Warning: Permanently added '10.128.1.88' (ED25519) to the list of known hosts. executing program [ 33.742773][ T6279] ------------[ cut here ]------------ [ 33.742902][ T6279] [ 33.742906][ T6279] ====================================================== [ 33.742910][ T6279] WARNING: possible circular locking dependency detected [ 33.742914][ T6279] 6.10.0-rc3-syzkaller-gac2193b4b460 #0 Tainted: G W [ 33.742921][ T6279] ------------------------------------------------------ [ 33.742924][ T6279] syz-executor385/6279 is trying to acquire lock: [ 33.742930][ T6279] ffff80008f36cea0 (console_owner){-...}-{0:0}, at: console_lock_spinning_enable+0x88/0xec [ 33.742961][ T6279] [ 33.742961][ T6279] but task is already holding lock: [ 33.742965][ T6279] ffff800093dcec98 (&port_lock_key){-...}-{2:2}, at: uart_write+0x114/0x2ec [ 33.742990][ T6279] [ 33.742990][ T6279] which lock already depends on the new lock. [ 33.742990][ T6279] [ 33.742993][ T6279] [ 33.742993][ T6279] the existing dependency chain (in reverse order) is: [ 33.742997][ T6279] [ 33.742997][ T6279] -> #1 (&port_lock_key){-...}-{2:2}: [ 33.743011][ T6279] _raw_spin_lock_irqsave+0x5c/0x7c [ 33.743024][ T6279] pl011_console_write+0x148/0x724 [ 33.743035][ T6279] console_flush_all+0x570/0xafc [ 33.743044][ T6279] console_unlock+0xfc/0x3d4 [ 33.743052][ T6279] vprintk_emit+0x1e8/0x344 [ 33.743072][ T6279] vprintk_default+0xa0/0xe4 [ 33.743081][ T6279] vprintk+0x200/0x2d4 [ 33.743090][ T6279] _printk+0xdc/0x128 [ 33.743101][ T6279] register_console+0x700/0xa8c [ 33.743110][ T6279] serial_core_register_port+0x1428/0x1bf4 [ 33.743122][ T6279] serial_ctrl_register_port+0x28/0x38 [ 33.743131][ T6279] uart_add_one_port+0x28/0x38 [ 33.743139][ T6279] pl011_register_port+0x1b4/0x44c [ 33.743149][ T6279] sbsa_uart_probe+0x488/0x608 [ 33.743159][ T6279] platform_probe+0x148/0x1c0 [ 33.743169][ T6279] really_probe+0x38c/0x8fc [ 33.743180][ T6279] __driver_probe_device+0x194/0x374 [ 33.743192][ T6279] driver_probe_device+0x78/0x330 [ 33.743203][ T6279] __device_attach_driver+0x2a8/0x4f4 [ 33.743215][ T6279] bus_for_each_drv+0x228/0x2bc [ 33.743225][ T6279] __device_attach+0x2b4/0x434 [ 33.743236][ T6279] device_initial_probe+0x24/0x34 [ 33.743247][ T6279] bus_probe_device+0x178/0x240 [ 33.743257][ T6279] device_add+0x728/0xa6c [ 33.743266][ T6279] platform_device_add+0x3e8/0x6e8 [ 33.743275][ T6279] platform_device_register_full+0x4ec/0x604 [ 33.743285][ T6279] acpi_create_platform_device+0x5bc/0x744 [ 33.743295][ T6279] acpi_default_enumeration+0x6c/0xdc [ 33.743306][ T6279] acpi_bus_attach+0x8b8/0xaa8 [ 33.743317][ T6279] acpi_dev_for_one_check+0xa0/0xb4 [ 33.743327][ T6279] device_for_each_child+0xec/0x174 [ 33.743337][ T6279] acpi_dev_for_each_child+0xc4/0x108 [ 33.743347][ T6279] acpi_bus_attach+0x358/0xaa8 [ 33.743357][ T6279] acpi_dev_for_one_check+0xa0/0xb4 [ 33.743367][ T6279] device_for_each_child+0xec/0x174 [ 33.743376][ T6279] acpi_dev_for_each_child+0xc4/0x108 [ 33.743386][ T6279] acpi_bus_attach+0x358/0xaa8 [ 33.743397][ T6279] acpi_bus_scan+0x118/0x4f0 [ 33.743407][ T6279] acpi_scan_init+0x214/0x6b0 [ 33.743419][ T6279] acpi_init+0x190/0x254 [ 33.743429][ T6279] do_one_initcall+0x24c/0x9c0 [ 33.743438][ T6279] do_initcall_level+0x154/0x214 [ 33.743451][ T6279] do_initcalls+0x58/0xac [ 33.743461][ T6279] do_basic_setup+0x8c/0xa0 [ 33.743472][ T6279] kernel_init_freeable+0x324/0x478 [ 33.743483][ T6279] kernel_init+0x24/0x2a0 [ 33.743494][ T6279] ret_from_fork+0x10/0x20 [ 33.743503][ T6279] [ 33.743503][ T6279] -> #0 (console_owner){-...}-{0:0}: [ 33.743517][ T6279] __lock_acquire+0x3384/0x763c [ 33.743528][ T6279] lock_acquire+0x240/0x728 [ 33.743539][ T6279] console_lock_spinning_enable+0xb4/0xec [ 33.743549][ T6279] console_flush_all+0x53c/0xafc [ 33.743558][ T6279] console_unlock+0xfc/0x3d4 [ 33.743566][ T6279] vprintk_emit+0x1e8/0x344 [ 33.743574][ T6279] vprintk_default+0xa0/0xe4 [ 33.743583][ T6279] vprintk+0x200/0x2d4 [ 33.743591][ T6279] _printk+0xdc/0x128 [ 33.743601][ T6279] report_bug+0x3b8/0x5b0 [ 33.743611][ T6279] bug_handler+0x50/0x1fc [ 33.743620][ T6279] brk_handler+0x17c/0x2e0 [ 33.743629][ T6279] do_debug_exception+0x1e4/0x398 [ 33.743640][ T6279] el1_dbg+0x64/0x80 [ 33.743649][ T6279] el1h_64_sync_handler+0x40/0xac [ 33.743658][ T6279] el1h_64_sync+0x64/0x68 [ 33.743666][ T6279] uart_write+0x280/0x2ec [ 33.743676][ T6279] ppp_async_push+0x258/0x1608 [ 33.743693][ T6279] ppp_async_send+0xb0/0x114 [ 33.743701][ T6279] __ppp_channel_push+0xe0/0x1ac [ 33.743713][ T6279] ppp_channel_push+0x17c/0x208 [ 33.743724][ T6279] ppp_write+0x288/0x374 [ 33.743732][ T6279] vfs_writev+0x6c8/0xb80 [ 33.743743][ T6279] __arm64_sys_pwritev+0x18c/0x29c [ 33.743754][ T6279] invoke_syscall+0x98/0x2b8 [ 33.743762][ T6279] el0_svc_common+0x130/0x23c [ 33.743770][ T6279] do_el0_svc+0x48/0x58 [ 33.743777][ T6279] el0_svc+0x54/0x168 [ 33.743786][ T6279] el0t_64_sync_handler+0x84/0xfc [ 33.743795][ T6279] el0t_64_sync+0x190/0x194 [ 33.743803][ T6279] [ 33.743803][ T6279] other info that might help us debug this: [ 33.743803][ T6279] [ 33.743806][ T6279] Possible unsafe locking scenario: [ 33.743806][ T6279] [ 33.743809][ T6279] CPU0 CPU1 [ 33.743812][ T6279] ---- ---- [ 33.743815][ T6279] lock(&port_lock_key); [ 33.743821][ T6279] lock(console_owner); [ 33.743829][ T6279] lock(&port_lock_key); [ 33.743836][ T6279] lock(console_owner); [ 33.743842][ T6279] [ 33.743842][ T6279] *** DEADLOCK *** [ 33.743842][ T6279] [ 33.743845][ T6279] 6 locks held by syz-executor385/6279: [ 33.743851][ T6279] #0: ffff0000d63d8248 (&pch->upl){.