[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.180' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program syzkaller login: [ 37.191254] hrtimer: interrupt took 46749 ns [ 37.299274] overlayfs: './bus' not a directory [ 37.376225] overlayfs: './bus' not a directory [ 37.384510] overlayfs: './bus' not a directory executing program executing program executing program [ 37.558873] [ 37.560517] ====================================================== [ 37.566829] WARNING: possible circular locking dependency detected [ 37.573179] 4.19.197-syzkaller #0 Not tainted [ 37.577766] ------------------------------------------------------ [ 37.584092] syz-executor569/8151 is trying to acquire lock: [ 37.589808] 000000009be23131 (sb_writers#3){.+.+}, at: mnt_want_write+0x3a/0xb0 [ 37.597316] [ 37.597316] but task is already holding lock: executing program executing program executing program [ 37.603293] 0000000006dd582f (&ovl_i_mutex_dir_key[depth]){++++}, at: path_openat+0x1071/0x2df0 [ 37.612241] [ 37.612241] which lock already depends on the new lock. [ 37.612241] [ 37.621000] [ 37.621000] the existing dependency chain (in reverse order) is: [ 37.628630] [ 37.628630] -> #3 (&ovl_i_mutex_dir_key[depth]){++++}: [ 37.635418] path_openat+0x17ec/0x2df0 [ 37.639836] do_filp_open+0x18c/0x3f0 [ 37.644167] do_open_execat+0x11d/0x5b0 [ 37.648695] __do_execve_file+0x1a8b/0x2360 [ 37.653548] do_execve+0x35/0x50 [ 37.657441] __x64_sys_execve+0x7c/0xa0 [ 37.661944] do_syscall_64+0xf9/0x620 [ 37.666272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.671990] [ 37.671990] -> #2 (&sig->cred_guard_mutex){+.+.}: [ 37.678341] proc_pid_personality+0x4a/0x170 [ 37.683277] proc_single_show+0xeb/0x170 [ 37.687865] seq_read+0x4be/0x1160 [ 37.692046] do_iter_read+0x471/0x630 [ 37.696378] vfs_readv+0xe5/0x150 [ 37.700363] __x64_sys_preadv+0x22b/0x310 [ 37.705383] do_syscall_64+0xf9/0x620 [ 37.709713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.715422] [ 37.715422] -> #1 (&p->lock){+.+.}: [ 37.720554] seq_read+0x6b/0x1160 [ 37.724630] proc_reg_read+0x1bd/0x2d0 [ 37.729047] do_iter_read+0x471/0x630 [ 37.733373] vfs_readv+0xe5/0x150 [ 37.737363] default_file_splice_read+0x457/0xa00 [ 37.742729] do_splice_to+0x10e/0x160 [ 37.747061] splice_direct_to_actor+0x2b9/0x8d0 [ 37.752263] do_splice_direct+0x1a7/0x270 [ 37.756939] do_sendfile+0x550/0xc30 [ 37.761177] __se_sys_sendfile64+0x147/0x160 [ 37.766103] do_syscall_64+0xf9/0x620 [ 37.770880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.776583] [ 37.776583] -> #0 (sb_writers#3){.+.+}: [ 37.782072] __sb_start_write+0x6e/0x2a0 [ 37.786638] mnt_want_write+0x3a/0xb0 [ 37.790958] ovl_create_object+0x96/0x290 [ 37.795627] lookup_open+0x893/0x1a20 [ 37.799996] path_openat+0x1094/0x2df0 [ 37.804388] do_filp_open+0x18c/0x3f0 [ 37.808786] do_sys_open+0x3b3/0x520 [ 37.813192] do_syscall_64+0xf9/0x620 [ 37.817516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.823231] [ 37.823231] other info that might help us debug this: [ 37.823231] [ 37.831363] Chain exists of: [ 37.831363] sb_writers#3 --> &sig->cred_guard_mutex --> &ovl_i_mutex_dir_key[depth] [ 37.831363] [ 37.843762] Possible unsafe locking scenario: [ 37.843762] [ 37.849800] CPU0 CPU1 [ 37.854444] ---- ---- [ 37.859086] lock(&ovl_i_mutex_dir_key[depth]); [ 37.863821] lock(&sig->cred_guard_mutex); [ 37.870653] lock(&ovl_i_mutex_dir_key[depth]); [ 37.877936] lock(sb_writers#3); [ 37.881383] [ 37.881383] *** DEADLOCK *** [ 37.881383] [ 37.887437] 2 locks held by syz-executor569/8151: [ 37.892270] #0: 000000006636d5bb (sb_writers#11){.