./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2368216514 <...> [ 31.418246][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.431453][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 39.600025][ T26] kauditd_printk_skb: 37 callbacks suppressed [ 39.600039][ T26] audit: type=1400 audit(1668444614.215:73): avc: denied { transition } for pid=3394 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 39.628955][ T26] audit: type=1400 audit(1668444614.225:74): avc: denied { write } for pid=3394 comm="sh" path="pipe:[28356]" dev="pipefs" ino=28356 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.10.54' (ECDSA) to the list of known hosts. execve("./syz-executor2368216514", ["./syz-executor2368216514"], 0x7fff61150880 /* 10 vars */) = 0 brk(NULL) = 0x555557299000 brk(0x555557299c40) = 0x555557299c40 arch_prctl(ARCH_SET_FS, 0x555557299300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 set_tid_address(0x5555572995d0) = 3607 set_robust_list(0x5555572995e0, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f449fd08520, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f449fd08bf0}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f449fd085c0, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f449fd08bf0}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2368216514", 4096) = 28 brk(0x5555572bac40) = 0x5555572bac40 brk(0x5555572bb000) = 0x5555572bb000 mprotect(0x7f449fdca000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 getpid() = 3607 mkdir("./syzkaller.3qVhwX", 0700) = 0 chmod("./syzkaller.3qVhwX", 0777) = 0 chdir("./syzkaller.3qVhwX") = 0 futex(0x7f449fdd04ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f449fcd8000 mprotect(0x7f449fcd9000, 131072, PROT_READ|PROT_WRITE) = 0 clone(child_stack=0x7f449fcf83f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[3608], tls=0x7f449fcf8700, child_tidptr=0x7f449fcf89d0) = 3608 futex(0x7f449fdd04e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 futex(0x7f449fdd04ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 3608 attached [pid 3608] set_robust_list(0x7f449fcf89e0, 24) = 0 [pid 3608] openat(AT_FDCWD, "/dev/virtual_nci", O_RDWR) = 3 [pid 3608] futex(0x7f449fdd04ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 3607] <... futex resumed>) = 0 [pid 3607] futex(0x7f449fdd04e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 3607] futex(0x7f449fdd04ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 3608] <... futex resumed>) = 1 [pid 3608] ioctl(3, _IOC(_IOC_NONE, 0, 0, 0), 0x200000c0) = 0 [pid 3608] futex(0x7f449fdd04ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 3607] <... futex resumed>) = 0 [pid 3607] futex(0x7f449fdd04e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 3607] futex(0x7f449fdd04ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 3608] <... futex resumed>) = 1 [pid 3608] socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 [pid 3608] futex(0x7f449fdd04ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 3607] <... futex resumed>) = 0 [pid 3607] futex(0x7f449fdd04e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 3607] futex(0x7f449fdd04ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 3608] <... futex resumed>) = 1 [pid 3608] sendto(4, [{nlmsg_len=28, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x08\x00\x02\x00\x6e\x66\x63\x00"], 28, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 28 [pid 