./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1891835679 <...> Warning: Permanently added '10.128.0.187' (ED25519) to the list of known hosts. execve("./syz-executor1891835679", ["./syz-executor1891835679"], 0x7ffc31251fa0 /* 10 vars */) = 0 brk(NULL) = 0x5555567a1000 brk(0x5555567a1d00) = 0x5555567a1d00 arch_prctl(ARCH_SET_FS, 0x5555567a1380) = 0 set_tid_address(0x5555567a1650) = 5015 set_robust_list(0x5555567a1660, 24) = 0 rseq(0x5555567a1ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1891835679", 4096) = 28 getrandom("\xe5\xf5\x43\xbf\x4f\xd4\x21\x25", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555567a1d00 brk(0x5555567c2d00) = 0x5555567c2d00 brk(0x5555567c3000) = 0x5555567c3000 mprotect(0x7fe3f8d83000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 [ 77.803300][ T26] audit: type=1400 audit(1689256698.607:83): avc: denied { write } for pid=5012 comm="strace-static-x" path="pipe:[1999]" dev="pipefs" ino=1999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fe3f08d3000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 524288) = 524288 munmap(0x7fe3f08d3000, 524288) = 0 [ 77.849087][ T26] audit: type=1400 audit(1689256698.657:84): avc: denied { execmem } for pid=5015 comm="syz-executor189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.850365][ T5015] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=5015 'syz-executor189' openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file0", 0777) = 0 [ 77.888090][ T26] audit: type=1400 audit(1689256698.697:85): avc: denied { read write } for pid=5015 comm="syz-executor189" name="loop0" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 77.890973][ T5015] loop0: detected capacity change from 0 to 1024 [ 77.913170][ T26] audit: type=1400 audit(1689256698.697:86): avc: denied { open } for pid=5015 comm="syz-executor189" path="/dev/loop0" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 77.924136][ T5015] ======================================================= [ 77.924136][ T5015] WARNING: The mand mount option has been deprecated and [ 77.924136][ T5015] and is ignored by this kernel. Remove the mand [ 77.924136][ T5015] option from the mount to silence this warning. [ 77.924136][ T5015] ======================================================= mount("/dev/loop0", "./file0", "hfsplus", MS_SYNCHRONOUS|MS_MANDLOCK|MS_NODIRATIME|MS_POSIXACL|MS_RELATIME|MS_STRICTATIME, "") = 0 openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 chdir("./file0") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 [ 77.983117][ T26] audit: type=1400 audit(1689256698.697:87): avc: denied { ioctl } for pid=5015 comm="syz-executor189" path="/dev/loop0" dev="devtmpfs" ino=648 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 77.983180][ T26] audit: type=1400 audit(1689256698.737:88): avc: denied { mounton } for pid=5015 comm="syz-executor189" path="/root/file0" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 openat(AT_FDCWD, "cgroup.controllers", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 4 [ 78.034831][ T26] audit: type=1400 audit(1689256698.827:89): avc: denied { mount } for pid=5015 