Warning: Permanently added '10.128.0.205' (ED25519) to the list of known hosts. 2025/10/11 16:57:17 parsed 1 programs [ 69.290296][ T30] audit: type=1400 audit(1760201838.419:111): avc: denied { unlink } for pid=4104 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.348233][ T4104] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 70.390193][ T11] cfg80211: failed to load regulatory.db [ 71.067578][ T30] audit: type=1400 audit(1760201840.189:112): avc: denied { read } for pid=4109 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 71.088835][ T30] audit: type=1400 audit(1760201840.189:113): avc: denied { open } for pid=4109 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 71.254402][ T30] audit: type=1401 audit(1760201840.379:114): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 72.905033][ T4143] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 72.913426][ T4143] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 72.921523][ T4143] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 72.929277][ T4143] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 76.313181][ T186] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.321044][ T186] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.333005][ T2261] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.341028][ T2261] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 2025/10/11 16:57:26 executed programs: 0 [ 78.751227][ T4750] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.758939][ T4750] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.766850][ T4750] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.777659][ T4750] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.738481][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.746525][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.749557][ T186] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.761621][ T186] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.827343][ T30] audit: type=1400 audit(1760201850.949:115): avc: denied { read } for pid=5229 comm="syz.1.16" name="uinput" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 81.828840][ T5230] input: syz1 as /devices/virtual/input/input5 [ 81.850311][ T30] audit: type=1400 audit(1760201850.949:116): avc: denied { open } for pid=5229 comm="syz.1.16" path="/dev/uinput" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 81.867679][ T5230] [ 81.879927][ T30] audit: type=1400 audit(1760201850.949:117): avc: denied { ioctl } for pid=5229 comm="syz.1.16" path="/dev/uinput" dev="devtmpfs" ino=673 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 81.882069][ T5230] ====================================================== [ 81.882075][ T5230] WARNING: possible circular locking dependency detected [ 81.906893][ T30] audit: type=1400 audit(1760201850.979:118): avc: denied { read } for pid=2619 comm="acpid" name="event4" dev="devtmpfs" ino=1434 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.913846][ T5230] syzkaller #0 Not tainted [ 81.920849][ T30] audit: type=1400 audit(1760201850.979:119): avc: denied { open } for pid=2619 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=1434 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.943172][ T5230] ------------------------------------------------------ [ 81.943178][ T5230] syz.1.16/5230 is trying to acquire lock: [ 81.943185][ T5230] ffff888175615070 (&newdev->mutex){+.+.}-{4:4} [ 81.947579][ T30] audit: type=1400 audit(1760201850.979:120): avc: denied { ioctl } for pid=2619 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=1434 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.970874][ T5230] , at: uinput_request_submit.part.0+0x1f/0x130 [ 81.970902][ T5230] [ 81.970902][ T5230] but task is already holding lock: [ 81.970906][ T5230] ffff8881756154b0 (&ff->mutex){+.