[ 61.093485][ T36] audit: type=1400 audit(1668578172.965:183): avc: denied { read } for pid=5791 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=1449 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 61.124611][ T36] audit: type=1400 audit(1668578172.985:184): avc: denied { open } for pid=5791 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1449 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 61.225216][ T36] audit: type=1400 audit(1668578173.095:185): avc: denied { create } for pid=5788 comm="dhcpcd-run-hook" name="resolv.conf.lapb9.ipv4ll" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 61.276138][ T36] audit: type=1400 audit(1668578173.095:186): avc: denied { write } for pid=5788 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.lapb9.ipv4ll" dev="tmpfs" ino=1539 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 61.340286][ T36] audit: type=1400 audit(1668578173.095:187): avc: denied { append } for pid=5788 comm="dhcpcd-run-hook" name="resolv.conf.lapb9.ipv4ll" dev="tmpfs" ino=1539 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 61.390181][ T36] audit: type=1400 audit(1668578173.135:188): avc: denied { unlink } for pid=5799 comm="rm" name="resolv.conf.lapb9.ipv4ll" dev="tmpfs" ino=1539 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Warning: Permanently added '10.128.15.196' (ECDSA) to the list of known hosts. 2022/11/16 05:56:21 ignoring optional flag "sandboxArg"="0" 2022/11/16 05:56:21 parsed 1 programs 2022/11/16 05:56:21 executed programs: 0 [ 69.689284][ T36] audit: type=1400 audit(1668578181.555:189): avc: denied { mounton } for pid=5848 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.717642][ T36] audit: type=1400 audit(1668578181.555:190): avc: denied { mount } for pid=5848 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.749932][ T36] audit: type=1400 audit(1668578181.555:191): avc: denied { write } for pid=5848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.776050][ T36] audit: type=1400 audit(1668578181.555:192): avc: denied { read } for pid=5848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.803144][ T36] audit: type=1400 audit(1668578181.645:193): avc: denied { ioctl } for pid=5853 comm="syz-executor.0" path="socket:[27562]" dev="sockfs" ino=27562 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 69.811550][ T5853] IPVS: ftp: loaded support on port[0] = 21 [ 69.830640][ T36] audit: type=1400 audit(1668578181.665:194): avc: denied { read } for pid=5853 comm="syz-executor.0" dev="nsfs" ino=4026531992 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.857387][ T36] audit: type=1400 audit(1668578181.665:195): avc: denied { open } for pid=5853 comm="syz-executor.0" path="net:[4026531992]" dev="nsfs" ino=4026531992 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.881490][ T36] audit: type=1400 audit(1668578181.665:196): avc: denied { mounton } for pid=5853 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 69.927745][ T5853] chnl_net:caif_netlink_parms(): no params data found [ 69.962950][ T5853] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.970119][ T5853] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.978150][ T5853] device bridge_slave_0 entered promiscuous mode [ 69.986394][ T5853] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.994448][ T5853] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.002338][ T5853] device bridge_slave_1 entered promiscuous mode [ 70.018395][ T5853] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.029498][ T5853] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.049717][ T5853] team0: Port device team_slave_0 added [ 70.057268][ T5853] team0: Port device team_slave_1 added [ 70.071933][ T5853] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.080668][ T5853] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.107407][ T5853] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.119600][ T5853] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.126766][ T5853] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.152858][ T5853] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.178806][ T5853] device hsr_slave_0 entered promiscuous mode [ 70.185633][ T5853] device hsr_slave_1 entered promiscuous mode [ 71.266443][ T3199] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.267070][ T3106] cfg80211: failed to load regulatory.db [ 71.274028][ T3199] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.823615][ T4082] Bluetooth: hci0: command 0x0409 tx timeout [ 71.834668][ T5853] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 71.846309][ T5853] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 71.856131][ T5853] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 71.867338][ T5853] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 71.940308][ T5853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.956623][ T4082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.967204][ T4082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.978221][ T5853] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.990621][ T4082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.001431][ T4082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.011748][ T4082] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.019345][ T4082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.039544][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.049060][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.058296][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.068874][ T5413] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.076012][ T5413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.086346][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.095132][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.112553][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.121576][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.131766][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.141771][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.158931][ T5853] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 72.170356][ T5853] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.184353][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.194439][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.204936][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.213795][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.226974][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.243873][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.321403][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.329569][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.340994][ T5853] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.364043][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.374630][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.396387][ T4082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.407079][ T4082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.418255][ T5853] device veth0_vlan entered promiscuous mode [ 72.425761][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.434064][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.447068][ T5853] device veth1_vlan entered promiscuous mode [ 72.470862][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 72.480409][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 72.490002][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.498866][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.511646][ T5853] device veth0_macvtap entered promiscuous mode [ 72.524002][ T5853] device veth1_macvtap entered promiscuous mode [ 72.541955][ T5853] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.551006][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 