ubi: mtd0 is already attached to ubi0 BUG: sleeping function called from invalid context at drivers/tty/vt/vt.c:2599 in_atomic(): 1, irqs_disabled(): 1, pid: 2757, name: syz-executor.5 3 locks held by syz-executor.5/2757: #0: 00000000b8d47dce (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:272 #1: 000000001802fd0d (&(&tty->flow_lock)->rlock){....}, at: spin_lock_irq include/linux/spinlock.h:354 [inline] #1: 000000001802fd0d (&(&tty->flow_lock)->rlock){....}, at: n_tty_ioctl_helper+0xcc/0x3a0 drivers/tty/tty_ioctl.c:914 #2: 00000000b8d47dce (&tty->ldisc_sem){++++}, at: tty_ldisc_ref+0x1d/0x80 drivers/tty/tty_ldisc.c:293 irq event stamp: 304 hardirqs last enabled at (303): [] do_syscall_64+0x21/0x620 arch/x86/entry/common.c:280 hardirqs last disabled at (304): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:126 [inline] hardirqs last disabled at (304): [] _raw_spin_lock_irq+0x35/0x80 kernel/locking/spinlock.c:160 softirqs last enabled at (0): [] copy_process.part.0+0x15b9/0x8260 kernel/fork.c:1856 softirqs last disabled at (0): [<0000000000000000>] (null) Preemption disabled at: [<0000000000000000>] (null) CPU: 0 PID: 2757 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 do_con_write+0x116/0x1d90 drivers/tty/vt/vt.c:2599 con_write+0x22/0xb0 drivers/tty/vt/vt.c:3163 n_hdlc_send_frames+0x278/0x470 drivers/tty/n_hdlc.c:403 n_hdlc_tty_wakeup+0xa0/0xc0 drivers/tty/n_hdlc.c:479 tty_wakeup+0xd4/0x110 drivers/tty/tty_io.c:534 __start_tty drivers/tty/tty_io.c:806 [inline] __start_tty+0x116/0x150 drivers/tty/tty_io.c:799 n_tty_ioctl_helper+0x348/0x3a0 drivers/tty/tty_ioctl.c:917 n_hdlc_tty_ioctl+0x102/0x350 drivers/tty/n_hdlc.c:783 tty_ioctl+0x65d/0x1630 drivers/tty/tty_io.c:2678 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xcdb/0x12e0 fs/ioctl.c:688 ksys_ioctl+0x9b/0xc0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:710 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f41ae48b5a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f41ac9dd168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f41ae5ac050 RCX: 00007f41ae48b5a9 RDX: 0000000000000001 RSI: 000000000000540a RDI: 0000000000000008 RBP: 00007f41ae4e67b0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe31f396ff R14: 00007f41ac9dd300 R15: 0000000000022000 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 audit: type=1804 audit(1667663845.650:105): pid=3174 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir3843497250/syzkaller.dg5sFj/1085/bus" dev="sda1" ino=13985 res=1 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 ubi: mtd0 is already attached to ubi0 audit: type=1804 audit(1667663846.800:106): pid=3251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir3843497250/syzkaller.dg5sFj/1086/bus" dev="sda1" ino=15185 res=1 audit: type=1804 audit(1667663847.491:107): pid=3303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir3843497250/syzkaller.dg5sFj/1087/bus" dev="sda1" ino=15345 res=1 device lo entered promiscuous mode Y4`Ҙ: renamed from lo vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) vhci_hcd vhci_hcd.0: Device attached vhci_hcd: connection closed vhci_hcd: stop threads vhci_hcd: release socket vhci_hcd: disconnect device