3608] recvfrom(4, [{nlmsg_len=472, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=3607}, "\x01\x02\x00\x00\x08\x00\x02\x00\x6e\x66\x63\x00\x06\x00\x01\x00\x1d\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x1f\x00\x00\x00\x80\x01\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x02\x00\x00\x00\x08\x00\x02\x00\x0b\x00\x00\x00\x14\x00\x03\x00\x08\x00\x01\x00\x03\x00\x00\x00"...], 4096, 0, NULL, NULL) = 472 [pid 3608] recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3607}, {error=0, msg={nlmsg_len=28, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 [ 51.353750][ T26] audit: type=1400 audit(1668444625.965:75): avc: denied { execmem } for pid=3607 comm="syz-executor236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 51.373407][ T26] audit: type=1400 audit(1668444625.975:76): avc: denied { read write } for pid=3607 comm="syz-executor236" name="virtual_nci" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [pid 3608] futex(0x7f449fdd04ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 3607] <... futex resumed>) = 0 [pid 3608] <... futex resumed>) = 1 [pid 3607] futex(0x7f449fdd04e8, FUTEX_WAKE_PRIVATE, 1000000 [pid 3608] sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x1c\x00\x00\x00\x1d\x00\x01\x00\x23\x01\x00\x00\x34\x02\x00\x00\x02\x00\x00\x00\x08\x00\x01\x00\x02\x00\x00\x00", iov_len=28}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0 [pid 3607] <... futex resumed>) = 0 [ 51.399249][ T26] audit: type=1400 audit(1668444625.975:77): avc: denied { open } for pid=3607 comm="syz-executor236" path="/dev/virtual_nci" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.423582][ T26] audit: type=1400 audit(1668444625.995:78): avc: denied { ioctl } for pid=3607 comm="syz-executor236" path="/dev/virtual_nci" dev="devtmpfs" ino=680 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [pid 3607] futex(0x7f449fdd04ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}) = -1 ETIMEDOUT (Connection timed out) [pid 3607] futex(0x7f449fdd04fc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 3607] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f449fcb7000 [pid 3607] mprotect(0x7f449fcb8000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 3607] clone(child_stack=0x7f449fcd73f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[3614], tls=0x7f449fcd7700, child_tidptr=0x7f449fcd79d0) = 3614 [pid 3607] futex(0x7f449fdd04f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 3607] futex(0x7f449fdd04fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 3614 attached [pid 3614] set_robust_list(0x7f449fcd79e0, 24) = 0 [pid 3614] write(3, "\x40\x00\x00\x00\x00\x00", 6) = 6 [pid 3614] futex(0x7f449fdd04fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 3607] <... futex resumed>) = 0 [pid 3607] futex(0x7f449fdd04f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 3607] futex(0x7f449fdd04fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 3614] <... futex resumed>) = 1 [pid 3614] write(3, "\x40\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 20) = 20 [pid 3614] futex(0x7f449fdd04fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 3607] <... futex resumed>) = 0 [pid 3607] futex(0x7f449fdd04f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 3607] futex(0x7f449fdd04fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 3614] <... futex resumed>) = 1 [pid 3614] write(3, "\x41\x00\x00\x00", 4 [pid 3608] <... sendmsg resumed>) = 28 [pid 3608] futex(0x7f449fdd04ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 3608] futex(0x7f449fdd04e8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 3614] <... write resumed>) = 