[info] Using makefile-style concurrent boot in runlevel 2. [ 26.785619] audit: type=1800 audit(1542844265.425:21): pid=5853 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.68' (ECDSA) to the list of known hosts. 2018/11/21 23:52:30 parsed 1 programs 2018/11/21 23:52:31 executed programs: 0 syzkaller login: [ 113.153500] IPVS: ftp: loaded support on port[0] = 21 [ 113.400692] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.407563] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.414781] device bridge_slave_0 entered promiscuous mode [ 113.434109] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.440619] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.447688] device bridge_slave_1 entered promiscuous mode [ 113.465872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 113.483952] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 113.535182] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 113.555686] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 113.633813] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.641789] team0: Port device team_slave_0 added [ 113.658494] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.665561] team0: Port device team_slave_1 added [ 113.682988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.702817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.723056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.743753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.892498] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.898971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.905808] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.912205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.424263] 8021q: adding VLAN 0 to HW filter on device bond0 [ 114.475315] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 114.525828] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 114.532360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.540346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.590272] 8021q: adding VLAN 0 to HW filter on device team0 [ 114.916136] [ 114.917793] ====================================================== [ 114.924087] WARNING: possible circular locking dependency detected [ 114.930385] 4.20.0-rc3+ #344 Not tainted [ 114.934425] ------------------------------------------------------ [ 114.940732] syz-executor0/6278 is trying to acquire lock: [ 114.946246] 000000003f70b849 (sb_writers#3){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 114.953683] [ 114.953683] but task is already holding lock: [ 114.959633] 00000000bee1eaf1 (&iint->mutex){+.+.}, at: process_measurement+0x438/0x1bf0 [ 114.967774] [ 114.967774] which lock already depends on the new lock. [ 114.967774] [ 114.976067] [ 114.976067] the existing dependency chain (in reverse order) is: [ 114.983759] [ 114.983759] -> #1 (&iint->mutex){+.+.}: [ 114.989221] __mutex_lock+0x166/0x16f0 [ 114.993610] mutex_lock_nested+0x16/0x20 [ 114.998173] process_measurement+0x438/0x1bf0 [ 115.003286] ima_file_check+0xe5/0x130 [ 115.007701] path_openat+0x134a/0x5150 [ 115.012095] do_filp_open+0x255/0x380 [ 115.016400] do_sys_open+0x568/0x700 [ 115.020619] __x64_sys_open+0x7e/0xc0 [ 115.024935] do_syscall_64+0x1b9/0x820 [ 115.029338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 115.035029] [ 115.035029] -> #0 (sb_writers#3){.+.+}: [ 115.040469] lock_acquire+0x1ed/0x520 [ 115.044773] __sb_start_write+0x214/0x370 [ 115.049422] mnt_want_write+0x3f/0xc0 [ 115.053723] ovl_want_write+0x76/0xa0 [ 115.058028] ovl_open_maybe_copy_up+0x12c/0x190 [ 115.063199] ovl_open+0xb3/0x260 [ 115.067065] do_dentry_open+0x499/0x1250 [ 115.071675] dentry_open+0x143/0x1d0 [ 115.075892] ima_calc_file_hash+0x324/0x570 [ 115.080713] ima_collect_measurement+0x619/0x730 [ 115.085969] process_measurement+0x11fd/0x1bf0 [ 115.091068] ima_file_check+0xe5/0x130 [ 115.095457] path_openat+0x134a/0x5150 [ 115.099857] do_filp_open+0x255/0x380 [ 115.104160] do_sys_open+0x568/0x700 [ 115.108378] __x64_sys_open+0x7e/0xc0 [ 115.112681] do_syscall_64+0x1b9/0x820 [ 115.117066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 115.122753] [ 115.122753] other info that might help us debug this: [ 115.122753] [ 115.130875] Possible unsafe locking scenario: [ 115.130875] [ 115.136908] CPU0 CPU1 [ 115.141552] ---- ---- [ 115.146191] lock(&iint->mutex); [ 115.149621] lock(sb_writers#3); [ 115.155579] lock(&iint->mutex); [ 115.161539] lock(sb_writers#3); [ 115.164968] [ 115.164968] *** DEADLOCK *** [ 115.164968] [ 115.171022] 1 lock held by syz-executor0/6278: [ 115.175577] #0: 00000000bee1eaf1 (&iint->mutex){+.+.