comm="syz-executor189" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 78.050028][ T5015] hfsplus: xattr searching failed [ 78.066085][ T5015] hfsplus: xattr searching failed [ 78.072182][ T5015] [ 78.074548][ T5015] ====================================================== [ 78.081593][ T5015] WARNING: possible circular locking dependency detected [ 78.088641][ T5015] 6.5.0-rc1-syzkaller-00033-geb26cbb1a754 #0 Not tainted [ 78.095685][ T5015] ------------------------------------------------------ [ 78.102701][ T5015] syz-executor189/5015 is trying to acquire lock: [ 78.109118][ T5015] ffff888019f2c0b0 (&tree->tree_lock){+.+.}-{3:3}, at: hfsplus_file_truncate+0xeb4/0x1110 [ 78.119072][ T5015] [ 78.119072][ T5015] but task is already holding lock: [ 78.126439][ T5015] ffff888018b13608 (&HFSPLUS_I(inode)->extents_lock){+.+.}-{3:3}, at: hfsplus_file_truncate+0x20f/0x1110 [ 78.137771][ T5015] [ 78.137771][ T5015] which lock already depends on the new lock. [ 78.137771][ T5015] [ 78.148525][ T5015] [ 78.148525][ T5015] the existing dependency chain (in reverse order) is: [ 78.157547][ T5015] [ 78.157547][ T5015] -> #1 (&HFSPLUS_I(inode)->extents_lock){+.+.}-{3:3}: [ 78.166692][ T5015] __mutex_lock+0x14d/0x12d0 [ 78.171844][ T5015] hfsplus_file_extend+0x1bd/0xf80 [ 78.177500][ T5015] hfsplus_bmap_reserve+0x318/0x410 [ 78.183244][ T5015] hfsplus_create_cat+0x1e4/0x10c0 [ 78.188989][ T5015] hfsplus_mknod+0x169/0x300 [ 78.194209][ T5015] lookup_open.isra.0+0x1049/0x1360 [ 78.199957][ T5015] path_openat+0x931/0x2990 [ 78.205006][ T5015] do_filp_open+0x1cb/0x410 [ 78.210062][ T5015] do_sys_openat2+0x15c/0x1c0 [ 78.215381][ T5015] __x64_sys_openat+0x175/0x210 [ 78.220797][ T5015] do_syscall_64+0x38/0xb0 [ 78.225764][ T5015] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 78.232803][ T5015] [ 78.232803][ T5015] -> #0 (&tree->tree_lock){+.+.}-{3:3}: [ 78.240559][ T5015] __lock_acquire+0x2e3d/0x5de0 [ 78.245957][ T5015] lock_acquire+0x1ae/0x510 [ 78.251004][ T5015] __mutex_lock+0x14d/0x12d0 [ 78.256136][ T5015] hfsplus_file_truncate+0xeb4/0x1110 [ 78.262054][ T5015] hfsplus_setattr+0x1eb/0x310 [ 78.267367][ T5015] notify_change+0x670/0x1160 [ 78.272594][ T5015] do_truncate+0x13d/0x1f0 [ 78.277569][ T5015] vfs_truncate+0x3eb/0x4d0 [ 78.282729][ T5015] do_sys_truncate.part.0+0x126/0x150 [ 78.288768][ T5015] __x64_sys_truncate+0x6b/0x90 [ 78.294177][ T5015] do_syscall_64+0x38/0xb0 [ 78.299130][ T5015] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 78.305575][ T5015] [ 78.305575][ T5015] other info that might help us debug this: [ 78.305575][ T5015] [ 78.316157][ T5015] Possible unsafe locking scenario: [ 78.316157][ T5015] [ 78.323606][ T5015] CPU0 CPU1 [ 78.328979][ T5015] ---- ---- [ 78.334348][ T5015] lock(&HFSPLUS_I(inode)->extents_lock); [ 78.340172][ T5015] lock(&tree->tree_lock); [ 78.347210][ T5015] lock(&HFSPLUS_I(inode)->extents_lock); [ 78.355552][ T5015] lock(&tree->tree_lock); [ 78.360079][ T5015] [ 78.360079][ T5015] *** DEADLOCK *** [ 78.360079][ T5015] [ 78.368314][ T5015] 3 locks held by syz-executor189/5015: [ 78.373864][ T5015] #0: ffff88807cda2410 (sb_writers#10){.+.