4 [pid 3614] futex(0x7f449fdd04fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 3607] <... futex resumed>) = 0 [pid 3607] futex(0x7f449fdd04e8, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 3608] <... futex resumed>) = 0 [pid 3607] futex(0x7f449fdd04ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 3608] sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x24\x00\x00\x00\x1d\x00\x01\x00\x23\x01\x00\x00\x34\x02\x00\x00\x06\x00\x00\x00\x08\x00\x01\x00\x02\x00\x00\x00\x08\x00\x03\x00\xff\xff\xff\xff", iov_len=36}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0 [pid 3614] <... futex resumed>) = 1 [ 51.448757][ T26] audit: type=1400 audit(1668444625.995:79): avc: denied { create } for pid=3607 comm="syz-executor236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 51.469806][ T26] audit: type=1400 audit(1668444626.005:80): avc: denied { create } for pid=3604 comm="strace-static-x" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [pid 3614] futex(0x7f449fdd04f8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 3607] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 3607] futex(0x7f449fdd04f8, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 3614] <... futex resumed>) = 0 [pid 3607] futex(0x7f449fdd04fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 3614] read(3, NULL, 0) = 0 [pid 3614] futex(0x7f449fdd04fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 3607] <... futex resumed>) = 0 [pid 3614] <... futex resumed>) = 1 [ 51.490869][ T26] audit: type=1400 audit(1668444626.005:81): avc: denied { write } for pid=3604 comm="strace-static-x" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 51.511774][ T26] audit: type=1400 audit(1668444626.005:82): avc: denied { nlmsg_read } for pid=3604 comm="strace-static-x" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 51.533230][ T26] audit: type=1400 audit(1668444626.005:83): avc: denied { read } for pid=3604 comm="strace-static-x" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 51.554402][ T26] audit: type=1400 audit(1668444626.005:84): avc: denied { write } for pid=3607 comm="syz-executor236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [pid 3614] futex(0x7f449fdd04f8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 3607] exit_group(0) = ? [pid 3614] <... futex resumed>) = ? [pid 3614] +++ exited with 0 +++ [pid 3608] <... sendmsg resumed>) = ? [ 51.664759][ T3608] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 51.673716][ T3608] nci: nci_start_poll: failed to set local general bytes [ 56.757584][ T3608] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 56.766189][ T3608] [ 56.768498][ T3608] ====================================================== [ 56.775493][ T3608] WARNING: possible circular locking dependency detected [ 56.782485][ T3608] 6.1.0-rc5-syzkaller #0 Not tainted [ 56.787745][ T3608] ------------------------------------------------------ [ 56.794738][ T3608] syz-executor236/3608 is trying to acquire lock: [ 56.801129][ T3608] ffffffff8cb4d8e8 (nci_mutex){+.+.}-{3:3}, at: virtual_nci_close+0x13/0x40 [ 56.809813][ T3608] [ 56.809813][ T3608] but task is already holding lock: [ 56.817153][ T3608] ffff888016d2f350 (&ndev->req_lock){+.+.}-{3:3}, at: nci_close_device+0x6d/0x370 [ 56.826362][ T3608] [ 56.826362][ T3608] which lock already depends on the new lock. [ 56.826362][ T3608] [ 56.836740][ T3608] [ 56.836740][ T3608] the existing dependency chain (in reverse order) is: [ 56.845731][ T3608] [ 56.845731][ T3608] -> #3 (&ndev->req_lock){+.