Warning: Permanently added '10.128.15.196' (ED25519) to the list of known hosts. 2025/05/02 11:31:44 ignoring optional flag "sandboxArg"="0" 2025/05/02 11:31:45 parsed 1 programs [ 54.411111][ T2652] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2025/05/02 11:31:49 executed programs: 0 [ 59.251670][ T3542] [ 59.253993][ T3542] ====================================================== [ 59.260990][ T3542] WARNING: possible circular locking dependency detected [ 59.267977][ T3542] 6.14.0-rc2-syzkaller #0 Not tainted [ 59.273310][ T3542] ------------------------------------------------------ [ 59.280299][ T3542] syz.3.16/3542 is trying to acquire lock: [ 59.286155][ T3542] ffffffff837ff0f8 (uevent_sock_mutex){+.+.}-{4:4}, at: kobject_uevent_net_broadcast+0x12b/0x230 [ 59.297141][ T3542] [ 59.297141][ T3542] but task is already holding lock: [ 59.304473][ T3542] ffff88810969c0c0 (&q->q_usage_counter(io)#8){++++}-{0:0}, at: loop_set_status+0x97/0x280 [ 59.314417][ T3542] [ 59.314417][ T3542] which lock already depends on the new lock. [ 59.314417][ T3542] [ 59.324868][ T3542] [ 59.324868][ T3542] the existing dependency chain (in reverse order) is: [ 59.333843][ T3542] [ 59.333843][ T3542] -> #2 (&q->q_usage_counter(io)#8){++++}-{0:0}: [ 59.342303][ T3542] blk_alloc_queue+0x33f/0x370 [ 59.347548][ T3542] __blk_mq_alloc_disk+0x74/0x120 [ 59.353053][ T3542] loop_add+0x1d4/0x3d0 [ 59.357691][ T3542] loop_init+0xc2/0xe0 [ 59.362240][ T3542] do_one_initcall+0xe3/0x380 [ 59.367397][ T3542] do_initcall_level+0x8f/0x100 [ 59.372729][ T3542] do_initcalls+0x54/0x90 [ 59.377551][ T3542] kernel_init_freeable+0x183/0x200 [ 59.383315][ T3542] kernel_init+0x15/0x120 [ 59.388141][ T3542] ret_from_fork+0x32/0x40 [ 59.393041][ T3542] ret_from_fork_asm+0x1a/0x30 [ 59.398290][ T3542] [ 59.398290][ T3542] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 59.405535][ T3542] fs_reclaim_acquire+0x51/0xc0 [ 59.410874][ T3542] kmem_cache_alloc_node_noprof+0x49/0x3f0 [ 59.417165][ T3542] __alloc_skb+0x92/0x210 [ 59.421976][ T3542] alloc_uevent_skb+0x44/0xc0 [ 59.427138][ T3542] kobject_uevent_net_broadcast+0x18e/0x230 [ 59.433508][ T3542] kobject_uevent_env+0x318/0x400 [ 59.439100][ T3542] kobject_synth_uevent+0x414/0x470 [ 59.444781][ T3542] bus_uevent_store+0x97/0xd0 [ 59.449941][ T3542] kernfs_fop_write_iter+0x11f/0x1a0 [ 59.455707][ T3542] vfs_write+0x28f/0x350 [ 59.460436][ T3542] ksys_write+0x75/0xf0 [ 59.465071][ T3542] do_syscall_64+0xa4/0x180 [ 59.470055][ T3542] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.476430][ T3542] [ 59.476430][ T3542] -> #0 (uevent_sock_mutex){+.+.}-{4:4}: [ 59.484197][ T3542] __lock_acquire+0x12cb/0x20e0 [ 59.489531][ T3542] lock_acquire+0xea/0x270 [ 59.494432][ T3542] __mutex_lock+0xac/0xa90 [ 59.499330][ T3542] kobject_uevent_net_broadcast+0x12b/0x230 [ 59.505701][ T3542] kobject_uevent_env+0x318/0x400 [ 59.511394][ T3542] loop_set_status+0x14c/0x280 [ 59.516640][ T3542] lo_ioctl+0x64d/0xa80 [ 59.521368][ T3542] blkdev_ioctl+0x2c4/0x310 [ 59.526351][ T3542] __se_sys_ioctl+0x69/0xc0 [ 59.531336][ T3542] do_syscall_64+0xa4/0x180 [ 59.536337][ T3542] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.542720][ T3542] [ 59.542720][ T3542] other info that might help us debug this: [ 59.542720][ T3542] [ 59.552910][ T3542] Chain exists of: [ 59.552910][ T3542] uevent_sock_mutex --> fs_reclaim --> &q->q_usage_counter(io)#8 [ 59.552910][ T3542] [ 59.566493][ T3542] Possible unsafe locking scenario: [ 59.566493][ T3542] [ 59.573990][ T3542] CPU0 CPU1 [ 59.579318][ T3542] ---- ---- [ 59.584647][ T3542] lock(&q->q_usage_counter(io)#8); [ 59.589891][ T3542] lock(fs_reclaim); [ 59.596351][ T3542] lock(&q->q_usage_counter(io)#8); [ 59.604110][ T3542] lock(uevent_sock_mutex); [ 59.608669][ T3542] [ 59.608669][ T3542] *** DEADLOCK *** [ 59.608669][ T3542] [ 59.616785][ T3542] 3 locks held by syz.3.16/3542: [ 59.621790][ T3542] #0: ffff8881096ea368 (&lo->lo_mutex){+.+.}-{4:4}, at: loop_set_status+0x22/0x280 [ 59.631131][ T3542] #1: ffff88810969c0c0 (&q->q_usage_counter(io)#8){++++}-{0:0}, at: loop_set_status+0x97/0x280 [ 59.641503][ T3542] #2: ffff88810969c0f8 (&q->q_usage_counter(queue)#2){+.+.}-{0:0}, at: loop_set_status+0x97/0x280 [ 59.652138][ T3542] [ 59.652138][ T3542] stack backtrace: [ 59.657998][ T3542] CPU: 0 UID: 0 PID: 3542 Comm: syz.3.16 Not tainted 6.14.0-rc2-syzkaller #0 [ 59.658001][ T3542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 59.658004][ T3542] Call Trace: [ 59.658006][ T3542] [ 59.658009][ T3542] dump_stack_lvl+0xaf/0x110 [ 59.658014][ T3542] print_circular_bug+0x29b/0x2b0 [ 59.658017][ T3542] check_noncircular+0x110/0x130 [ 59.658019][ T3542] __lock_acquire+0x12cb/0x20e0 [ 59.658023][ T3542] ? __lock_acquire+0x4ec/0x20e0 [ 59.658031][ T3542] ? kobject_uevent_net_broadcast+0x12b/0x230 [ 59.658034][ T3542] lock_acquire+0xea/0x270 [ 59.658036][ T3542] ? kobject_uevent_net_broadcast+0x12b/0x230 [ 59.658039][ T3542] ? kobject_uevent_net_broadcast+0x12b/0x230 [ 59.658040][ T3542] __mutex_lock+0xac/0xa90 [ 59.658043][ T3542] ? kobject_uevent_net_broadcast+0x12b/0x230 [ 59.658045][ T3542] kobject_uevent_net_broadcast+0x12b/0x230 [ 59.658048][ T3542] kobject_uevent_env+0x318/0x400 [ 59.658050][ T3542] loop_set_status+0x14c/0x280 [ 59.658053][ T3542] lo_ioctl+0x64d/0xa80 [ 59.658060][ T3542] blkdev_ioctl+0x2c4/0x310 [ 59.658064][ T3542] __se_sys_ioctl+0x69/0xc0 [ 59.658067][ T3542] do_syscall_64+0xa4/0x180 [ 59.658070][ T3542] ? clear_bhb_loop+0x55/0xb0 [ 59.658073][ T3542] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.658077][ T3542] RIP: 0033:0x7f01fa98e969 [ 59.658081][ T3542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.658083][ T3542] RSP: 002b:00007f01fb8db038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 59.658086][ T3542] RAX: ffffffffffffffda RBX: 00007f01fabb5fa0 RCX: 00007f01fa98e969 [ 59.658087][ T3542] RDX: 00002000000001c0 RSI: 0000000000004c02 RDI: 0000000000000003 [ 59.658089][ T3542] RBP: 00007f01faa10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 59.658090][ T3542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 59.658091][ T3542] R13: 0000000000000000 R14: 00007f01fabb5fa0 R15: 00007ffc6d2b8ef8 [ 59.658093][ T3542] 2025/05/02 11:31:54 executed programs: 52 2025/05/02 11:31:59 executed programs: 150