, device number 79 [ 1346.727853][T15844] mkiss: ax0: crc mode is auto. [ 1346.732415][T15850] netlink: 'syz.4.16865': attribute type 2 has an invalid length. [ 1346.732437][T15850] netlink: 1184 bytes leftover after parsing attributes in process `syz.4.16865'. [ 1348.068378][ T37] kauditd_printk_skb: 18839 callbacks suppressed [ 1348.068401][ T37] audit: type=1400 audit(2000000875.120:1451171): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="loop6" dev="sysfs" ino=15444 [ 1348.068446][ T37] audit: type=1400 audit(2000000875.120:1451172): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1348.068487][ T37] audit: type=1400 audit(2000000875.120:1451173): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1348.068524][ T37] audit: type=1400 audit(2000000875.120:1451174): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sysfs" ino=1 [ 1348.068564][ T37] audit: type=1400 audit(2000000875.120:1451175): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1348.068606][ T37] audit: type=1400 audit(2000000875.120:1451176): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1348.068645][ T37] audit: type=1400 audit(2000000875.120:1451177): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1348.068688][ T37] audit: type=1400 audit(2000000875.120:1451178): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="loop6" dev="sysfs" ino=15444 [ 1348.068728][ T37] audit: type=1400 audit(2000000875.120:1451179): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="mq" dev="sysfs" ino=15539 [ 1348.068768][ T37] audit: type=1400 audit(2000000875.120:1451180): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1348.106868][ T4557] usb 4-1: new high-speed USB device number 84 using dummy_hcd [ 1348.344984][ T4557] usb 4-1: Using ep0 maxpacket: 8 [ 1348.364600][ T4557] usb 4-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2e.04 [ 1348.364631][ T4557] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1348.364653][ T4557] usb 4-1: Product: syz [ 1348.364668][ T4557] usb 4-1: Manufacturer: syz [ 1348.364684][ T4557] usb 4-1: SerialNumber: syz [ 1348.406928][ T4557] usb 4-1: config 0 descriptor?? [ 1348.645071][ T4557] usb 4-1: dvb_usb_v2: found a 'TerraTec NOXON DAB Stick' in warm state [ 1349.044707][ T4557] dvb_usb_rtl28xxu 4-1:0.0: probe with driver dvb_usb_rtl28xxu failed with error -71 [ 1349.064759][ T4557] usb 4-1: USB disconnect, device number 84 [ 1349.363831][ T1232] usb 6-1: new high-speed USB device number 28 using dummy_hcd [ 1349.382248][ T6735] udevd[6735]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1349.398960][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1349.460746][ T8447] udevd[8447]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1349.520073][ T1232] usb 6-1: Using ep0 maxpacket: 8 [ 1349.529964][ T1232] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1349.530012][ T1232] usb 6-1: New USB device found, idVendor=0458, idProduct=4018, bcdDevice= 0.00 [ 1349.530036][ T1232] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1349.571381][ T1232] usb 6-1: config 0 descriptor?? [ 1349.605253][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1349.692802][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1349.692905][ T8447] udevd[8447]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1349.829904][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1350.039284][ T1232] kye 0003:0458:4018.0057: unbalanced collection at end of report description [ 1350.040140][ T1232] kye 0003:0458:4018.0057: parse failed [ 1350.040210][ T1232] kye 0003:0458:4018.0057: probe with driver kye failed with error -22 [ 1350.115877][ T8447] udevd[8447]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1350.141444][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1350.178642][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1350.264248][ T6046] usb 6-1: USB disconnect, device number 28 [ 1351.009261][T15993] netlink: 332 bytes leftover after parsing attributes in process `syz.0.16901'. [ 1351.613820][T16006] netlink: 64691 bytes leftover after parsing attributes in process `syz.0.16904'. [ 1352.843034][ T37] kauditd_printk_skb: 32093 callbacks suppressed [ 1352.843051][ T37] audit: type=1400 audit(2000000880.138:1467839): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1352.843094][ T37] audit: type=1400 audit(2000000880.138:1467840): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1352.843134][ T37] audit: type=1400 audit(2000000880.138:1467841): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="data" dev="tmpfs" ino=13 [ 1352.848519][ T5204] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1352.848535][ T5204] audit: audit_lost=181884 audit_rate_limit=0 audit_backlog_limit=64 [ 1352.848549][ T5204] audit: backlog limit exceeded [ 1352.848575][ T5204] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1352.848587][ T5204] audit: audit_lost=181885 audit_rate_limit=0 audit_backlog_limit=64 [ 1352.848599][ T5204] audit: backlog limit exceeded [ 1352.848623][ T5204] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1352.982617][T16601] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1353.006233][T16601] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1353.008723][T16601] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1353.065738][T16601] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1353.066655][T16601] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1353.348170][T16052] mkiss: ax0: crc mode is auto. [ 1353.793687][T16064] netlink: 'syz.0.16925': attribute type 1 has an invalid length. [ 1354.300890][ T6024] udevd[6024]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1354.831648][ T4557] usb 6-1: new high-speed USB device number 29 using dummy_hcd [ 1354.974475][ T4557] usb 6-1: Using ep0 maxpacket: 32 [ 1354.979671][ T4557] usb 6-1: config 0 interface 0 has no altsetting 0 [ 1355.003122][ T4557] usb 6-1: New USB device found, idVendor=16d0, idProduct=10b8, bcdDevice=de.8e [ 1355.003163][ T4557] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1355.003186][ T4557] usb 6-1: Product: syz [ 1355.003202][ T4557] usb 6-1: Manufacturer: syz [ 1355.003217][ T4557] usb 6-1: SerialNumber: syz [ 1355.081221][ T4557] usb 6-1: config 0 descriptor?? [ 1355.098919][ T4664] Bluetooth: hci2: command tx timeout [ 1355.430290][ T6024] udevd[6024]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1355.541398][ T4557] gs_usb 6-1:0.0: Configuring for 16 interfaces [ 1355.541423][ T4557] gs_usb 6-1:0.0: Driver cannot handle more that 3 CAN interfaces [ 1355.541461][ T4557] gs_usb 6-1:0.0: probe with driver gs_usb failed with error -22 [ 1355.695538][ T8447] udevd[8447]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1355.751241][ T9682] udevd[9682]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1355.785229][ T5854] usb 6-1: USB disconnect, device number 29 [ 1355.786158][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1355.886355][ T9682] udevd[9682]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1356.012022][ T6024] udevd[6024]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1356.454987][ T6024] udevd[6024]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1356.650216][ T6024] udevd[6024]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1356.790152][T16036] chnl_net:caif_netlink_parms(): no params data found [ 1357.001753][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1357.027297][T16258] netlink: 12 bytes leftover after parsing attributes in process `syz.5.16952'. [ 1357.089952][ T4664] Bluetooth: hci2: command tx timeout [ 1357.366101][ T6046] usb 5-1: new high-speed USB device number 80 using dummy_hcd [ 1357.531569][ T6046] usb 5-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 1357.531602][ T6046] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1357.565107][ T6046] usb 5-1: config 0 descriptor?? [ 1357.599948][ T6046] cp210x 5-1:0.0: cp210x converter detected [ 1357.615581][ T37] kauditd_printk_skb: 20932 callbacks suppressed [ 1357.615597][ T37] audit: type=1400 audit(2000000885.103:1481889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="loop6" dev="sysfs" ino=15444 [ 1357.615689][ T37] audit: type=1400 audit(2000000885.145:1481930): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1357.615738][ T37] audit: type=1400 audit(2000000885.145:1481931): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sysfs" ino=1 [ 1357.615833][ T37] audit: type=1400 audit(2000000885.145:1481932): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1357.615875][ T37] audit: type=1400 audit(2000000885.145:1481933): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1357.615916][ T37] audit: type=1400 audit(2000000885.145:1481934): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1357.616016][ T37] audit: type=1400 audit(2000000885.145:1481935): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="loop6" dev="sysfs" ino=15444 [ 1357.616058][ T37] audit: type=1400 audit(2000000885.145:1481936): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="slaves" dev="sysfs" ino=15489 [ 1357.616152][ T37] audit: type=1400 audit(2000000885.145:1481937): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1357.616192][ T37] audit: type=1400 audit(2000000885.145:1481938): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sysfs" ino=1 [ 1357.643718][T16309] netlink: 24 bytes leftover after parsing attributes in process `syz.0.16955'. [ 1357.962346][T16036] bridge0: port 1(bridge_slave_0) entered blocking state [ 1357.966325][T16036] bridge0: port 1(bridge_slave_0) entered disabled state [ 1357.968572][T16036] bridge_slave_0: entered allmulticast mode [ 1358.030275][T16036] bridge_slave_0: entered promiscuous mode [ 1358.081731][T16036] bridge0: port 2(bridge_slave_1) entered blocking state [ 1358.083519][T16036] bridge0: port 2(bridge_slave_1) entered disabled state [ 1358.085866][T16036] bridge_slave_1: entered allmulticast mode [ 1358.123356][T16036] bridge_slave_1: entered promiscuous mode [ 1358.252541][ T6046] cp210x 5-1:0.0: failed to get vendor val 0x000e size 678: -71 [ 1358.252596][ T6046] cp210x 5-1:0.0: GPIO initialisation failed: -71 [ 1358.274984][ T6046] usb 5-1: cp210x converter now attached to ttyUSB0 [ 1358.322740][ T6046] usb 5-1: USB disconnect, device number 80 [ 1358.377038][ T6046] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1358.377905][ T6046] cp210x 5-1:0.0: device disconnected [ 1358.668850][T16036] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1358.696258][T16036] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1358.999236][T16036] team0: Port device team_slave_0 added [ 1359.003292][T16036] team0: Port device team_slave_1 added [ 1359.061860][ T4664] Bluetooth: hci2: command tx timeout [ 1359.321138][T16036] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1359.321154][T16036] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1359.321181][T16036] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1359.323611][T16036] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1359.323625][T16036] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1359.323650][T16036] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1359.929980][T16036] hsr_slave_0: entered promiscuous mode [ 1359.931444][T16036] hsr_slave_1: entered promiscuous mode [ 1359.932370][T16036] debugfs: 'hsr0' already exists in 'hsr' [ 1359.932394][T16036] Cannot create hsr debugfs directory [ 1360.150774][ T8447] udevd[8447]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1360.255616][ T6798] udevd[6798]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1360.255688][ T8667] udevd[8667]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1360.363221][ T6735] udevd[6735]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1360.454386][ T9682] udevd[9682]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1360.458339][ T6735] udevd[6735]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1360.597157][ T9682] udevd[9682]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1360.636667][ T6735] udevd[6735]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1360.691227][T16543] comedi comedi3: 8255: I/O port conflict (0x5,4) [ 1360.774409][ T6024] udevd[6024]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1360.850557][ T9682] udevd[9682]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1361.054247][ T4664] Bluetooth: hci2: command tx timeout [ 1361.420519][T16588] comedi comedi3: 8255: I/O port conflict (0x5,4) [ 1361.420578][T16588] comedi comedi3: 8255: I/O port conflict (0x2,4) [ 1361.420630][T16588] comedi comedi3: 8255: I/O port conflict (0x5,4) [ 1361.420689][T16588] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1361.420829][T16588] comedi comedi3: 8255: I/O port conflict (0x5c952399,4) [ 1361.420881][T16588] comedi comedi3: 8255: I/O port conflict (0x5,4) [ 1361.420935][T16588] comedi comedi3: 8255: I/O port conflict (0x3ff,4) [ 1361.421071][T16588] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1361.421121][T16588] comedi comedi3: 8255: I/O port conflict (0x1,4) [ 1361.421170][T16588] comedi comedi3: 8255: I/O port conflict (0x9,4) [ 1361.889880][T16036] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1361.939185][T16616] CIFS mount error: No usable UNC path provided in device string! [ 1361.939185][T16616] [ 1361.939209][T16616] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 1361.984473][T16036] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1362.022649][T16036] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1362.067760][T16036] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1362.388019][ T37] kauditd_printk_skb: 20561 callbacks suppressed [ 1362.388038][ T37] audit: type=1400 audit(2000000890.143:1495900): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1362.388080][ T37] audit: type=1400 audit(2000000890.143:1495901): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=14596 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1362.388120][ T37] audit: type=1400 audit(2000000890.143:1495902): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=16630 comm="syz.0.16996" path="/dev/vbi0" dev="devtmpfs" ino=954 [ 1362.388160][ T37] audit: type=1400 audit(2000000890.143:1495903): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1362.388198][ T37] audit: type=1400 audit(2000000890.143:1495904): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1362.388235][ T37] audit: type=1400 audit(2000000890.143:1495905): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1362.388274][ T37] audit: type=1400 audit(2000000890.143:1495906): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6024 comm="udevd" name="loop0" dev="sysfs" ino=347849 [ 1362.388313][ T37] audit: type=1400 audit(2000000890.143:1495907): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6024 comm="udevd" path="/sys/devices/virtual/block/loop0" dev="sysfs" ino=347849 [ 1362.388353][ T37] audit: type=1400 audit(2000000890.143:1495908): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6024 comm="udevd" name="loop0" dev="sysfs" ino=347849 [ 1362.388392][ T37] audit: type=1400 audit(2000000890.143:1495909): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sysfs" ino=1 [ 1362.581456][T16036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1362.695673][T16036] 8021q: adding VLAN 0 to HW filter on device team0 [ 1362.722280][ T3614] bridge0: port 1(bridge_slave_0) entered blocking state [ 1362.723744][ T3614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1362.770973][ T1168] bridge0: port 