INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 1 PID: 13133 Comm: syz-executor.4 Not tainted 4.14.307-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 register_lock_class+0x389/0x1180 kernel/locking/lockdep.c:768 __lock_acquire+0x167/0x3f20 kernel/locking/lockdep.c:3378 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 flush_work+0xad/0x770 kernel/workqueue.c:2890 __cancel_work_timer+0x321/0x460 kernel/workqueue.c:2965 smc_close_active+0x7e2/0xbb0 net/smc/smc_close.c:207 smc_release+0x3e1/0x5d0 net/smc/af_smc.c:131 __sock_release+0xcd/0x2b0 net/socket.c:602 sock_close+0x15/0x20 net/socket.c:1139 __fput+0x25f/0x7a0 fs/file_table.c:210 task_work_run+0x11f/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7fa0f35c9fab RSP: 002b:00007ffc72ea7ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007fa0f35c9fab RDX: 0000001b2f620000 RSI: 0000001b2f626bc4 RDI: 0000000000000005 RBP: 00007fa0f3739980 R08: 0000000000000000 R09: 00000000f105bd8a R10: 0011d78ed04581d0 R11: 0000000000000293 R12: 00000000000482ad R13: 00007ffc72ea7fd0 R14: 00007fa0f3738050 R15: 0000000000000032 hfs: unable to parse mount options F2FS-fs (loop5): Mismatch start address, segment0(512) cp_blkaddr(605) F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (loop5): invalid crc value F2FS-fs (loop5): Found nat_bits in checkpoint hfs: unable to parse mount options F2FS-fs (loop5): Mounted with checkpoint version = 753bd00b audit: type=1804 audit(1677675810.697:86): pid=13150 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir4175337936/syzkaller.IarVcy/91/bus/file0" dev="loop5" ino=4 res=1 unregister_netdevice: waiting for ip6gre0 to become free. Usage count = -1 F2FS-fs (loop5): Mismatch start address, segment0(512) cp_blkaddr(605) F2FS-fs (loop1): Mismatch start address, segment0(512) cp_blkaddr(605) F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (loop5): invalid crc value hfs: unable to parse mount options hfs: unable to parse mount options audit: type=1804 audit(1677675811.437:87): pid=13240 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir1396930745/syzkaller.WfQFNz/101/bus/file0" dev="loop1" ino=4 res=1 audit: type=1804 audit(1677675811.437:88): pid=13252 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir4175337936/syzkaller.IarVcy/92/bus/file0" dev="loop5" ino=4 res=1 audit: type=1804 audit(1677675811.947:89): pid=13301 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir4175337936/syzkaller.IarVcy/93/bus/file0" dev="loop5" ino=4 res=1 audit: type=1804 audit(1677675812.017:90): pid=13304 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir1396930745/syzkaller.WfQFNz/102/bus/file0" dev="loop1" ino=4 res=1 hfs: unable to parse mount options hfs: unable to parse mount options audit: type=1804 audit(1677675812.447:91): pid=13341 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir4175337936/syzkaller.IarVcy/94/bus/file0" dev="loop5" ino=4 res=1 audit: type=1804 audit(1677675812.617:92): pid=13356 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir1396930745/syzkaller.WfQFNz/103/bus/file0" dev="loop1" ino=4 res=1 audit: type=1800 audit(1677675812.827:93): pid=13395 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=14373 res=0 hfs: unable to parse mount options hfs: unable to parse mount options print_req_error: I/O error, dev loop2, sector 0 audit: type=1800 audit(1677675813.667:94): pid=13446 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=14357 res=0 hfs: unable to parse mount options audit: type=1800 audit(1677675814.247:95): pid=13471 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=14386 res=0 device veth0_vlan left promiscuous mode device veth0_vlan left promiscuous mode kauditd_printk_skb: 3 callbacks suppressed audit: type=1800 audit(1677675815.927:99): pid=13511 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=14387 res=0 audit: type=1800 audit(1677675816.207:100): pid=13512 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=14391 res=0 audit: type=1800 audit(1677675816.697:101): pid=13519 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=14310 res=0 audit: type=1800 audit(1677675817.157:102): pid=13538 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=14390 res=0