Warning: Permanently added '10.128.10.20' (ED25519) to the list of known hosts. 2024/12/31 22:29:12 ignoring optional flag "sandboxArg"="0" 2024/12/31 22:29:12 parsed 1 programs [ 114.678464][ T29] audit: type=1400 audit(1735684152.694:88): avc: denied { node_bind } for pid=5831 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 116.181512][ T29] audit: type=1400 audit(1735684154.194:89): avc: denied { mounton } for pid=5836 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 116.184668][ T5836] cgroup: Unknown subsys name 'net' [ 116.204230][ T29] audit: type=1400 audit(1735684154.194:90): avc: denied { mount } for pid=5836 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 116.233249][ T29] audit: type=1400 audit(1735684154.244:91): avc: denied { unmount } for pid=5836 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 116.400575][ T5836] cgroup: Unknown subsys name 'cpuset' [ 116.407699][ T5836] cgroup: Unknown subsys name 'rlimit' [ 116.590830][ T29] audit: type=1400 audit(1735684154.604:92): avc: denied { setattr } for pid=5836 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 116.614548][ T29] audit: type=1400 audit(1735684154.604:93): avc: denied { create } for pid=5836 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 116.635425][ T29] audit: type=1400 audit(1735684154.604:94): avc: denied { write } for pid=5836 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 116.656563][ T29] audit: type=1400 audit(1735684154.604:95): avc: denied { read } for pid=5836 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 116.677097][ T29] audit: type=1400 audit(1735684154.634:96): avc: denied { mounton } for pid=5836 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 116.701946][ T29] audit: type=1400 audit(1735684154.634:97): avc: denied { mount } for pid=5836 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 116.739030][ T5841] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 117.531670][ T5836] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 119.022348][ T5846] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 119.813800][ T35] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 119.825410][ T35] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 119.842996][ T3492] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 119.851146][ T3492] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 120.160515][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 120.160529][ T29] audit: type=1400 audit(1735684158.174:123): avc: denied { create } for pid=5885 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 120.187004][ T29] audit: type=1400 audit(1735684158.194:124): avc: denied { sys_admin } for pid=5885 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 120.276741][ T29] audit: type=1400 audit(1735684158.284:125): avc: denied { sys_chroot } for pid=5886 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 120.376240][ T29] audit: type=1401 audit(1735684158.384:126): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 120.405330][ T29] audit: type=1400 audit(1735684158.414:127): avc: denied { create } for pid=5893 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 120.426774][ T29] audit: type=1400 audit(1735684158.414:128): avc: denied { read write } for pid=5893 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 120.452059][ T29] audit: type=1400 audit(1735684158.414:129): avc: denied { open } for pid=5893 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 120.452512][ T5895] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 120.475915][ T29] audit: type=1400 audit(1735684158.424:130): avc: denied { ioctl } for pid=5893 comm="syz-executor" path="socket:[5335]" dev="sockfs" ino=5335 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 120.484427][ T5895] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 120.516192][ T5895] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 120.528410][ T5895] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 120.536191][ T5895] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 120.543796][ T5895] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 120.967602][ T29] audit: type=1400 audit(1735684158.974:131): avc: denied { module_request } for pid=5906 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 120.994086][ T5906] chnl_net:caif_netlink_parms(): no params data found [ 121.026325][ T5906] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.033690][ T5906] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.041743][ T5906] bridge_slave_0: entered allmulticast mode [ 121.048300][ T5906] bridge_slave_0: entered promiscuous mode [ 121.057296][ T5906] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.064492][ T5906] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.071728][ T5906] bridge_slave_1: entered allmulticast mode [ 121.078180][ T5906] bridge_slave_1: entered promiscuous mode [ 121.096262][ T5906] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 121.107067][ T5906] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 121.128454][ T5906] team0: Port device team_slave_0 added [ 121.135553][ T5906] team0: Port device team_slave_1 added [ 121.150362][ T5906] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 121.157312][ T5906] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 121.183482][ T5906] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 121.195471][ T5906] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 121.202535][ T5906] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 121.228770][ T5906] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 121.257079][ T5906] hsr_slave_0: entered promiscuous mode [ 121.263382][ T5906] hsr_slave_1: entered promiscuous mode [ 121.345367][ T5906] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 121.354019][ T5906] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 121.362431][ T5906] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 121.372952][ T5906] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 121.389454][ T5906] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.396542][ T5906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.404196][ T5906] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.411250][ T5906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.452515][ T5906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.465450][ T35] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.473813][ T35] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.485614][ T5906] 8021q: adding VLAN 0 to HW filter on device team0 [ 121.495983][ T3576] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.503046][ T3576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.514569][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.521642][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.562870][ T29] audit: type=1400 audit(1735684159.574:132): avc: denied { sys_module } for pid=5906 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 121.613869][ T5906] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 121.636301][ T5906] veth0_vlan: entered promiscuous mode [ 121.644668][ T5906] veth1_vlan: entered promiscuous mode [ 121.662590][ T5906] veth0_macvtap: entered promiscuous mode [ 121.670481][ T5906] veth1_macvtap: entered promiscuous mode [ 121.682451][ T5906] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 121.693923][ T5906] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 121.704024][ T5906] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.712834][ T5906] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.721855][ T5906] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.730724][ T5906] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.811588][ T3576] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.889198][ T3576] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.945377][ T3576] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.026039][ T3576] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2024/12/31 22:29:20 executed programs: 0 [ 122.187549][ T5895] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 122.195362][ T5895] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 122.202999][ T5895] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 122.211217][ T5895] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 122.219565][ T5895] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 122.226712][ T5895] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 122.299853][ T5929] chnl_net:caif_netlink_parms(): no params data found [ 122.331077][ T5929] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.338306][ T5929] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.345352][ T5929] bridge_slave_0: entered allmulticast mode [ 122.351977][ T5929] bridge_slave_0: entered promiscuous mode [ 122.359738][ T5929] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.366805][ T5929] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.373923][ T5929] bridge_slave_1: entered allmulticast