2(bridge_slave_1) entered blocking state [ 1362.776034][ T1168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1364.024987][T16036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1364.416491][ T5854] usb 5-1: new high-speed USB device number 81 using dummy_hcd [ 1364.600448][ T5854] usb 5-1: config 0 has an invalid interface number: 1 but max is 0 [ 1364.600489][ T5854] usb 5-1: config 0 has no interface number 0 [ 1364.600537][ T5854] usb 5-1: config 0 interface 1 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1364.600564][ T5854] usb 5-1: config 0 interface 1 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1364.600588][ T5854] usb 5-1: config 0 interface 1 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1364.600631][ T5854] usb 5-1: New USB device found, idVendor=28bd, idProduct=0042, bcdDevice= 0.00 [ 1364.600656][ T5854] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1364.678010][ T5854] usb 5-1: config 0 descriptor?? [ 1365.298169][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1365.327974][ T5854] uclogic 0003:28BD:0042.0058: failed retrieving string descriptor #100: -71 [ 1365.328034][ T5854] uclogic 0003:28BD:0042.0058: failed retrieving pen parameters: -71 [ 1365.328053][ T5854] uclogic 0003:28BD:0042.0058: pen probing failed: -71 [ 1365.328070][ T5854] uclogic 0003:28BD:0042.0058: failed probing parameters: -71 [ 1365.328180][ T5854] uclogic 0003:28BD:0042.0058: probe with driver uclogic failed with error -71 [ 1365.374670][ T5854] usb 5-1: USB disconnect, device number 81 [ 1365.582865][ T6024] udevd[6024]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1365.637361][ T9682] udevd[9682]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1365.799226][ T6024] udevd[6024]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1365.922345][ T9682] udevd[9682]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1366.011323][ T9682] udevd[9682]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1366.061456][ T6024] udevd[6024]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1366.232293][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1366.237882][T16036] veth0_vlan: entered promiscuous mode [ 1366.291676][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1366.371040][T16036] veth1_vlan: entered promiscuous mode [ 1366.439474][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1366.634699][T16036] veth0_macvtap: entered promiscuous mode [ 1366.666045][T16036] veth1_macvtap: entered promiscuous mode [ 1366.778562][T16036] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1366.819478][T16036] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1366.910682][T14978] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1366.916340][T14978] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1366.916616][T14978] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1366.917114][T14978] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1367.157762][ T5204] audit_log_start: 22930 callbacks suppressed [ 1367.157779][ T5204] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1367.157791][ T5204] audit: audit_lost=188789 audit_rate_limit=0 audit_backlog_limit=64 [ 1367.157804][ T5204] audit: backlog limit exceeded [ 1367.157875][ T5204] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1367.157888][ T5204] audit: audit_lost=188790 audit_rate_limit=0 audit_backlog_limit=64 [ 1367.157900][ T5204] audit: backlog limit exceeded [ 1367.157928][ T5204] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1367.157939][ T5204] audit: audit_lost=188791 audit_rate_limit=0 audit_backlog_limit=64 [ 1367.157952][ T5204] audit: backlog limit exceeded [ 1367.169258][T16768] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1367.605527][ T1325] ieee802154 phy1 wpan1: encryption failed: -22 [ 1367.687044][ T6593] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1367.687066][ T6593] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1367.813492][T15377] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1367.813512][T15377] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1367.815439][T16785] program syz.5.17034 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1368.222068][T16799] program syz.4.17038 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1369.274128][T16838] Invalid source name [ 1369.832579][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.832616][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.832643][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.832670][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.832696][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.832721][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.832748][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.832774][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.832800][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.832837][ T31] hid-generic 0002:0004:0007.0059: unknown main item tag 0x0 [ 1369.884687][ T31] hid-generic 0002:0004:0007.0059: hidraw0: HID v0.04 Device [syz0] on syz0 [ 1369.954870][ T4664] Bluetooth: hci3: unknown advertising packet type: 0x82 [ 1369.954906][ T4664] Bluetooth: hci3: Malformed LE Event: 0x02 [ 1370.250160][T16872] ptrace attach of "./syz-executor exec"[4662] was attempted by ""[16872] [ 1371.187567][T16897] netlink: 12 bytes leftover after parsing attributes in process `syz.4.17068'. [ 1371.250254][T16897] vlan2: entered promiscuous mode [ 1371.250278][T16897] syz_tun: entered promiscuous mode [ 1371.376528][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1371.454098][ T9659] udevd[9659]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1371.469796][T16904] sp0: Synchronizing with TNC [ 1371.672181][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1371.755459][ T9682] udevd[9682]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1371.852008][T16912] fido_id[16912]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1371.897003][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1371.930318][ T37] kauditd_printk_skb: 23650 callbacks suppressed [ 1371.930336][ T37] audit: type=1400 audit(2000000900.168:1526600): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/sys/devices/virtual/block/loop0/mq" dev="sysfs" ino=347944 [ 1371.930375][ T37] audit: type=1400 audit(2000000900.168:1526601): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/sys/devices/virtual/block/loop0/mq" dev="sysfs" ino=347944 [ 1371.930414][ T37] audit: type=1400 audit(2000000900.168:1526602): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1371.930451][ T37] audit: type=1400 audit(2000000900.168:1526603): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sysfs" ino=1 [ 1371.930488][ T37] audit: type=1400 audit(2000000900.168:1526604): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1371.930529][ T37] audit: type=1400 audit(2000000900.168:1526605): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1371.930569][ T37] audit: type=1400 audit(2000000900.168:1526606): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1371.930621][ T37] audit: type=1400 audit(2000000900.168:1526607): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="loop0" dev="sysfs" ino=347849 [ 1371.930664][ T37] audit: type=1400 audit(2000000900.168:1526608): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="mq" dev="sysfs" ino=347944 [ 1371.930702][ T37] audit: type=1400 audit(2000000900.168:1526609): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1372.263139][ T9682] udevd[9682]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1372.288203][ T6735] udevd[6735]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1372.403575][ T8447] udevd[8447]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1372.607301][ T6735] udevd[6735]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1372.624081][ T9682] udevd[9682]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1374.718084][T16971] overlayfs: "xino" feature enabled using 3 upper inode bits. [ 1376.437921][T16993] netlink: 24 bytes leftover after parsing attributes in process `syz.6.17099'. [ 1376.713321][ T37] kauditd_printk_skb: 14576 callbacks suppressed [ 1376.713340][ T37] audit: type=1400 audit(2000000905.186:1536998): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1376.713386][ T37] audit: type=1400 audit(2000000905.186:1536999): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1376.713429][ T37] audit: type=1400 audit(2000000905.186:1537000): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sysfs" ino=1 [ 1376.713471][ T37] audit: type=1400 audit(2000000905.197:1537001): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1376.713513][ T37] audit: type=1400 audit(2000000905.197:1537002): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1376.713554][ T37] audit: type=1400 audit(2000000905.197:1537003): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1376.713594][ T37] audit: type=1400 audit(2000000905.197:1537004): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="loop0" dev="sysfs" ino=347849 [ 1376.713635][ T37] audit: type=1400 audit(2000000905.197:1537005): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/sys/devices/virtual/block/loop0/uevent" dev="sysfs" ino=347850 [ 1376.713677][ T37] audit: type=1400 audit(2000000905.197:1537006): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1376.713716][ T37] audit: type=1400 audit(2000000905.197:1537007): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sysfs" ino=1 [ 1377.058222][ T6024] udevd[6024]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1377.558849][T17002] macsec1: entered promiscuous mode [ 1377.712458][ T6024] udevd[6024]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1378.041100][ T9682] udevd[9682]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1378.043406][ T6024] udevd[6024]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1378.305986][ T9682] udevd[9682]: symlink '../../loop6' '/dev/disk/by-diskseq/81.tmp-b7:6' failed: Read-only file system [ 1378.406805][ C0] vkms_vblank_simulate: vblank timer overrun [ 1379.941981][ T6046] usb 5-1: new high-speed USB device number 82 using dummy_hcd [ 1380.105610][ T6046] usb 5-1: Using ep0 maxpacket: 32 [ 1380.109484][ T6046] usb 5-1: New USB device found, idVendor=055f, idProduct=d001, bcdDevice=88.92 [ 1380.109514][ T6046] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1380.148071][ T6046] usb 5-1: config 0 descriptor?? [ 1380.188278][ T6046] gspca_main: nw80x-2.14.0 probing 055f:d001 [ 1380.799936][ T6046] usb 5-1: USB disconnect, device number 82 [ 1381.053561][ C0] vkms_vblank_simulate: vblank timer overrun [ 1381.074559][ C0] vkms_vblank_simulate: vblank timer overrun [ 1381.486692][ T37] kauditd_printk_skb: 4149 callbacks suppressed [ 1381.486711][ T37] audit: type=1400 audit(2000000910.204:1541151): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17032 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1381.486758][ T37] audit: type=1400 audit(2000000910.204:1541152): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17032 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 1381.486799][ T37] audit: type=1400 audit(2000000910.204:1541153): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17032 comm="syz-executor" name="3560" dev="tmpfs" ino=17890 [ 1381.486840][ T37] audit: type=1400 audit(2000000910.204:1541154): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=17032 comm="syz-executor" opid=17032 ocomm="syz-executor" [ 1381.487705][ T37] audit: type=1400 audit(2000000910.204:1541155): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17032 comm="syz-executor" name="3560" dev="tmpfs" ino=17890 [ 1381.487954][ T37] audit: type=1400 audit(2000000910.204:1541156): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17032 comm="syz-executor" name="3560" dev="tmpfs" ino=17890 [ 1381.488402][ T37] audit: type=1400 audit(2000000910.204:1541157): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=17032 comm="syz-executor" name="3560" dev="tmpfs" ino=17890 [ 1381.488950][ T37] audit: type=1400 audit(2000000910.204:1541158): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17032 comm="syz-executor" name="3560" dev="tmpfs" ino=17890 [ 1381.489178][ T37] audit: type=1400 audit(2000000910.204:1541159): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17032 comm="syz-executor" name="3560" dev="tmpfs" ino=17890 [ 1381.554282][ T37] audit: type=1400 audit(2000000910.204:1541160): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=17032 comm="syz-executor" name="3560" dev="tmpfs" ino=17890 [ 1383.603666][ T6024] udevd[6024]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1384.085551][ T9682] udevd[9682]: symlink '../../loop0' '/dev/disk/by-diskseq/77.tmp-b7:0' failed: Read-only file system [ 1384.806088][ T6046] usb 5-1: new high-speed USB device number 83 using dummy_hcd [ 1386.484329][ T37] kauditd_printk_skb: 3625 callbacks suppressed [ 1386.484349][ T37] audit: type=1400 audit(2000000915.453:1541861): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1387.105735][ T37] audit: type=1400 audit(2000000916.094:1541862): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=6024 ocomm="udevd" [ 1387.105786][ T37] audit: type=1400 audit(2000000916.094:1541863): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=9682 ocomm="udevd" [ 1387.105824][ T37] audit: type=1400 audit(2000000916.094:1541864): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=6735 ocomm="udevd" [ 1387.105864][ T37] audit: type=1400 audit(2000000916.094:1541865): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=8447 ocomm="udevd" [ 1387.105903][ T37] audit: type=1400 audit(2000000916.094:1541866): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=9659 ocomm="udevd" [ 1387.105943][ T37] audit: type=1400 audit(2000000916.094:1541867): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=8667 ocomm="udevd" [ 1387.105983][ T37] audit: type=1400 audit(2000000916.094:1541868): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=6798 ocomm="udevd" [ 1387.106023][ T37] audit: type=1400 audit(2000000916.094:1541869): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=5354 ocomm="udevd" [ 1387.106062][ T37] audit: type=1400 audit(2000000916.094:1541870): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=6641 ocomm="udevd" [ 1388.423327][ T6046] usb 5-1: Using ep0 maxpacket: 16 [ 1391.799585][ T37] kauditd_printk_skb: 597 callbacks suppressed [ 1391.799605][ T37] audit: type=1400 audit(2000000921.028:1542309): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1391.799651][ T37] audit: type=1400 audit(2000000921.028:1542310): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="etc" dev="sda1" ino=116 [ 1391.799692][ T37] audit: type=1400 audit(2000000921.028:1542311): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=259 [ 1391.807938][ T37] audit: type=1400 audit(2000000921.038:1542312): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1391.807987][ T37] audit: type=1400 audit(2000000921.038:1542313): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1391.808028][ T37] audit: type=1400 audit(2000000921.038:1542314): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="lib" dev="sda1" ino=264 [ 1391.808071][ T37] audit: type=1400 audit(2000000921.038:1542315): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1391.808112][ T37] audit: type=1400 audit(2000000921.038:1542316): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1391.808152][ T37] audit: type=1400 audit(2000000921.038:1542317): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1391.808192][ T37] audit: type=1400 audit(2000000921.038:1542318): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1394.041157][ T6046] usb 5-1: device descriptor read/all, error -71 [ 1396.832697][ T37] kauditd_printk_skb: 875 callbacks suppressed [ 1396.832714][ T37] audit: type=1400 audit(2000000926.319:1542693): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1396.852218][ T37] audit: type=1400 audit(2000000926.319:1542694): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1396.852273][ T37] audit: type=1400 audit(2000000926.319:1542695): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1397.877803][ T37] audit: type=1400 audit(2000000926.413:1542696): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1397.877866][ T37] audit: type=1400 audit(2000000926.581:1542697): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1397.877909][ T37] audit: type=1400 audit(2000000927.116:1542698): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1398.187683][ T37] audit: type=1400 audit(2000000927.589:1542699): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1398.187740][ T37] audit: type=1400 audit(2000000927.641:1542700): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1398.552301][ T37] audit: type=1400 audit(2000000928.072:1542701): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1398.926754][ T37] audit: type=1400 audit(2000000928.156:1542702): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1401.696398][ T37] kauditd_printk_skb: 39 callbacks suppressed [ 1401.696416][ T37] audit: type=1400 audit(2000000931.421:1542742): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1401.696463][ T37] audit: type=1400 audit(2000000931.421:1542743): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1401.696503][ T37] audit: type=1400 audit(2000000931.421:1542744): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1403.376464][ T37] audit: type=1400 audit(2000000933.142:1542745): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=17075 comm="syz-executor" opid=17075 ocomm="syz-executor" [ 1403.376519][ T37] audit: type=1400 audit(2000000933.142:1542746): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17075 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1403.376561][ T37] audit: type=1400 audit(2000000933.142:1542747): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17075 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1403.376604][ T37] audit: type=1400 audit(2000000933.142:1542748): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17075 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1403.376646][ T37] audit: type=1400 audit(2000000933.142:1542749): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17075 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 1403.376695][ T37] audit: type=1400 audit(2000000933.142:1542750): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17075 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1403.376736][ T37] audit: type=1400 audit(2000000933.142:1542751): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17075 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1406.633685][ T37] kauditd_printk_skb: 64 callbacks suppressed [ 1406.633706][ T37] audit: type=1400 audit(2000000936.575:1542816): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1406.727719][ T37] audit: type=1400 audit(2000000936.712:1542817): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17075 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1406.727933][ T37] audit: type=1400 audit(2000000936.712:1542818): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17075 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1406.728112][ T37] audit: type=1400 audit(2000000936.712:1542819): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17075 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1406.728308][ T37] audit: type=1400 audit(2000000936.712:1542820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17075 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1406.728502][ T37] audit: type=1400 audit(2000000936.712:1542821): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17075 comm="syz-executor" name="kcov" dev="debugfs" ino=1089 [ 1406.728828][ T37] audit: type=1400 audit(2000000936.712:1542822): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17075 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1406.729210][ T37] audit: type=1400 audit(2000000936.712:1542823): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17075 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1407.129117][ T37] audit: type=1400 audit(2000000937.090:1542824): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1407.620840][ T37] audit: type=1400 audit(2000000937.625:1542825): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1411.598792][ C0] audit_log_start: 454 callbacks suppressed [ 1411.598815][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1411.598842][ C0] audit: audit_lost=194348 audit_rate_limit=0 audit_backlog_limit=64 [ 1411.598858][ C0] audit: backlog limit exceeded [ 1411.688209][ T37] audit: type=1400 audit(2000000940.911:1543019): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1411.688263][ T37] audit: type=1400 audit(2000000940.911:1543020): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sysfs" ino=1 [ 1411.688305][ T37] audit: type=1400 audit(2000000940.911:1543021): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1411.688347][ T37] audit: type=1400 audit(2000000940.911:1543022): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1411.688390][ T37] audit: type=1400 audit(2000000940.911:1543023): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="block" dev="sysfs" ino=12922 [ 1411.688430][ T37] audit: type=1400 audit(2000000940.911:1543024): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="loop5" dev="sysfs" ino=15322 [ 1411.688472][ T37] audit: type=1400 audit(2000000940.911:1543025): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1414.558160][T17083] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 1414.562377][T17083] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 1414.564049][T17083] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 1414.565228][T17083] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 1414.566806][T17083] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 1417.791491][ T37] kauditd_printk_skb: 298 callbacks suppressed [ 1417.791512][ T37] audit: type=1400 audit(2000000948.144:1543249): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1419.458013][ T4664] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 1419.544441][ T4664] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 1419.544598][ T37] audit: type=1400 audit(2000000950.107:1543250): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1419.704341][ T4664] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 1420.836846][ T4664] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 1420.843558][ T4664] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 1420.900270][ T37] audit: type=1400 audit(2000000951.514:1543251): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=17079 comm="syz-executor" path="socket:[131376]" dev="sockfs" ino=131376 [ 1420.969034][ T37] audit: type=1400 audit(2000000951.650:1543252): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1422.731306][ T37] audit: type=1400 audit(2000000953.508:1543253): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1422.737467][ T37] audit: type=1400 audit(2000000953.508:1543254): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1422.737512][ T37] audit: type=1400 audit(2000000953.508:1543255): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1422.737546][ T37] audit: type=1400 audit(2000000953.508:1543256): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5204 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1422.737588][ T37] audit: type=1400 audit(2000000953.508:1543257): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=15421 [ 1422.737627][ T37] audit: type=1400 audit(2000000953.508:1543258): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" name="queue" dev="tmpfs" ino=15421 [ 1422.737663][ T37] audit: type=1400 audit(2000000953.508:1543259): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1422.737691][ T37] audit: type=1400 audit(2000000953.508:1543260): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="etc" dev="sda1" ino=116 [ 1422.737719][ T37] audit: type=1400 audit(2000000953.508:1543261): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=259 [ 1422.737746][ T37] audit: type=1400 audit(2000000953.508:1543262): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1423.798147][T17086] udevd[17086]: symlink '../../loop5' '/dev/disk/by-diskseq/75.tmp-b7:5' failed: Read-only file system [ 1427.769708][ T37] kauditd_printk_skb: 343 callbacks suppressed [ 1427.769726][ T37] audit: type=1400 audit(2000000957.876:1543465): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1427.769763][ T37] audit: type=1400 audit(2000000958.138:1543466): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1427.769795][ T37] audit: type=1400 audit(2000000958.642:1543467): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1428.163975][ T37] audit: type=1400 audit(2000000959.177:1543468): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1428.316347][ T37] audit: type=1400 audit(2000000959.366:1543469): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17087 comm="kworker/u8:19" name="/" dev="sda1" ino=2 [ 1428.748632][ T37] audit: type=1400 audit(2000000959.692:1543470): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1428.786386][ T37] audit: type=1400 audit(2000000959.860:1543471): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17088 comm="kworker/u8:21" name="/" dev="sda1" ino=2 [ 1429.311129][ T37] audit: type=1400 audit(2000000960.217:1543472): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1429.621984][ T37] audit: type=1400 audit(2000000960.742:1543473): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1429.785235][T17089] Bluetooth: hci0: command 0x0406 tx timeout [ 1430.713711][T17083] Bluetooth: hci5: command tx timeout [ 1430.714706][ T37] audit: type=1400 audit(2000000961.193:1543474): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1432.731210][T17083] Bluetooth: hci5: command tx timeout [ 1432.733734][ T37] kauditd_printk_skb: 186 callbacks suppressed [ 1432.733749][ T37] audit: type=1400 audit(2000000963.901:1543661): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1432.742766][ T37] audit: type=1400 audit(2000000964.017:1543662): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17086 comm="udevd" name="/" dev="sysfs" ino=1 [ 1432.742960][ T37] audit: type=1400 audit(2000000964.017:1543663): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17086 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1432.743148][ T37] audit: type=1400 audit(2000000964.017:1543664): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17086 comm="udevd" name="virtual" dev="sysfs" ino=1375 [ 1432.743343][ T37] audit: type=1400 audit(2000000964.017:1543665): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17086 comm="udevd" name="bluetooth" dev="sysfs" ino=86677 [ 1432.743542][ T37] audit: type=1400 audit(2000000964.017:1543666): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17086 comm="udevd" name="hci5" dev="sysfs" ino=391630 [ 1432.782857][ T37] audit: type=1400 audit(2000000964.059:1543667): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17086 comm="udevd" name="hci5:201" dev="sysfs" ino=391671 [ 1432.782909][ T37] audit: type=1400 audit(2000000964.059:1543668): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=17086 comm="udevd" name="uevent" dev="sysfs" ino=391672 [ 1432.782949][ T37] audit: type=1400 audit(2000000964.059:1543669): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17086 comm="udevd" path="/sys/devices/virtual/bluetooth/hci5/hci5:201/uevent" dev="sysfs" ino=391672 [ 1432.782992][ T37] audit: type=1400 audit(2000000964.059:1543670): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=17086 comm="udevd" path="/sys/devices/virtual/bluetooth/hci5/hci5:201/uevent" dev="sysfs" ino=391672 [ 1434.702173][T17083] Bluetooth: hci5: command tx timeout [ 1436.809868][T17083] Bluetooth: hci5: command tx timeout [ 1437.617647][ T37] kauditd_printk_skb: 87 callbacks suppressed [ 1437.617669][ T37] audit: type=1400 audit(2000000968.626:1543758): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1437.683995][ T37] audit: type=1400 audit(2000000969.203:1543759): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1437.684178][ T37] audit: type=1400 audit(2000000969.203:1543760): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17094 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1437.684294][ T37] audit: type=1400 audit(2000000969.203:1543761): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17094 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1437.684425][ T37] audit: type=1400 audit(2000000969.203:1543762): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17094 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1437.684543][ T37] audit: type=1400 audit(2000000969.203:1543763): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17094 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1437.684690][ T37] audit: type=1400 audit(2000000969.203:1543764): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17094 comm="syz-executor" name="kcov" dev="debugfs" ino=1089 [ 1437.684895][ T37] audit: type=1400 audit(2000000969.203:1543765): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17094 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1437.685136][ T37] audit: type=1400 audit(2000000969.203:1543766): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17094 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1438.422010][ T37] audit: type=1400 audit(2000000969.665:1543767): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1440.813525][ C0] IPVS: sh: UDP 0.0.0.0:0 - no destination available [ 1442.217038][T14605] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 1442.221402][T14605] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 1442.223042][T14605] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 1442.224993][T14605] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 1442.225761][T14605] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 1442.679173][ T37] kauditd_printk_skb: 63 callbacks suppressed [ 1442.679192][ T37] audit: type=1400 audit(2000000974.431:1543831): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1442.679240][ T37] audit: type=1400 audit(2000000974.431:1543832): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1443.256759][ T37] audit: type=1400 audit(2000000974.924:1543833): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1443.344479][ T1325] ieee802154 phy1 wpan1: encryption failed: -22 [ 1443.810741][ T37] audit: type=1400 audit(2000000975.460:1543834): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1444.148813][ T37] audit: type=1400 audit(2000000975.974:1543835): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1444.646022][ T37] audit: type=1400 audit(2000000976.499:1543836): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1445.190930][ T37] audit: type=1400 audit(2000000977.055:1543837): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1446.318297][ T37] audit: type=1400 audit(2000000978.095:1543838): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1446.544578][ T37] audit: type=1400 audit(2000000978.483:1543839): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17079 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1446.544631][ T37] audit: type=1400 audit(2000000978.494:1543840): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17079 comm="syz-executor" name="/" dev="proc" ino=1 [ 1447.928003][ T37] kauditd_printk_skb: 47 callbacks suppressed [ 1447.928022][ T37] audit: type=1400 audit(2000000979.953:1543888): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=17099 comm="syz-executor" opid=17099 ocomm="syz-executor" [ 1447.929591][ T37] audit: type=1400 audit(2000000979.953:1543889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1447.929812][ T37] audit: type=1400 audit(2000000979.953:1543890): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1447.930045][ T37] audit: type=1400 audit(2000000979.953:1543891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1447.930322][ T37] audit: type=1400 audit(2000000979.953:1543892): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17099 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 1447.933613][ T37] audit: type=1400 audit(2000000979.953:1543893): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1447.933889][ T37] audit: type=1400 audit(2000000979.953:1543894): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1447.934506][ T37] audit: type=1400 audit(2000000979.953:1543895): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=17099 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1447.942548][ T37] audit: type=1400 audit(2000000979.963:1543896): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5822 comm="syz-executor" opid=14542 ocomm="syz-executor" [ 1448.097413][ T37] audit: type=1400 audit(2000000979.995:1543897): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1451.961432][T17089] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 1451.961893][T17089] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 1451.962283][T17089] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 1451.974905][T17089] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 1451.976548][T17089] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 1452.732319][ T37] kauditd_printk_skb: 60 callbacks suppressed [ 1452.732340][ T37] audit: type=1400 audit(2000000984.908:1543958): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1452.756376][ T37] audit: type=1400 audit(2000000985.023:1543959): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1452.756619][ T37] audit: type=1400 audit(2000000985.023:1543960): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1452.756842][ T37] audit: type=1400 audit(2000000985.023:1543961): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1452.757066][ T37] audit: type=1400 audit(2000000985.023:1543962): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1452.757278][ T37] audit: type=1400 audit(2000000985.023:1543963): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17099 comm="syz-executor" name="kcov" dev="debugfs" ino=1089 [ 1452.764969][ T37] audit: type=1400 audit(2000000985.034:1543964): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17099 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1452.765394][ T37] audit: type=1400 audit(2000000985.034:1543965): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17099 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1452.779180][ T37] audit: type=1400 audit(2000000985.044:1543966): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1452.779286][ T37] audit: type=1400 audit(2000000985.044:1543967): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17099 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1455.168951][T14605] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 1455.203812][T14605] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 1455.207260][T14605] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 1455.209201][T14605] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 1455.209977][T14605] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 1457.701102][ T37] kauditd_printk_skb: 107 callbacks suppressed [ 1457.701121][ T37] audit: type=1400 audit(2000000990.220:1544075): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1458.747005][ T37] audit: type=1400 audit(2000000990.703:1544076): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1458.747057][ T37] audit: type=1400 audit(2000000991.217:1544077): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1459.299390][ T37] audit: type=1400 audit(2000000991.753:1544078): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1459.309092][ T37] audit: type=1400 audit(2000000991.910:1544079): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1459.309341][ T37] audit: type=1400 audit(2000000991.910:1544080): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1459.309561][ T37] audit: type=1400 audit(2000000991.910:1544081): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1459.309767][ T37] audit: type=1400 audit(2000000991.910:1544082): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" name="queue" dev="tmpfs" ino=15425 [ 1459.310111][ T37] audit: type=1400 audit(2000000991.910:1544083): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=15425 [ 1459.310372][ T37] audit: type=1400 audit(2000000991.910:1544084): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" name="queue" dev="tmpfs" ino=15425 [ 1460.211468][T14605] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 1460.211923][T14605] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 1460.212324][T14605] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 1460.214601][T14605] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 1460.215304][T14605] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 1462.552630][ T37] kauditd_printk_skb: 129 callbacks suppressed [ 1462.552648][ T37] audit: type=1400 audit(2000000995.311:1544214): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=17104 ocomm="udevd" [ 1462.552928][ T37] audit: type=1400 audit(2000000995.311:1544215): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=17105 ocomm="udevd" [ 1462.555762][ T37] audit: type=1400 audit(2000000995.311:1544216): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1462.555983][ T37] audit: type=1400 audit(2000000995.311:1544217): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="etc" dev="sda1" ino=116 [ 1462.556194][ T37] audit: type=1400 audit(2000000995.311:1544218): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=259 [ 1462.570537][ T37] audit: type=1400 audit(2000000995.332:1544219): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1462.596131][ T37] audit: type=1400 audit(2000000995.332:1544220): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1462.596181][ T37] audit: type=1400 audit(2000000995.343:1544221): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="lib" dev="sda1" ino=264 [ 1462.596221][ T37] audit: type=1400 audit(2000000995.343:1544222): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1462.596260][ T37] audit: type=1400 audit(2000000995.343:1544223): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1468.287821][ T37] kauditd_printk_skb: 29 callbacks suppressed [ 1468.287841][ T37] audit: type=1400 audit(2000001000.980:1544253): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1468.287888][ T37] audit: type=1400 audit(2000001001.211:1544254): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=10647 comm="kworker/u8:12" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1468.287932][ T37] audit: type=1400 audit(2000001001.211:1544255): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=10647 comm="kworker/u8:12" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1468.287975][ T37] audit: type=1400 audit(2000001001.211:1544256): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=10647 comm="kworker/u8:12" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1468.288016][ T37] audit: type=1400 audit(2000001001.211:1544257): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=10647 comm="kworker/u8:12" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1468.301096][ T37] audit: type=1400 audit(2000001001.327:1544258): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="/" dev="sda1" ino=2 [ 1468.301146][ T37] audit: type=1400 audit(2000001001.327:1544259): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="etc" dev="sda1" ino=116 [ 1468.301187][ T37] audit: type=1400 audit(2000001001.327:1544260): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="cron" dev="sda1" ino=120 [ 1468.301228][ T37] audit: type=1400 audit(2000001001.337:1544261): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5578 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 1468.317943][ T37] audit: type=1400 audit(2000001001.358:1544262): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5578 comm="crond" name="crontabs" dev="sda1" ino=121 [ 1473.720546][T17083] Bluetooth: hci6: command tx timeout [ 1473.724438][T17089] Bluetooth: hci7: command tx timeout [ 1473.727962][ T37] kauditd_printk_skb: 114 callbacks suppressed [ 1473.727978][ T37] audit: type=1400 audit(2000001007.038:1544377): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17109 comm="kworker/u8:8" name="/" dev="sda1" ino=2 [ 1473.728591][ T37] audit: type=1400 audit(2000001007.038:1544378): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17110 comm="kworker/u8:8" name="/" dev="sda1" ino=2 [ 1475.661273][T17083] Bluetooth: hci6: command tx timeout [ 1475.661294][T17089] Bluetooth: hci7: command tx timeout [ 1476.428933][ T37] audit: type=1400 audit(2000001009.883:1544379): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1476.429049][ T37] audit: type=1400 audit(2000001009.883:1544380): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1476.429160][ T37] audit: type=1400 audit(2000001009.883:1544381): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1476.429276][ T37] audit: type=1400 audit(2000001009.883:1544382): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" name="queue" dev="tmpfs" ino=15426 [ 1476.429527][ T37] audit: type=1400 audit(2000001009.883:1544383): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=15426 [ 1476.429679][ T37] audit: type=1400 audit(2000001009.883:1544384): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" name="queue" dev="tmpfs" ino=15426 [ 1476.429935][ T37] audit: type=1400 audit(2000001009.883:1544385): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1476.430048][ T37] audit: type=1400 audit(2000001009.883:1544386): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="etc" dev="sda1" ino=116 [ 1477.677033][T17083] Bluetooth: hci6: command tx timeout [ 1478.297754][T17083] Bluetooth: hci7: command tx timeout [ 1478.734467][ T37] kauditd_printk_skb: 122 callbacks suppressed [ 1478.734489][ T37] audit: type=1400 audit(2000001012.234:1544509): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1479.234487][ T37] audit: type=1400 audit(2000001012.770:1544510): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1479.720226][ T37] audit: type=1400 audit(2000001013.274:1544511): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1479.720315][T17083] Bluetooth: hci6: command tx timeout [ 1480.315947][ T37] audit: type=1400 audit(2000001013.882:1544512): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1480.335531][T17083] Bluetooth: hci7: command tx timeout [ 1480.853650][ T37] audit: type=1400 audit(2000001014.344:1544513): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1481.206849][ T37] audit: type=1400 audit(2000001014.859:1544514): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1481.283760][ T37] audit: type=1400 audit(2000001014.964:1544515): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=17112 ocomm="udevd" [ 1481.283810][ T37] audit: type=1400 audit(2000001014.964:1544516): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=17108 ocomm="udevd" [ 1481.283851][ T37] audit: type=1400 audit(2000001014.964:1544517): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" opid=17111 ocomm="udevd" [ 1481.283891][ T37] audit: type=1400 audit(2000001014.964:1544518): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1483.694807][ T37] kauditd_printk_skb: 82 callbacks suppressed [ 1483.694827][ T37] audit: type=1400 audit(2000001016.507:1544601): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17113 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1483.694881][ T37] audit: type=1400 audit(2000001016.538:1544602): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1483.694925][ T37] audit: type=1400 audit(2000001016.538:1544603): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1483.694972][ T37] audit: type=1400 audit(2000001016.969:1544604): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1483.703487][ T37] audit: type=1400 audit(2000001017.504:1544605): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17113 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1483.703718][ T37] audit: type=1400 audit(2000001017.515:1544606): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17113 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1483.704048][ T37] audit: type=1400 audit(2000001017.515:1544607): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17113 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 1484.775912][ T37] audit: type=1400 audit(2000001017.557:1544608): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17113 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1484.775966][ T37] audit: type=1400 audit(2000001017.557:1544609): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1484.776007][ T37] audit: type=1400 audit(2000001018.040:1544610): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1488.758326][ T37] kauditd_printk_skb: 124 callbacks suppressed [ 1488.758348][ T37] audit: type=1400 audit(2000001022.743:1544735): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1488.910920][ T37] audit: type=1400 audit(2000001022.974:1544736): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17113 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1488.911167][ T37] audit: type=1400 audit(2000001022.974:1544737): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17113 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1488.911411][ T37] audit: type=1400 audit(2000001022.974:1544738): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17113 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1488.911643][ T37] audit: type=1400 audit(2000001022.974:1544739): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17113 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1488.911858][ T37] audit: type=1400 audit(2000001022.974:1544740): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17113 comm="syz-executor" name="kcov" dev="debugfs" ino=1089 [ 1488.912221][ T37] audit: type=1400 audit(2000001022.974:1544741): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17113 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1488.912606][ T37] audit: type=1400 audit(2000001022.974:1544742): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17113 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1489.520200][ T37] audit: type=1400 audit(2000001023.278:1544743): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1489.912391][ T37] audit: type=1400 audit(2000001023.824:1544744): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1493.556252][ T37] kauditd_printk_skb: 63 callbacks suppressed [ 