[info] Using makefile-style concurrent boot in runlevel 2. [ 26.214085] audit: type=1800 audit(1542846687.683:21): pid=5829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.74' (ECDSA) to the list of known hosts. 2018/11/22 00:31:44 parsed 1 programs 2018/11/22 00:31:45 executed programs: 0 syzkaller login: [ 44.381622] IPVS: ftp: loaded support on port[0] = 21 [ 44.635065] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.642081] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.649359] device bridge_slave_0 entered promiscuous mode [ 44.668348] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.674750] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.682066] device bridge_slave_1 entered promiscuous mode [ 44.700666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.718703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.770193] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 44.790725] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 44.868029] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 44.875766] team0: Port device team_slave_0 added [ 44.892321] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 44.899526] team0: Port device team_slave_1 added [ 44.917516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.938985] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.958390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.978719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.125225] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.131972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.138985] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.145437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.667190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 45.720202] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 45.772224] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 45.778457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.785937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.833903] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.162098] [ 46.163765] ====================================================== [ 46.170076] WARNING: possible circular locking dependency detected [ 46.176372] 4.20.0-rc3+ #344 Not tainted [ 46.180412] ------------------------------------------------------ [ 46.186709] syz-executor0/6255 is trying to acquire lock: [ 46.192226] 000000004d7e3c62 (sb_writers#3){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 46.199665] [ 46.199665] but task is already holding lock: [ 46.205621] 00000000dae0da4a (&iint->mutex){+.+.}, at: process_measurement+0x438/0x1bf0 [ 46.213767] [ 46.213767] which lock already depends on the new lock. [ 46.213767] [ 46.222064] [ 46.222064] the existing dependency chain (in reverse order) is: [ 46.229683] [ 46.229683] -> #1 (&iint->mutex){+.+.}: [ 46.235128] __mutex_lock+0x166/0x16f0 [ 46.239521] mutex_lock_nested+0x16/0x20 [ 46.244096] process_measurement+0x438/0x1bf0 [ 46.249095] ima_file_check+0xe5/0x130 [ 46.253505] path_openat+0x134a/0x5150 [ 46.257896] do_filp_open+0x255/0x380 [ 46.262203] do_sys_open+0x568/0x700 [ 46.266425] __x64_sys_open+0x7e/0xc0 [ 46.270732] do_syscall_64+0x1b9/0x820 [ 46.275122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.280809] [ 46.280809] -> #0 (sb_writers#3){.+.+}: [ 46.286253] lock_acquire+0x1ed/0x520 [ 46.290576] __sb_start_write+0x214/0x370 [ 46.295234] mnt_want_write+0x3f/0xc0 [ 46.299573] ovl_want_write+0x76/0xa0 [ 46.303883] ovl_open_maybe_copy_up+0x12c/0x190 [ 46.309062] ovl_open+0xb3/0x260 [ 46.312942] do_dentry_open+0x499/0x1250 [ 46.317517] dentry_open+0x143/0x1d0 [ 46.321732] ima_calc_file_hash+0x324/0x570 [ 46.326572] ima_collect_measurement+0x619/0x730 [ 46.331831] process_measurement+0x11fd/0x1bf0 [ 46.336932] ima_file_check+0xe5/0x130 [ 46.341354] path_openat+0x134a/0x5150 [ 46.345744] do_filp_open+0x255/0x380 [ 46.350046] do_sys_open+0x568/0x700 [ 46.354262] __x64_sys_open+0x7e/0xc0 [ 46.358572] do_syscall_64+0x1b9/0x820 [ 46.362984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.368670] [ 46.368670] other info that might help us debug this: [ 46.368670] [ 46.376792] Possible unsafe locking scenario: [ 46.376792] [ 46.382826] CPU0 CPU1 [ 46.387472] ---- ---- [ 46.392115] lock(&iint->mutex); [ 46.395548] lock(sb_writers#3); [ 46.401497] lock(&iint->mutex); [ 46.407446] lock(sb_writers#3); [ 46.410878] [ 46.410878] *** DEADLOCK *** [ 46.410878] [ 46.416920] 1 lock held by syz-executor0/6255: [ 46.421478] #0: 00000000dae0da4a (&iint->mutex){+.+.