mode [ 122.380979][ T5929] bridge_slave_1: entered promiscuous mode [ 122.396666][ T5929] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 122.407106][ T5929] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 122.426553][ T5929] team0: Port device team_slave_0 added [ 122.433306][ T5929] team0: Port device team_slave_1 added [ 122.446069][ T5929] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 122.453027][ T5929] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 122.479766][ T5929] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 122.491920][ T5929] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 122.499017][ T5929] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 122.525262][ T5929] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 122.551697][ T5929] hsr_slave_0: entered promiscuous mode [ 122.557632][ T5929] hsr_slave_1: entered promiscuous mode [ 122.564856][ T5929] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 122.572708][ T5929] Cannot create hsr debugfs directory [ 124.328640][ T54] Bluetooth: hci0: command tx timeout [ 125.156086][ T3576] bridge_slave_1: left allmulticast mode [ 125.162094][ T3576] bridge_slave_1: left promiscuous mode [ 125.168259][ T3576] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.180522][ T3576] bridge_slave_0: left allmulticast mode [ 125.186173][ T3576] bridge_slave_0: left promiscuous mode [ 125.192104][ T3576] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.222064][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 125.222078][ T29] audit: type=1400 audit(1735684163.234:135): avc: denied { read } for pid=5939 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.251973][ T29] audit: type=1400 audit(1735684163.244:136): avc: denied { open } for pid=5939 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.277274][ T29] audit: type=1400 audit(1735684163.244:137): avc: denied { getattr } for pid=5939 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.393334][ T29] audit: type=1400 audit(1735684163.404:138): avc: denied { write } for pid=5938 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.418659][ T29] audit: type=1400 audit(1735684163.404:139): avc: denied { add_name } for pid=5938 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.443364][ T29] audit: type=1400 audit(1735684163.444:140): avc: denied { remove_name } for pid=5949 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1914 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.503108][ T3576] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 125.513028][ T3576] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 125.523253][ T3576] bond0 (unregistering): Released all slaves [ 125.622993][ T3576] hsr_slave_0: left promiscuous mode [ 125.631085][ T3576] hsr_slave_1: left promiscuous mode [ 125.636849][ T3576] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 125.644502][ T3576] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 125.656800][ T3576] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 125.664252][ T3576] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 125.681619][ T3576] veth1_macvtap: left promiscuous mode [ 125.689072][ T3576] veth0_macvtap: left promiscuous mode [ 125.694628][ T3576] veth1_vlan: left promiscuous mode [ 125.702121][ T3576] veth0_vlan: left promiscuous mode [ 125.907639][ T3576] team0 (unregistering): Port device team_slave_1 removed [ 125.926829][ T3576] team0 (unregistering): Port device team_slave_0 removed [ 126.272269][ T5929] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 126.294380][ T5929] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 126.308834][ T5929] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 126.320721][ T5929] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 126.376986][ T5929] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.401640][ T5929] 8021q: adding VLAN 0 to HW filter on device team0 [ 126.411580][ T54] Bluetooth: hci0: command tx timeout [ 126.418882][ T3492] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.425923][ T3492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.436713][ T3492] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.443796][ T3492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.613021][ T5929] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 126.672671][ T5929] veth0_vlan: entered promiscuous mode [ 126.691442][ T5929] veth1_vlan: entered promiscuous mode [ 126.727820][ T5929] veth0_macvtap: entered promiscuous mode [ 