72.560411][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.569170][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.578020][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.590579][ T5853] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.603444][ T4082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.612180][ T4082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.625331][ T5853] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.634370][ T5853] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.644864][ T5853] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.654108][ T5853] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.731570][ T147] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.746333][ T147] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.759728][ T163] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.761539][ T5402] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 72.769038][ T163] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.788660][ T4082] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 72.861521][ T36] audit: type=1400 audit(1668578184.725:197): avc: denied { ioctl } for pid=5998 comm="syz-executor.0" path="/dev/virtual_nci" dev="devtmpfs" ino=680 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.902922][ T4082] Bluetooth: hci0: command 0x041b tx timeout 2022/11/16 05:56:27 executed programs: 3 [ 75.982749][ T19] Bluetooth: hci0: command 0x040f tx timeout [ 78.062573][ T5952] Bluetooth: hci0: command 0x0419 tx timeout 2022/11/16 05:56:32 executed programs: 9 2022/11/16 05:56:37 executed programs: 15 2022/11/16 05:56:42 executed programs: 21 2022/11/16 05:56:48 executed programs: 27 2022/11/16 05:56:53 executed programs: 33 [ 104.118074][ T6772] [ 104.120411][ T6772] ====================================================== [ 104.127509][ T6772] WARNING: possible circular locking dependency detected [ 104.134814][ T6772] 5.11.0-rc5-syzkaller #0 Not tainted [ 104.140173][ T6772] ------------------------------------------------------ [ 104.147364][ T6772] syz-executor.0/6772 is trying to acquire lock: [ 104.153854][ T6772] ffff888028112350 (&ndev->req_lock){+.+.}-{3:3}, at: nci_start_poll+0x496/0x740 [ 104.163324][ T6772] [ 104.163324][ T6772] but task is already holding lock: [ 104.170870][ T6772] ffff88803140f588 (&genl_data->genl_data_mutex){+.+.}-{3:3}, at: nfc_genl_start_poll+0x175/0x410 [ 104.181789][ T6772] [ 104.181789][ T6772] which lock already depends on the new lock. [ 104.181789][ T6772] [ 104.192252][ T6772] [ 104.192252][ T6772] the existing dependency chain (in reverse order) is: [ 104.201452][ T6772] [ 104.201452][ T6772] -> #3 (&genl_data->genl_data_mutex){+.+.}-{3:3}: [ 104.210242][ T6772] __mutex_lock+0x134/0x1110 [ 104.215680][ T6772] nfc_urelease_event_work+0x116/0x290 [ 104.221867][ T6772] process_one_work+0x84c/0x13b0 [ 104.227455][ T6772] worker_thread+0x598/0xf80 [ 104.232631][ T6772] kthread+0x36f/0x450 [ 104.237280][ T6772] ret_from_fork+0x1f/0x30 [ 104.242474][ T6772] [ 104.242474][ T6772] -> #2 (nfc_devlist_mutex){+.+.}-{3:3}: [ 104.250595][ T6772] __mutex_lock+0x134/0x1110 [ 104.255874][ T6772] nfc_register_device+0x1e/0x2d0 [ 104.261571][ T6772] nci_register_device+0x796/0xaf0 [ 104.267397][ T6772] virtual_ncidev_open+0x44/0xb0 [ 104.273087][ T6772] misc_open+0x2f0/0x410 [ 104.277816][ T6772] chrdev_open+0x20f/0x650 [ 104.282806][ T6772] do_dentry_open+0x42a/0xfb0 [ 104.287986][ T6772] path_openat+0x12cd/0x21d0 [ 104.293250][ T6772] do_filp_open+0x16d/0x390 [ 104.298354][ T6772] do_sys_openat2+0x11e/0x360 [ 104.303614][ T6772] __x64_sys_openat+0x11b/0x1d0 [ 104.308956][ T6772] do_syscall_64+0x2d/0x40 [ 104.313860][ T6772] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.320234][ T6772] [ 104.320234][ T6772] -> #1 (nci_mutex){+.+.