audit: type=1804 audit(1668559445.212:7): pid=10165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir693507240/syzkaller.WFlKJS/13/file0" dev="sda1" ino=13943 res=1 ============================================ WARNING: possible recursive locking detected audit: type=1804 audit(1668559445.212:8): pid=10165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir693507240/syzkaller.WFlKJS/13/file0" dev="sda1" ino=13943 res=1 4.19.211-syzkaller #0 Not tainted -------------------------------------------- syz-executor.0/10165 is trying to acquire lock: 00000000e5f1d8d1 (&port_lock_key){-.-.}, at: uart_write+0x1ce/0x6f0 drivers/tty/serial/serial_core.c:591 but task is already holding lock: 00000000e5f1d8d1 (&port_lock_key){-.-.}, at: serial8250_handle_irq.part.0+0x21/0x3d0 drivers/tty/serial/8250/8250_port.c:1876 other info that might help us debug this: audit: type=1804 audit(1668559445.222:9): pid=10165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir693507240/syzkaller.WFlKJS/13/file0" dev="sda1" ino=13943 res=1 Possible unsafe locking scenario: CPU0 ---- lock(&port_lock_key); lock(&port_lock_key); *** DEADLOCK *** May be due to missing lock nesting notation 4 locks held by syz-executor.0/10165: audit: type=1804 audit(1668559445.222:10): pid=10165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir693507240/syzkaller.WFlKJS/13/file0" dev="sda1" ino=13943 res=1 #0: 000000003f00d62f (&sb->s_type->i_mutex_key#10){+.+.}, at: inode_lock include/linux/fs.h:748 [inline] #0: 000000003f00d62f (&sb->s_type->i_mutex_key#10){+.+.}, at: process_measurement+0x1415/0x1440 security/integrity/ima/ima_main.c:205 #1: 0000000082ad7981 (&(&i->lock)->rlock){-.-.}, at: spin_lock include/linux/spinlock.h:329 [inline] #1: 0000000082ad7981 (&(&i->lock)->rlock){-.-.}, at: serial8250_interrupt+0x3a/0x240 drivers/tty/serial/8250/8250_core.c:115 audit: type=1804 audit(1668559445.222:11): pid=10165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir693507240/syzkaller.WFlKJS/13/file0" dev="sda1" ino=13943 res=1 #2: 00000000e5f1d8d1 (&port_lock_key){-.-.}, at: serial8250_handle_irq.part.0+0x21/0x3d0 drivers/tty/serial/8250/8250_port.c:1876 #3: 0000000008ca7f58 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref+0x1d/0x80 drivers/tty/tty_ldisc.c:293 stack backtrace: CPU: 1 PID: 10165 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_deadlock_bug kernel/locking/lockdep.c:1764 [inline] check_deadlock kernel/locking/lockdep.c:1808 [inline] validate_chain kernel/locking/lockdep.c:2404 [inline] __lock_acquire.cold+0x121/0x57e kernel/locking/lockdep.c:3416 lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x8c/0xc0 kernel/locking/spinlock.c:152 uart_write+0x1ce/0x6f0 drivers/tty/serial/serial_core.c:591 n_hdlc_send_frames+0x278/0x470 drivers/tty/n_hdlc.c:403 n_hdlc_tty_wakeup+0xa0/0xc0 drivers/tty/n_hdlc.c:479 tty_wakeup+0xd4/0x110 drivers/tty/tty_io.c:534 tty_port_default_wakeup+0x26/0x40 drivers/tty/tty_port.c:50 serial8250_tx_chars+0x490/0xaf0 drivers/tty/serial/8250/8250_port.c:1813 serial8250_handle_irq.part.0+0x31f/0x3d0 drivers/tty/serial/8250/8250_port.c:1900 serial8250_handle_irq drivers/tty/serial/8250/8250_port.c:1873 [inline] serial8250_default_handle_irq+0xae/0x220 