+..}-{2:2}, at: ppp_channel_push+0x38/0x208 [ 33.743877][ T6279] #1: ffff0000d63d81e0 (&pch->downl){+...}-{2:2}, at: __ppp_channel_push+0x3c/0x1ac [ 33.743903][ T6279] #2: ffff0000d7f00030 (&ap->xmit_lock){+...}-{2:2}, at: ppp_async_push+0x8c/0x1608 [ 33.743926][ T6279] #3: ffff800093dcec98 (&port_lock_key){-...}-{2:2}, at: uart_write+0x114/0x2ec [ 33.743952][ T6279] #4: ffff80008f2547c0 (console_lock){+.+.}-{0:0}, at: vprintk_emit+0x1cc/0x344 [ 33.743975][ T6279] #5: ffff80008f2543f0 (console_srcu){....}-{0:0}, at: rcu_try_lock_acquire+0x10/0x4c [ 33.743999][ T6279] [ 33.743999][ T6279] stack backtrace: [ 33.744003][ T6279] CPU: 1 PID: 6279 Comm: syz-executor385 Tainted: G W 6.10.0-rc3-syzkaller-gac2193b4b460 #0 [ 33.744015][ T6279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 33.744022][ T6279] Call trace: [ 33.744024][ T6279] dump_backtrace+0x1b8/0x1e4 [ 33.744033][ T6279] show_stack+0x2c/0x3c [ 33.744041][ T6279] dump_stack_lvl+0xe4/0x150 [ 33.744050][ T6279] dump_stack+0x1c/0x28 [ 33.744062][ T6279] print_circular_bug+0x150/0x1b8 [ 33.744071][ T6279] check_noncircular+0x310/0x404 [ 33.744079][ T6279] __lock_acquire+0x3384/0x763c [ 33.744089][ T6279] lock_acquire+0x240/0x728 [ 33.744100][ T6279] console_lock_spinning_enable+0xb4/0xec [ 33.744110][ T6279] console_flush_all+0x53c/0xafc [ 33.744119][ T6279] console_unlock+0xfc/0x3d4 [ 33.744127][ T6279] vprintk_emit+0x1e8/0x344 [ 33.744135][ T6279] vprintk_default+0xa0/0xe4 [ 33.744143][ T6279] vprintk+0x200/0x2d4 [ 33.744152][ T6279] _printk+0xdc/0x128 [ 33.744162][ T6279] report_bug+0x3b8/0x5b0 [ 33.744170][ T6279] bug_handler+0x50/0x1fc [ 33.744179][ T6279] brk_handler+0x17c/0x2e0 [ 33.744188][ T6279] do_debug_exception+0x1e4/0x398 [ 33.744198][ T6279] el1_dbg+0x64/0x80 [ 33.744206][ T6279] el1h_64_sync_handler+0x40/0xac [ 33.744215][ T6279] el1h_64_sync+0x64/0x68 [ 33.744223][ T6279] uart_write+0x280/0x2ec [ 33.744234][ T6279] ppp_async_push+0x258/0x1608 [ 33.744242][ T6279] ppp_async_send+0xb0/0x114 [ 33.744250][ T6279] __ppp_channel_push+0xe0/0x1ac [ 33.744261][ T6279] ppp_channel_push+0x17c/0x208 [ 33.744273][ T6279] ppp_write+0x288/0x374 [ 33.744280][ T6279] vfs_writev+0x6c8/0xb80 [ 33.744290][ T6279] __arm64_sys_pwritev+0x18c/0x29c [ 33.744301][ T6279] invoke_syscall+0x98/0x2b8 [ 33.744308][ T6279] el0_svc_common+0x130/0x23c [ 33.744316][ T6279] do_el0_svc+0x48/0x58 [ 33.744323][ T6279] el0_svc+0x54/0x168 [ 33.744332][ T6279] el0t_64_sync_handler+0x84/0xfc [ 33.744341][ T6279] el0t_64_sync+0x190/0x194 [ 33.955292][ T6279] WARNING: CPU: 1 PID: 6279 at drivers/tty/serial/serial_core.c:625 uart_write+0x280/0x2ec [ 33.957822][ T6279] Modules linked in: [ 33.958849][ T6279] CPU: 1 PID: 6279 Comm: syz-executor385 Tainted: G W 6.10.0-rc3-syzkaller-gac2193b4b460 #0 [ 33.961895][ T6279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 33.964619][ T6279] pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 33.966733][ T6279] pc : uart_write+0x280/0x2ec [ 33.968011][ T6279] lr : uart_write+0x278/0x2ec [ 33.969222][ T6279] sp : ffff80009a3c77a0 [ 33.970332][ T6279] x29: ffff80009a3c77a0 x28: ffff0000d7f000e8 x27: ffff0000d7f000e0 [ 33.972400][ T6279] x26: 0000000000000001 x25: dfff800000000000 x24: ffff0000c8cf8f48 [ 33.974521][ T6279] x23: 0000000000000000 x22: ffff800093dcec80 x21: ffff0000d7f00210 [ 33.976557][ T6279] x20: 0000000000000009 x19: ffff0000c8cf8be8 x18: ffff80009a3c7440 [ 33.978630][ T6279] x17: 000000000000c6b0 x16: ffff800080350d3c x15: ffff700013478ed8 [ 33.980761][ T6279] x14: 1ffff00013478ed8 x13: 0000000000000004 x12: ffffffffffffffff [ 33.982879][ T6279] x11: ffff700013478ed8 x10: 0000000000ff0100 x9 : 0000000000000000 [ 33.984914][ T6279] x8 : ffff0000d7715ac0 x7 : 0000000000000000 x6 : 0000000000000000 [ 33.987019][ T6279] x5 : ffff800092c27a08 x4 : 0000000000000008 x3 : ffff800080350e64 [ 33.989140][ T6279] x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff800093dcec80 [ 33.991181][ T6279] Call trace: [ 33.991993][ T6279] uart_write+0x280/0x2ec [ 33.993095][ T6279] ppp_async_push+0x258/0x1608 [ 33.994339][ T6279] ppp_async_send+0xb0/0x114 [ 33.995501][ T6279] __ppp_channel_push+0xe0/0x1ac [ 33.996848][ T6279] ppp_channel_push+0x17c/0x208 [ 33.998121][ T6279] ppp_write+0x288/0x374 [ 33.999277][ T6279] vfs_writev+0x6c8/0xb80 [ 34.000406][ T6279] __arm64_sys_pwritev+0x18c/0x29c [ 34.001726][ T6279] invoke_syscall+0x98/0x2b8 [ 34.002889][ T6279] el0_svc_common+0x130/0x23c [ 34.004054][ T6279] do_el0_svc+0x48/0x58 [ 34.005143][ T6279] el0_svc+0x54/0x168 [ 34.006144][ T6279] el0t_64_sync_handler+0x84/0xfc [ 34.007528][ T6279] el0t_64_sync+0x190/0x194 [ 34.008772][ T6279] irq event stamp: 10217 [ 34.009846][ T6279] hardirqs last enabled at (10216): [] kasan_quarantine_put+0x1a0/0x1c8 [ 34.012432][ T6279] hardirqs last disabled at (10217): [] _raw_spin_lock_irqsave+0x2c/0x7c [ 34.015030][ T6279] softirqs last enabled at (10174): [] ppp_ioctl+0x176c/0x258c [ 34.017454][ T6279] softirqs last disabled at (10198): [] ppp_channel_push+0x38/0x208 [ 34.019980][ T6279] ---[ end trace 0000000000000000 ]---