Warning: Permanently added '[localhost]:33738' (ED25519) to the list of known hosts. [ 59.803364][ T40] audit: type=1400 audit(1767464506.471:62): avc: denied { execute } for pid=5933 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.812034][ T40] audit: type=1400 audit(1767464506.471:63): avc: denied { execute_no_trans } for pid=5933 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/01/03 18:21:47 parsed 1 programs [ 61.278574][ T40] audit: type=1400 audit(1767464507.951:64): avc: denied { node_bind } for pid=5933 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.386892][ T40] audit: type=1400 audit(1767464510.051:65): avc: denied { mounton } for pid=5943 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.395936][ T40] audit: type=1400 audit(1767464510.061:66): avc: denied { mount } for pid=5943 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.402158][ T5943] cgroup: Unknown subsys name 'net' [ 63.408531][ T40] audit: type=1400 audit(1767464510.081:67): avc: denied { unmount } for pid=5943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.562530][ T5943] cgroup: Unknown subsys name 'cpuset' [ 63.569006][ T5943] cgroup: Unknown subsys name 'rlimit' [ 63.753651][ T40] audit: type=1400 audit(1767464510.421:68): avc: denied { setattr } for pid=5943 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.768195][ T40] audit: type=1400 audit(1767464510.421:69): avc: denied { create } for pid=5943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.779794][ T40] audit: type=1400 audit(1767464510.421:70): avc: denied { write } for pid=5943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.786569][ T40] audit: type=1400 audit(1767464510.421:71): avc: denied { read } for pid=5943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.806132][ T5945] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 64.727472][ T5943] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 66.314130][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 66.314143][ T40] audit: type=1400 audit(1767464512.981:82): avc: denied { execmem } for pid=5950 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.323069][ T40] audit: type=1400 audit(1767464512.991:83): avc: denied { read } for pid=5951 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.329672][ T40] audit: type=1400 audit(1767464512.991:84): avc: denied { open } for pid=5951 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.336741][ T40] audit: type=1400 audit(1767464512.991:85): avc: denied { mounton } for pid=5951 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 66.360795][ T40] audit: type=1400 audit(1767464513.031:86): avc: denied { mount } for pid=5951 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 66.368931][ T40] audit: type=1400 audit(1767464513.031:87): avc: denied { mounton } for pid=5951 comm="syz-executor" path="/syzkaller.1LTdzM/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 66.376959][ T40] audit: type=1400 audit(1767464513.031:88): avc: denied { mount } for pid=5951 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 66.383612][ T40] audit: type=1400 audit(1767464513.031:89): avc: denied { mounton } for pid=5951 comm="syz-executor" path="/syzkaller.1LTdzM/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 66.391633][ T40] audit: type=1400 audit(1767464513.031:90): avc: denied { mounton } for pid=5951 comm="syz-executor" path="/syzkaller.1LTdzM/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7325 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 66.400559][ T40] audit: type=1400 audit(1767464513.041:91): avc: denied { unmount } for pid=5951 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 66.411918][ T5951] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 67.033467][ T5967] chnl_net:caif_netlink_parms(): no params data found [ 67.122161][ T5967] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.125177][ T5967] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.127581][ T5967] bridge_slave_0: entered allmulticast mode [ 67.131713][ T5967] bridge_slave_0: entered promiscuous mode [ 67.137254][ T5967] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.139620][ T5967] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.141951][ T5967] bridge_slave_1: entered allmulticast mode [ 67.144738][ T5967] bridge_slave_1: entered promiscuous mode [ 67.167815][ T5967] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.175324][ T5967] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.204754][ T5967] team0: Port device team_slave_0 added [ 67.209624][ T5967] team0: Port device team_slave_1 added [ 67.233757][ T5967] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.237219][ T5967] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.248188][ T5967] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.256122][ T5967] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.259103][ T5967] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.269531][ T5967] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.306640][ T5967] hsr_slave_0: entered promiscuous mode [ 67.309080][ T5967] hsr_slave_1: entered promiscuous mode [ 67.459165][ T5967] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 67.469332][ T5967] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 67.476068][ T5967] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 67.483676][ T5967] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 67.507527][ T5967] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.510082][ T5967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.514293][ T5967] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.517125][ T5967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.552122][ T5967] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.565099][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.572079][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.581186][ T5967] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.588962][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.591955][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.599630][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.601972][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.715511][ T5967] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.744674][ T5967] veth0_vlan: entered promiscuous mode [ 67.750994][ T5967] veth1_vlan: entered promiscuous mode [ 67.770353][ T5967] veth0_macvtap: entered promiscuous mode [ 67.774946][ T5967] veth1_macvtap: entered promiscuous mode [ 67.784271][ T5967] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.792508][ T5967] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.802548][ T1146] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.808058][ T1146] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.813203][ T1146] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.816688][ T1146] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.947520][ T1146] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.009004][ T1146] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.090388][ T1146] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.164822][ T1146] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.859495][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.865826][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.891833][ T1208] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.895105][ T1208] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.366227][ T6041] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.369832][ T6041] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.373176][ T6041] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.376375][ T6041] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.380125][ T6041] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 2026/01/03 18:21:56 executed programs: 0 [ 69.745955][ T5296] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.749500][ T5296] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.752981][ T5296] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.756736][ T5296] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.760282][ T5296] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.871002][ T6052] chnl_net:caif_netlink_parms(): no params data found [ 69.946957][ T6052] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.950247][ T6052] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.952674][ T6052] bridge_slave_0: entered allmulticast mode [ 69.955388][ T6052] bridge_slave_0: entered promiscuous mode [ 69.959229][ T6052] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.961880][ T6052] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.964599][ T6052] bridge_slave_1: entered allmulticast mode [ 69.967810][ T6052] bridge_slave_1: entered promiscuous mode [ 69.984132][ T6052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.989842][ T6052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.006923][ T6052] team0: Port device team_slave_0 added [ 70.010459][ T6052] team0: Port device team_slave_1 added [ 70.026552][ T6052] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.029250][ T6052] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.038363][ T6052] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.042892][ T6052] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.045229][ T6052] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.053767][ T6052] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.077820][ T6052] hsr_slave_0: entered promiscuous mode [ 70.080173][ T6052] hsr_slave_1: entered promiscuous mode [ 70.082436][ T6052] debugfs: 'hsr0' already exists in 'hsr' [ 70.084339][ T6052] Cannot create hsr debugfs directory [ 71.256578][ T1146] bridge_slave_1: left allmulticast mode [ 71.259112][ T1146] bridge_slave_1: left promiscuous mode [ 71.261856][ T1146] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.267772][ T1146] bridge_slave_0: left allmulticast mode [ 71.270738][ T1146] bridge_slave_0: left promiscuous mode [ 71.272738][ T1146] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.487984][ T1146] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 71.493469][ T1146] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 71.497623][ T1146] bond0 (unregistering): Released all slaves [ 71.587875][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 71.587896][ T40] audit: type=1400 audit(1767464518.251:112): avc: denied { create } for pid=6064 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.597346][ T40] audit: type=1400 audit(1767464518.251:113): avc: denied { write } for pid=6064 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2090 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.607949][ T40] audit: type=1400 audit(1767464518.251:114): avc: denied { append } for pid=6064 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2090 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.633498][ T40] audit: type=1400 audit(1767464518.301:115): avc: denied { unlink } for pid=6067 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2090 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.648905][ T1146] hsr_slave_0: left promiscuous mode [ 71.652223][ T1146] hsr_slave_1: left promiscuous mode [ 71.655272][ T1146] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 71.659135][ T1146] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 71.663251][ T1146] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 71.666385][ T1146] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 71.685816][ T1146] veth1_macvtap: left promiscuous mode [ 71.689034][ T1146] veth0_macvtap: left promiscuous mode [ 71.692203][ T1146] veth1_vlan: left promiscuous mode [ 71.694551][ T1146] veth0_vlan: left promiscuous mode [ 71.838929][ T5296] Bluetooth: hci0: command tx timeout [ 72.004405][ T1146] team0 (unregistering): Port device team_slave_1 removed [ 72.026096][ T1146] team0 (unregistering): Port device team_slave_0 removed [ 72.624931][ T6052] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.634980][ T6052] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.642904][ T6052] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 72.652571][ T6052] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 72.702967][ T6052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.712934][ T6052] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.720514][ T4285] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.723003][ T4285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.729978][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.732553][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.090773][ T6052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.132852][ T6052] veth0_vlan: entered promiscuous mode [ 73.142900][ T6052] veth1_vlan: entered promiscuous mode [ 73.172866][ T6052] veth0_macvtap: entered promiscuous mode [ 73.183413][ T6052] veth1_macvtap: entered promiscuous mode [ 73.199803][ T6052] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.212950][ T6052] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.222695][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.225477][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.231306][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.234631][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.297788][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.303497][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.317480][ T1208] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.320770][ T1208] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.366257][ T40] audit: type=1400 audit(1767464520.031:116): avc: denied { read write } for pid=6090 comm="syz.0.17" name="uinput" dev="devtmpfs" ino=943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 73.371647][ T6090] input: syz1 as /devices/virtual/input/input5 [ 73.374159][ T40] audit: type=1400 audit(1767464520.041:117): avc: denied { open } for pid=6090 comm="syz.0.17" path="/dev/uinput" dev="devtmpfs" ino=943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 73.382722][ T6090] [ 73.387220][ T40] audit: type=1400 audit(1767464520.041:118): avc: denied { ioctl } for pid=6090 comm="syz.0.17" path="/dev/uinput" dev="devtmpfs" ino=943 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 73.387296][ T6090] ====================================================== [ 73.397442][ T40] audit: type=1400 audit(1767464520.051:119): avc: denied { read } for pid=6090 comm="syz.0.17" name="event4" dev="devtmpfs" ino=2840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.397933][ T6090] WARNING: possible circular locking dependency detected [ 73.405211][ T40] audit: type=1400 audit(1767464520.051:120): avc: denied { open } for pid=6090 comm="syz.0.17" path="/dev/input/event4" dev="devtmpfs" ino=2840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.407237][ T6090] syzkaller #0 Not tainted [ 73.415546][ T40] audit: type=1400 audit(1767464520.051:121): avc: denied { ioctl } for pid=6090 comm="syz.0.17" path="/dev/input/event4" dev="devtmpfs" ino=2840 ioctlcmd=0x4580 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.417063][ T6090] ------------------------------------------------------ [ 73.417071][ T6090] syz.0.17/6090 is trying to acquire lock: [ 73.429450][ T6090] ffff888026307070 (&newdev->mutex){+.+.}-{4:4}, at: uinput_request_submit.part.0+0x25/0x2e0 [ 73.433203][ T6090] [ 73.433203][ T6090] but task is already holding lock: [ 73.435506][ T6090] ffff8880263078b0 (&ff->mutex){+.+.}-{4:4}, at: input_ff_upload+0x1dd/0xc60 [ 73.438627][ T6090] [ 73.438627][ T6090] which lock already depends on the new lock. [ 73.438627][ T6090] [ 73.442570][ T6090] [ 73.442570][ T6090] the existing dependency chain (in reverse order) is: [ 73.445651][ T6090] [ 73.445651][ T6090] -> #3 (&ff->mutex){+.+.}-{4:4}: [ 73.448165][ T6090] __mutex_lock+0x1aa/0x1ca0 [ 73.450156][ T6090] input_ff_flush+0x63/0x1c0 [ 73.451855][ T6090] uinput_dev_flush+0x2a/0x40 [ 73.453479][ T6090] input_flush_device+0xce/0x160 [ 73.455312][ T6090] evdev_release+0x344/0x420 [ 73.456989][ T6090] __fput+0x402/0xb70 [ 73.458528][ T6090] fput_close_sync+0x118/0x260 [ 73.460354][ T6090] __x64_sys_close+0x8b/0x120 [ 73.462260][ T6090] do_syscall_64+0xcd/0xf80 [ 73.464137][ T6090] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.466487][ T6090] [ 73.466487][ T6090] -> #2 (&dev->mutex#2){+.+.}-{4:4}: [ 73.469274][ T6090] __mutex_lock+0x1aa/0x1ca0 [ 73.471392][ T6090] input_register_handle+0xca/0x650 [ 73.473564][ T6090] kbd_connect+0xce/0x180 [ 73.475625][ T6090] input_attach_handler.isra.0+0x176/0x250 [ 73.478192][ T6090] input_register_device+0xab9/0x11b0 [ 73.480505][ T6090] acpi_button_add+0x582/0xb90 [ 73.482650][ T6090] acpi_device_probe+0xc9/0x380 [ 73.484812][ T6090] really_probe+0x241/0xb20 [ 73.486928][ T6090] __driver_probe_device+0x1de/0x470 [ 73.489361][ T6090] driver_probe_device+0x4c/0x1b0 [ 73.491574][ T6090] __driver_attach+0x283/0x5e0 [ 73.493590][ T6090] bus_for_each_dev+0x13e/0x1d0 [ 73.495677][ T6090] bus_add_driver+0x30f/0x6c0 [ 73.497761][ T6090] driver_register+0x15c/0x4b0 [ 73.500045][ T6090] __acpi_bus_register_driver+0xdf/0x130 [ 73.502573][ T6090] acpi_button_driver_init+0x82/0x110 [ 73.505186][ T6090] do_one_initcall+0x123/0x680 [ 73.507278][ T6090] kernel_init_freeable+0x5c8/0x920 [ 73.509570][ T6090] kernel_init+0x1c/0x2b0 [ 73.511466][ T6090] ret_from_fork+0x983/0xb10 [ 73.513433][ T6090] ret_from_fork_asm+0x1a/0x30 [ 73.515446][ T6090] [ 73.515446][ T6090] -> #1 (input_mutex){+.+.}-{4:4}: [ 73.518188][ T6090] __mutex_lock+0x1aa/0x1ca0 [ 73.520425][ T6090] input_register_device+0x992/0x11b0 [ 73.523161][ T6090] uinput_ioctl_handler.isra.0+0x1357/0x1df0 [ 73.525760][ T6090] __x64_sys_ioctl+0x18e/0x210 [ 73.528004][ T6090] do_syscall_64+0xcd/0xf80 [ 73.530080][ T6090] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.532589][ T6090] [ 73.532589][ T6090] -> #0 (&newdev->mutex){+.