1493.556272][ T37] audit: type=1400 audit(2000001027.834:1544808): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1493.556322][ T37] audit: type=1400 audit(2000001027.855:1544809): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1493.556363][ T37] audit: type=1400 audit(2000001027.855:1544810): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1493.712336][ T37] audit: type=1400 audit(2000001028.013:1544811): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1494.523520][ T37] audit: type=1400 audit(2000001028.527:1544812): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1494.549563][ T37] audit: type=1400 audit(2000001028.895:1544813): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=17113 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1494.567941][ T37] audit: type=1400 audit(2000001028.916:1544814): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17124 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1494.568179][ T37] audit: type=1400 audit(2000001028.916:1544815): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17124 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 1494.568386][ T37] audit: type=1400 audit(2000001028.916:1544816): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17124 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 [ 1494.568728][ T37] audit: type=1400 audit(2000001028.916:1544817): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17124 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 [ 1496.567638][T14605] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 1497.506811][T14605] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 1497.514669][T14605] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 1497.515825][T14605] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 1497.519329][T14605] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 1498.402066][ T37] kauditd_printk_skb: 38 callbacks suppressed [ 1498.402086][ T37] audit: type=1400 audit(2000001032.926:1544856): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1498.402129][ T37] audit: type=1400 audit(2000001032.926:1544857): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1498.402169][ T37] audit: type=1400 audit(2000001032.926:1544858): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1498.739863][ T37] audit: type=1400 audit(2000001033.251:1544859): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1499.233681][ T37] audit: type=1400 audit(2000001033.776:1544860): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1499.735295][ T37] audit: type=1400 audit(2000001034.312:1544861): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1500.274329][ T37] audit: type=1400 audit(2000001034.836:1544862): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1502.263909][ T37] audit: type=1400 audit(2000001036.810:1544863): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1502.263967][ T37] audit: type=1400 audit(2000001036.810:1544864): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1502.264010][ T37] audit: type=1400 audit(2000001036.810:1544865): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1506.487502][ T37] kauditd_printk_skb: 2 callbacks suppressed [ 1506.487520][ T37] audit: type=1400 audit(2000001041.429:1544868): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1506.487804][ T37] audit: type=1400 audit(2000001041.429:1544869): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1507.718220][ T37] audit: type=1400 audit(2000001042.720:1544870): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17131 comm="kworker/u8:26" name="/" dev="sda1" ino=2 [ 1510.857777][ T1325] ieee802154 phy1 wpan1: encryption failed: -22 [ 1511.543886][ T4664] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 1511.569372][ T4664] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 1511.581959][ T4664] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 1511.703709][ T37] audit: type=1400 audit(2000001046.374:1544871): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=17124 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1511.703758][ T37] audit: type=1400 audit(2000001046.374:1544872): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=17124 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1511.703790][ T37] audit: type=1400 audit(2000001046.374:1544873): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=17124 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1511.703822][ T37] audit: type=1400 audit(2000001046.374:1544874): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=17124 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1512.296766][ T37] audit: type=1400 audit(2000001046.941:1544875): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1512.296822][ T37] audit: type=1400 audit(2000001047.445:1544876): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1513.580592][ T37] audit: type=1400 audit(2000001047.980:1544877): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1513.580648][ T37] audit: type=1400 audit(2000001048.494:1544878): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1513.643246][ T4664] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 1513.652826][ T4664] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 1513.653973][ T37] audit: type=1400 audit(2000001048.956:1544879): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=17124 comm="syz-executor" path="socket:[131429]" dev="sockfs" ino=131429 [ 1513.656075][ T37] audit: type=1400 audit(2000001048.956:1544880): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=17132 comm="syz-executor" opid=17132 ocomm="syz-executor" [ 1516.652838][ T37] kauditd_printk_skb: 44 callbacks suppressed [ 1516.652858][ T37] audit: type=1400 audit(2000001052.043:1544925): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17132 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1516.652906][ T37] audit: type=1400 audit(2000001052.043:1544926): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17132 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1516.652948][ T37] audit: type=1400 audit(2000001052.043:1544927): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17132 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1516.652985][ T37] audit: type=1400 audit(2000001052.053:1544928): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17132 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1516.653023][ T37] audit: type=1400 audit(2000001052.053:1544929): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17132 comm="syz-executor" name="kcov" dev="debugfs" ino=1089 [ 1516.653062][ T37] audit: type=1400 audit(2000001052.053:1544930): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17132 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1516.653207][ T37] audit: type=1400 audit(2000001052.053:1544931): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17132 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1516.653251][ T37] audit: type=1400 audit(2000001052.074:1544932): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17132 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1516.653289][ T37] audit: type=1400 audit(2000001052.074:1544933): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17132 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1516.653326][ T37] audit: type=1400 audit(2000001052.074:1544934): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17132 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1522.416262][ T37] kauditd_printk_skb: 87 callbacks suppressed [ 1522.416283][ T37] audit: type=1400 audit(2000001054.793:1545022): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17136 comm="udevd" name="/" dev="sda1" ino=2 [ 1522.416333][ T37] audit: type=1400 audit(2000001054.793:1545023): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1522.416374][ T37] audit: type=1400 audit(2000001054.793:1545024): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1522.416420][ T37] audit: type=1400 audit(2000001054.804:1545025): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17132 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1522.416460][ T37] audit: type=1400 audit(2000001054.835:1545026): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17133 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1522.416501][ T37] audit: type=1400 audit(2000001054.835:1545027): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5822 comm="syz-executor" opid=17075 ocomm="syz-executor" [ 1522.416542][ T37] audit: type=1400 audit(2000001057.155:1545028): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1522.416585][ T37] audit: type=1400 audit(2000001057.155:1545029): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1522.416629][ T37] audit: type=1400 audit(2000001057.155:1545030): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1522.416672][ T37] audit: type=1400 audit(2000001057.155:1545031): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1527.296260][ T37] kauditd_printk_skb: 40 callbacks suppressed [ 1527.296282][ T37] audit: type=1400 audit(2000001063.202:1545072): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1527.638636][ T37] audit: type=1400 audit(2000001063.632:1545073): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17133 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1527.679361][ T37] audit: type=1400 audit(2000001063.653:1545074): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1527.679416][ T37] audit: type=1400 audit(2000001063.674:1545075): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=17136 comm="udevd" name="oom_score_adj" dev="proc" ino=131444 [ 1527.683235][ T37] audit: type=1400 audit(2000001063.674:1545076): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17136 comm="udevd" path="/proc/17136/oom_score_adj" dev="proc" ino=131444 [ 1527.683284][ T37] audit: type=1400 audit(2000001063.674:1545077): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=17136 comm="udevd" name="oom_score_adj" dev="proc" ino=131444 [ 1527.683328][ T37] audit: type=1400 audit(2000001063.674:1545078): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=17136 comm="udevd" path="/proc/17136/oom_score_adj" dev="proc" ino=131444 [ 1527.683374][ T37] audit: type=1400 audit(2000001063.674:1545079): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17136 comm="udevd" name="/" dev="sda1" ino=2 [ 1527.683414][ T37] audit: type=1400 audit(2000001063.674:1545080): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17136 comm="udevd" name="/" dev="sysfs" ino=1 [ 1527.683453][ T37] audit: type=1400 audit(2000001063.674:1545081): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17136 comm="udevd" name="devices" dev="sysfs" ino=7 [ 1532.249966][ T37] kauditd_printk_skb: 147 callbacks suppressed [ 1532.478631][ T37] audit: type=1400 audit(2000001068.462:1545229): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1532.720935][ T37] audit: type=1400 audit(2000001068.965:1545230): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17133 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1532.721191][ T37] audit: type=1400 audit(2000001068.965:1545231): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17133 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1532.721415][ T37] audit: type=1400 audit(2000001068.965:1545232): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17133 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1532.721657][ T37] audit: type=1400 audit(2000001068.965:1545233): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17133 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1532.721885][ T37] audit: type=1400 audit(2000001068.965:1545234): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17133 comm="syz-executor" name="kcov" dev="debugfs" ino=1089 [ 1532.722241][ T37] audit: type=1400 audit(2000001068.965:1545235): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17133 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1532.722638][ T37] audit: type=1400 audit(2000001068.965:1545236): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17133 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1532.982829][ T37] audit: type=1400 audit(2000001069.028:1545237): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1533.305105][ T37] audit: type=1400 audit(2000001069.543:1545238): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1537.161541][ T37] kauditd_printk_skb: 50 callbacks suppressed [ 1537.161558][ T37] audit: type=1400 audit(2000001073.627:1545289): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17135 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1537.162009][ T37] audit: type=1400 audit(2000001073.627:1545290): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17135 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1537.162055][ T37] audit: type=1400 audit(2000001073.627:1545291): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17135 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1537.173112][ T37] audit: type=1400 audit(2000001073.648:1545292): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17133 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1537.173341][ T37] audit: type=1400 audit(2000001073.648:1545293): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17133 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1537.173551][ T37] audit: type=1400 audit(2000001073.648:1545294): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17133 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1537.173775][ T37] audit: type=1400 audit(2000001073.648:1545295): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17133 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1537.173973][ T37] audit: type=1400 audit(2000001073.648:1545296): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17133 comm="syz-executor" name="kcov" dev="debugfs" ino=1089 [ 1537.174301][ T37] audit: type=1400 audit(2000001073.648:1545297): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17133 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1537.174695][ T37] audit: type=1400 audit(2000001073.648:1545298): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17133 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1540.217874][T14605] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1540.222481][T14605] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1540.238596][T14605] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1540.239697][T14605] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1540.241249][T14605] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1540.260548][T14605] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 1540.265243][T14605] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 1541.247457][T14605] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 1541.264252][T14605] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 1541.265029][T14605] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 [ 1542.416596][ T37] kauditd_printk_skb: 56 callbacks suppressed [ 1542.416615][ T37] audit: type=1400 audit(2000001079.107:1545355): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1542.588113][ T37] audit: type=1400 audit(2000001079.327:1545356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17135 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1542.588370][ T37] audit: type=1400 audit(2000001079.327:1545357): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17135 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1542.588596][ T37] audit: type=1400 