[ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.161' (ECDSA) to the list of known hosts. 2022/12/08 14:27:09 ignoring optional flag "sandboxArg"="0" 2022/12/08 14:27:09 parsed 1 programs 2022/12/08 14:27:10 executed programs: 0 syzkaller login: [ 33.217522] IPVS: ftp: loaded support on port[0] = 21 [ 33.362061] chnl_net:caif_netlink_parms(): no params data found [ 33.404066] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.411371] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.418510] device bridge_slave_0 entered promiscuous mode [ 33.426450] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.433235] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.441217] device bridge_slave_1 entered promiscuous mode [ 33.458665] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 33.467456] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 33.485348] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 33.492855] team0: Port device team_slave_0 added [ 33.498273] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 33.505867] team0: Port device team_slave_1 added [ 33.520784] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.527054] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.552341] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.563771] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.570116] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.595352] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.609568] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 33.617370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 33.636648] device hsr_slave_0 entered promiscuous mode [ 33.643232] device hsr_slave_1 entered promiscuous mode [ 33.649260] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 33.656499] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 33.729014] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.735472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.742452] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.748810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.780413] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 33.786482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.795976] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 33.806150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.814603] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.821946] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.828857] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 33.839627] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 33.845717] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.855714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.863802] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.870223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.879912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.887719] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.894117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.910463] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 33.918167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 33.926328] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 33.936231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.947658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.956673] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 33.963960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 33.993242] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 34.001596] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 34.008239] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 34.021194] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.054301] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 34.063690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.098179] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 34.105666] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 34.113070] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 