Warning: Permanently added '10.128.0.208' (ED25519) to the list of known hosts. 2025/05/16 11:57:25 ignoring optional flag "sandboxArg"="0" 2025/05/16 11:57:25 ignoring optional flag "type"="gce" 2025/05/16 11:57:25 parsed 1 programs 2025/05/16 11:57:27 executed programs: 0 [ 60.403085][ T2443] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 61.517035][ T2450] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 61.525507][ T2450] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 61.534271][ T2450] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 61.542646][ T2450] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 64.762893][ T58] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.771213][ T58] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.780108][ T72] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 64.802750][ T58] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.811019][ T58] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.819567][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 64.851171][ T3133] input: syz1 as /devices/virtual/input/input5 [ 64.861205][ T3133] [ 64.863556][ T3133] ====================================================== [ 64.870843][ T3133] WARNING: possible circular locking dependency detected [ 64.877961][ T3133] 5.15.182-syzkaller #0 Not tainted [ 64.883155][ T3133] ------------------------------------------------------ [ 64.890181][ T3133] syz-executor.0/3133 is trying to acquire lock: [ 64.896669][ T3133] ffff88817b00d470 (&newdev->mutex){+.+.}-{3:3}, at: uinput_request_submit.part.0+0x1f/0x130 [ 64.906855][ T3133] [ 64.906855][ T3133] but task is already holding lock: [ 64.914291][ T3133] ffff88817b00d8b0 (&ff->mutex){+.+.}-{3:3}, at: input_ff_upload+0x12a/0x4b0 [ 64.923287][ T3133] [ 64.923287][ T3133] which lock already depends on the new lock. [ 64.923287][ T3133] [ 64.933980][ T3133] [ 64.933980][ T3133] the existing dependency chain (in reverse order) is: [ 64.943239][ T3133] [ 64.943239][ T3133] -> #3 (&ff->mutex){+.+.}-{3:3}: [ 64.950838][ T3133] __mutex_lock+0x60/0x660 [ 64.955781][ T3133] input_ff_flush+0x37/0xc0 [ 64.960827][ T3133] uinput_dev_flush+0x28/0x40 [ 64.966107][ T3133] input_flush_device+0x58/0x80 [ 64.971471][ T3133] evdev_release+0x192/0x1a0 [ 64.976639][ T3133] __fput+0x101/0x430 [ 64.981133][ T3133] task_work_run+0x73/0xb0 [ 64.986081][ T3133] exit_to_user_mode_prepare+0x20b/0x210 [ 64.992320][ T3133] syscall_exit_to_user_mode+0x19/0x60 [ 64.998738][ T3133] do_syscall_64+0x40/0xb0 [ 65.003682][ T3133] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.010274][ T3133] [ 65.010274][ T3133] -> #2 (&dev->mutex#2){+.+.}-{3:3}: [ 65.018275][ T3133] __mutex_lock+0x60/0x660 [ 65.023586][ T3133] input_register_handle+0x2f/0x1b0 [ 65.029338][ T3133] kbd_connect+0x4a/0xb0 [ 65.034366][ T3133] input_attach_handler+0xd5/0x120 [ 65.040003][ T3133] input_register_device.cold+0xdf/0x1c5 [ 65.046261][ T3133] acpi_button_add+0x2f7/0x600 [ 65.051556][ T3133] acpi_device_probe+0x63/0x220 [ 65.059017][ T3133] really_probe+0x138/0x520 [ 65.064542][ T3133] __driver_probe_device+0x149/0x1c0 [ 65.070568][ T3133] driver_probe_device+0x2a/0x120 [ 65.076850][ T3133] __driver_attach+0x178/0x290 [ 65.082237][ T3133] bus_for_each_dev+0xac/0x100 [ 65.087563][ T3133] bus_add_driver+0x195/0x2c0 [ 65.093163][ T3133] driver_register+0xc4/0x150 [ 65.099090][ T3133] acpi_bus_register_driver+0x52/0x70 [ 65.105395][ T3133] acpi_button_driver_init+0x8b/0x9a [ 65.111688][ T3133] do_one_initcall+0x8b/0x2f0 [ 65.117502][ T3133] kernel_init_freeable+0x322/0x397 [ 65.123604][ T3133] kernel_init+0x1a/0x1c0 [ 65.128639][ T3133] ret_from_fork+0x1f/0x30 [ 65.133945][ T3133] [ 65.133945][ T3133] -> #1 (input_mutex){+.+.}-{3:3}: [ 65.141663][ T3133] __mutex_lock+0x60/0x660 [ 65.146679][ T3133] input_register_device.cold+0x57/0x1c5 [ 65.153464][ T3133] uinput_ioctl_handler.isra.0+0x4f0/0xe80 [ 65.160313][ T3133] __x64_sys_ioctl+0xfc/0x140 [ 65.165689][ T3133] do_syscall_64+0x33/0xb0 [ 65.170723][ T3133] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.177586][ T3133] [ 65.177586][ T3133] -> #0 (&newdev->mutex){+.+.