[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.5' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 27.190373] audit: type=1804 audit(1656803882.106:2): pid=7971 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor304" name="/root/bus/file0" dev="sda1" ino=13861 res=1 [ 27.193476] [ 27.210994] ====================================================== [ 27.217290] WARNING: possible circular locking dependency detected [ 27.223577] 4.14.286-syzkaller #0 Not tainted [ 27.228055] ------------------------------------------------------ [ 27.234346] syz-executor304/7971 is trying to acquire lock: [ 27.240034] (sb_writers#3){.+.+}, at: [] mnt_want_write+0x3a/0xb0 [ 27.248064] [ 27.248064] but task is already holding lock: [ 27.254059] (&iint->mutex){+.+.}, at: [] process_measurement+0x270/0xb20 [ 27.262534] [ 27.262534] which lock already depends on the new lock. [ 27.262534] [ 27.270838] [ 27.270838] the existing dependency chain (in reverse order) is: [ 27.278451] [ 27.278451] -> #1 (&iint->mutex){+.+.}: [ 27.283899] __mutex_lock+0xc4/0x1310 [ 27.288202] process_measurement+0x270/0xb20 [ 27.293288] path_openat+0x10ad/0x2970 [ 27.297701] do_filp_open+0x179/0x3c0 [ 27.302005] do_sys_open+0x296/0x410 [ 27.306224] do_syscall_64+0x1d5/0x640 [ 27.310708] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 27.316403] [ 27.316403] -> #0 (sb_writers#3){.+.+}: [ 27.321847] lock_acquire+0x170/0x3f0 [ 27.326170] __sb_start_write+0x64/0x260 [ 27.330740] mnt_want_write+0x3a/0xb0 [ 27.335039] ovl_open_maybe_copy_up+0xcf/0x130 [ 27.340132] ovl_d_real+0xbc/0x350 [ 27.344349] vfs_open+0x19e/0x220 [ 27.348328] dentry_open+0xa7/0x210 [ 27.352460] ima_calc_file_hash+0x51c/0x780 [ 27.357279] ima_collect_measurement+0x39d/0x430 [ 27.362552] process_measurement+0x78b/0xb20 [ 27.367466] path_openat+0x10ad/0x2970 [ 27.371852] do_filp_open+0x179/0x3c0 [ 27.376154] do_sys_open+0x296/0x410 [ 27.380369] do_syscall_64+0x1d5/0x640 [ 27.384767] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 27.390470] [ 27.390470] other info that might help us debug this: [ 27.390470] [ 27.398594] Possible unsafe locking scenario: [ 27.398594] [ 27.404641] CPU0 CPU1 [ 27.409382] ---- ---- [ 27.414022] lock(&iint->mutex); [ 27.417447] lock(sb_writers#3); [ 27.423392] lock(&iint->mutex); [ 27.429424] lock(sb_writers#3); [ 27.432848] [ 27.432848] *** DEADLOCK *** [ 27.432848] [ 27.438876] 1 lock held by syz-executor304/7971: [ 27.443607] #0: (&iint->mutex){+.+.}, at: [] process_measurement+0x270/0xb20 [ 27.452518] [ 27.452518] stack backtrace: [ 27.456986] CPU: 0 PID: 7971 Comm: syz-executor304 Not tainted 4.14.286-syzkaller #0 [ 27.464836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 27.474161] Call Trace: [ 27.476724] dump_stack+0x1b2/0x281 [ 27.480354] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 27.486219] __lock_acquire+0x2e0e/0x3f20 [ 27.490454] ? kmem_cache_alloc+0x124/0x3c0 [ 27.494757] ? trace_hardirqs_on+0x10/0x10 [ 27.498973] ? trace_hardirqs_on+0x10/0x10 [ 27.503180] ? do_filp_open+0x179/0x3c0 [ 27.507126] ? do_syscall_64+0x1d5/0x640 [ 27.511160] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 27.516495] ? __lock_acquire+0x5fc/0x3f20 [ 27.520703] ? trace_hardirqs_on+0x10/0x10 [ 27.524911] ? fs_reclaim_release+0xd0/0x110 [ 27.529291] lock_acquire+0x170/0x3f0 [ 27.533079] ? mnt_want_write+0x3a/0xb0 [ 27.537029] __sb_start_write+0x64/0x260 [ 27.541088] ? mnt_want_write+0x3a/0xb0 [ 27.545383] mnt_want_write+0x3a/0xb0 [ 27.549257] ovl_open_maybe_copy_up+0xcf/0x130 [ 27.553837] ovl_d_real+0xbc/0x350 [ 27.557394] vfs_open+0x19e/0x220 [ 27.560921] dentry_open+0xa7/0x210 [ 27.564534] ima_calc_file_hash+0x51c/0x780 [ 27.568848] ? ext4_xattr_get+0x139/0x8b0 [ 27.572974] ima_collect_measurement+0x39d/0x430 [ 27.577705] ? ima_get_action+0x70/0x70 [ 27.581660] ? vfs_getxattr_alloc+0xc8/0x2d0 [ 27.586080] ? ima_get_cache_status+0x170/0x170 [ 27.590728] process_measurement+0x78b/0xb20 [ 27.595116] ? ima_rdwr_violation_check+0x3a0/0x3a0 [ 27.600104] ? generic_file_open+0x68/0x90 [ 27.604317] ? ext4_release_file+0x2d0/0x2d0 [ 27.608748] ? apparmor_file_alloc_security+0x800/0x800 [ 27.614172] ? lock_downgrade+0x740/0x740 [ 27.618306] ? file_ra_state_init+0xc4/0x1e0 [ 27.622695] ? do_dentry_open+0x698/0xec0 [ 27.626907] ? ext4_release_file+0x2d0/0x2d0 [ 27.631292] ? vfs_open+0x10d/0x220 [ 27.634894] path_openat+0x10ad/0x2970 [ 27.638757] ? path_lookupat+0x780/0x780 [ 27.642804] ? trace_hardirqs_on+0x10/0x10 [ 27.647017] ? trace_hardirqs_on+0x10/0x10 [ 27.651235] do_filp_open+0x179/0x3c0 [ 27.655012] ? may_open_dev+0xe0/0xe0 [ 27.658801] ? lock_downgrade+0x740/0x740 [ 27.662931] ? do_raw_spin_unlock+0x164/0x220 [ 27.667749] ? _raw_spin_unlock+0x29/0x40 [ 27.671960] ? __alloc_fd+0x1be/0x490 [ 27.675905] do_sys_open+0x296/0x410 [ 27.679628] ? filp_open+0x60/0x60 [ 27.683147] ? do_syscall_64+0x4c/0x640 [ 27.687108] ? do_sys_open+0x410/0x410 [ 27.690989] do_syscall_64+0x1d5/0x640 [ 27.694855] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 27.700050] RIP: 0033:0x7f829b7290c9 [ 27.703749] RSP: 002b:00007ffe5508e828 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 27.711439] RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 00007f829b7290c9 [ 27.718686] RDX: 0000000000000000 RSI: 000000000000000b RDI: 00000000200000c0 [ 27.725953] RBP: 00007f829b6ed0b0 R08: 0000000000000000 R09: 0000000000000000 [ 27.738080] R10: 0000000000000000 R11: 0000000000000