}-{3:3}: [ 104.327311][ T6772] __mutex_lock+0x134/0x1110 [ 104.332565][ T6772] virtual_nci_close+0xe/0x40 [ 104.337741][ T6772] nci_dev_up+0x380/0x540 [ 104.342560][ T6772] nfc_dev_up+0x150/0x300 [ 104.347378][ T6772] nfc_genl_dev_up+0x90/0xe0 [ 104.352457][ T6772] genl_family_rcv_msg_doit+0x1e4/0x2f0 [ 104.358493][ T6772] genl_rcv_msg+0x27d/0x490 [ 104.363684][ T6772] netlink_rcv_skb+0x118/0x370 [ 104.368947][ T6772] genl_rcv+0x1f/0x30 [ 104.373423][ T6772] netlink_unicast+0x42e/0x700 [ 104.378682][ T6772] netlink_sendmsg+0x70e/0xbe0 [ 104.383939][ T6772] sock_sendmsg+0xab/0xe0 [ 104.388758][ T6772] ____sys_sendmsg+0x5bf/0x7a0 [ 104.394002][ T6772] ___sys_sendmsg+0xd3/0x150 [ 104.399080][ T6772] __sys_sendmsg+0xb2/0x140 [ 104.404075][ T6772] do_syscall_64+0x2d/0x40 [ 104.408974][ T6772] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.415350][ T6772] [ 104.415350][ T6772] -> #0 (&ndev->req_lock){+.+.}-{3:3}: [ 104.422960][ T6772] __lock_acquire+0x2b2a/0x5500 [ 104.428298][ T6772] lock_acquire+0x1a8/0x720 [ 104.433377][ T6772] __mutex_lock+0x134/0x1110 [ 104.438549][ T6772] nci_start_poll+0x496/0x740 [ 104.443716][ T6772] nfc_start_poll+0x130/0x290 [ 104.448888][ T6772] nfc_genl_start_poll+0x183/0x410 [ 104.454499][ T6772] genl_family_rcv_msg_doit+0x1e4/0x2f0 [ 104.460545][ T6772] genl_rcv_msg+0x27d/0x490 [ 104.465535][ T6772] netlink_rcv_skb+0x118/0x370 [ 104.471003][ T6772] genl_rcv+0x1f/0x30 [ 104.475577][ T6772] netlink_unicast+0x42e/0x700 [ 104.480843][ T6772] netlink_sendmsg+0x70e/0xbe0 [ 104.486100][ T6772] sock_sendmsg+0xab/0xe0 [ 104.490920][ T6772] ____sys_sendmsg+0x5bf/0x7a0 [ 104.496179][ T6772] ___sys_sendmsg+0xd3/0x150 [ 104.501273][ T6772] __sys_sendmsg+0xb2/0x140 [ 104.506264][ T6772] do_syscall_64+0x2d/0x40 [ 104.511864][ T6772] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.518242][ T6772] [ 104.518242][ T6772] other info that might help us debug this: [ 104.518242][ T6772] [ 104.528439][ T6772] Chain exists of: [ 104.528439][ T6772] &ndev->req_lock --> nfc_devlist_mutex --> &genl_data->genl_data_mutex [ 104.528439][ T6772] [ 104.542874][ T6772] Possible unsafe locking scenario: [ 104.542874][ T6772] [ 104.550313][ T6772] CPU0 CPU1 [ 104.556435][ T6772] ---- ---- [ 104.561773][ T6772] lock(&genl_data->genl_data_mutex); [ 104.567968][ T6772] lock(nfc_devlist_mutex); [ 104.575417][ T6772] lock(&genl_data->genl_data_mutex); [ 104.583978][ T6772] lock(&ndev->req_lock); [ 104.588366][ T6772] [ 104.588366][ T6772] *** DEADLOCK *** [ 104.588366][ T6772] [ 104.596575][ T6772] 4 locks held by syz-executor.0/6772: [ 104.602578][ T6772] #0: ffffffff8bdd8b50 (cb_lock){++++}-{3:3}, at: genl_rcv+0x10/0x30 [ 104.610801][ T6772] #1: ffffffff8bdd8c08 (genl_mutex){+.+.}-{3:3}, at: genl_rcv_msg+0x317/0x490 [ 104.619714][ T6772] #2: ffff88803140f588 (&genl_data->genl_data_mutex){+.+.}-{3:3}, at: nfc_genl_start_poll+0x175/0x410 [ 104.630950][ T6772] #3: ffff88803140f190 (&dev->mutex){....}-{3:3}, at: nfc_start_poll+0x33/0x290 [ 104.640037][ T6772] [ 104.640037][ T6772] stack backtrace: [ 104.646138][ T6772] CPU: 0 PID: 6772 Comm: syz-executor.0 Not tainted 5.11.0-rc5-syzkaller #0 [ 104.655137][ T6772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 104.665513][ T6772] Call Trace: [ 104.668784][ T6772] dump_stack+0x9a/0xcc [ 104.672998][ T6772] check_noncircular+0x25f/0x2e0 [ 104.677935][ T6772] ? print_circular_bug+0x480/0x480 [ 104.683117][ T6772] ? do_raw_spin_unlock+0x171/0x230 [ 104.688294][ T6772] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 104.694075][ T6772] ? lockdep_lock+0xc6/0x200 [ 104.698742][ T6772] ? call_rcu_zapped+0xb0/0xb0 [ 104.703574][ T6772] __lock_acquire+0x2b2a/0x5500 [ 104.708408][ T6772] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 104.714356][ T6772] ? find_held_lock+0x2d/0x110 [ 104.719175][ T6772] lock_acquire+0x1a8/0x720 [ 104.723646][ T6772] ? nci_start_poll+0x496/0x740 [ 104.728462][ T6772] ? lock_release+0x710/0x710 [ 104.733104][ T6772] ? do_raw_spin_unlock+0x171/0x230 [ 104.738439][ T6772] __mutex_lock+0x134/0x1110 [ 104.742998][ T6772] ? nci_start_poll+0x496/0x740 [ 104.747818][ T6772] ? nci_start_poll+0x496/0x740 [ 104.752639][ T6772] ? nfc_llcp_build_gb.isra.0+0x271/0x340 [ 104.758325][ T6772] ? mutex_lock_io_nested+0xf60/0xf60 [ 104.763668][ T6772] ? lock_acquire+0x11/0x720 [ 104.768345][ T6772] nci_start_poll+0x496/0x740 [ 104.773091][ T6772] ? nci_dep_link_up+0x170/0x170 [ 104.778490][ T6772] ? mutex_lock_io_nested+0xf60/0xf60 [ 104.783847][ T6772] ? nla_get_range_signed+0x540/0x540 [ 104.789291][ T6772] nfc_start_poll+0x130/0x290 [ 104.794122][ T6772] nfc_genl_start_poll+0x183/0x410 [ 104.799217][ T6772] genl_family_rcv_msg_doit+0x1e4/0x2f0 [ 104.804828][ T6772] ? mutex_lock_io_nested+0xf60/0xf60 [ 104.810354][ T6772] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x230/0x230 [ 104.817798][ T6772] ? __lock_acquire+0x16c2/0x5500 [ 104.822808][ T6772] genl_rcv_msg+0x27d/0x490 [ 104.827375][ T6772] ? genl_get_cmd+0x3c0/0x3c0 [ 104.832045][ T6772] ? lock_acquire+0x1a8/0x720 [ 104.836702][ T6772] ? nfc_genl_dep_link_up+0x200/0x200 [ 104.842145][ T6772] ? lock_release+0x710/0x710 [ 104.846904][ T6772] netlink_rcv_skb+0x118/0x370 [ 104.852504][ T6772] ? genl_get_cmd+0x3c0/0x3c0 [ 104.857346][ T6772] ? netlink_ack+0x9f0/0x9f0 [ 104.862250][ T6772] genl_rcv+0x1f/0x30 [ 104.866209][ T6772] netlink_unicast+0x42e/0x700 [ 104.871626][ T6772] ? netlink_attachskb+0x730/0x730 [ 104.876809][ T6772] ? _copy_from_iter_full+0x193/0x6e0 [ 104.882160][ T6772] netlink_sendmsg+0x70e/0xbe0 [ 104.886988][ T6772] ? netlink_unicast+0x700/0x700 [ 104.892103][ T6772] ? iovec_from_user+0x143/0x290 [ 104.897025][ T6772] ? netlink_unicast+0x700/0x700 [ 104.902162][ T6772] sock_sendmsg+0xab/0xe0 [ 104.906771][ T6772] ____sys_sendmsg+0x5bf/0x7a0 [ 104.912306][ T6772] ? kernel_sendmsg+0x30/0x30 [ 104.917153][ T6772] ? do_recvmmsg+0x540/0x540 [ 104.921973][ T6772] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 104.927938][ T6772] ___sys_sendmsg+0xd3/0x150 [ 104.932596][ T6772] ? sendmsg_copy_msghdr+0x110/0x110 [ 104.938112][ T6772] ? find_held_lock+0x2d/0x110 [ 104.942849][ T6772] ? __fget_files+0x193/0x2b0 [ 104.947612][ T6772] ? lock_downgrade+0x6d0/0x6d0 [ 104.952438][ T6772] ? __fget_files+0x1ab/0x2b0 [ 104.957106][ T6772] ? __fget_light+0xbe/0x220 [ 104.961682][ T6772] ? find_held_lock+0x2d/0x110 [ 104.966431][ T6772] __sys_sendmsg+0xb2/0x140 [ 104.971038][ T6772] ? __sys_sendmsg_sock+0xa0/0xa0 [ 104.976126][ T6772] ? lockdep_hardirqs_on_prepare+0x17b/0x400 [ 104.982088][ T6772] ? syscall_enter_from_user_mode+0x27/0x70 [ 104.988128][ T6772] ? lockdep_hardirqs_on+0x79/0x100 [ 104.993700][ T6772] do_syscall_64+0x2d/0x40 [ 104.998190][ T6772] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.004076][ T6772] RIP: 0033:0x7f2e67179639 [ 105.008468][ T6772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 105.028144][ T6772] RSP: 002b:00007f2e664cb168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 105.036531][ T6772] RAX: ffffffffffffffda RBX: 00007f2e6729a050 RCX: 00007f2e67179639 [ 105.044692][ T6772] RDX: 0000000000000000 RSI: 0000000020000440 RDI: 0000000000000005 [ 105.052645][ T6772] RBP: 00007f2e671d4ae9 R08: 0000000000000000 R09: 0000000000000000 [ 105.060768][ T6772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 105.069062][ T6772] R13: 00007ffe75f0b95f R14: 00007f2e664cb300 R15: 0000000000022000 [ 105.181307][ T6772] nci: nci_start_poll: failed to set local general bytes 2022/11/16 05:56:58 executed programs: 37 [ 107.052403][ T6767] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 107.907439][ T6778] nci: nci_start_poll: failed to set local general bytes [ 110.071704][ T6773] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 110.929402][ T6786] nci: nci_start_poll: failed to set local general bytes 2022/11/16 05:57:04 executed programs: 39 [ 113.095009][ T6780] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 113.951137][ T6788] nci: nci_start_poll: failed to set local general bytes