[ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. executing program [ 85.151844][ T37] audit: type=1400 audit(1624019123.232:8): avc: denied { execmem } for pid=8444 comm="syz-executor890" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 85.183450][ T8445] [ 85.185805][ T8445] ====================================================== [ 85.192814][ T8445] WARNING: possible circular locking dependency detected [ 85.196839][ T8446] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 85.199833][ T8445] 5.13.0-rc6-syzkaller #0 Not tainted [ 85.219328][ T8445] ------------------------------------------------------ [ 85.226328][ T8445] syz-executor890/8445 is trying to acquire lock: [ 85.232736][ T8445] ffff88802f1a93e0 (&iint->mutex){+.+.}-{3:3}, at: process_measurement+0x3a8/0x17e0 [ 85.242170][ T8445] [ 85.242170][ T8445] but task is already holding lock: [ 85.249530][ T8445] ffff88802c652460 (sb_writers#5){.+.+}-{0:0}, at: path_openat+0x1ad9/0x27e0 [ 85.258434][ T8445] [ 85.258434][ T8445] which lock already depends on the new lock. [ 85.258434][ T8445] [ 85.268824][ T8445] [ 85.268824][ T8445] the existing dependency chain (in reverse order) is: [ 85.277841][ T8445] [ 85.277841][ T8445] -> #1 (sb_writers#5){.+.+}-{0:0}: [ 85.285224][ T8445] mnt_want_write+0x6e/0x3e0 [ 85.290322][ T8445] ovl_maybe_copy_up+0x11f/0x190 [ 85.295765][ T8445] ovl_open+0xba/0x270 [ 85.300351][ T8445] do_dentry_open+0x4b9/0x11b0 [ 85.305618][ T8445] dentry_open+0x132/0x1d0 [ 85.310537][ T8445] ima_calc_file_hash+0x2d2/0x4b0 [ 85.316070][ T8445] ima_collect_measurement+0x4ca/0x570 [ 85.322072][ T8445] process_measurement+0xd1c/0x17e0 [ 85.327786][ T8445] ima_file_check+0xb9/0x100 [ 85.332888][ T8445] path_openat+0x15b5/0x27e0 [ 85.337986][ T8445] do_filp_open+0x190/0x3d0 [ 85.343021][ T8445] do_sys_openat2+0x16d/0x420 [ 85.348214][ T8445] __x64_sys_open+0x119/0x1c0 [ 85.353915][ T8445] do_syscall_64+0x3a/0xb0 [ 85.358862][ T8445] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.365291][ T8445] [ 85.365291][ T8445] -> #0 (&iint->mutex){+.+.}-{3:3}: [ 85.372685][ T8445] __lock_acquire+0x2a17/0x5230 [ 85.378079][ T8445] lock_acquire+0x1ab/0x740 [ 85.383105][ T8445] __mutex_lock+0x139/0x10c0 [ 85.388461][ T8445] process_measurement+0x3a8/0x17e0 [ 85.394222][ T8445] ima_file_check+0xb9/0x100 [ 85.399360][ T8445] path_openat+0x15b5/0x27e0 [ 85.404474][ T8445] do_filp_open+0x190/0x3d0 [ 85.409521][ T8445] do_sys_openat2+0x16d/0x420 [ 85.414723][ T8445] __x64_sys_openat+0x13f/0x1f0 D[ 85.420097][ T8445] do_syscall_64+0x3a/0xb0 [ 85.425118][ T8445] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.431614][ T8445] [ 85.431614][ T8445] other info that might help us debug this: [ 85.431614][ T8445] [ 85.441852][ T8445] Possible unsafe locking scenario: [ 85.441852][ T8445] [ 85.449298][ T8445] CPU0 CPU1 [ 85.454654][ T8445] ---- ---- eb[ 85.460012][ T8445] lock(sb_writers#5); [ 85.464376][ T8445] lock(&iint->mutex); i[ 85.471074][ T8445] lock(sb_writers#5); [ 85.477820][ T8445] lock(&iint->mutex); [ 85.481977][ T8445] [ 85.481977][ T8445] *** DEADLOCK *** [ 85.481977][ T8445] [ 85.490127][ T8445] 1 lock held by syz-executor890/8445: a[ 85.495597][ T8445] #0: ffff88802c652460 (sb_writers#5){.+.