====================================================== WARNING: possible circular locking dependency detected 5.17.0-rc5-next-20220222-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.2/3826 is trying to acquire lock: ffff888010c69818 (&pool->lock/1){-.-.}-{2:2}, at: __queue_work+0x366/0x1140 kernel/workqueue.c:1474 but task is already holding lock: ffffffff9061a530 (&port_lock_key){-.-.}-{2:2}, at: serial8250_handle_irq.part.0+0x21/0x3d0 drivers/tty/serial/8250/8250_port.c:1916 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 (&port_lock_key){-.-.}-{2:2}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 serial8250_console_write+0x91a/0xb70 drivers/tty/serial/8250/8250_port.c:3359 call_console_drivers kernel/printk/printk.c:1953 [inline] console_unlock+0x9bc/0xdd0 kernel/printk/printk.c:2775 vprintk_emit+0x1b4/0x5f0 kernel/printk/printk.c:2273 vprintk+0x80/0x90 kernel/printk/printk_safe.c:50 _printk+0xba/0xed kernel/printk/printk.c:2294 register_console kernel/printk/printk.c:3132 [inline] register_console+0x410/0x7c0 kernel/printk/printk.c:3013 univ8250_console_init+0x3a/0x46 drivers/tty/serial/8250/8250_core.c:679 console_init+0x3c1/0x58d kernel/printk/printk.c:3232 start_kernel+0x30b/0x4a0 init/main.c:1068 secondary_startup_64_no_verify+0xc3/0xcb -> #2 (console_owner){....}-{0:0}: console_lock_spinning_enable kernel/printk/printk.c:1795 [inline] console_unlock+0x3b1/0xdd0 kernel/printk/printk.c:2772 vprintk_emit+0x1b4/0x5f0 kernel/printk/printk.c:2273 vprintk+0x80/0x90 kernel/printk/printk_safe.c:50 _printk+0xba/0xed kernel/printk/printk.c:2294 warn_flush_attempt kernel/workqueue.c:2613 [inline] check_flush_dependency.cold+0x18/0x4e kernel/workqueue.c:2635 start_flush_work kernel/workqueue.c:3049 [inline] __flush_work+0x25a/0xb10 kernel/workqueue.c:3091 flush_all_cpus_locked+0x148/0x1b0 mm/slub.c:2728 flush_all mm/slub.c:2737 [inline] __kmem_cache_shrink+0x11/0x20 mm/slub.c:4640 acpi_os_purge_cache+0x11/0x20 drivers/acpi/osl.c:1666 acpi_purge_cached_objects+0x37/0xd0 drivers/acpi/acpica/utxface.c:237 acpi_initialize_objects+0x2b/0x95 drivers/acpi/acpica/utxfinit.c:250 acpi_bus_init drivers/acpi/bus.c:1237 [inline] acpi_init+0x1d2/0x976 drivers/acpi/bus.c:1325 do_one_initcall+0x103/0x650 init/main.c:1302 do_initcall_level init/main.c:1375 [inline] do_initcalls init/main.c:1391 [inline] do_basic_setup init/main.c:1410 [inline] kernel_init_freeable+0x6b1/0x73a init/main.c:1615 kernel_init+0x1a/0x1d0 init/main.c:1504 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 -> #1 (&pool->lock){-.-.}-{2:2}: __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 __queue_work+0x366/0x1140 kernel/workqueue.c:1474 queue_work_on+0xee/0x110 kernel/workqueue.c:1545 queue_work include/linux/workqueue.h:514 [inline] schedule_work include/linux/workqueue.h:575 [inline] put_pwq kernel/workqueue.c:1139 [inline] put_pwq+0x161/0x1b0 kernel/workqueue.c:1124 put_pwq_unlocked kernel/workqueue.c:1156 [inline] put_pwq_unlocked kernel/workqueue.c:1148 [inline] apply_wqattrs_cleanup+0x1e9/0x2d0 kernel/workqueue.c:3961 apply_workqueue_attrs_locked+0xe1/0x140 kernel/workqueue.c:4098 apply_workqueue_attrs+0x2c/0x50 kernel/workqueue.c:4129 padata_setup_cpumasks kernel/padata.c:422 [inline] padata_alloc+0x1bd/0x370 kernel/padata.c:1001 pcrypt_init_padata+0x1b/0xf5 crypto/pcrypt.c:323 pcrypt_init+0x70/0xef crypto/pcrypt.c:348 do_one_initcall+0x103/0x650 init/main.c:1302 do_initcall_level init/main.c:1375 [inline] do_initcalls init/main.c:1391 [inline] do_basic_setup init/main.c:1410 [inline] kernel_init_freeable+0x6b1/0x73a init/main.c:1615 kernel_init+0x1a/0x1d0 init/main.c:1504 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 -> #0 (&pool->lock/1){-.-.