}, at: process_measurement+0x438/0x1bf0 [ 46.430067] [ 46.430067] stack backtrace: [ 46.434548] CPU: 0 PID: 6255 Comm: syz-executor0 Not tainted 4.20.0-rc3+ #344 [ 46.441797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.451129] Call Trace: [ 46.453704] dump_stack+0x244/0x39d [ 46.457337] ? dump_stack_print_info.cold.1+0x20/0x20 [ 46.462514] ? vprintk_func+0x85/0x181 [ 46.466387] print_circular_bug.isra.35.cold.54+0x1bd/0x27d [ 46.472079] ? save_trace+0xe0/0x290 [ 46.475775] __lock_acquire+0x3399/0x4c20 [ 46.479913] ? kasan_check_read+0x11/0x20 [ 46.484055] ? mark_held_locks+0x130/0x130 [ 46.488296] ? kmem_cache_alloc_trace+0x152/0x750 [ 46.493130] ? apparmor_file_alloc_security+0x17b/0xac0 [ 46.498478] ? security_file_alloc+0x4c/0xa0 [ 46.502886] ? __alloc_file+0x12a/0x470 [ 46.506873] ? alloc_empty_file+0x72/0x170 [ 46.511090] ? dentry_open+0x71/0x1d0 [ 46.514872] ? ima_file_check+0xe5/0x130 [ 46.518917] ? path_openat+0x134a/0x5150 [ 46.522966] ? do_filp_open+0x255/0x380 [ 46.526924] ? do_sys_open+0x568/0x700 [ 46.530802] ? __x64_sys_open+0x7e/0xc0 [ 46.534759] ? do_syscall_64+0x1b9/0x820 [ 46.538801] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.544149] ? zap_class+0x640/0x640 [ 46.547848] ? zap_class+0x640/0x640 [ 46.551547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 46.557156] ? check_preemption_disabled+0x48/0x280 [ 46.562163] lock_acquire+0x1ed/0x520 [ 46.565970] ? mnt_want_write+0x3f/0xc0 [ 46.570304] ? lock_release+0xa00/0xa00 [ 46.574264] ? perf_trace_sched_process_exec+0x860/0x860 [ 46.579719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 46.585244] ? fsnotify+0x50e/0xef0 [ 46.588860] __sb_start_write+0x214/0x370 [ 46.592992] ? mnt_want_write+0x3f/0xc0 [ 46.596958] mnt_want_write+0x3f/0xc0 [ 46.600744] ovl_want_write+0x76/0xa0 [ 46.604531] ovl_open_maybe_copy_up+0x12c/0x190 [ 46.609185] ovl_open+0xb3/0x260 [ 46.612541] do_dentry_open+0x499/0x1250 [ 46.616586] ? ovl_llseek+0x110/0x110 [ 46.620389] ? chown_common+0x730/0x730 [ 46.624349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 46.629872] ? percpu_counter_add_batch+0x141/0x190 [ 46.634918] dentry_open+0x143/0x1d0 [ 46.638664] ima_calc_file_hash+0x324/0x570 [ 46.643015] ima_collect_measurement+0x619/0x730 [ 46.647752] ? ima_get_action+0xa0/0xa0 [ 46.651737] process_measurement+0x11fd/0x1bf0 [ 46.656311] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 46.661571] ? find_held_lock+0x36/0x1c0 [ 46.665636] ? lock_downgrade+0x900/0x900 [ 46.669800] ? check_preemption_disabled+0x48/0x280 [ 46.674817] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 46.679733] ? kasan_check_read+0x11/0x20 [ 46.683865] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 46.689144] ? rcu_softirq_qs+0x20/0x20 [ 46.693107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 46.698629] ? refcount_sub_and_test_checked+0x203/0x310 [ 46.704093] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 46.709540] ? aa_capable+0xe30/0xe30 [ 46.713323] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 46.718862] ? ovl_open+0xc9/0x260 [ 46.722386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 46.727906] ? do_dentry_open+0x945/0x1250 [ 46.732128] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 46.737648] ? apparmor_task_getsecid+0x96/0xd0 [ 46.742307] ima_file_check+0xe5/0x130 [ 46.746194] ? process_measurement+0x1bf0/0x1bf0 [ 46.750938] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 46.756134] path_openat+0x134a/0x5150 [ 46.760033] ? rcu_softirq_qs+0x20/0x20 [ 46.764014] ? unwind_dump+0x190/0x190 [ 46.767902] ? path_lookupat.isra.43+0xc00/0xc00 [ 46.772679] ? unwind_get_return_address+0x61/0xa0 [ 46.777593] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 46.782595] ? expand_files.part.8+0x571/0x9a0 [ 46.787169] ? find_held_lock+0x36/0x1c0 [ 46.791244] ? __alloc_fd+0x347/0x6e0 [ 46.795036] ? lock_downgrade+0x900/0x900 [ 46.799165] ? getname+0x19/0x20 [ 46.802518] ? kasan_check_read+0x11/0x20 [ 46.806660] ? do_raw_spin_unlock+0xa7/0x330 [ 46.811049] ? do_raw_spin_trylock+0x270/0x270 [ 46.815614] ? __lock_is_held+0xb5/0x140 [ 46.819658] ? __check_object_size+0xb1/0x782 [ 46.824142] ? _raw_spin_unlock+0x2c/0x50 [ 46.828284] ? __alloc_fd+0x347/0x6e0 [ 46.832069] do_filp_open+0x255/0x380 [ 46.835866] ? may_open_dev+0x100/0x100 [ 46.839838] ? get_unused_fd_flags+0x122/0x1a0 [ 46.844420] ? __alloc_fd+0x6e0/0x6e0 [ 46.848207] do_sys_open+0x568/0x700 [ 46.851913] ? filp_open+0x80/0x80 [ 46.855439] ? trace_hardirqs_off_caller+0x310/0x310 [ 46.860526] __x64_sys_open+0x7e/0xc0 [ 46.864311] do_syscall_64+0x1b9/0x820 [ 46.868180] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 46.873529] ? syscall_return_slowpath+0x5e0/0x5e0 [ 46.878441] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 46.883269] ? trace_hardirqs_on_caller+0x310/0x310 [ 46.888281] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 46.893285] ? prepare_exit_to_usermode+0x291/0x3b0 [ 46.898316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 46.903147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.908321] RIP: 0033:0x457569 [ 46.911499] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 46.930386] RSP: 002b:00007ffd19b91988 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 46.938106] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 46.945365] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020000040 [ 46.952618] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 46.959885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000