+}-{0:0}, at: vfs_truncate+0xea/0x4d0 [ 78.383057][ T5015] #1: ffff888018b13800 (&sb->s_type->i_mutex_key#15){+.+.}-{3:3}, at: do_truncate+0x12b/0x1f0 [ 78.393554][ T5015] #2: ffff888018b13608 (&HFSPLUS_I(inode)->extents_lock){+.+.}-{3:3}, at: hfsplus_file_truncate+0x20f/0x1110 [ 78.405276][ T5015] [ 78.405276][ T5015] stack backtrace: [ 78.411164][ T5015] CPU: 1 PID: 5015 Comm: syz-executor189 Not tainted 6.5.0-rc1-syzkaller-00033-geb26cbb1a754 #0 [ 78.421598][ T5015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 78.431667][ T5015] Call Trace: [ 78.434963][ T5015] [ 78.439139][ T5015] dump_stack_lvl+0xd9/0x1b0 [ 78.443858][ T5015] check_noncircular+0x2f7/0x3d0 [ 78.448835][ T5015] ? print_circular_bug+0x750/0x750 [ 78.454063][ T5015] ? check_path.constprop.0+0x24/0x50 [ 78.459546][ T5015] ? is_dynamic_key+0x1f0/0x1f0 [ 78.464512][ T5015] ? print_circular_bug+0x750/0x750 [ 78.469737][ T5015] __lock_acquire+0x2e3d/0x5de0 [ 78.474617][ T5015] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 78.480625][ T5015] lock_acquire+0x1ae/0x510 [ 78.485157][ T5015] ? hfsplus_file_truncate+0xeb4/0x1110 [ 78.490728][ T5015] ? lock_sync+0x190/0x190 [ 78.495171][ T5015] __mutex_lock+0x14d/0x12d0 [ 78.499892][ T5015] ? hfsplus_file_truncate+0xeb4/0x1110 [ 78.505489][ T5015] ? hfsplus_file_truncate+0xeb4/0x1110 [ 78.511156][ T5015] ? mutex_lock_io_nested+0x1120/0x1120 [ 78.516732][ T5015] ? hfsplus_block_free+0x35d/0x530 [ 78.521983][ T5015] ? hfsplus_file_truncate+0xeb4/0x1110 [ 78.527556][ T5015] hfsplus_file_truncate+0xeb4/0x1110 [ 78.532965][ T5015] ? hfsplus_get_block+0x9e0/0x9e0 [ 78.538110][ T5015] ? unmap_mapping_pages+0x280/0x280 [ 78.543416][ T5015] ? inode_newsize_ok+0x13c/0x200 [ 78.548473][ T5015] hfsplus_setattr+0x1eb/0x310 [ 78.553262][ T5015] ? hfsplus_file_fsync+0x5d0/0x5d0 [ 78.558582][ T5015] notify_change+0x670/0x1160 [ 78.563294][ T5015] do_truncate+0x13d/0x1f0 [ 78.567740][ T5015] ? file_open_root+0x430/0x430 [ 78.573946][ T5015] ? security_inode_permission+0xd8/0x100 [ 78.579696][ T5015] vfs_truncate+0x3eb/0x4d0 [ 78.584226][ T5015] do_sys_truncate.part.0+0x126/0x150 [ 78.589662][ T5015] ? vfs_truncate+0x4d0/0x4d0 [ 78.594370][ T5015] ? lockdep_hardirqs_on+0x7d/0x100 [ 78.599616][ T5015] ? _raw_spin_unlock_irq+0x2e/0x50 [ 78.604845][ T5015] __x64_sys_truncate+0x6b/0x90 [ 78.609743][ T5015] do_syscall_64+0x38/0xb0 [ 78.614187][ T5015] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 78.620191][ T5015] RIP: 0033:0x7fe3f8d105f9 [ 78.624620][ T5015] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 78.644248][ T5015] RSP: 002b:00007ffcc79321e8 EFLAGS: 00000246 ORIG_RAX: 000000000000004c truncate("./file1", 0) = 0 exit_group(0) = ? [ 78.652706][ T5015] RAX: ffffffffffffffda RBX: 00007ffcc79323c8 RCX: 00007fe3f8d105f9 [ 78.660718][ T5015] RDX: 00007fe3f8d105f9 RSI: 0000000000000000 RDI: 0000000020000000 [ 78.668812][ T5015] RBP: 00007fe3f8d83610 R08: 0000000000000000 R09: 0000000000000000 [ 78.676981][ T5015] R10: 000000000000063c R11: 0000000000000246 R12: 0000000000000001 [ 78.684985][ T5015] R13: 00007ffcc79323b8 R14: 0000000000000001 R15: 0000000000000001 [ 78.693063][ T5015] +++ exited with 0 +++ [ 78.698820][ T26] audit: type=1400 audit(16