+.}-{4:4}: [ 73.535399][ T6090] __lock_acquire+0x1669/0x2890 [ 73.537768][ T6090] lock_acquire+0x179/0x330 [ 73.539659][ T6090] __mutex_lock+0x1aa/0x1ca0 [ 73.541582][ T6090] uinput_request_submit.part.0+0x25/0x2e0 [ 73.544030][ T6090] uinput_dev_upload_effect+0x174/0x1f0 [ 73.546665][ T6090] input_ff_upload+0x582/0xc60 [ 73.548910][ T6090] evdev_do_ioctl+0xf40/0x1b30 [ 73.550959][ T6090] evdev_ioctl+0x16f/0x1a0 [ 73.552931][ T6090] __x64_sys_ioctl+0x18e/0x210 [ 73.554845][ T6090] do_syscall_64+0xcd/0xf80 [ 73.556752][ T6090] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.559119][ T6090] [ 73.559119][ T6090] other info that might help us debug this: [ 73.559119][ T6090] [ 73.562882][ T6090] Chain exists of: [ 73.562882][ T6090] &newdev->mutex --> &dev->mutex#2 --> &ff->mutex [ 73.562882][ T6090] [ 73.568059][ T6090] Possible unsafe locking scenario: [ 73.568059][ T6090] [ 73.570829][ T6090] CPU0 CPU1 [ 73.572858][ T6090] ---- ---- [ 73.574953][ T6090] lock(&ff->mutex); [ 73.576464][ T6090] lock(&dev->mutex#2); [ 73.578993][ T6090] lock(&ff->mutex); [ 73.581486][ T6090] lock(&newdev->mutex); [ 73.583257][ T6090] [ 73.583257][ T6090] *** DEADLOCK *** [ 73.583257][ T6090] [ 73.586882][ T6090] 2 locks held by syz.0.17/6090: [ 73.588787][ T6090] #0: ffff888035ed1118 (&evdev->mutex){+.+.}-{4:4}, at: evdev_ioctl+0x7f/0x1a0 [ 73.592092][ T6090] #1: ffff8880263078b0 (&ff->mutex){+.+.}-{4:4}, at: input_ff_upload+0x1dd/0xc60 [ 73.595556][ T6090] [ 73.595556][ T6090] stack backtrace: [ 73.597774][ T6090] CPU: 2 UID: 0 PID: 6090 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) [ 73.597792][ T6090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 [ 73.597801][ T6090] Call Trace: [ 73.597809][ T6090] [ 73.597815][ T6090] dump_stack_lvl+0x116/0x1f0 [ 73.597834][ T6090] print_circular_bug+0x275/0x340 [ 73.597852][ T6090] check_noncircular+0x146/0x160 [ 73.597869][ T6090] __lock_acquire+0x1669/0x2890 [ 73.597886][ T6090] ? save_trace+0x4e/0x380 [ 73.597900][ T6090] lock_acquire+0x179/0x330 [ 73.597915][ T6090] ? uinput_request_submit.part.0+0x25/0x2e0 [ 73.597935][ T6090] ? __pfx___might_resched+0x10/0x10 [ 73.597950][ T6090] __mutex_lock+0x1aa/0x1ca0 [ 73.597969][ T6090] ? uinput_request_submit.part.0+0x25/0x2e0 [ 73.597988][ T6090] ? uinput_request_submit.part.0+0x25/0x2e0 [ 73.598006][ T6090] ? find_held_lock+0x2b/0x80 [ 73.598027][ T6090] ? __pfx___mutex_lock+0x10/0x10 [ 73.598045][ T6090] ? do_raw_spin_unlock+0x172/0x230 [ 73.598064][ T6090] ? _raw_spin_unlock+0x28/0x50 [ 73.598085][ T6090] ? __pfx_uinput_request_reserve_slot+0x10/0x10 [ 73.598106][ T6090] ? rcu_is_watching+0x12/0xc0 [ 73.598119][ T6090] ? trace_contention_end+0xdd/0x110 [ 73.598141][ T6090] ? uinput_request_submit.part.0+0x25/0x2e0 [ 73.598161][ T6090] uinput_request_submit.part.0+0x25/0x2e0 [ 73.598181][ T6090] uinput_dev_upload_effect+0x174/0x1f0 [ 73.598200][ T6090] ? __pfx_uinput_dev_upload_effect+0x10/0x10 [ 73.598222][ T6090] ? __might_fault+0x13b/0x190 [ 73.598237][ T6090] input_ff_upload+0x582/0xc60 [ 73.598256][ T6090] evdev_do_ioctl+0xf40/0x1b30 [ 73.598272][ T6090] ? __pfx_evdev_do_ioctl+0x10/0x10 [ 73.598286][ T6090] ? __pfx___mutex_lock+0x10/0x10 [ 73.598309][ T6090] evdev_ioctl+0x16f/0x1a0 [ 73.598323][ T6090] ? __pfx_evdev_ioctl+0x10/0x10 [ 73.598338][ T6090] __x64_sys_ioctl+0x18e/0x210 [ 73.598355][ T6090] do_syscall_64+0xcd/0xf80 [ 73.598374][ T6090] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.598389][ T6090] RIP: 0033:0x7f6c02f8f7c9 [ 73.598400][ T6090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.598413][ T6090] RSP: 002b:00007ffc2c689858 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 73.598427][ T6090] RAX: ffffffffffffffda RBX: 00007f6c031e5fa0 RCX: 00007f6c02f8f7c9 [ 73.598436][ T6090] RDX: 0000200000000300 RSI: 0000000040304580 RDI: 0000000000000004 [ 73.598445][ T6090] RBP: 00007f6c03013f91 R08: 0000000000000000 R09: 0000000000000000 [ 73.598453][ T6090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 73.598461][ T6090] R13: 00007f6c031e5fa0 R14: 00007f6c031e5fa0 R15: 0000000000000003 [ 73.598474][ T6090] [ 73.918248][ T5296] Bluetooth: hci0: command tx timeout [ 75.998243][ T5296] Bluetooth: hci0: command tx timeout [ 76.400806][ T1420] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.403243][ T1420] ieee802154 phy1 wpan1: encryption failed: -22 [ 78.079194][ T5296] Bluetooth: hci0: command tx timeout