audit(2000001079.327:1545358): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17135 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1542.588829][ T37] audit: type=1400 audit(2000001079.327:1545359): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17135 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1542.589046][ T37] audit: type=1400 audit(2000001079.327:1545360): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17135 comm="syz-executor" name="kcov" dev="debugfs" ino=1089 [ 1542.607061][ T37] audit: type=1400 audit(2000001079.348:1545361): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17135 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1542.617209][ T37] audit: type=1400 audit(2000001079.358:1545362): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17135 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1542.629553][ T37] audit: type=1400 audit(2000001079.369:1545363): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17137 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1542.629605][ T37] audit: type=1400 audit(2000001079.369:1545364): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17137 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1545.520417][T14605] Bluetooth: hci5: command 0x0406 tx timeout [ 1547.514139][ T37] kauditd_printk_skb: 34 callbacks suppressed [ 1547.514161][ T37] audit: type=1400 audit(2000001084.492:1545399): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=17137 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1547.514208][ T37] audit: type=1400 audit(2000001084.502:1545400): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=17135 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1089 [ 1547.514788][ T37] audit: type=1400 audit(2000001084.502:1545401): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17124 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1547.514925][ T37] audit: type=1400 audit(2000001084.502:1545402): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17124 comm="syz-executor" name="/" dev="proc" ino=1 [ 1547.515054][ T37] audit: type=1400 audit(2000001084.502:1545403): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17124 comm="syz-executor" name="/" dev="proc" ino=1 [ 1547.515314][ T37] audit: type=1400 audit(2000001084.502:1545404): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17124 comm="syz-executor" name="17124" dev="proc" ino=130399 [ 1547.515542][ T37] audit: type=1400 audit(2000001084.502:1545405): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17124 comm="syz-executor" name="ns" dev="proc" ino=130400 [ 1547.515781][ T37] audit: type=1400 audit(2000001084.502:1545406): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=17124 comm="syz-executor" dev="nsfs" ino=4026531833 [ 1547.516024][ T37] audit: type=1400 audit(2000001084.502:1545407): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17124 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 [ 1547.518754][ T37] audit: type=1400 audit(2000001084.513:1545408): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17124 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1548.541245][T17152] Bluetooth: hci10: unexpected cc 0x0c03 length: 249 > 1 [ 1548.545302][T17156] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1 [ 1548.551999][T17156] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9 [ 1548.790317][T17152] Bluetooth: hci10: unexpected cc 0x1003 length: 249 > 9 [ 1548.793911][T17157] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9 [ 1548.811467][T17157] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4 [ 1548.812373][T17157] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2 [ 1549.790317][T17152] Bluetooth: hci10: unexpected cc 0x1001 length: 249 > 9 [ 1549.801223][T17152] Bluetooth: hci10: unexpected cc 0x0c23 length: 249 > 4 [ 1549.803362][T17152] Bluetooth: hci10: unexpected cc 0x0c38 length: 249 > 2 [ 1552.149261][T14605] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1552.639319][T17152] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1553.595750][ T37] kauditd_printk_skb: 55 callbacks suppressed [ 1553.595770][ T37] audit: type=1400 audit(2000001090.465:1545464): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.1.145 dest=56258 netif=eth0 [ 1553.622736][T17152] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1553.639952][ T37] audit: type=1400 audit(2000001090.927:1545465): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1553.640064][ T37] audit: type=1400 audit(2000001090.927:1545466): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1553.640173][ T37] audit: type=1400 audit(2000001090.927:1545467): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1553.640286][ T37] audit: type=1400 audit(2000001090.927:1545468): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" name="queue" dev="tmpfs" ino=15427 [ 1553.640547][ T37] audit: type=1400 audit(2000001090.927:1545469): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5204 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=15427 [ 1553.640711][ T37] audit: type=1400 audit(2000001090.927:1545470): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5204 comm="udevd" name="queue" dev="tmpfs" ino=15427 [ 1553.640942][ T37] audit: type=1400 audit(2000001090.927:1545471): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="/" dev="sda1" ino=2 [ 1553.641049][ T37] audit: type=1400 audit(2000001090.927:1545472): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="etc" dev="sda1" ino=116 [ 1553.641201][ T37] audit: type=1400 audit(2000001090.938:1545473): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5204 comm="udevd" name="udev" dev="sda1" ino=259 [ 1553.644815][T17152] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1553.645651][T17152] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1556.965875][ T38] INFO: task syz.6.17103:17002 blocked for more than 147 seconds. [ 1556.965898][ T38] Not tainted syzkaller #0 [ 1556.965910][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1556.965919][ T38] task:syz.6.17103 state:D stack:22728 pid:17002 tgid:17001 ppid:14596 task_flags:0x400140 flags:0x00004006 [ 1556.965970][ T38] Call Trace: [ 1556.965977][ T38] [ 1556.965990][ T38] __schedule+0x16f3/0x4c20 [ 1556.966046][ T38] ? __lock_acquire+0xab9/0xd20 [ 1556.966072][ T38] ? __pfx___schedule+0x10/0x10 [ 1556.966113][ T38] ? schedule+0x91/0x360 [ 1556.966142][ T38] schedule+0x165/0x360 [ 1556.966169][ T38] schedule_timeout+0x9a/0x270 [ 1556.966195][ T38] ? __pfx_schedule_timeout+0x10/0x10 [ 1556.966232][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 1556.966267][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1556.966291][ T38] ? wait_for_completion+0x267/0x5d0 [ 1556.966319][ T38] wait_for_completion+0x2bf/0x5d0 [ 1556.966359][ T38] ? __pfx_wait_for_completion+0x10/0x10 [ 1556.966392][ T38] ? __init_swait_queue_head+0xa9/0x150 [ 1556.966419][ T38] rcu_barrier+0x463/0x570 [ 1556.966450][ T38] netdev_run_todo+0x327/0xea0 [ 1556.966478][ T38] ? __pfx_netdev_run_todo+0x10/0x10 [ 1556.966515][ T38] rtnl_newlink+0x177b/0x1c70 [ 1556.966555][ T38] ? __pfx_rtnl_newlink+0x10/0x10 [ 1556.966576][ T38] ? migrate_enable+0x29c/0x3c0 [ 1556.966600][ T38] ? reacquire_held_locks+0x127/0x1d0 [ 1556.966626][ T38] ? __pfx_migrate_enable+0x10/0x10 [ 1556.966648][ T38] ? __pfx_migrate_enable+0x10/0x10 [ 1556.966684][ T38] ? __local_bh_enable+0x23f/0x3d0 [ 1556.966705][ T38] ? reacquire_held_locks+0x127/0x1d0 [ 1556.966732][ T38] ? __pfx___local_bh_enable+0x10/0x10 [ 1556.966762][ T38] ? __local_bh_enable_ip+0x1b2/0x270 [ 1556.966784][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1556.966814][ T38] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 1556.966835][ T38] ? dev_hard_start_xmit+0x7f5/0x870 [ 1556.966854][ T38] ? __dev_queue_xmit+0x26f/0x3b70 [ 1556.966881][ T38] ? __dev_queue_xmit+0x26f/0x3b70 [ 1556.966901][ T38] ? __dev_queue_xmit+0x26f/0x3b70 [ 1556.966923][ T38] ? __dev_queue_xmit+0x1d3d/0x3b70 [ 1556.966949][ T38] ? __lock_acquire+0xab9/0xd20 [ 1556.966998][ T38] ? __pfx_rtnl_newlink+0x10/0x10 [ 1556.967022][ T38] rtnetlink_rcv_msg+0x7cf/0xb70 [ 1556.967050][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 1556.967073][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1556.967095][ T38] ? ref_tracker_free+0x61e/0x7c0 [ 1556.967122][ T38] ? __asan_memcpy+0x40/0x70 [ 1556.967141][ T38] ? __pfx_ref_tracker_free+0x10/0x10 [ 1556.967178][ T38] netlink_rcv_skb+0x205/0x470 [ 1556.967205][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1556.967230][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1556.967275][ T38] ? netlink_deliver_tap+0x2e/0x1b0 [ 1556.967307][ T38] netlink_unicast+0x843/0xa10 [ 1556.967339][ T38] ? __pfx_netlink_unicast+0x10/0x10 [ 1556.967371][ T38] ? netlink_sendmsg+0x642/0xb30 [ 1556.967393][ T38] ? skb_put+0x11b/0x210 [ 1556.967424][ T38] netlink_sendmsg+0x805/0xb30 [ 1556.967461][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1556.967493][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1556.967512][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1556.967538][ T38] __sock_sendmsg+0x21c/0x270 [ 1556.967566][ T38] ____sys_sendmsg+0x508/0x820 [ 1556.967591][ T38] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1556.967620][ T38] ? import_iovec+0x74/0xa0 [ 1556.967646][ T38] ___sys_sendmsg+0x21f/0x2a0 [ 1556.967668][ T38] ? __pfx____sys_sendmsg+0x10/0x10 [ 1556.967723][ T38] ? __fget_files+0x2a/0x420 [ 1556.967746][ T38] ? __fget_files+0x3a6/0x420 [ 1556.967780][ T38] __x64_sys_sendmsg+0x1a1/0x260 [ 1556.967803][ T38] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1556.967833][ T38] ? rcu_is_watching+0x15/0xb0 [ 1556.967864][ T38] ? do_syscall_64+0xbe/0x3b0 [ 1556.967887][ T38] do_syscall_64+0xfa/0x3b0 [ 1556.967904][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1556.967929][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1556.967948][ T38] ? clear_bhb_loop+0x60/0xb0 [ 1556.967971][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1556.967989][ T38] RIP: 0033:0x7f421cc5eec9 [ 1556.968006][ T38] RSP: 002b:00007f421aec6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1556.968026][ T38] RAX: ffffffffffffffda RBX: 00007f421ceb5fa0 RCX: 00007f421cc5eec9 [ 1556.968040][ T38] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 1556.968052][ T38] RBP: 00007f421cce1f91 R08: 0000000000000000 R09: 0000000000000000 [ 1556.968064][ T38] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1556.968076][ T38] R13: 00007f421ceb6038 R14: 00007f421ceb5fa0 R15: 00007ffdca1f5c18 [ 1556.968107][ T38] [ 1556.968152][ T38] [ 1556.968152][ T38] Showing all locks held in the system: [ 1556.968162][ T38] 4 locks held by kworker/0:1/10: [ 1556.968173][ T38] #0: ffff88805bcb4938 ((wq_completion)wg-crypt-wg1#6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.968225][ T38] #1: ffffc900000f7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.968289][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.968333][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.968379][ T38] 2 locks held by ksoftirqd/0/15: [ 1556.968390][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.968435][ T38] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.968482][ T38] 13 locks held by ktimers/0/16: [ 1556.968494][ T38] 2 locks held by rcuc/0/20: [ 1556.968504][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.968550][ T38] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.968598][ T38] 2 locks held by rcuc/1/28: [ 1556.968609][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.968654][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.968700][ T38] 11 locks held by ktimers/1/29: [ 1556.968711][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.968756][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.968803][ T38] #2: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 1556.968848][ T38] #3: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.968894][ T38] #4: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: process_backlog+0x27b/0x900 [ 1556.968941][ T38] #5: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: NF_HOOK+0x9a/0x3a0 [ 1556.968988][ T38] #6: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: ip_output+0x60/0x3c0 [ 1556.969031][ T38] #7: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: ip_finish_output2+0x452/0x11d0 [ 1556.969076][ T38] #8: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.969122][ T38] #9: ffffffff8d9a8de0 (rcu_read_lock_bh){....}-{1:3}, at: __dev_queue_xmit+0x26f/0x3b70 [ 1556.969165][ T38] #10: ffff888033771318 (dev->qdisc_tx_busylock ?: &qdisc_tx_busylock#7){+...}-{3:3}, at: __dev_queue_xmit+0xd58/0x3b70 [ 1556.969215][ T38] 2 locks held by ksoftirqd/1/30: [ 1556.969226][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.969277][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.969324][ T38] 4 locks held by kworker/1:0/31: [ 1556.969334][ T38] #0: ffff88805b6e5138 ((wq_completion)wg-kex-wg1#13){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.969385][ T38] #1: ffffc90000a5fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.969447][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.969492][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.969539][ T38] 1 lock held by khungtaskd/38: [ 1556.969549][ T38] #0: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 1556.969594][ T38] 2 locks held by kcompactd0/41: [ 1556.969603][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.969646][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.969692][ T38] 5 locks held by kworker/u8:2/43: [ 1556.969703][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.969748][ T38] #1: ffffc90000b47bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.969792][ T38] #2: ffff888029500898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1556.969839][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.969881][ T38] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.969927][ T38] 7 locks held by kworker/u8:4/67: [ 1556.969937][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.969981][ T38] #1: ffffc9000152fbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.970026][ T38] #2: ffff88803b79c300 (&devlink->lock_key#7){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 1556.970079][ T38] #3: ffff888058a9b120 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 1556.970128][ T38] #4: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 1556.970173][ T38] #5: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.970216][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.970270][ T38] 4 locks held by kworker/u8:6/992: [ 1556.970281][ T38] #0: ffff88814da00938 ((wq_completion)bat_events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.970326][ T38] #1: ffffc9000468fbc0 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.970373][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.970416][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.970464][ T38] 4 locks held by kworker/u8:7/1168: [ 1556.970476][ T38] #0: ffff88801f2a4938 ((wq_completion)wg-kex-wg2#16){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.970525][ T38] #1: ffffc90004d37bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.970567][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.970607][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.970653][ T38] 4 locks held by kworker/1:2/1232: [ 1556.970664][ T38] #0: ffff88805ce9e138 ((wq_completion)wg-kex-wg2#14){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.970716][ T38] #1: ffffc90004e27bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.970778][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.970824][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.970871][ T38] 2 locks held by aoe_tx0/1325: [ 1556.970883][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.970928][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.970985][ T38] 3 locks held by udevd/5204: [ 1556.970997][ T38] #0: ffff88803050a350 (sk_lock-AF_NETLINK){+.