====================================================== WARNING: possible circular locking dependency detected 4.14.292-syzkaller #0 Not tainted ------------------------------------------------------ systemd-udevd/4628 is trying to acquire lock: (&(&gsm->tx_lock)->rlock){-...}, at: [<ffffffff8356eece>] gsmld_write_wakeup+0x4e/0xd0 drivers/tty/n_gsm.c:2490 but task is already holding lock: (&port_lock_key){-.-.}, at: [<ffffffff835c4660>] serial8250_handle_irq.part.0+0x20/0x330 drivers/tty/serial/8250/8250_port.c:1891 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&port_lock_key){-.-.}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x8c/0xc0 kernel/locking/spinlock.c:160 uart_write_room+0xd5/0x340 drivers/tty/serial/serial_core.c:643 tty_write_room+0x61/0x80 drivers/tty/tty_ioctl.c:78 gsmld_write+0x69/0x120 drivers/tty/n_gsm.c:2546 do_tty_write drivers/tty/tty_io.c:959 [inline] tty_write+0x410/0x740 drivers/tty/tty_io.c:1043 __vfs_write+0xe4/0x630 fs/read_write.c:480 __kernel_write+0xf5/0x330 fs/read_write.c:501 write_pipe_buf+0x143/0x1c0 fs/splice.c:797 splice_from_pipe_feed fs/splice.c:502 [inline] __splice_from_pipe+0x326/0x7a0 fs/splice.c:626 splice_from_pipe fs/splice.c:661 [inline] default_file_splice_write+0xc5/0x150 fs/splice.c:809 do_splice_from fs/splice.c:851 [inline] direct_splice_actor+0x115/0x160 fs/splice.c:1016 splice_direct_to_actor+0x25a/0x700 fs/splice.c:971 do_splice_direct+0x164/0x210 fs/splice.c:1059 do_sendfile+0x47f/0xb30 fs/read_write.c:1441 SYSC_sendfile64 fs/read_write.c:1502 [inline] SyS_sendfile64+0xff/0x110 fs/read_write.c:1488 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb -> #0 (&(&gsm->tx_lock)->rlock){-...}: lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x8c/0xc0 kernel/locking/spinlock.c:160 gsmld_write_wakeup+0x4e/0xd0 drivers/tty/n_gsm.c:2490 tty_wakeup+0xc3/0xf0 drivers/tty/tty_io.c:533 tty_port_default_wakeup+0x26/0x40 drivers/tty/tty_port.c:49 serial8250_tx_chars+0x3fe/0xc70 drivers/tty/serial/8250/8250_port.c:1828 serial8250_handle_irq.part.0+0x28d/0x330 drivers/tty/serial/8250/8250_port.c:1915 serial8250_handle_irq drivers/tty/serial/8250/8250_port.c:1888 [inline] serial8250_default_handle_irq+0x8a/0x1f0 drivers/tty/serial/8250/8250_port.c:1931 serial8250_interrupt+0xf3/0x210 drivers/tty/serial/8250/8250_core.c:129 __handle_irq_event_percpu+0xee/0x7f0 kernel/irq/handle.c:147 handle_irq_event_percpu kernel/irq/handle.c:187 [inline] handle_irq_event+0xed/0x240 kernel/irq/handle.c:204 handle_edge_irq+0x224/0xc40 kernel/irq/chip.c:770 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x35/0x50 arch/x86/kernel/irq_64.c:87 do_IRQ+0x93/0x1d0 arch/x86/kernel/irq.c:230 ret_from_intr+0x0/0x1e __might_sleep+0x35/0xb0 kernel/sched/core.c:5987 __might_fault+0x9f/0x1b0 mm/memory.c:4702 _copy_to_user+0x27/0xd0 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] cp_new_stat+0x472/0x580 fs/stat.c:329 SYSC_newlstat fs/stat.c:353 [inline] SyS_newlstat+0xda/0xe0 fs/stat.c:343 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&port_lock_key); lock(&(&gsm->tx_lock)->rlock); lock(&port_lock_key); lock(&(&gsm->tx_lock)->rlock); *** DEADLOCK *** 3 locks held by systemd-udevd/4628: #0: (&(&i->lock)->rlock){-.-.}, at: [<ffffffff835b19ea>] spin_lock include/linux/spinlock.h:317 [inline] #0: (&(&i->lock)->rlock){-.-.}, at: [<ffffffff835b19ea>] serial8250_interrupt+0x3a/0x210 drivers/tty/serial/8250/8250_core.c:119 #1: (&port_lock_key){-.-.