+.}-{3:3}: [ 56.853350][ T3608] __mutex_lock+0x12f/0x1350 [ 56.858448][ T3608] nci_start_poll+0x684/0x900 [ 56.863626][ T3608] nfc_start_poll+0x18e/0x320 [ 56.868807][ T3608] nfc_genl_start_poll+0x1a8/0x480 [ 56.874426][ T3608] genl_family_rcv_msg_doit+0x228/0x320 [ 56.880478][ T3608] genl_rcv_msg+0x441/0x780 [ 56.885484][ T3608] netlink_rcv_skb+0x153/0x420 [ 56.890751][ T3608] genl_rcv+0x24/0x40 [ 56.895237][ T3608] netlink_unicast+0x543/0x7f0 [ 56.900502][ T3608] netlink_sendmsg+0x917/0xe10 [ 56.905779][ T3608] sock_sendmsg+0xcf/0x120 [ 56.910695][ T3608] ____sys_sendmsg+0x712/0x8c0 [ 56.915964][ T3608] ___sys_sendmsg+0x110/0x1b0 [ 56.921142][ T3608] __sys_sendmsg+0xf3/0x1c0 [ 56.926148][ T3608] do_syscall_64+0x35/0xb0 [ 56.931067][ T3608] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 56.937466][ T3608] [ 56.937466][ T3608] -> #2 (&genl_data->genl_data_mutex){+.+.}-{3:3}: [ 56.946128][ T3608] __mutex_lock+0x12f/0x1350 [ 56.951227][ T3608] nfc_urelease_event_work+0x13f/0x2d0 [ 56.957196][ T3608] process_one_work+0x9bf/0x1710 [ 56.962655][ T3608] worker_thread+0x665/0x1080 [ 56.967837][ T3608] kthread+0x2e4/0x3a0 [ 56.972407][ T3608] ret_from_fork+0x1f/0x30 [ 56.977330][ T3608] [ 56.977330][ T3608] -> #1 (nfc_devlist_mutex){+.+.}-{3:3}: [ 56.985127][ T3608] __mutex_lock+0x12f/0x1350 [ 56.990225][ T3608] nfc_register_device+0x2e/0x3a0 [ 56.995755][ T3608] nci_register_device+0x7c7/0xb50 [ 57.001370][ T3608] virtual_ncidev_open+0x6d/0x110 [ 57.006903][ T3608] misc_open+0x376/0x4a0 [ 57.011648][ T3608] chrdev_open+0x266/0x770 [ 57.016572][ T3608] do_dentry_open+0x6cc/0x13f0 [ 57.021845][ T3608] path_openat+0x1bf6/0x2860 [ 57.026942][ T3608] do_filp_open+0x1b6/0x400 [ 57.031953][ T3608] do_sys_openat2+0x16d/0x4c0 [ 57.037129][ T3608] __x64_sys_openat+0x13f/0x1f0 [ 57.042479][ T3608] do_syscall_64+0x35/0xb0 [ 57.047399][ T3608] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.053801][ T3608] [ 57.053801][ T3608] -> #0 (nci_mutex){+.+.}-{3:3}: [ 57.060901][ T3608] __lock_acquire+0x2a43/0x56d0 [ 57.066254][ T3608] lock_acquire+0x1df/0x630 [ 57.071258][ T3608] __mutex_lock+0x12f/0x1350 [ 57.076351][ T3608] virtual_nci_close+0x13/0x40 [ 57.081618][ T3608] nci_close_device+0x231/0x370 [ 57.086969][ T3608] nci_unregister_device+0x34/0x310 [ 57.092672][ T3608] virtual_ncidev_close+0x6d/0x90 [ 57.098195][ T3608] __fput+0x27c/0xa90 [ 57.102679][ T3608] task_work_run+0x16b/0x270 [ 57.107775][ T3608] do_exit+0xb35/0x2a20 [ 57.112439][ T3608] do_group_exit+0xd0/0x2a0 [ 57.117441][ T3608] get_signal+0x21a1/0x2430 [ 57.122449][ T3608] arch_do_signal_or_restart+0x82/0x2300 [ 57.128583][ T3608] exit_to_user_mode_prepare+0x15f/0x250 [ 57.134721][ T3608] syscall_exit_to_user_mode+0x19/0x50 [ 57.140687][ T3608] do_syscall_64+0x42/0xb0 [ 57.145610][ T3608] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.152006][ T3608] [ 57.152006][ T3608] other info that might help us debug this: [ 57.152006][ T3608] [ 57.162209][ T3608] Chain exists of: [ 57.162209][ T3608] nci_mutex --> &genl_data->genl_data_mutex --> &ndev->req_lock [ 57.162209][ T3608] [ 57.175738][ T3608] Possible unsafe locking scenario: [ 57.175738][ T3608] [ 57.183165][ T3608] CPU0 CPU1 [ 57.188509][ T3608] ---- ---- [ 57.193870][ T3608] lock(&ndev->req_lock); [ 57.198274][ T3608] lock(&genl_data->genl_data_mutex); [ 57.206241][ T3608] lock(&ndev->req_lock); [ 57.213164][ T3608] lock(nci_mutex); [ 57.217051][ T3608] [ 57.217051][ T3608] *** DEADLOCK *** [ 57.217051][ T3608] [ 57.225181][ T3608] 1 lock held by syz-executor236/3608: [ 57.230623][ T3608] #0: ffff888016d2f350 (&ndev->req_lock){+.