+.}-{0:0}, at: netlink_insert+0xd3/0x1370 [ 1556.971044][ T38] #1: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.971089][ T38] #2: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.971137][ T38] 2 locks held by getty/5592: [ 1556.971147][ T38] #0: ffff88823bf400a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1556.971199][ T38] #1: ffffc90003e832e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x444/0x1410 [ 1556.971252][ T38] 3 locks held by syz-executor/5822: [ 1556.971263][ T38] #0: ffff888030eaa1d0 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_recvmsg+0xd3/0x560 [ 1556.971310][ T38] #1: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.971357][ T38] #2: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.971406][ T38] 4 locks held by kworker/0:7/6046: [ 1556.971417][ T38] #0: ffff88805bef8138 ((wq_completion)wg-crypt-wg2#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.971469][ T38] #1: ffffc900057a7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.971529][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.971575][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.971622][ T38] 5 locks held by kworker/u8:11/6593: [ 1556.971633][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.971679][ T38] #1: ffffc90004977bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.971727][ T38] #2: ffff88806dc30898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1556.971775][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.971821][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.971868][ T38] 6 locks held by kworker/u8:12/10647: [ 1556.971880][ T38] #0: ffff88805eb7e138 ((wq_completion)wg-kex-wg1#12){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.971930][ T38] #1: ffffc90003a0fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.971978][ T38] #2: ffff88805ec9d5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 1556.972027][ T38] #3: ffff88805ad0a3c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 1556.972074][ T38] #4: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.972120][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.972168][ T38] 5 locks held by kworker/u8:1/23571: [ 1556.972179][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.972227][ T38] #1: ffffc9001d3e7bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.972280][ T38] #2: ffff88804e440898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1556.972328][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.972375][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.972421][ T38] 5 locks held by kworker/u8:5/23580: [ 1556.972433][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.972481][ T38] #1: ffffc9001dc47bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.972528][ T38] #2: ffff888095e50898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1556.972577][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.972622][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.972669][ T38] 2 locks held by ipvs-e:6:0/31356: [ 1556.972680][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.972726][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.972773][ T38] 4 locks held by kworker/1:1/4557: [ 1556.972785][ T38] #0: ffff88805bcb5538 ((wq_completion)wg-kex-wg1#11){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.972836][ T38] #1: ffffc900059d7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.972897][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.972942][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.972988][ T38] 4 locks held by kworker/0:0/4563: [ 1556.973000][ T38] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.973046][ T38] #1: ffffc9000cc07bc0 ((work_completion)(&(&tbl->gc_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.973094][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.973139][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.973186][ T38] 2 locks held by syz-executor/4662: [ 1556.973197][ T38] #0: ffff888058bece80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_unregister_dev+0x212/0x510 [ 1556.973249][ T38] #1: ffff888058bec0a8 (&hdev->lock){+.+.}-{4:4}, at: hci_dev_close_sync+0x66a/0x1330 [ 1556.973297][ T38] 4 locks held by kworker/u9:0/4664: [ 1556.973308][ T38] #0: ffff88803da81938 ((wq_completion)hci8#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.973358][ T38] #1: ffffc9000ad57bc0 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.973403][ T38] #2: ffff88803dafc0a8 (&hdev->lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x9b/0x8e0 [ 1556.973449][ T38] #3: ffffffff8ee3b318 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_remote_features_evt+0x516/0x8e0 [ 1556.973496][ T38] 4 locks held by kworker/R-wg-cr/5190: [ 1556.973507][ T38] #0: ffff88805c82b938 ((wq_completion)wg-crypt-wg2#6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.973557][ T38] #1: ffffc9000408fba0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.973618][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.973663][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.973710][ T38] 4 locks held by kworker/0:2/5854: [ 1556.973721][ T38] #0: ffff88805da59538 ((wq_completion)wg-crypt-wg2#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.973772][ T38] #1: ffffc9000cd2fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.973834][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.973879][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.973925][ T38] 2 locks held by ipvs-e:13:0/14316: [ 1556.973936][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.973982][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.974028][ T38] 4 locks held by kworker/R-wg-cr/15066: [ 1556.974039][ T38] #0: ffff88805c114938 ((wq_completion)wg-crypt-wg0#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.974089][ T38] #1: ffffc9001866fba0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.974150][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.974196][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.974246][ T38] 5 locks held by kworker/u8:3/15377: [ 1556.974257][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.974303][ T38] #1: ffffc90005b97bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.974353][ T38] #2: ffff88803d660898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1556.974401][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.974446][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.974491][ T38] 4 locks held by syz-executor/16036: [ 1556.974503][ T38] #0: ffff888023234e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_unregister_dev+0x212/0x510 [ 1556.974549][ T38] #1: ffff8880232340a8 (&hdev->lock){+.+.}-{4:4}, at: hci_dev_close_sync+0x66a/0x1330 [ 1556.974595][ T38] #2: ffffffff8ee3b318 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_hash_flush+0xa1/0x230 [ 1556.974638][ T38] #3: ffff88803977db58 (&conn->lock#2){+.+.}-{4:4}, at: l2cap_conn_del+0x70/0x680 [ 1556.974684][ T38] 2 locks held by napi/wg1-0/16623: [ 1556.974694][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.974737][ T38] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.974782][ T38] 2 locks held by napi/wg2-0/16625: [ 1556.974792][ T38] #0: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.974834][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.974879][ T38] 2 locks held by syz.6.17103/17002: [ 1556.974891][ T38] #0: ffffffff8f1d7e08 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x23/0x250 [ 1556.974943][ T38] #1: ffffffff8d9ae730 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1556.974986][ T38] 4 locks held by kworker/1:4/17003: [ 1556.974996][ T38] #0: ffff888058d72538 ((wq_completion)wg-crypt-wg0#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.975047][ T38] #1: ffffc90004c17bc0 ((work_completion)(&peer->transmit_packet_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.975166][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.975209][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.975254][ T38] 5 locks held by kworker/1:7/17041: [ 1556.975264][ T38] #0: ffff88805c82ad38 ((wq_completion)wg-kex-wg2#12){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.975313][ T38] #1: ffffc90004ee7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.975370][ T38] #2: ffff888028e08e90 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_begin_session+0x38/0xbe0 [ 1556.975416][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.975460][ T38] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.975506][ T38] 5 locks held by kworker/u8:9/17042: [ 1556.975516][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.975563][ T38] #1: ffffc900050d7bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.975605][ T38] #2: ffff88804e450898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 1556.975650][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.975695][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.975742][ T38] 3 locks held by kworker/u8:13/17043: [ 1556.975753][ T38] #0: ffff88802fdb1138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.975800][ T38] #1: ffffc90004b27bc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.975847][ T38] #2: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 1556.975895][ T38] 3 locks held by kworker/u8:15/17051: [ 1556.975906][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.975953][ T38] #1: ffffc900049e7bc0 ((work_completion)(&map->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.975999][ T38] #2: ffffffff8d9ae730 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1556.976042][ T38] 4 locks held by kworker/u8:16/17052: [ 1556.976054][ T38] #0: ffff88803686c938 ((wq_completion)wg-kex-wg0#15){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.976104][ T38] #1: ffffc90004aafbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.976152][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.976198][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.976249][ T38] 4 locks held by kworker/u8:17/17053: [ 1556.976260][ T38] #0: ffff888033810938 ((wq_completion)wg-kex-wg1#14){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.976310][ T38] #1: ffffc90004a9fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.976357][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.976401][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.976446][ T38] 4 locks held by kworker/0:3/17054: [ 1556.976458][ T38] #0: ffff88805ce9e138 ((wq_completion)wg-kex-wg2#14){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.976509][ T38] #1: ffffc90004a47bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.976570][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.976614][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.976660][ T38] 4 locks held by kworker/1:9/17056: [ 1556.976672][ T38] #0: ffff88805bef8138 ((wq_completion)wg-crypt-wg2#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.976722][ T38] #1: ffffc900049f7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.976781][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.976825][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.976871][ T38] 4 locks held by kworker/u8:18/17057: [ 1556.976881][ T38] #0: ffff88803686c938 ((wq_completion)wg-kex-wg0#15){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.976932][ T38] #1: ffffc900048d7bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.976976][ T38] #2: ffff8880315bd5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 1556.977018][ T38] #3: ffff888028e0ae58 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 1556.977061][ T38] 4 locks held by kworker/u8:19/17058: [ 1556.977072][ T38] #0: ffff888033810938 ((wq_completion)wg-kex-wg1#14){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.977121][ T38] #1: ffffc90004827bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.977169][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.977215][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.977265][ T38] 4 locks held by kworker/u8:21/17060: [ 1556.977276][ T38] #0: ffff8880598a5938 ((wq_completion)wg-kex-wg2#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.977326][ T38] #1: ffffc90004a27bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.977373][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.977418][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.977464][ T38] 6 locks held by kworker/u8:22/17062: [ 1556.977476][ T38] #0: ffff88805eb7e138 ((wq_completion)wg-kex-wg1#12){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.977526][ T38] #1: ffffc90004a07bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.977574][ T38] #2: ffff88805ec9d5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 1556.977620][ T38] #3: ffff88805ad09928 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 1556.977666][ T38] #4: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.977711][ T38] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.977758][ T38] 4 locks held by kworker/u8:23/17067: [ 1556.977769][ T38] #0: ffff88803686a938 ((wq_completion)wg-kex-wg1#15){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.977821][ T38] #1: ffffc9000d6bfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.977868][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.977912][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.977958][ T38] 1 lock held by syz.0.17110/17069: [ 1556.977970][ T38] #0: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x41/0x1c0 [ 1556.978018][ T38] 4 locks held by kworker/0:4/17071: [ 1556.978029][ T38] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.978074][ T38] #1: ffffc9000d5cfbc0 ((reg_check_chans).