+.}-{4:4}, at: input_ff_upload+0xdf/0x500 [ 81.977909][ T30] audit: type=1400 audit(1760201850.979:121): avc: denied { read } for pid=5229 comm="syz.1.16" name="event4" dev="devtmpfs" ino=1434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.983674][ T5230] [ 81.983674][ T5230] which lock already depends on the new lock. [ 81.983674][ T5230] [ 81.983679][ T5230] [ 81.983679][ T5230] the existing dependency chain (in reverse order) is: [ 81.983684][ T5230] [ 81.983684][ T5230] -> #3 (&ff->mutex){+.+.}-{4:4}: [ 81.983704][ T5230] __mutex_lock+0xc7/0xd10 [ 81.983721][ T5230] input_ff_flush+0x39/0xf0 [ 81.989947][ T30] audit: type=1400 audit(1760201850.979:122): avc: denied { open } for pid=5229 comm="syz.1.16" path="/dev/input/event4" dev="devtmpfs" ino=1434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.014709][ T5230] uinput_dev_flush+0x2a/0x40 [ 82.014734][ T5230] input_flush_device+0x7e/0xe0 [ 82.020956][ T30] audit: type=1400 audit(1760201850.979:123): avc: denied { ioctl } for pid=5229 comm="syz.1.16" path="/dev/input/event4" dev="devtmpfs" ino=1434 ioctlcmd=0x4580 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.028269][ T5230] evdev_release+0x19c/0x1b0 [ 82.159297][ T5230] __fput+0x1c3/0x500 [ 82.163782][ T5230] fput_close_sync+0x69/0x110 [ 82.168962][ T5230] __x64_sys_close+0x4a/0xc0 [ 82.174054][ T5230] do_syscall_64+0x80/0x3d0 [ 82.179063][ T5230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.185454][ T5230] [ 82.185454][ T5230] -> #2 (&dev->mutex#2){+.+.}-{4:4}: [ 82.192899][ T5230] __mutex_lock+0xc7/0xd10 [ 82.197815][ T5230] input_register_handle+0x4e/0x230 [ 82.203526][ T5230] kbd_connect+0x4e/0xb0 [ 82.208273][ T5230] input_attach_handler.isra.0+0xc4/0x120 [ 82.214490][ T5230] input_register_device+0x5de/0x8d0 [ 82.220275][ T5230] acpi_button_add+0x2bf/0x6e0 [ 82.225538][ T5230] acpi_device_probe+0x64/0x1c0 [ 82.230897][ T5230] really_probe+0x136/0x500 [ 82.235898][ T5230] __driver_probe_device+0xcd/0x1e0 [ 82.241593][ T5230] driver_probe_device+0x2a/0x120 [ 82.247114][ T5230] __driver_attach+0x17e/0x2b0 [ 82.252377][ T5230] bus_for_each_dev+0xb5/0x120 [ 82.257644][ T5230] bus_add_driver+0x159/0x320 [ 82.262827][ T5230] driver_register+0x85/0x180 [ 82.268001][ T5230] __acpi_bus_register_driver+0x53/0x70 [ 82.274052][ T5230] acpi_button_driver_init+0x54/0xb0 [ 82.279841][ T5230] do_one_initcall+0xa3/0x4b0 [ 82.285028][ T5230] kernel_init_freeable+0x32b/0x5d0 [ 82.290745][ T5230] kernel_init+0x1b/0x2a0 [ 82.295583][ T5230] ret_from_fork+0x38e/0x3c0 [ 82.300681][ T5230] ret_from_fork_asm+0x1a/0x30 [ 82.305949][ T5230] [ 82.305949][ T5230] -> #1 (input_mutex){+.+.}-{4:4}: [ 82.313217][ T5230] __mutex_lock+0xc7/0xd10 [ 82.318131][ T5230] input_register_device+0x527/0x8d0 [ 82.323914][ T5230] uinput_ioctl_handler.isra.0+0xc92/0x10b0 [ 82.330313][ T5230] __x64_sys_ioctl+0xf4/0x140 [ 82.335492][ T5230] do_syscall_64+0x80/0x3d0 [ 82.340492][ T5230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.346880][ T5230] [ 82.346880][ T5230] -> #0 (&newdev->mutex){+.+.