+.+}, at: mnt_want_write+0x3a/0xb0 [ 37.900265] #1: 0000000006dd582f (&ovl_i_mutex_dir_key[depth]){++++}, at: path_openat+0x1071/0x2df0 [ 37.909549] [ 37.909549] stack backtrace: [ 37.914038] CPU: 1 PID: 8151 Comm: syz-executor569 Not tainted 4.19.197-syzkaller #0 [ 37.921903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.931440] Call Trace: [ 37.934025] dump_stack+0x1fc/0x2ef [ 37.937660] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 37.943450] __lock_acquire+0x30c9/0x3ff0 [ 37.947675] ? do_raw_spin_unlock+0x171/0x230 [ 37.952168] ? mark_held_locks+0xf0/0xf0 [ 37.956219] ? mark_held_locks+0xa6/0xf0 [ 37.960271] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 37.965013] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 37.969580] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 37.974321] lock_acquire+0x170/0x3c0 [ 37.978140] ? mnt_want_write+0x3a/0xb0 [ 37.982150] __sb_start_write+0x6e/0x2a0 [ 37.986222] ? mnt_want_write+0x3a/0xb0 [ 37.990188] mnt_want_write+0x3a/0xb0 [ 37.993975] ovl_create_object+0x96/0x290 [ 37.998111] ? ovl_create_or_link+0x1270/0x1270 [ 38.002793] ? lookup_open+0xdb4/0x1a20 [ 38.006775] ? lookup_open+0xdbe/0x1a20 [ 38.010742] ? ovl_symlink+0x30/0x30 [ 38.014984] lookup_open+0x893/0x1a20 [ 38.018780] ? vfs_mkdir+0x7a0/0x7a0 [ 38.022523] path_openat+0x1094/0x2df0 [ 38.026418] ? calibrate_delay+0xb81/0xc4a [ 38.030686] ? path_lookupat+0x8d0/0x8d0 [ 38.034851] ? retint_kernel+0x2d/0x2d [ 38.038756] ? expand_files+0x4ee/0x890 [ 38.042729] do_filp_open+0x18c/0x3f0 [ 38.046526] ? may_open_dev+0xf0/0xf0 [ 38.050342] ? lock_downgrade+0x720/0x720 [ 38.054558] ? lock_acquire+0x170/0x3c0 [ 38.058542] ? __alloc_fd+0x34/0x570 [ 38.062243] ? do_raw_spin_unlock+0x171/0x230 [ 38.066737] ? _raw_spin_unlock+0x29/0x40 [ 38.071171] ? __alloc_fd+0x28d/0x570 [ 38.074958] do_sys_open+0x3b3/0x520 [ 38.078669] ? filp_open+0x70/0x70 [ 38.082232] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 38.087597] ? trace_hardirqs_off_caller+0x6e/0x210 [ 38.092600] ? do_syscall_64+0x21/0x620 [ 38.096688] do_syscall_64+0xf9/0x620 [ 38.100487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.105672] RIP: 0033:0x446389 [ 38.108918] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 38.127836] RSP: 002b:00007fcebac07278 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 38.135530] RAX: ffffffffffffffda RBX: 00000000004cb4e0 RCX: 0000000000446389 [ 38.142803] RDX: 0000000000000000 RSI: 00000000001612c2 RDI: 0000000020000200 [ 38.150073] RBP: 000000000049b0a8 R08: 0000000000000000 R09: 0000000000000000 executing program executing program executing program executing program executing program [ 38.157341] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd36309a2e [ 38.164597] R13: 0073656369766564 R14: 6c616e6f73726570 R15: 00000000004cb4e8 executing program executing program executing program executing program executing program executing program executing program [ 38.331430] syz-executor569 (8173) used greatest stack depth: 23168 bytes left executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.939484] syz-executor569 (8460) used greatest stack depth: 23160 bytes left executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 44.365394] syz-executor569 (8833) used greatest stack depth: 22888 bytes left executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program