+}-{0:0}, at: path_openat+0x1ad9/0x27e0 [ 85.504902][ T8445] [ 85.504902][ T8445] stack backtrace: n[ 85.510809][ T8445] CPU: 0 PID: 8445 Comm: syz-executor890 Not tainted 5.13.0-rc6-syzkaller #0 [ 85.519651][ T8445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.529707][ T8445] Call Trace: [ 85.532991][ T8445] dump_stack+0x141/0x1d7 [ 85.537380][ T8445] check_noncircular+0x25f/0x2e0 [ 85.542326][ T8445] ? print_circular_bug+0x1e0/0x1e0 G[ 85.547525][ T8445] ? check_path.constprop.0+0x50/0x50 [ 85.553056][ T8445] ? lockdep_lock+0xc6/0x200 [ 85.557659][ T8445] ? call_rcu_zapped+0xb0/0xb0 N[ 85.562426][ T8445] __lock_acquire+0x2a17/0x5230 [ 85.567363][ T8445] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 85.573367][ T8445] lock_acquire+0x1ab/0x740 [ 85.577898][ T8445] ? process_measurement+0x3a8/0x17e0 U[ 85.583287][ T8445] ? lock_release+0x720/0x720 [ 85.588036][ T8445] __mutex_lock+0x139/0x10c0 [ 85.592647][ T8445] ? process_measurement+0x3a8/0x17e0 /[ 85.598126][ T8445] ? process_measurement+0x814/0x17e0 [ 85.603551][ T8445] ? lock_downgrade+0x6e0/0x6e0 [ 85.608408][ T8445] ? process_measurement+0x3a8/0x17e0 [ 85.613863][ T8445] ? mutex_lock_io_nested+0xf20/0xf20 L[ 85.619236][ T8445] ? up_write+0x191/0x560 [ 85.623639][ T8445] ? downgrade_write+0x3a0/0x3a0 [ 85.628590][ T8445] ? do_raw_read_unlock+0x3b/0x70 [ 85.633624][ T8445] ? _raw_read_unlock+0x24/0x40 i[ 85.638474][ T8445] ? integrity_iint_find+0x123/0x150 [ 85.643833][ T8445] process_measurement+0x3a8/0x17e0 [ 85.649208][ T8445] ? mmap_violation_check+0x1e0/0x1e0 [ 85.654599][ T8445] ? dquot_free_inode+0x6c0/0x6c0 n[ 85.659689][ T8445] ? find_held_lock+0x2d/0x110 [ 85.664540][ T8445] ? selinux_task_getsecid_subj+0x167/0x2c0 [ 85.670434][ T8445] ? lock_downgrade+0x6e0/0x6e0 u[ 85.675639][ T8445] ? ext4_file_write_iter+0x14e0/0x14e0 [ 85.681291][ T8445] ? selinux_task_getsecid_subj+0x189/0x2c0 [ 85.687204][ T8445] ima_file_check+0xb9/0x100 [ 85.691794][ T8445] ? process_measurement+0x17e0/0x17e0 x[ 85.697252][ T8445] ? may_open+0x1f6/0x420 [ 85.701753][ T8445] path_openat+0x15b5/0x27e0 [ 85.706446][ T8445] ? path_lookupat+0x850/0x850 [ 85.711270][ T8445] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 85.717292][ T8445] do_filp_open+0x190/0x3d0 [ 85.721817][ T8445] ? may_open_dev+0xf0/0xf0 [ 85.726434][ T8445] ? do_raw_spin_lock+0x120/0x2b0 9[ 85.731510][ T8445] ? rwlock_bug.part.0+0x90/0x90 [ 85.736514][ T8445] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 85.742882][ T8445] ? _find_next_bit+0x1e3/0x260 [ 85.747746][ T8445] ? _raw_spin_unlock+0x24/0x40 [ 85.752618][ T8445] ? alloc_fd+0x2e6/0x660 [ 85.757072][ T8445] do_sys_openat2+0x16d/0x420 [ 85.761749][ T8445] ? build_open_flags+0x6f0/0x6f0 syzkaller[ 85.766777][ T8445] ? __context_tracking_exit+0xb8/0xe0 [ 85.773031][ T8445] ? lock_downgrade+0x6e0/0x6e0 [ 85.782361][ T8445] __x64_sys_openat+0x13f/0x1f0 [ 85.787231][ T8445] ? __ia32_sys_open+0x1c0/0x1c0 [ 85.792293][ T8445] ? syscall_enter_from_user_mode+0x27/0x70 [ 85.798254][ T8445] do_syscall_64+0x3a/0xb0 [ 85.802680][ T8445] entry_SYSCALL_64_after_hwframe+0x44/0xae ttyS0[ 85.808573][ T8445] RIP: 0033:0x444cf9 [ 85.812868][ T8445] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 81 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 85.832472][ T8445] RSP: 002b:00007f785097e2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 85.840902][ T8445] RAX: ffffffffffffffda RBX: 00000000004ca400 RCX: 0000000000444cf9 [ 85.848870][ T8445] RDX: 000000000000275a RSI: 0000000020000080 RDI