}-{4:4}: [ 82.354590][ T5230] __lock_acquire+0x12e5/0x1b20 [ 82.359940][ T5230] lock_acquire+0xc9/0x2c0 [ 82.364863][ T5230] __mutex_lock+0xc7/0xd10 [ 82.369789][ T5230] uinput_request_submit.part.0+0x1f/0x130 [ 82.376113][ T5230] uinput_dev_upload_effect+0xbb/0xf0 [ 82.381989][ T5230] input_ff_upload+0x36f/0x500 [ 82.387256][ T5230] evdev_do_ioctl+0xaac/0x1150 [ 82.392524][ T5230] evdev_ioctl+0xd3/0xe0 [ 82.397265][ T5230] __x64_sys_ioctl+0xf4/0x140 [ 82.402446][ T5230] do_syscall_64+0x80/0x3d0 [ 82.407449][ T5230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.413838][ T5230] [ 82.413838][ T5230] other info that might help us debug this: [ 82.413838][ T5230] [ 82.424034][ T5230] Chain exists of: [ 82.424034][ T5230] &newdev->mutex --> &dev->mutex#2 --> &ff->mutex [ 82.424034][ T5230] [ 82.436345][ T5230] Possible unsafe locking scenario: [ 82.436345][ T5230] [ 82.443763][ T5230] CPU0 CPU1 [ 82.449099][ T5230] ---- ---- [ 82.454445][ T5230] lock(&ff->mutex); [ 82.458401][ T5230] lock(&dev->mutex#2); [ 82.465137][ T5230] lock(&ff->mutex); [ 82.471615][ T5230] lock(&newdev->mutex); [ 82.475915][ T5230] [ 82.475915][ T5230] *** DEADLOCK *** [ 82.475915][ T5230] [ 82.484028][ T5230] 2 locks held by syz.1.16/5230: [ 82.488933][ T5230] #0: ffff888167ca4918 (&evdev->mutex){+.+.}-{4:4}, at: evdev_ioctl+0x3d/0xe0 [ 82.497870][ T5230] #1: ffff8881756154b0 (&ff->mutex){+.+.}-{4:4}, at: input_ff_upload+0xdf/0x500 [ 82.506983][ T5230] [ 82.506983][ T5230] stack backtrace: [ 82.512872][ T5230] CPU: 0 UID: 0 PID: 5230 Comm: syz.1.16 Not tainted syzkaller #0 PREEMPT(none) [ 82.512892][ T5230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 82.512901][ T5230] Call Trace: [ 82.512907][ T5230] [ 82.512913][ T5230] dump_stack_lvl+0x116/0x1f0 [ 82.512933][ T5230] print_circular_bug+0x26e/0x2f0 [ 82.512952][ T5230] check_noncircular+0x11b/0x130 [ 82.512971][ T5230] __lock_acquire+0x12e5/0x1b20 [ 82.512991][ T5230] lock_acquire+0xc9/0x2c0 [ 82.513010][ T5230] ? uinput_request_submit.part.0+0x1f/0x130 [ 82.513036][ T5230] __mutex_lock+0xc7/0xd10 [ 82.513052][ T5230] ? uinput_request_submit.part.0+0x1f/0x130 [ 82.513076][ T5230] ? uinput_request_submit.part.0+0x1f/0x130 [ 82.513102][ T5230] ? uinput_request_submit.part.0+0x1f/0x130 [ 82.513126][ T5230] uinput_request_submit.part.0+0x1f/0x130 [ 82.513151][ T5230] uinput_dev_upload_effect+0xbb/0xf0 [ 82.513176][ T5230] input_ff_upload+0x36f/0x500 [ 82.513200][ T5230] evdev_do_ioctl+0xaac/0x1150 [ 82.513221][ T5230] evdev_ioctl+0xd3/0xe0 [ 82.513240][ T5230] ? __pfx_evdev_ioctl+0x10/0x10 [ 82.513259][ T5230] __x64_sys_ioctl+0xf4/0x140 [ 82.513286][ T5230] do_syscall_64+0x80/0x3d0 [ 82.513304][ T5230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.513321][ T5230] RIP: 0033:0x7f5834b8e9a9 [ 82.513333][ T5230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.513349][ T5230] RSP: 002b:00007f58345ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 82.513362][ T5230] RAX: ffffffffffffffda RBX: 00007f5834db5fa0 RCX: 00007f5834b8e9a9 [ 82.513373][ T5230] RDX: 0000200000000300 RSI: 0000000040304580 RDI: 0000000000000004 [ 82.513382][ T5230] RBP: 00007f5834c10d69 R08: 0000000000000000 R09: 0000000000000000 [ 82.513392][ T5230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 82.513401][ T5230] R13: 0000000000000000 R14: 00007f5834db5fa0 R15: 00007ffe77b6cc88 [ 82.513413][ T5230] 2025/10/11 16:57:31 executed programs: 3 [ 82.820099][ T5232] input: syz1 as /devices/virtual/input/input6 [ 83.657973][ T5234] input: syz1 as /devices/virtual/input/input7 [ 84.496647][ T5236] input: syz1 as /devices/virtual/input/input8 [ 85.335880][ T5238] input: syz1 as /devices/virtual/input/input9 [ 86.174570][ T5240] input: syz1 as /devices/virtual/input/input10 [ 87.011966][ T5242] input: syz1 as /devices/virtual/input/input11 2025/10/11 16:57:37 executed programs: 9 [ 87.851041][ T5244] input: syz1 as /devices/virtual/input/input12 [ 88.689613][ T5246] input: syz1 as /devices/virtual/input/input13 [ 89.528099][ T5248] input: syz1 as /devices/virtual/input/input14 [ 90.367694][ T5250] input: syz1 as /devices/virtual/input/input15 [ 91.206038][ T5252] input: syz1 as /devices/virtual/input/input16