34.122819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.130726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.137516] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.146747] device veth0_vlan entered promiscuous mode [ 34.155713] device veth1_vlan entered promiscuous mode [ 34.161909] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 34.171366] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 34.183382] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 34.193081] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 34.201198] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 34.208411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.217808] device veth0_macvtap entered promiscuous mode [ 34.224872] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 34.233894] device veth1_macvtap entered promiscuous mode [ 34.243670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 34.252906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 34.263274] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.270815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.279140] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 34.288856] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.296193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.405489] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 34.413115] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 34.425472] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 34.437157] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 34.448318] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 34.455658] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 34.464099] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 34.472520] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 34.503872] FAULT_INJECTION: forcing a failure. [ 34.503872] name failslab, interval 1, probability 0, space 0, times 1 [ 34.516540] CPU: 1 PID: 8373 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 34.524312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 34.533639] Call Trace: [ 34.536210] dump_stack+0x1fc/0x2ef [ 34.539819] should_fail.cold+0xa/0xf [ 34.543600] ? setup_fault_attr+0x200/0x200 [ 34.547902] ? mark_held_locks+0xf0/0xf0 [ 34.551944] ? mark_held_locks+0xf0/0xf0 [ 34.555986] __should_failslab+0x115/0x180 [ 34.560200] should_failslab+0x5/0x10 [ 34.563983] __kmalloc+0x6d/0x3c0 [ 34.567416] ? tty_buffer_alloc+0x23f/0x2a0 [ 34.571719] tty_buffer_alloc+0x23f/0x2a0 [ 34.575874] __tty_buffer_request_room+0x156/0x2a0 [ 34.580887] tty_insert_flip_string_fixed_flag+0x93/0x250 [ 34.586408] ? do_raw_spin_lock+0xcb/0x220 [ 34.590631] pty_write+0x126/0x1f0 [ 34.594178] tty_put_char+0x122/0x150 [ 34.597960] ? dev_match_devt+0x90/0x90 [ 34.601914] ? tty_buffer_space_avail+0x7e/0xb0 [ 34.606564] ? pty_write_room+0xbe/0xe0 [ 34.610516] ? ptmx_open+0x350/0x350 [ 34.614210] __process_echoes+0x577/0x9f0 [ 34.618342] n_tty_receive_buf_common+0xc0c/0x2a90 [ 34.623255] ? n_tty_receive_buf2+0x40/0x40 [ 34.627580] tty_ioctl+0x1026/0x1630 [ 34.631281] ? tty_fasync+0x300/0x300 [ 34.635065] ? get_pid_task+0xf4/0x190 [ 34.638938] ? proc_fail_nth_write+0x95/0x1d0 [ 34.643410] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 34.648331] ? debug_check_no_obj_freed+0x201/0x490 [ 34.653336] ? __vfs_write+0xff/0x770 [ 34.657115] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 34.662024] ? common_file_perm+0x4e5/0x850 [ 34.666586] ? tty_fasync+0x300/0x300 [ 34.670364] do_vfs_ioctl+0xcdb/0x12e0 [ 34.674230] ? vfs_write+0x3d7/0x540 [ 34.677919] ? ioctl_preallocate+0x200/0x200 [ 34.682306] ? lock_downgrade+0x720/0x720 [ 34.686435] ? check_preemption_disabled+0x41/0x280 [ 34.691430] ? vfs_write+0x393/0x540 [ 34.695123] ? ksys_write+0x1c8/0x2a0 [ 34.698900] ksys_ioctl+0x9b/0xc0 [ 34.702331] __x64_sys_ioctl+0x6f/0xb0 [ 34.706197] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 34.710760] do_syscall_64+0xf9/0x620 [ 34.714543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.719709] RIP: 0033:0x7fd128f3a0d9 [ 34.723402] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 