}-{2:2}: check_prev_add kernel/locking/lockdep.c:3096 [inline] check_prevs_add kernel/locking/lockdep.c:3219 [inline] validate_chain kernel/locking/lockdep.c:3834 [inline] __lock_acquire+0x2ac6/0x56c0 kernel/locking/lockdep.c:5060 lock_acquire kernel/locking/lockdep.c:5672 [inline] lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5637 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 __queue_work+0x366/0x1140 kernel/workqueue.c:1474 queue_work_on+0xee/0x110 kernel/workqueue.c:1545 serial8250_rx_chars+0xcc/0xf0 drivers/tty/serial/8250/8250_port.c:1798 serial8250_handle_irq.part.0+0x292/0x3d0 drivers/tty/serial/8250/8250_port.c:1935 serial8250_handle_irq drivers/tty/serial/8250/8250_port.c:1913 [inline] serial8250_default_handle_irq+0xb2/0x220 drivers/tty/serial/8250/8250_port.c:1957 serial8250_interrupt+0xfd/0x200 drivers/tty/serial/8250/8250_core.c:126 __handle_irq_event_percpu+0x22b/0x880 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0xa7/0x1e0 kernel/irq/handle.c:210 handle_edge_irq+0x25f/0xd00 kernel/irq/chip.c:817 generic_handle_irq_desc include/linux/irqdesc.h:158 [inline] handle_irq arch/x86/kernel/irq.c:231 [inline] __common_interrupt+0x9d/0x210 arch/x86/kernel/irq.c:250 common_interrupt+0x4d/0xc0 arch/x86/kernel/irq.c:240 asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:629 other info that might help us debug this: Chain exists of: &pool->lock/1 --> console_owner --> &port_lock_key Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&port_lock_key); lock(console_owner); lock(&port_lock_key); lock(&pool->lock/1); *** DEADLOCK *** 3 locks held by syz-executor.2/3826: #0: ffff888078bd7bb0 (&i->lock){-.-.}-{2:2}, at: spin_lock include/linux/spinlock.h:354 [inline] #0: ffff888078bd7bb0 (&i->lock){-.-.}-{2:2}, at: serial8250_interrupt+0x3a/0x200 drivers/tty/serial/8250/8250_core.c:116 #1: ffffffff9061a530 (&port_lock_key){-.-.}-{2:2}, at: serial8250_handle_irq.part.0+0x21/0x3d0 drivers/tty/serial/8250/8250_port.c:1916 #2: ffffffff8bb866a0 (rcu_read_lock){....}-{1:2}, at: __queue_work+0xd0/0x1140 kernel/workqueue.c:1437 stack backtrace: CPU: 0 PID: 3826 Comm: syz-executor.2 Not tainted 5.17.0-rc5-next-20220222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 check_noncircular+0x25f/0x2e0 kernel/locking/lockdep.c:2176 check_prev_add kernel/locking/lockdep.c:3096 [inline] check_prevs_add kernel/locking/lockdep.c:3219 [inline] validate_chain kernel/locking/lockdep.c:3834 [inline] __lock_acquire+0x2ac6/0x56c0 kernel/locking/lockdep.c:5060 lock_acquire kernel/locking/lockdep.c:5672 [inline] lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5637 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 __queue_work+0x366/0x1140 kernel/workqueue.c:1474 queue_work_on+0xee/0x110 kernel/workqueue.c:1545 serial8250_rx_chars+0xcc/0xf0 drivers/tty/serial/8250/8250_port.c:1798 serial8250_handle_irq.part.0+0x292/0x3d0 drivers/tty/serial/8250/8250_port.c:1935 serial8250_handle_irq drivers/tty/serial/8250/8250_port.c:1913 [inline] serial8250_default_handle_irq+0xb2/0x220 drivers/tty/serial/8250/8250_port.c:1957 serial8250_interrupt+0xfd/0x200 drivers/tty/serial/8250/8250_core.c:126 __handle_irq_event_percpu+0x22b/0x880 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0xa7/0x1e0 kernel/irq/handle.c:210 handle_edge_irq+0x25f/0xd00 kernel/irq/chip.c:817 generic_handle_irq_desc include/linux/irqdesc.h:158 [inline] handle_irq arch/x86/kernel/irq.c:231 [inline] __common_interrupt+0x9d/0x210 arch/x86/kernel/irq.c:250 common_interrupt+0x4d/0xc0 arch/x86/kernel/irq.c:240 asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:629 RIP: 0033:0x7f7ae62370a1 Code: ff 41 08 c5 0f 85 f7 01 00 00 41 83 c6 01 44 39 73 04 0f 86 b7 00 00 00 48 8b 04 24 44 89 f7 48 8b 53 28 4d 89 f8 48 03 14 f8 <80> 3d f0 0f 16 00 00 49 89 d7 89 d5 75 37 b8 00 00 00 80 48 01 d0 RSP: 002b:00007ffc7c479310 EFLAGS: 00000282 RAX: 00007f7ae6000008 RBX: 00007f7ae639bff8 RCX: 0000001b2e420000 RDX: ffffffff840730d6 RSI: 0000001b2e423120 RDI: 0000000000004898 RBP: 00000000845cede0 R08: ffffffff840730be R09: 00000000845cede4 R10: 00007ffc7c4794e0 R11: 0000000000000246 R12: 00007f7ae6390000 R13: 0000000000000001 R14: 0000000000004898 R15: ffffffff840730be TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.