+.}-{3:3}, at: nci_close_device+0x6d/0x370 [ 57.240259][ T3608] [ 57.240259][ T3608] stack backtrace: [ 57.246124][ T3608] CPU: 1 PID: 3608 Comm: syz-executor236 Not tainted 6.1.0-rc5-syzkaller #0 [ 57.254783][ T3608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 57.264903][ T3608] Call Trace: [ 57.268167][ T3608] [ 57.271081][ T3608] dump_stack_lvl+0xcd/0x134 [ 57.275657][ T3608] check_noncircular+0x25f/0x2e0 [ 57.280585][ T3608] ? print_circular_bug+0x1e0/0x1e0 [ 57.285779][ T3608] ? memcpy+0x39/0x60 [ 57.289766][ T3608] ? desc_read+0x2d6/0x380 [ 57.294182][ T3608] ? _prb_read_valid+0x5f6/0x710 [ 57.299111][ T3608] __lock_acquire+0x2a43/0x56d0 [ 57.303947][ T3608] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 57.309908][ T3608] ? lock_downgrade+0x6e0/0x6e0 [ 57.314756][ T3608] lock_acquire+0x1df/0x630 [ 57.319251][ T3608] ? virtual_nci_close+0x13/0x40 [ 57.324188][ T3608] ? llist_reverse_order+0x60/0x60 [ 57.329386][ T3608] ? lock_release+0x810/0x810 [ 57.334068][ T3608] __mutex_lock+0x12f/0x1350 [ 57.338654][ T3608] ? virtual_nci_close+0x13/0x40 [ 57.343583][ T3608] ? vprintk+0x88/0x90 [ 57.347645][ T3608] ? virtual_nci_close+0x13/0x40 [ 57.352573][ T3608] ? _printk+0xba/0xed [ 57.356641][ T3608] ? mutex_lock_io_nested+0x1190/0x1190 [ 57.362179][ T3608] ? nci_reset_req+0x72/0xa0 [ 57.366755][ T3608] ? nci_generic_req+0xb0/0xb0 [ 57.371509][ T3608] virtual_nci_close+0x13/0x40 [ 57.376258][ T3608] nci_close_device+0x231/0x370 [ 57.381092][ T3608] nci_unregister_device+0x34/0x310 [ 57.386273][ T3608] virtual_ncidev_close+0x6d/0x90 [ 57.391285][ T3608] __fput+0x27c/0xa90 [ 57.395254][ T3608] ? virtual_nci_open+0x10/0x10 [ 57.400095][ T3608] task_work_run+0x16b/0x270 [ 57.404691][ T3608] ? task_work_cancel+0x30/0x30 [ 57.409549][ T3608] ? do_raw_spin_unlock+0x171/0x230 [ 57.414744][ T3608] do_exit+0xb35/0x2a20 [ 57.418907][ T3608] ? get_signal+0x88a/0x2430 [ 57.423492][ T3608] ? mm_update_next_owner+0x7b0/0x7b0 [ 57.428875][ T3608] do_group_exit+0xd0/0x2a0 [ 57.433372][ T3608] get_signal+0x21a1/0x2430 [ 57.437870][ T3608] ? map_id_up+0x178/0x2f0 [ 57.442292][ T3608] ? exit_signals+0x8b0/0x8b0 [ 57.446962][ T3608] ? __task_pid_nr_ns+0x168/0x4b0 [ 57.451994][ T3608] ? lock_downgrade+0x6e0/0x6e0 [ 57.456840][ T3608] arch_do_signal_or_restart+0x82/0x2300 [ 57.462471][ T3608] ? find_held_lock+0x2d/0x110 [ 57.467242][ T3608] ? get_sigframe_size+0x10/0x10 [ 57.472176][ T3608] ? ptrace_notify+0xfa/0x140 [ 57.476849][ T3608] ? lock_downgrade+0x6e0/0x6e0 [ 57.481698][ T3608] ? send_sig+0xfe/0x160 [ 57.485936][ T3608] ? send_sig_info+0x140/0x140 [ 57.490697][ T3608] ? _raw_spin_unlock_irq+0x1f/0x40 [ 57.495901][ T3608] exit_to_user_mode_prepare+0x15f/0x250 [ 57.501536][ T3608] syscall_exit_to_user_mode+0x19/0x50 [ 57.506996][ T3608] do_syscall_64+0x42/0xb0 [ 57.511412][ T3608] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.517301][ T3608] RIP: 0033:0x7f449fd46b89 [ 57.521709][ T3608] Code: Unable to access opcode bytes at 0x7f449fd46b5f. [ 57.528712][ T3608] RSP: 002b:00007f449fcf8318 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 57.537119][ T3608] RAX: 0000000000000024 RBX: 00007f449fdd04e8 RCX: 00007f449fd46b89 [ 57.545089][ T3608] RDX: 0000000000000000 RSI: 0000000020000440 RDI: 0000000000000004 [ 57.553053][ T3608] RBP: 00007f449fdd04e0 R08: 0000000000000003 R09: 0000000000000000 [pid 3608] +++ exited with 0 +++ +++ exited with 0 +++ [