34.742280] RSP: 002b:00007ffe7f714008 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 34.749965] RAX: ffffffffffffffda RBX: 00007fd129059f80 RCX: 00007fd128f3a0d9 [ 34.757397] RDX: 0000000020000000 RSI: 0000000000005412 RDI: 0000000000000004 [ 34.764644] RBP: 00007ffe7f714070 R08: 0000000000000000 R09: 0000000000000000 [ 34.771889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.779137] R13: 00007fd128aae158 R14: 00007fd129059f80 R15: 0000000000000000 [ 34.786411] [ 34.786414] ====================================================== [ 34.786417] WARNING: possible circular locking dependency detected [ 34.786419] 4.19.211-syzkaller #0 Not tainted [ 34.786422] ------------------------------------------------------ [ 34.786425] syz-executor.0/8373 is trying to acquire lock: [ 34.786427] 00000000ba8e72f8 (console_owner){....}, at: console_unlock+0x3a9/0x1110 [ 34.786434] [ 34.786436] but task is already holding lock: [ 34.786438] 00000000d6492d93 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xf4/0x1f0 [ 34.786445] [ 34.786448] which lock already depends on the new lock. [ 34.786449] [ 34.786450] [ 34.786453] the existing dependency chain (in reverse order) is: [ 34.786454] [ 34.786455] -> #2 (&(&port->lock)->rlock){-.-.}: [ 34.786462] tty_port_tty_get+0x1d/0x80 [ 34.786465] tty_port_default_wakeup+0x11/0x40 [ 34.786467] serial8250_tx_chars+0x490/0xaf0 [ 34.786469] serial8250_handle_irq.part.0+0x31f/0x3d0 [ 34.786472] serial8250_default_handle_irq+0xae/0x220 [ 34.786474] serial8250_interrupt+0x101/0x240 [ 34.786476] __handle_irq_event_percpu+0x27e/0x8e0 [ 34.786478] handle_irq_event+0x102/0x290 [ 34.786481] handle_edge_irq+0x260/0xcf0 [ 34.786482] handle_irq+0x35/0x50 [ 34.786484] do_IRQ+0x93/0x1c0 [ 34.786486] ret_from_intr+0x0/0x1e [ 34.786488] _raw_spin_unlock_irqrestore+0xa3/0xe0 [ 34.786490] uart_write+0x3bb/0x6f0 [ 34.786492] do_output_char+0x5de/0x850 [ 34.786494] n_tty_write+0x46e/0xff0 [ 34.786496] tty_write+0x496/0x810 [ 34.786498] redirected_tty_write+0xaa/0xb0 [ 34.786500] do_iter_write+0x461/0x5d0 [ 34.786502] vfs_writev+0x153/0x2e0 [ 34.786504] do_writev+0x136/0x330 [ 34.786506] do_syscall_64+0xf9/0x620 [ 34.786509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.786510] [ 34.786511] -> #1 (&port_lock_key){-.-.}: [ 34.786518] serial8250_console_write+0x90e/0xb70 [ 34.786520] console_unlock+0xbb6/0x1110 [ 34.786522] vprintk_emit+0x2d1/0x740 [ 34.786524] vprintk_func+0x79/0x180 [ 34.786526] printk+0xba/0xed [ 34.786528] register_console+0x87f/0xc90 [ 34.786530] univ8250_console_init+0x3a/0x46 [ 34.786532] console_init+0x4cb/0x718 [ 34.786534] start_kernel+0x686/0x911 [ 34.786536] secondary_startup_64+0xa4/0xb0 [ 34.786537] [ 34.786538] -> #0 (console_owner){....}: [ 34.786545] console_unlock+0x411/0x1110 [ 34.786547] vprintk_emit+0x2d1/0x740 [ 34.786549] vprintk_func+0x79/0x180 [ 34.786551] printk+0xba/0xed [ 34.786553] should_fail+0x66b/0x7b0 [ 34.786555] __should_failslab+0x115/0x180 [ 34.786557] should_failslab+0x5/0x10 [ 34.786559] __kmalloc+0x6d/0x3c0 [ 34.786562] tty_buffer_alloc+0x23f/0x2a0 [ 34.786564] __tty_buffer_request_room+0x156/0x2a0 [ 34.786567] tty_insert_flip_string_fixed_flag+0x93/0x250 [ 34.786568] pty_write+0x126/0x1f0 [ 34.786570] tty_put_char+0x122/0x150 [ 34.786573] __process_echoes+0x577/0x9f0 [ 34.786575] n_tty_receive_buf_common+0xc0c/0x2a90 [ 34.786577] tty_ioctl+0x1026/0x1630 [ 34.786579] do_vfs_ioctl+0xcdb/0x12e0 [ 34.786581] ksys_ioctl+0x9b/0xc0 [ 34.786583] __x64_sys_ioctl+0x6f/0xb0 [ 34.786585] do_syscall_64+0xf9/0x620 [ 34.786587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.786588] [ 34.786591] other info that might help us debug this: [ 34.786592] [ 34.786593] Chain exists of: [ 34.786594] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 34.786603] [ 34.786605] Possible unsafe locking scenario: [ 34.786607] [ 34.786609] CPU0 CPU1 [ 34.786611] ---- ---- [ 34.786612] lock(&(&port->lock)->rlock); [ 34.786617] lock(&port_lock_key); [ 34.786622] lock(&(&port->lock)->rlock); [ 34.786626] lock(console_owner); [ 34.786630] [ 34.786631] *** DEADLOCK *** [ 34.786632] [ 34.786635] 6 locks held by syz-executor.0/8373: [ 34.786636] #0: 000000000014d6c2 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 34.786644] #1: 000000008972e4a2 (&port->buf.lock/1){+.