126.737266][ T5929] veth1_macvtap: entered promiscuous mode [ 126.752304][ T5929] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 126.764803][ T5929] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 126.775676][ T5929] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.785623][ T5929] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.795076][ T5929] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.805838][ T5929] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.858828][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 126.866638][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 126.892254][ T3576] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 126.900747][ T3576] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 126.924884][ T29] audit: type=1400 audit(1735684164.934:141): avc: denied { mount } for pid=5929 comm="syz-executor" name="/" dev="gadgetfs" ino=7174 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 126.979578][ T29] audit: type=1400 audit(1735684164.984:142): avc: denied { read write } for pid=6013 comm="syz.0.16" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 127.003614][ T29] audit: type=1400 audit(1735684164.984:143): avc: denied { open } for pid=6013 comm="syz.0.16" path="/dev/raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 127.032751][ T29] audit: type=1400 audit(1735684164.984:144): avc: denied { ioctl } for pid=6013 comm="syz.0.16" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 127.219318][ T6008] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 127.380815][ T6008] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 127.391991][ T6008] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 127.401097][ T6008] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 127.412367][ T6008] usb 1-1: config 0 descriptor?? [ 127.822467][ T6008] keytouch 0003:0926:3333.0001: fixing up Keytouch IEC report descriptor [ 127.833014][ T6008] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.0001/input/input5 [ 127.906346][ T6008] keytouch 0003:0926:3333.0001: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 128.033989][ T6008] [ 128.033995][ T6008] ====================================================== [ 128.033999][ T6008] WARNING: possible circular locking dependency detected [ 128.034003][ T6008] 6.13.0-rc5-syzkaller-00004-gccb98ccef0e5 #0 Not tainted [ 128.034009][ T6008] ------------------------------------------------------ [ 128.034012][ T6008] kworker/1:3/6008 is trying to acquire lock: [ 128.034018][ T6008] ffff88801b0990b8 (&buf->lock){+.+.}-{4:4}, at: tty_buffer_flush+0x72/0x310 [ 128.034044][ T6008] [ 128.034044][ T6008] but task is already holding lock: [ 128.034046][ T6008] ffffffff8e1a9040 (console_lock){+.+.}-{0:0}, at: vc_SAK+0x13/0x310 [ 128.034068][ T6008] [ 128.034068][ T6008] which lock already depends on the new lock. [ 128.034068][ T6008] [ 128.034071][ T6008] [ 128.034071][ T6008] the existing dependency chain (in reverse order) is: [ 128.034074][ T6008] [ 128.034074][ T6008] -> #2 (console_lock){+.+.}-{0:0}: [ 128.034086][ T6008] console_lock+0x7a/0xa0 [ 128.034099][ T6008] con_flush_chars+0x5e/0x80 [ 128.034110][ T6008] n_tty_receive_buf_common+0xa99/0x1980 [ 128.034122][ T6008] tty_ldisc_receive_buf+0xa2/0x190 [ 128.034134][ T6008] tty_port_default_receive_buf+0x70/0xb0 [ 128.034143][ T6008] flush_to_ldisc+0x264/0x780 [ 128.034155][ T6008] process_one_work+0x9c5/0x1ba0 [ 128.034164][ T6008] worker_thread+0x6c8/0xf00 [ 128.034173][ T6008] kthread+0x2c1/0x3a0 [ 128.034184][ T6008] ret_from_fork+0x45/0x80 [ 128.034192][ T6008] ret_from_fork_asm+0x1a/0x30 [ 128.034205][ T6008] [ 128.034205][ T6008] -> #1 (&tty->termios_rwsem){++++}-{4:4}: [ 128.034217][ T6008] down_read+0x9a/0x330 [ 128.034230][ T6008] n_tty_receive_buf_common+0x85/0x1980 [ 128.034240][ T6008] tty_ldisc_receive_buf+0xa2/0x190 [ 128.034252][ T6008] tty_port_default_receive_buf+0x70/0xb0 [ 128.034261][ T6008] flush_to_ldisc+0x264/0x780 [ 128.034273][ T6008] process_one_work+0x9c5/0x1ba0 [ 128.034281][ T6008] worker_thread+0x6c8/0xf00 [ 128.034290][ T6008] kthread+0x2c1/0x3a0 [ 128.034300][ T6008] ret_from_fork+0x45/0x80 [ 128.034308][ T6008] ret_from_fork_asm+0x1a/0x30 [ 128.034319][ T6008] [ 128.034319][ T6008] -> #0 (&buf->lock){+.+.