}, at: process_measurement+0x438/0x1bf0 [ 115.184138] [ 115.184138] stack backtrace: [ 115.188621] CPU: 1 PID: 6278 Comm: syz-executor0 Not tainted 4.20.0-rc3+ #344 [ 115.195876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.205223] Call Trace: [ 115.207794] dump_stack+0x244/0x39d [ 115.211413] ? dump_stack_print_info.cold.1+0x20/0x20 [ 115.216582] ? vprintk_func+0x85/0x181 [ 115.220453] print_circular_bug.isra.35.cold.54+0x1bd/0x27d [ 115.226142] ? save_trace+0xe0/0x290 [ 115.229842] __lock_acquire+0x3399/0x4c20 [ 115.233974] ? kasan_check_read+0x11/0x20 [ 115.238108] ? mark_held_locks+0x130/0x130 [ 115.242325] ? kmem_cache_alloc_trace+0x152/0x750 [ 115.247146] ? apparmor_file_alloc_security+0x17b/0xac0 [ 115.252496] ? security_file_alloc+0x4c/0xa0 [ 115.256894] ? __alloc_file+0x12a/0x470 [ 115.260872] ? alloc_empty_file+0x72/0x170 [ 115.265101] ? dentry_open+0x71/0x1d0 [ 115.268885] ? ima_file_check+0xe5/0x130 [ 115.272926] ? path_openat+0x134a/0x5150 [ 115.276964] ? do_filp_open+0x255/0x380 [ 115.280917] ? do_sys_open+0x568/0x700 [ 115.284795] ? __x64_sys_open+0x7e/0xc0 [ 115.288748] ? do_syscall_64+0x1b9/0x820 [ 115.292787] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 115.298147] ? zap_class+0x640/0x640 [ 115.301881] ? zap_class+0x640/0x640 [ 115.305591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.311109] ? check_preemption_disabled+0x48/0x280 [ 115.316110] lock_acquire+0x1ed/0x520 [ 115.319890] ? mnt_want_write+0x3f/0xc0 [ 115.323846] ? lock_release+0xa00/0xa00 [ 115.327801] ? perf_trace_sched_process_exec+0x860/0x860 [ 115.333231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.338747] ? fsnotify+0x50e/0xef0 [ 115.342355] __sb_start_write+0x214/0x370 [ 115.346480] ? mnt_want_write+0x3f/0xc0 [ 115.350435] mnt_want_write+0x3f/0xc0 [ 115.354215] ovl_want_write+0x76/0xa0 [ 115.358001] ovl_open_maybe_copy_up+0x12c/0x190 [ 115.362657] ovl_open+0xb3/0x260 [ 115.366003] do_dentry_open+0x499/0x1250 [ 115.370045] ? ovl_llseek+0x110/0x110 [ 115.373826] ? chown_common+0x730/0x730 [ 115.377783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.383304] ? percpu_counter_add_batch+0x141/0x190 [ 115.388301] dentry_open+0x143/0x1d0 [ 115.392016] ima_calc_file_hash+0x324/0x570 [ 115.396334] ima_collect_measurement+0x619/0x730 [ 115.401072] ? ima_get_action+0xa0/0xa0 [ 115.405032] process_measurement+0x11fd/0x1bf0 [ 115.409618] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 115.414880] ? find_held_lock+0x36/0x1c0 [ 115.418925] ? lock_downgrade+0x900/0x900 [ 115.423067] ? check_preemption_disabled+0x48/0x280 [ 115.428065] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 115.432978] ? kasan_check_read+0x11/0x20 [ 115.437104] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 115.442358] ? rcu_softirq_qs+0x20/0x20 [ 115.446315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.451834] ? refcount_sub_and_test_checked+0x203/0x310 [ 115.457266] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 115.462701] ? aa_capable+0xe30/0xe30 [ 115.466482] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 115.472001] ? ovl_open+0xc9/0x260 [ 115.475521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.481037] ? do_dentry_open+0x945/0x1250 [ 115.485253] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 115.490771] ? apparmor_task_getsecid+0x96/0xd0 [ 115.495433] ima_file_check+0xe5/0x130 [ 115.499298] ? process_measurement+0x1bf0/0x1bf0 [ 115.504041] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 115.509250] path_openat+0x134a/0x5150 [ 115.513119] ? rcu_softirq_qs+0x20/0x20 [ 115.517092] ? unwind_dump+0x190/0x190 [ 115.520965] ? path_lookupat.isra.43+0xc00/0xc00 [ 115.525701] ? unwind_get_return_address+0x61/0xa0 [ 115.530612] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 115.535605] ? expand_files.part.8+0x571/0x9a0 [ 115.540171] ? find_held_lock+0x36/0x1c0 [ 115.544215] ? __alloc_fd+0x347/0x6e0 [ 115.547999] ? lock_downgrade+0x900/0x900 [ 115.552127] ? getname+0x19/0x20 [ 115.555475] ? kasan_check_read+0x11/0x20 [ 115.559619] ? do_raw_spin_unlock+0xa7/0x330 [ 115.564027] ? do_raw_spin_trylock+0x270/0x270 [ 115.568603] ? __lock_is_held+0xb5/0x140 [ 115.572651] ? __check_object_size+0xb1/0x782 [ 115.577147] ? _raw_spin_unlock+0x2c/0x50 [ 115.581278] ? __alloc_fd+0x347/0x6e0 [ 115.585062] do_filp_open+0x255/0x380 [ 115.588841] ? may_open_dev+0x100/0x100 [ 115.592810] ? get_unused_fd_flags+0x122/0x1a0 [ 115.597387] ? __alloc_fd+0x6e0/0x6e0 [ 115.601171] do_sys_open+0x568/0x700 [ 115.604864] ? filp_open+0x80/0x80 [ 115.608388] ? trace_hardirqs_off_caller+0x310/0x310 [ 115.613470] __x64_sys_open+0x7e/0xc0 [ 115.617248] do_syscall_64+0x1b9/0x820 [ 115.621117] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 115.626460] ? syscall_return_slowpath+0x5e0/0x5e0 [ 115.631386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 115.636208] ? trace_hardirqs_on_caller+0x310/0x310 [ 115.641202] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 115.646198] ? prepare_exit_to_usermode+0x291/0x3b0 [ 115.651195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 115.656016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 115.661186] RIP: 0033:0x457569 [ 115.664363] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 115.683244] RSP: 002b:00007ffef4d9e078 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 115.690946] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 115.698213] RDX: 0000000000000040 RSI: 0000000000000003 RDI: 0000000020000780 [ 115.705496] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 115.712745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002851914