}, at: [<ffffffff835c4660>] serial8250_handle_irq.part.0+0x20/0x330 drivers/tty/serial/8250/8250_port.c:1891 #2: (&tty->ldisc_sem){++++}, at: [<ffffffff83556cfb>] tty_ldisc_ref+0x1b/0x80 drivers/tty/tty_ldisc.c:305 stack backtrace: CPU: 1 PID: 4628 Comm: systemd-udevd Not tainted 4.14.292-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Call Trace: <IRQ> __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_circular_bug.constprop.0.cold+0x2d7/0x41e kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1905 [inline] check_prevs_add kernel/locking/lockdep.c:2022 [inline] validate_chain kernel/locking/lockdep.c:2464 [inline] __lock_acquire+0x2e0e/0x3f20 kernel/locking/lockdep.c:3491 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x8c/0xc0 kernel/locking/spinlock.c:160 gsmld_write_wakeup+0x4e/0xd0 drivers/tty/n_gsm.c:2490 tty_wakeup+0xc3/0xf0 drivers/tty/tty_io.c:533 tty_port_default_wakeup+0x26/0x40 drivers/tty/tty_port.c:49 serial8250_tx_chars+0x3fe/0xc70 drivers/tty/serial/8250/8250_port.c:1828 serial8250_handle_irq.part.0+0x28d/0x330 drivers/tty/serial/8250/8250_port.c:1915 serial8250_handle_irq drivers/tty/serial/8250/8250_port.c:1888 [inline] serial8250_default_handle_irq+0x8a/0x1f0 drivers/tty/serial/8250/8250_port.c:1931 serial8250_interrupt+0xf3/0x210 drivers/tty/serial/8250/8250_core.c:129 __handle_irq_event_percpu+0xee/0x7f0 kernel/irq/handle.c:147 handle_irq_event_percpu kernel/irq/handle.c:187 [inline] handle_irq_event+0xed/0x240 kernel/irq/handle.c:204 handle_edge_irq+0x224/0xc40 kernel/irq/chip.c:770 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x35/0x50 arch/x86/kernel/irq_64.c:87 do_IRQ+0x93/0x1d0 arch/x86/kernel/irq.c:230 common_interrupt+0x93/0x93 arch/x86/entry/entry_64.S:576 </IRQ> RIP: 0010:__might_sleep+0x35/0xb0 kernel/sched/core.c:5987 RSP: 0018:ffff88809cacfc30 EFLAGS: 00000246 ORIG_RAX: ffffffffffffffc8 RAX: dffffc0000000000 RBX: ffff88809cac2240 RCX: 0000000000000000 RDX: 1ffff1101395844a RSI: 0000000000000019 RDI: ffff88809cac2250 RBP: ffffffff87ccefa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: ffff88809cac2240 R12: 0000000000000019 R13: 0000000000000000 R14: ffff88809cac2240 R15: 0000000000000000 __might_fault+0x9f/0x1b0 mm/memory.c:4702 _copy_to_user+0x27/0xd0 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] cp_new_stat+0x472/0x580 fs/stat.c:329 SYSC_newlstat fs/stat.c:353 [inline] SyS_newlstat+0xda/0xe0 fs/stat.c:343 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fbd27564335 RSP: 002b:00007fffcb736668 EFLAGS: 00000246 ORIG_RAX: 0000000000000006 RAX: ffffffffffffffda RBX: 000055ee898909d0 RCX: 00007fbd27564335 RDX: 00007fffcb7366a0 RSI: 00007fffcb7366a0 RDI: 000055ee8988f9d0 RBP: 00007fffcb736760 R08: 00007fbd278232f8 R09: 0000000000001010 R10: 00007fbd27822b58 R11: 0000000000000246 R12: 000055ee8988f9d0 R13: 000055ee8988f9e4 R14: 000055ee8988c26d R15: 000055ee8988c274 print_req_error: I/O error, dev loop3, sector 0 cannot load conntrack support for proto=2 UDF-fs: error (device loop2): udf_process_sequence: Block 99 of volume descriptor sequence is corrupted or we could not read it UDF-fs: error (device loop2): udf_process_sequence: Block 1984 of volume descriptor sequence is corrupted or we could not read it UDF-fs: Scanning with blocksize 512 failed UDF-fs: warning (device loop2): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: warning (device loop2): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop2): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed cannot load conntrack support for proto=2 audit: type=1804 audit(1662778930.738:2): pid=10296 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2329886804/syzkaller.nMTfGk/22/bus" dev="sda1" ino=13967 res=1 UDF-fs: error (device loop2): udf_process_sequence: Block 99 of volume descriptor sequence is corrupted or we could not read it UDF-fs: error (device loop2): udf_process_sequence: Block 1984 of volume descriptor sequence is corrupted or we could not read it UDF-fs: Scanning with blocksize 512 failed audit: type=1800 audit(1662778930.768:3): pid=10296 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=13967 res=0 UDF-fs: warning (device loop2): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: warning (device loop2): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop2): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed syz-executor.5 (10347) used greatest stack depth: 24256 bytes left cannot load conntrack support for proto=2 kvm: vcpu 0: requested 128 ns lapic timer period limited to 500000 ns UDF-fs: error (device loop2): udf_process_sequence: Block 99 of volume descriptor sequence is corrupted or we could not read it UDF-fs: error (device loop2): udf_process_sequence: Block 1984 of volume descriptor sequence is corrupted or we could not read it UDF-fs: Scanning with blocksize 512 failed UDF-fs: warning (device loop2): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: warning (device loop2): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop2): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed cannot load conntrack support for proto=2 UDF-fs: error (device loop2): udf_process_sequence: Block 99 of volume descriptor sequence is corrupted or we could not read it UDF-fs: error (device loop2): udf_process_sequence: Block 1984 of volume descriptor sequence is corrupted or we could not read it UDF-fs: Scanning with blocksize 512 failed UDF-fs: warning (device loop2): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: warning (device loop2): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop2): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed audit: type=1804 audit(1662778933.328:4): pid=10562 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir2756756496/syzkaller.KsyEHG/27/bus" dev="sda1" ino=13999 res=1 audit: type=1804 audit(1662778933.388:5): pid=10562 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir2756756496/syzkaller.KsyEHG/27/bus" dev="sda1" ino=13999 res=1 IPVS: ftp: loaded support on port[0] = 21 audit: type=1800 audit(1662778933.688:6): pid=10620 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=13987 res=0 audit: type=1804 audit(1662778933.688:7): pid=10620 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3500664266/syzkaller.SDR4mt/28/file0" dev="sda1" ino=13987 res=1 audit: type=1804 audit(1662778933.688:8): pid=10620 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir3500664266/syzkaller.SDR4mt/28/file0" dev="sda1" ino=13987 res=1 audit: type=1804 audit(1662778933.718:9): pid=10620 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir3500664266/syzkaller.SDR4mt/28/file0" dev="sda1" ino=13987 res=1 audit: type=1800 audit(1662778934.578:10): pid=10728 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=13971 res=0 audit: type=1804 audit(1662778934.588:11): pid=10728 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3500664266/syzkaller.SDR4mt/29/file0" dev="sda1" ino=13971 res=1