+.}, at: tty_ioctl+0xfbc/0x1630 [ 34.786654] #2: 00000000e27aff39 (&o_tty->termios_rwsem/1){++++}, at: n_tty_receive_buf_common+0x84/0x2a90 [ 34.786663] #3: 00000000f19320ea (&ldata->output_lock){+.+.}, at: n_tty_receive_buf_common+0xbce/0x2a90 [ 34.786672] #4: 00000000d6492d93 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xf4/0x1f0 [ 34.786681] #5: 00000000721ca104 (console_lock){+.+.}, at: vprintk_func+0x79/0x180 [ 34.786689] [ 34.786691] stack backtrace: [ 34.786694] CPU: 1 PID: 8373 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 34.786698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 34.786699] Call Trace: [ 34.786701] dump_stack+0x1fc/0x2ef [ 34.786704] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 34.786706] __lock_acquire+0x30c9/0x3ff0 [ 34.786708] ? mark_held_locks+0xf0/0xf0 [ 34.786710] ? snprintf+0xf0/0xf0 [ 34.786712] ? console_unlock+0x3ec/0x1110 [ 34.786714] lock_acquire+0x170/0x3c0 [ 34.786716] ? console_unlock+0x3a9/0x1110 [ 34.786718] console_unlock+0x411/0x1110 [ 34.786720] ? console_unlock+0x3a9/0x1110 [ 34.786722] vprintk_emit+0x2d1/0x740 [ 34.786724] vprintk_func+0x79/0x180 [ 34.786726] printk+0xba/0xed [ 34.786728] ? log_store.cold+0x16/0x16 [ 34.786730] ? __lock_acquire+0x22f9/0x3ff0 [ 34.786732] ? ___ratelimit+0x319/0x590 [ 34.786734] should_fail+0x66b/0x7b0 [ 34.786736] ? setup_fault_attr+0x200/0x200 [ 34.786738] ? mark_held_locks+0xf0/0xf0 [ 34.786740] ? mark_held_locks+0xf0/0xf0 [ 34.786742] __should_failslab+0x115/0x180 [ 34.786744] should_failslab+0x5/0x10 [ 34.786746] __kmalloc+0x6d/0x3c0 [ 34.786748] ? tty_buffer_alloc+0x23f/0x2a0 [ 34.786750] tty_buffer_alloc+0x23f/0x2a0 [ 34.786753] __tty_buffer_request_room+0x156/0x2a0 [ 34.786755] tty_insert_flip_string_fixed_flag+0x93/0x250 [ 34.786757] ? do_raw_spin_lock+0xcb/0x220 [ 34.786759] pty_write+0x126/0x1f0 [ 34.786761] tty_put_char+0x122/0x150 [ 34.786763] ? dev_match_devt+0x90/0x90 [ 34.786765] ? tty_buffer_space_avail+0x7e/0xb0 [ 34.786767] ? pty_write_room+0xbe/0xe0 [ 34.786769] ? ptmx_open+0x350/0x350 [ 34.786771] __process_echoes+0x577/0x9f0 [ 34.786774] n_tty_receive_buf_common+0xc0c/0x2a90 [ 34.786776] ? n_tty_receive_buf2+0x40/0x40 [ 34.786778] tty_ioctl+0x1026/0x1630 [ 34.786780] ? tty_fasync+0x300/0x300 [ 34.786782] ? get_pid_task+0xf4/0x190 [ 34.786784] ? proc_fail_nth_write+0x95/0x1d0 [ 34.786786] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 34.786788] ? debug_check_no_obj_freed+0x201/0x490 [ 34.786790] ? __vfs_write+0xff/0x770 [ 34.786793] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 34.786795] ? common_file_perm+0x4e5/0x850 [ 34.786797] ? tty_fasync+0x300/0x300 [ 34.786799] do_vfs_ioctl+0xcdb/0x12e0 [ 34.786801] ? vfs_write+0x3d7/0x540 [ 34.786803] ? ioctl_preallocate+0x200/0x200 [ 34.786805] ? lock_downgrade+0x720/0x720 [ 34.786807] ? check_preemption_disabled+0x41/0x280 [ 34.786809] ? vfs_write+0x393/0x540 [ 34.786811] ? ksys_write+0x1c8/0x2a0 [ 34.786813] ksys_ioctl+0x9b/0xc0 [ 34.786815] __x64_sys_ioctl+0x6f/0xb0 [ 34.786817] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 34.786819] do_syscall_64+0xf9/0x620 [ 34.786822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.786824] RIP: 0033:0x7fd128f3a0d9 [ 34.786831] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 34.786833] RSP: 002b:00007ffe7f714008 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 34.786838] RAX: ffffffffffffffda RBX: 00007fd129059f80 RCX: 00007fd128f3a0d9 [ 34.786841] RDX: 0000000020000000 RSI: 0000000000005412 RDI: 0000000000000004 [ 34.786844] RBP: 00007ffe7f714070 R08: 0000000000000000 R09: 0000000000000000 [ 34.786848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.786851] R13: 00007fd128aae158 R14: 00007fd129059f80 R15: 0000000000000000 [ 35.575680] Bluetooth: hci0: command 0x0409 tx timeout