============================================ WARNING: possible recursive locking detected 5.12.0-rc4-syzkaller #0 Not tainted -------------------------------------------- syz-executor.2/24335 is trying to acquire lock: ffff8880254085e8 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: wiphy_lock include/net/cfg80211.h:5269 [inline] ffff8880254085e8 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: cfg80211_netdev_notifier_call+0x704/0x11d0 net/wireless/core.c:1415 but task is already holding lock: ffff8880254085e8 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: wiphy_lock include/net/cfg80211.h:5269 [inline] ffff8880254085e8 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_stop+0x6a/0xf0 net/mac80211/iface.c:643 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&rdev->wiphy.mtx); lock(&rdev->wiphy.mtx); *** DEADLOCK *** May be due to missing lock nesting notation 2 locks held by syz-executor.2/24335: #0: ffffffff8d66b268 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x19f/0xb70 net/core/dev_ioctl.c:504 #1: ffff8880254085e8 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: wiphy_lock include/net/cfg80211.h:5269 [inline] #1: ffff8880254085e8 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_stop+0x6a/0xf0 net/mac80211/iface.c:643 stack backtrace: CPU: 1 PID: 24335 Comm: syz-executor.2 Not tainted 5.12.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x141/0x1d7 lib/dump_stack.c:120 print_deadlock_bug kernel/locking/lockdep.c:2829 [inline] check_deadlock kernel/locking/lockdep.c:2872 [inline] validate_chain kernel/locking/lockdep.c:3661 [inline] __lock_acquire.cold+0x14c/0x3b4 kernel/locking/lockdep.c:4900 lock_acquire kernel/locking/lockdep.c:5510 [inline] lock_acquire+0x1ab/0x740 kernel/locking/lockdep.c:5475 __mutex_lock_common kernel/locking/mutex.c:949 [inline] __mutex_lock+0x139/0x1120 kernel/locking/mutex.c:1096 wiphy_lock include/net/cfg80211.h:5269 [inline] cfg80211_netdev_notifier_call+0x704/0x11d0 net/wireless/core.c:1415 notifier_call_chain+0xb5/0x200 kernel/notifier.c:83 call_netdevice_notifiers_info+0xb5/0x130 net/core/dev.c:2075 call_netdevice_notifiers_extack net/core/dev.c:2087 [inline] call_netdevice_notifiers net/core/dev.c:2101 [inline] __dev_close_many+0xf3/0x2f0 net/core/dev.c:1621 dev_close_many+0x22c/0x620 net/core/dev.c:1672 dev_close net/core/dev.c:1698 [inline] dev_close+0x16d/0x210 net/core/dev.c:1692 ieee80211_do_stop+0x1276/0x20e0 net/mac80211/iface.c:485 ieee80211_stop+0x77/0xf0 net/mac80211/iface.c:644 __dev_close_many+0x1b8/0x2f0 net/core/dev.c:1647 __dev_close net/core/dev.c:1659 [inline] __dev_change_flags+0x2ca/0x750 net/core/dev.c:8684 dev_change_flags+0x93/0x170 net/core/dev.c:8757 dev_ifsioc+0x210/0xa60 net/core/dev_ioctl.c:254 dev_ioctl+0x1ad/0xb70 net/core/dev_ioctl.c:505 sock_do_ioctl+0x148/0x2d0 net/socket.c:1062 sock_ioctl+0x477/0x6a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x466459 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f21865ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 RDX: 0000000020000180 RSI: 0000000000008914 RDI: 0000000000000003 RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffc7d51c67f R14: 00007f21865ce300 R15: 0000000000022000