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.978120][ T38] #2: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x95/0xf30 [ 1556.978161][ T38] #3: ffff88804e450898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: reg_check_chans_work+0x164/0xf30 [ 1556.978203][ T38] 4 locks held by kworker/1:11/17073: [ 1556.978214][ T38] #0: ffff888019899138 ((wq_completion)events_long){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.978265][ T38] #1: ffffc90005d7fbc0 ((work_completion)(&(&ipvs->defense_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.978313][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.978358][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.978405][ T38] 4 locks held by kworker/1:12/17074: [ 1556.978417][ T38] #0: ffff88805bef8138 ((wq_completion)wg-crypt-wg2#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.978467][ T38] #1: ffffc90004937bc0 ((work_completion)(&peer->transmit_packet_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.978513][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.978560][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.978605][ T38] 7 locks held by kworker/u8:24/17076: [ 1556.978616][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.978661][ T38] #1: ffffc9000d5f7bc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.978709][ T38] #2: ffff88805dc98300 (&devlink->lock_key#6){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 1556.978763][ T38] #3: ffff888058bfe120 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 1556.978814][ T38] #4: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 1556.978858][ T38] #5: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.978903][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.978948][ T38] 1 lock held by syz-executor/17079: [ 1556.978959][ T38] #0: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1556.979004][ T38] 5 locks held by kworker/u9:3/17083: [ 1556.979015][ T38] #0: ffff88803b94e138 ((wq_completion)hci5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.979060][ T38] #1: ffffc900048a7bc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.979105][ T38] #2: ffff888031030e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0 [ 1556.979149][ T38] #3: ffff8880310300a8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30 [ 1556.979196][ T38] #4: ffffffff8ee3b318 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310 [ 1556.979249][ T38] 4 locks held by kworker/0:5/17084: [ 1556.979260][ T38] #0: ffff88805c075138 ((wq_completion)wg-crypt-wg1#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.979311][ T38] #1: ffffc90004897bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.979372][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.979416][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.979462][ T38] 5 locks held by kworker/1:13/17085: [ 1556.979474][ T38] #0: ffff888058d70138 ((wq_completion)wg-kex-wg0#16){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.979523][ T38] #1: ffffc90004887bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.979585][ T38] #2: ffff888028e0ae58 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_begin_session+0x38/0xbe0 [ 1556.979632][ T38] #3: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.979678][ T38] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.979725][ T38] 4 locks held by kworker/u9:4/17089: [ 1556.979736][ T38] #0: ffff88814d918938 ((wq_completion)krxrpcd){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.979784][ T38] #1: ffffc9001857fbc0 ((work_completion)(&rxnet->peer_keepalive_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.979833][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.979878][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.979925][ T38] 4 locks held by kworker/0:6/17090: [ 1556.979937][ T38] #0: ffff888058d72538 ((wq_completion)wg-crypt-wg0#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.979987][ T38] #1: ffffc90004fa7bc0 ((work_completion)(&peer->transmit_packet_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.980036][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.980082][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.980128][ T38] 4 locks held by kworker/0:8/17091: [ 1556.980140][ T38] #0: ffff88805bef8138 ((wq_completion)wg-crypt-wg2#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.980191][ T38] #1: ffffc900047d7bc0 ((work_completion)(&peer->transmit_packet_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.980244][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.980291][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.980337][ T38] 4 locks held by kworker/0:9/17092: [ 1556.980348][ T38] #0: ffff88805b6e6d38 ((wq_completion)wg-crypt-wg1#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.980399][ T38] #1: ffffc900047b7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.980462][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.980507][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.980554][ T38] 1 lock held by syz-executor/17095: [ 1556.980566][ T38] #0: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1556.980609][ T38] 1 lock held by syz-executor/17100: [ 1556.980621][ T38] #0: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1556.980666][ T38] 7 locks held by kworker/u8:26/17114: [ 1556.980678][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.980725][ T38] #1: ffffc900046cfbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.980773][ T38] #2: ffff888095109300 (&devlink->lock_key#8){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 1556.980828][ T38] #3: ffff88805b828520 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 1556.980880][ T38] #4: ffffffff8d9a8d80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 1556.980924][ T38] #5: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.980969][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.981017][ T38] 4 locks held by kworker/0:10/17116: [ 1556.981028][ T38] #0: ffff88805bcb4938 ((wq_completion)wg-crypt-wg1#6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.981079][ T38] #1: ffffc900046afbc0 ((work_completion)(&peer->transmit_packet_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.981128][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.981174][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.981222][ T38] 6 locks held by kworker/0:11/17117: [ 1556.981238][ T38] #0: ffff88805c117538 ((wq_completion)wg-kex-wg0#14){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.981290][ T38] #1: ffffc900062cfbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.981353][ T38] #2: ffff8880308dd5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_response+0x115/0x970 [ 1556.981401][ T38] #3: ffff88823bfd29e0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_response+0x126/0x970 [ 1556.981446][ T38] #4: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.981492][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.981539][ T38] 4 locks held by kworker/0:12/17118: [ 1556.981551][ T38] #0: ffff88805c075138 ((wq_completion)wg-crypt-wg1#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.981600][ T38] #1: ffffc90004727bc0 ((work_completion)(&peer->transmit_packet_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.981637][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.981673][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.981711][ T38] 4 locks held by kworker/0:13/17119: [ 1556.981719][ T38] #0: ffff888058d70138 ((wq_completion)wg-kex-wg0#16){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.981758][ T38] #1: ffffc90004757bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.981803][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.981837][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.981872][ T38] 3 locks held by kworker/0:14/17120: [ 1556.981880][ T38] #0: ffff888019898538 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.981915][ T38] #1: ffffc90004707bc0 (drain_vmap_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.981952][ T38] #2: ffffffff8daaa198 (vmap_purge_lock){+.+.}-{4:4}, at: drain_vmap_area_work+0x17/0x40 [ 1556.981985][ T38] 4 locks held by kworker/0:15/17121: [ 1556.981994][ T38] #0: ffff88805bcb5538 ((wq_completion)wg-kex-wg1#11){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.982034][ T38] #1: ffffc9000469fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.982083][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.982119][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.982153][ T38] 4 locks held by kworker/0:16/17122: [ 1556.982161][ T38] #0: ffff888019899138 ((wq_completion)events_long){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1556.982198][ T38] #1: ffffc90004557bc0 ((work_completion)(&(&ipvs->defense_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1556.982246][ T38] #2: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.982282][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.982324][ T38] 2 locks held by kworker/0:17/17123: [ 1556.982335][ T38] 1 lock held by syz-executor/17124: [ 1556.982345][ T38] #0: ffffffff8ecd3878 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1556.982385][ T38] 3 locks held by syz-executor/17139: [ 1556.982394][ T38] #0: ffff8880325dc350 (sk_lock-AF_BLUETOOTH-BTPROTO_HCI){+.+.}-{0:0}, at: hci_sock_ioctl+0x247/0x910 [ 1556.982436][ T38] #1: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.982482][ T38] #2: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.982527][ T38] 3 locks held by syz-executor/17143: [ 1556.982538][ T38] #0: ffff888028561350 (sk_lock-AF_BLUETOOTH-BTPROTO_HCI){+.+.}-{0:0}, at: hci_sock_ioctl+0x247/0x910 [ 1556.982581][ T38] #1: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.982646][ T38] #2: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.982693][ T38] 1 lock held by syz-executor/17147: [ 1556.982705][ T38] #0: ffff88805b8d0e80 (&hdev->req_lock){+.+.}-{4:4}, at: hci_dev_open+0x1f3/0x300 [ 1556.982755][ T38] 3 locks held by syz-executor/17151: [ 1556.982766][ T38] #0: ffff88802af2b350 (sk_lock-AF_BLUETOOTH-BTPROTO_HCI){+.+.}-{0:0}, at: hci_sock_ioctl+0x247/0x910 [ 1556.982810][ T38] #1: ffffffff8d84a960 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 1556.982856][ T38] #2: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 1556.982902][ T38] 7 locks held by kworker/u9:5/17152: [ 1556.982917][ T38] [ 1556.982922][ T38] ============================================= [ 1556.982922][ T38] [ 1556.982943][ T38] NMI backtrace for cpu 1 [ 1556.982956][ T38] CPU: 1 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1556.982973][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1556.982982][ T38] Call Trace: [ 1556.982988][ T38] [ 1556.982995][ T38] dump_stack_lvl+0x189/0x250 [ 1556.983018][ T38] ? __pfx_dump_stack_lvl+0x10/0x10 [ 1556.983039][ T38] ? __pfx__printk+0x10/0x10 [ 1556.983070][ T38] nmi_cpu_backtrace+0x39e/0x3d0 [ 1556.983097][ T38] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 1556.983122][ T38] ? __pfx__printk+0x10/0x10 [ 1556.983146][ T38] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1556.983172][ T38] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 1556.983198][ T38] watchdog+0xf93/0xfe0 [ 1556.983227][ T38] ? watchdog+0x1de/0xfe0 [ 1556.983262][ T38] kthread+0x70e/0x8a0 [ 1556.983291][ T38] ? __pfx_watchdog+0x10/0x10 [ 1556.983312][ T38] ? __pfx_kthread+0x10/0x10 [ 1556.983343][ T38] ? __pfx_kthread+0x10/0x10 [ 1556.983369][ T38] ret_from_fork+0x436/0x7d0 [ 1556.983395][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 1556.983424][ T38] ? __switch_to_asm+0x39/0x70 [ 1556.983441][ T38] ? __switch_to_asm+0x33/0x70 [ 1556.983457][ T38] ? __pfx_kthread+0x10/0x10 [ 1556.983482][ T38] ret_from_fork_asm+0x1a/0x30 [ 1556.983516][ T38] [ 1556.983524][ T38] Sending NMI from CPU 1 to CPUs 0: [ 1556.983549][ C0] NMI backtrace for cpu 0 [ 1556.983563][ C0] CPU: 0 UID: 0 PID: 17152 Comm: kworker/u9:5 Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1556.983583][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1556.983595][ C0] Workqueue: hci10 hci_rx_work [ 1556.983614][ C0] RIP: 0010:lock_acquire+0x5/0x360 [ 1556.983634][ C0] Code: 90 90 90 90 90 f3 0f 1e fa b0 01 e9 55 e1 5e 09 cc 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 <41> 57 41 56 41 55 41 54 53 48 83 ec 60 4d 89 ce 45 89 c7 41 89 cc [ 1556.983649][ C0] RSP: 0018:ffffc90003fef260 EFLAGS: 00000246 [ 1556.983663][ C0] RAX: 0000000000000001 RBX: ffffffff82105029 RCX: 0000000000000002 [ 1556.983674][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8d9a8d80 [ 1556.983686][ C0] RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1556.983697][ C0] R10: ffffc90003fef398 R11: ffffffff81aaefe0 R12: 1ffff920007fde69 [ 1556.983710][ C0] R13: ffffc90003fef380 R14: ffffc90003fef348 R15: ffffffff8172c165 [ 1556.983723][ C0] FS: 0000000000000000(0000) GS:ffff8881268bc000(0000) knlGS:0000000000000000 [ 1556.983737][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1556.983749][ C0] CR2: 000055c3b95a7230 CR3: 0000000071f30000 CR4: 00000000003526f0 [ 1556.983764][ C0] Call Trace: [ 1556.983771][ C0] [ 1556.983778][ C0] unwind_next_frame+0xc2/0x2390 [ 1556.983798][ C0] ? unwind_next_frame+0xa5/0x2390 [ 1556.983821][ C0] ? unwind_next_frame+0xa5/0x2390 [ 1556.983841][ C0] ? __reset_page_owner+0x71/0x1f0 [ 1556.983862][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1556.983879][ C0] arch_stack_walk+0x11c/0x150 [ 1556.983903][ C0] ? __free_frozen_pages+0xb59/0xce0 [ 1556.983928][ C0] stack_trace_save+0x9c/0xe0 [ 1556.983944][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 1556.983966][ C0] save_stack+0xf7/0x1f0 [ 1556.983985][ C0] ? __pfx_save_stack+0x10/0x10 [ 1556.984001][ C0] ? __free_frozen_pages+0xb59/0xce0 [ 1556.984030][ C0] ? page_ext_put+0x97/0xc0 [ 1556.984051][ C0] __reset_page_owner+0x71/0x1f0 [ 1556.984070][ C0] __free_frozen_pages+0xb59/0xce0 [ 1556.984096][ C0] ? __pfx___free_frozen_pages+0x10/0x10 [ 1556.984123][ C0] __slab_free+0x2db/0x390 [ 1556.984142][ C0] ? qlist_free_all+0x8c/0x140 [ 1556.984161][ C0] qlist_free_all+0x97/0x140 [ 1556.984179][ C0] kasan_quarantine_reduce+0x148/0x160 [ 1556.984198][ C0] __kasan_slab_alloc+0x22/0x80 [ 1556.984216][ C0] ? skb_clone+0x212/0x3a0 [ 1556.984233][ C0] kmem_cache_alloc_noprof+0x143/0x310 [ 1556.984255][ C0] skb_clone+0x212/0x3a0 [ 1556.984271][ C0] ? hci_event_packet+0x3e2/0x1200 [ 1556.984290][ C0] hci_event_packet+0x3f4/0x1200 [ 1556.984312][ C0] ? __pfx_hci_event_packet+0x10/0x10 [ 1556.984330][ C0] ? __pfx_migrate_enable+0x10/0x10 [ 1556.984353][ C0] ? hci_send_to_monitor+0xe2/0x570 [ 1556.984377][ C0] hci_rx_work+0x46a/0xe80 [ 1556.984399][ C0] ? process_scheduled_works+0x9ef/0x17b0 [ 1556.984419][ C0] process_scheduled_works+0xade/0x17b0 [ 1556.984453][ C0] ? __pfx_process_scheduled_works+0x10/0x10 [ 1556.984481][ C0] worker_thread+0x8a0/0xda0 [ 1556.984519][ C0] kthread+0x70e/0x8a0 [ 1556.984542][ C0] ? __pfx_worker_thread+0x10/0x10 [ 1556.984560][ C0] ? __pfx_kthread+0x10/0x10 [ 1556.984584][ C0] ? __pfx_kthread+0x10/0x10 [ 1556.984609][ C0] ret_from_fork+0x436/0x7d0 [ 1556.984629][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 1556.984651][ C0] ? __switch_to_asm+0x39/0x70 [ 1556.984666][ C0] ? __switch_to_asm+0x33/0x70 [ 1556.984681][ C0] ? __pfx_kthread+0x10/0x10 [ 1556.984702][ C0] ret_from_fork_asm+0x1a/0x30 [ 1556.984726][ C0] [ 1556.985552][ T38] Kernel panic - not syncing: hung_task: blocked tasks [ 1556.985568][ T38] CPU: 1 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1556.985590][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1556.985601][ T38] Call Trace: [ 1556.985610][ T38] [ 1556.985618][ T38] dump_stack_lvl+0x99/0x250 [ 1556.985645][ T38] ? __asan_memcpy+0x40/0x70 [ 1556.985665][ T38] ? __pfx_dump_stack_lvl+0x10/0x10 [ 1556.985691][ T38] ? __pfx__printk+0x10/0x10 [ 1556.985720][ T38] vpanic+0x281/0x750 [ 1556.985748][ T38] ? __pfx_vpanic+0x10/0x10 [ 1556.985779][ T38] ? irqentry_exit+0x74/0x90 [ 1556.985796][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 1556.985829][ T38] panic+0xb9/0xc0 [ 1556.985853][ T38] ? __pfx_panic+0x10/0x10 [ 1556.985881][ T38] ? irq_work_queue+0xc3/0x140 [ 1556.985907][ T38] ? nmi_trigger_cpumask_backtrace+0x234/0x300 [ 1556.985934][ T38] watchdog+0xfd2/0xfe0 [ 1556.985961][ T38] ? watchdog+0x1de/0xfe0 [ 1556.985989][ T38] kthread+0x70e/0x8a0 [ 1556.986017][ T38] ? __pfx_watchdog+0x10/0x10 [ 1556.986039][ T38] ? __pfx_kthread+0x10/0x10 [ 1556.986070][ T38] ? __pfx_kthread+0x10/0x10 [ 1556.986096][ T38] ret_from_fork+0x436/0x7d0 [ 1556.986121][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 1556.986151][ T38] ? __switch_to_asm+0x39/0x70 [ 1556.986168][ T38] ? __switch_to_asm+0x33/0x70 [ 1556.986185][ T38] ? __pfx_kthread+0x10/0x10 [ 1556.986210][ T38] ret_from_fork_asm+0x1a/0x30 [ 1556.986252][ T38] [ 1556.986389][ T38] Kernel Offset: disabled