}-{3:3}: [ 65.185820][ T3133] __lock_acquire+0x10b6/0x1a40 [ 65.191368][ T3133] lock_acquire+0xbb/0x290 [ 65.196484][ T3133] __mutex_lock+0x60/0x660 [ 65.201417][ T3133] uinput_request_submit.part.0+0x1f/0x130 [ 65.207771][ T3133] uinput_dev_upload_effect+0xa6/0xe0 [ 65.213752][ T3133] input_ff_upload+0x314/0x4b0 [ 65.219213][ T3133] evdev_do_ioctl+0xdc8/0x1040 [ 65.224666][ T3133] evdev_ioctl+0xa2/0xe0 [ 65.229659][ T3133] __x64_sys_ioctl+0xfc/0x140 [ 65.234958][ T3133] do_syscall_64+0x33/0xb0 [ 65.240077][ T3133] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.246755][ T3133] [ 65.246755][ T3133] other info that might help us debug this: [ 65.246755][ T3133] [ 65.257446][ T3133] Chain exists of: [ 65.257446][ T3133] &newdev->mutex --> &dev->mutex#2 --> &ff->mutex [ 65.257446][ T3133] [ 65.270166][ T3133] Possible unsafe locking scenario: [ 65.270166][ T3133] [ 65.277790][ T3133] CPU0 CPU1 [ 65.283333][ T3133] ---- ---- [ 65.289013][ T3133] lock(&ff->mutex); [ 65.292984][ T3133] lock(&dev->mutex#2); [ 65.300129][ T3133] lock(&ff->mutex); [ 65.306973][ T3133] lock(&newdev->mutex); [ 65.311297][ T3133] [ 65.311297][ T3133] *** DEADLOCK *** [ 65.311297][ T3133] [ 65.319614][ T3133] 2 locks held by syz-executor.0/3133: [ 65.325158][ T3133] #0: ffff888177d4b910 (&evdev->mutex){+.+.}-{3:3}, at: evdev_ioctl+0x3c/0xe0 [ 65.334865][ T3133] #1: ffff88817b00d8b0 (&ff->mutex){+.+.}-{3:3}, at: input_ff_upload+0x12a/0x4b0 [ 65.344227][ T3133] [ 65.344227][ T3133] stack backtrace: [ 65.350286][ T3133] CPU: 0 PID: 3133 Comm: syz-executor.0 Not tainted 5.15.182-syzkaller #0 [ 65.358907][ T3133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 65.369229][ T3133] Call Trace: [ 65.372693][ T3133] [ 65.375713][ T3133] dump_stack_lvl+0xcd/0x134 [ 65.380424][ T3133] check_noncircular+0xcc/0xe0 [ 65.385198][ T3133] __lock_acquire+0x10b6/0x1a40 [ 65.390128][ T3133] ? __lock_acquire+0xe65/0x1a40 [ 65.395178][ T3133] lock_acquire+0xbb/0x290 [ 65.399797][ T3133] ? uinput_request_submit.part.0+0x1f/0x130 [ 65.405805][ T3133] ? lock_acquire+0xbb/0x290 [ 65.410412][ T3133] ? uinput_request_reserve_slot+0x3c/0x1a0 [ 65.416616][ T3133] __mutex_lock+0x60/0x660 [ 65.421312][ T3133] ? uinput_request_submit.part.0+0x1f/0x130 [ 65.427314][ T3133] ? uinput_request_submit.part.0+0x1f/0x130 [ 65.433392][ T3133] ? do_raw_spin_unlock+0x50/0xa0 [ 65.438421][ T3133] ? _raw_spin_unlock+0x1a/0x30 [ 65.443315][ T3133] ? uinput_request_reserve_slot+0x14a/0x1a0 [ 65.449481][ T3133] uinput_request_submit.part.0+0x1f/0x130 [ 65.455328][ T3133] uinput_dev_upload_effect+0xa6/0xe0 [ 65.460707][ T3133] ? input_ff_upload+0x12a/0x4b0 [ 65.465648][ T3133] ? tomoyo_path_number_perm+0x127/0x2b0 [ 65.471363][ T3133] input_ff_upload+0x314/0x4b0 [ 65.476240][ T3133] evdev_do_ioctl+0xdc8/0x1040 [ 65.480998][ T3133] ? evdev_ioctl+0x3c/0xe0 [ 65.485628][ T3133] evdev_ioctl+0xa2/0xe0 [ 65.490043][ T3133] ? evdev_ioctl_compat+0xe0/0xe0 [ 65.495082][ T3133] __x64_sys_ioctl+0xfc/0x140 [ 65.499941][ T3133] do_syscall_64+0x33/0xb0 [ 65.504449][ T3133] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.510542][ T3133] RIP: 0033:0x7f865bdd6ca9 [ 65.514950][ T3133] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 65.534932][ T3133] RSP: 002b:00007f865b9580c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 65.543718][ T3133] RAX: ffffffffffffffda RBX: 00007f865bf04f80 RCX: 00007f865bdd6ca9 [ 65.551990][ T3133] RDX: 0000000020000300 RSI: 0000000040304580 RDI: 0000000000000004 [ 65.560179][ T3133] RBP: 00007f865be2247e R08: 0000000000000000 R09: 0000000000000000 [ 65.568244][ T3133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 65.576599][ T3133] R13: 0000000000000006 R14: 00007f865bf04f80 R15: 00007ffce5ee4ce8 [ 65.584926][ T3133] 2025/05/16 11:57:33 executed programs: 1 [ 65.697865][ T3135] input: syz1 as /devices/virtual/input/input6 [ 66.539020][ T3137] input: syz1 as /devices/virtual/input/input7 [ 67.379294][ T3139] input: syz1 as /devices/virtual/input/input8 [ 68.220942][ T3141] input: syz1 as /devices/virtual/input/input9 [ 69.062757][ T3143] input: syz1 as /devices/virtual/input/input10 [ 69.906711][ T3145] input: syz1 as /devices/virtual/input/input11 2025/05/16 11:57:38 executed programs: 7 [ 70.748080][ T3147] input: syz1 as /devices/virtual/input/input12 [ 71.588937][ T3149] input: syz1 as /devices/virtual/input/input13 [ 72.429508][ T3151] input: syz1 as /devices/virtual/input/input14 [ 73.270930][ T3153] input: syz1 as /devices/virtual/input/input15 [ 74.111408][ T3155] input: syz1 as /devices/virtual/input/input16