drivers/tty/serial/8250/8250_port.c:1916 serial8250_interrupt+0x101/0x240 drivers/tty/serial/8250/8250_core.c:125 __handle_irq_event_percpu+0x27e/0x8e0 kernel/irq/handle.c:149 handle_irq_event_percpu kernel/irq/handle.c:189 [inline] handle_irq_event+0x102/0x290 kernel/irq/handle.c:206 handle_edge_irq+0x260/0xcf0 kernel/irq/chip.c:800 generic_handle_irq_desc include/linux/irqdesc.h:155 [inline] handle_irq+0x35/0x50 arch/x86/kernel/irq_64.c:87 do_IRQ+0x93/0x1c0 arch/x86/kernel/irq.c:246 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:slab_alloc_node mm/slab.c:3334 [inline] RIP: 0010:kmem_cache_alloc_node_trace+0x2ee/0x3b0 mm/slab.c:3666 A link change request failed with some changes committed already. Interface ipvlan0 may have been left with an inconsistent configuration, please check. Code: fe ff ff 48 f7 04 24 00 02 00 00 0f 84 28 fe ff ff e8 26 89 cf ff 48 83 3d 66 62 59 08 00 0f 84 aa 00 00 00 48 8b 3c 24 57 9d <0f> 1f 44 00 00 e9 23 fe ff ff 65 ff 05 11 bf 69 7e 48 8b 05 c2 db RSP: 0018:ffff88805857f460 EFLAGS: 00000286 ORIG_RAX: ffffffffffffffd2 RAX: 0000000000000007 RBX: 00000000006102c0 RCX: 1ffff1100b0c3565 RDX: 0000000000000000 RSI: ffff88805861ab08 RDI: 0000000000000286 RBP: 00000000006102c0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880af802140 R13: ffff88813bff0c40 R14: 0000000000000580 R15: ffff88813bff0c40 __do_kmalloc_node mm/slab.c:3688 [inline] __kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3703 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0xae/0x560 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:995 [inline] nlmsg_new include/net/netlink.h:511 [inline] audit_buffer_alloc kernel/audit.c:1693 [inline] audit_log_start.part.0+0x282/0x710 kernel/audit.c:1806 audit_log_start+0x5f/0x90 kernel/audit.c:1767 integrity_audit_msg+0x100/0x430 security/integrity/integrity_audit.c:41 ima_add_violation+0x198/0x380 security/integrity/ima/ima_api.c:154 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline] process_measurement+0xa9c/0x1440 security/integrity/ima/ima_main.c:214 ima_file_check+0xb9/0x100 security/integrity/ima/ima_main.c:391 do_last fs/namei.c:3425 [inline] path_openat+0x7e4/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ff0a3b96639 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff0a2109168 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007ff0a3cb6f80 RCX: 00007ff0a3b96639 RDX: 0000000000000000 RSI: 0000000000121000 RDI: 00000000200002c0 RBP: 00007ff0a3bf1ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff5528df3f R14: 00007ff0a2109300 R15: 0000000000022000 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: ff 48 f7 decl -0x9(%rax) 3: 04 24 add $0x24,%al 5: 00 02 add %al,(%rdx) 7: 00 00 add %al,(%rax) 9: 0f 84 28 fe ff ff je 0xfffffe37 f: e8 26 89 cf ff callq 0xffcf893a 14: 48 83 3d 66 62 59 08 cmpq $0x0,0x8596266(%rip) # 0x8596282 1b: 00 1c: 0f 84 aa 00 00 00 je 0xcc 22: 48 8b 3c 24 mov (%rsp),%rdi 26: 57 push %rdi 27: 9d popfq * 28: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) <-- trapping instruction 2d: e9 23 fe ff ff jmpq 0xfffffe55 32: 65 ff 05 11 bf 69 7e incl %gs:0x7e69bf11(%rip) # 0x7e69bf4a 39: 48 rex.W 3a: 8b .byte 0x8b 3b: 05 .byte 0x5 3c: c2 .byte 0xc2 3d: db .byte 0xdb