}-{4:4}: [ 128.034331][ T6008] __lock_acquire+0x249e/0x3c40 [ 128.034340][ T6008] lock_acquire.part.0+0x11b/0x380 [ 128.034349][ T6008] __mutex_lock+0x19b/0xa60 [ 128.034360][ T6008] tty_buffer_flush+0x72/0x310 [ 128.034367][ T6008] tty_ldisc_flush+0x64/0xe0 [ 128.034378][ T6008] __do_SAK+0x6a1/0x800 [ 128.034386][ T6008] vc_SAK+0x7f/0x310 [ 128.034395][ T6008] process_one_work+0x9c5/0x1ba0 [ 128.034404][ T6008] worker_thread+0x6c8/0xf00 [ 128.034412][ T6008] kthread+0x2c1/0x3a0 [ 128.034422][ T6008] ret_from_fork+0x45/0x80 [ 128.034430][ T6008] ret_from_fork_asm+0x1a/0x30 [ 128.034442][ T6008] [ 128.034442][ T6008] other info that might help us debug this: [ 128.034442][ T6008] [ 128.034444][ T6008] Chain exists of: [ 128.034444][ T6008] &buf->lock --> &tty->termios_rwsem --> console_lock [ 128.034444][ T6008] [ 128.034458][ T6008] Possible unsafe locking scenario: [ 128.034458][ T6008] [ 128.034460][ T6008] CPU0 CPU1 [ 128.034463][ T6008] ---- ---- [ 128.034465][ T6008] lock(console_lock); [ 128.034471][ T6008] lock(&tty->termios_rwsem); [ 128.034483][ T6008] lock(console_lock); [ 128.034489][ T6008] lock(&buf->lock); [ 128.034495][ T6008] [ 128.034495][ T6008] *** DEADLOCK *** [ 128.034495][ T6008] [ 128.034497][ T6008] 4 locks held by kworker/1:3/6008: [ 128.034502][ T6008] #0: ffff88801b078948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 [ 128.034524][ T6008] #1: ffffc90003cafd80 ((work_completion)(&vc_cons[currcons].SAK_work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 [ 128.034546][ T6008] #2: ffffffff8e1a9040 (console_lock){+.+.}-{0:0}, at: vc_SAK+0x13/0x310 [ 128.034568][ T6008] #3: ffff8880798a40a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_flush+0x1c/0xe0 [ 128.034592][ T6008] [ 128.034592][ T6008] stack backtrace: [ 128.034596][ T6008] CPU: 1 UID: 0 PID: 6008 Comm: kworker/1:3 Not tainted 6.13.0-rc5-syzkaller-00004-gccb98ccef0e5 #0 [ 128.034606][ T6008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 128.034612][ T6008] Workqueue: events vc_SAK [ 128.034623][ T6008] Call Trace: [ 128.034627][ T6008] [ 128.034631][ T6008] dump_stack_lvl+0x116/0x1f0 [ 128.034644][ T6008] print_circular_bug+0x419/0x5d0 [ 128.034654][ T6008] check_noncircular+0x31a/0x400 [ 128.034663][ T6008] ? __pfx_check_noncircular+0x10/0x10 [ 128.034673][ T6008] ? lockdep_lock+0xc6/0x200 [ 128.034686][ T6008] ? add_lock_to_list+0x17d/0x390 [ 128.034700][ T6008] __lock_acquire+0x249e/0x3c40 [ 128.034711][ T6008] ? __pfx___lock_acquire+0x10/0x10 [ 128.034722][ T6008] lock_acquire.part.0+0x11b/0x380 [ 128.034732][ T6008] ? tty_buffer_flush+0x72/0x310 [ 128.034740][ T6008] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 128.034750][ T6008] ? rcu_is_watching+0x12/0xc0 [ 128.034764][ T6008] ? trace_lock_acquire+0x14e/0x1f0 [ 128.034776][ T6008] ? __pfx___lock_acquire+0x10/0x10 [ 128.034786][ T6008] ? tty_buffer_flush+0x72/0x310 [ 128.034794][ T6008] ? lock_acquire+0x2f/0xb0 [ 128.034803][ T6008] ? tty_buffer_flush+0x72/0x310 [ 128.034811][ T6008] __mutex_lock+0x19b/0xa60 [ 128.034822][ T6008] ? tty_buffer_flush+0x72/0x310 [ 128.034831][ T6008] ? tty_buffer_flush+0x72/0x310 [ 128.034838][ T6008] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 128.034848][ T6008] ? __pfx___mutex_lock+0x10/0x10 [ 128.034860][ T6008] ? trace_lock_acquire+0x14e/0x1f0 [ 128.034872][ T6008] ? lock_acquire.part.0+0x11b/0x380 [ 128.034882][ T6008] ? tty_ldisc_flush+0x1c/0xe0 [ 128.034895][ T6008] ? ldsem_down_read_trylock+0x11b/0x180 [ 128.034906][ T6008] ? tty_buffer_flush+0x72/0x310 [ 128.034913][ T6008] tty_buffer_flush+0x72/0x310 [ 128.034922][ T6008] tty_ldisc_flush+0x64/0xe0 [ 128.034934][ T6008] __do_SAK+0x6a1/0x800 [ 128.034943][ T6008] ? lock_acquire+0x2f/0xb0 [ 128.034952][ T6008] ? vc_SAK+0x13/0x310 [ 128.034963][ T6008] vc_SAK+0x7f/0x310 [ 128.034973][ T6008] process_one_work+0x9c5/0x1ba0 [ 128.034984][ T6008] ? __pfx_console_callback+0x10/0x10 [ 128.034993][ T6008] ? __pfx_process_one_work+0x10/0x10 [ 128.035002][ T6008] ? rcu_is_watching+0x12/0xc0 [ 128.035015][ T6008] ? assign_work+0x1a0/0x250 [ 128.035024][ T6008] worker_thread+0x6c8/0xf00 [ 128.035035][ T6008] ? __kthread_parkme+0x148/0x220 [ 128.035047][ T6008] ? __pfx_worker_thread+0x10/0x10 [ 128.035056][ T6008] kthread+0x2c1/0x3a0 [ 128.035068][ T6008] ? _raw_spin_unlock_irq+0x23/0x50 [ 128.035078][ T6008] ? __pfx_kthread+0x10/0x10 [ 128.035089][ T6008] ret_from_fork+0x45/0x80 [ 128.035097][ T6008] ? __pfx_kthread+0x10/0x10 [ 128.035109][ T6008] ret_from_fork_asm+0x1a/0x30 [ 128.035123][ T6008] [ 128.035598][ T6008] tty tty1: SAK: killed process 6013 (syz.0.16): by fd#3 [ 128.037280][ T8] usb 1-1: USB disconnect, device number 2 [ 128.499721][ T54] Bluetooth: hci0: command tx timeout