ntfs: volume version 3.1. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. hfs: unable to parse mount options audit: type=1800 audit(1670478406.808:15): pid=12638 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=13899 res=0 ====================================================== WARNING: possible circular locking dependency detected 4.14.300-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.1/12634 is trying to acquire lock: (&ni->mrec_lock){+.+.}, at: [] map_mft_record+0x2b/0xbe0 fs/ntfs/mft.c:166 but task is already holding lock: (&rl->lock){++++}, at: [] ntfs_attr_extend_allocation+0x1dd/0x2f80 fs/ntfs/attrib.c:2015 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&rl->lock){++++}: down_read+0x36/0x80 kernel/locking/rwsem.c:24 ntfs_read_block fs/ntfs/aops.c:269 [inline] ntfs_readpage+0x1396/0x1ad0 fs/ntfs/aops.c:456 do_read_cache_page+0x38e/0xc10 mm/filemap.c:2713 read_mapping_page include/linux/pagemap.h:398 [inline] ntfs_map_page fs/ntfs/aops.h:89 [inline] ntfs_sync_mft_mirror+0x1f4/0x1560 fs/ntfs/mft.c:490 write_mft_record_nolock+0xece/0x1240 fs/ntfs/mft.c:793 write_mft_record fs/ntfs/mft.h:109 [inline] __ntfs_write_inode+0x58d/0xcc0 fs/ntfs/inode.c:3084 write_inode fs/fs-writeback.c:1241 [inline] __writeback_single_inode+0x6a4/0x1010 fs/fs-writeback.c:1439 writeback_sb_inodes+0x48b/0xd30 fs/fs-writeback.c:1645 wb_writeback+0x243/0xb80 fs/fs-writeback.c:1820 wb_do_writeback fs/fs-writeback.c:1952 [inline] wb_workfn+0x2bd/0xf50 fs/fs-writeback.c:1988 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:406 -> #0 (&ni->mrec_lock){+.+.}: lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893 map_mft_record+0x2b/0xbe0 fs/ntfs/mft.c:166 ntfs_attr_extend_allocation+0x1e5/0x2f80 fs/ntfs/attrib.c:2016 ntfs_prepare_file_for_write fs/ntfs/file.c:412 [inline] ntfs_file_write_iter+0x61b/0x1f70 fs/ntfs/file.c:1949 call_write_iter include/linux/fs.h:1780 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x44c/0x630 fs/read_write.c:482 vfs_write+0x17f/0x4d0 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xf2/0x210 fs/read_write.c:582 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&rl->lock); lock(&ni->mrec_lock); lock(&rl->lock); lock(&ni->mrec_lock); *** DEADLOCK *** 4 locks held by syz-executor.1/12634: #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0x1fb/0x2b0 fs/file.c:819 #1: (sb_writers#15){.+.+}, at: [] file_start_write include/linux/fs.h:2714 [inline] #1: (sb_writers#15){.+.+}, at: [] vfs_write+0x3d8/0x4d0 fs/read_write.c:543 #2: (&sb->s_type->i_mutex_key#23){+.+.}, at: [] inode_lock include/linux/fs.h:719 [inline] #2: (&sb->s_type->i_mutex_key#23){+.+.}, at: [] ntfs_file_write_iter+0x79/0x1f70 fs/ntfs/file.c:1946 #3: (&rl->lock){++++}, at: [] ntfs_attr_extend_allocation+0x1dd/0x2f80 fs/ntfs/attrib.c:2015 stack backtrace: CPU: 0 PID: 12634 Comm: syz-executor.1 Not tainted 4.14.300-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_circular_bug.constprop.0.cold+0x2d7/0x41e kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1905 [inline] check_prevs_add kernel/locking/lockdep.c:2022 [inline] validate_chain kernel/locking/lockdep.c:2464 [inline] __lock_acquire+0x2e0e/0x3f20 kernel/locking/lockdep.c:3491 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893 map_mft_record+0x2b/0xbe0 fs/ntfs/mft.c:166 ntfs_attr_extend_allocation+0x1e5/0x2f80 fs/ntfs/attrib.c:2016 ntfs_prepare_file_for_write fs/ntfs/file.c:412 [inline] ntfs_file_write_iter+0x61b/0x1f70 fs/ntfs/file.c:1949 call_write_iter include/linux/fs.h:1780 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x44c/0x630 fs/read_write.c:482 vfs_write+0x17f/0x4d0 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xf2/0x210 fs/read_write.c:582 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 IPVS: ftp: loaded support on port[0] = 21 audit: type=1800 audit(1670478407.558:16): pid=12703 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=13900 res=0 audit: type=1800 audit(1670478407.578:17): pid=12703 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=13900 res=0 hfs: unable to parse mount options audit: type=1800 audit(1670478407.648:18): pid=12723 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=13915 res=0 audit: type=1800 audit(1670478407.688:19): pid=12723 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=13915 res=0 ntfs: volume version 3.1. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. ntfs: volume version 3.1. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables ip6_tables: ip6tables: counters copy to user failed while replacing table base_sock_release(ffff888045753940) sk=ffff88808d845480 base_sock_release(ffff88804c9781c0) sk=ffff88804acf1540 audit: type=1326 audit(1670478412.048:20): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13460 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f73c65b60d9 code=0x0 audit: type=1326 audit(1670478412.068:21): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13460 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7f73c6567f8b code=0x0 audit: type=1326 audit(1670478412.098:22): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13466 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5def1730d9 code=0x0 audit: type=1326 audit(1670478412.098:23): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13469 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe3308850d9 code=0x0 audit: type=1326 audit(1670478412.118:24): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13493 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f73c65b60d9 code=0x0 audit: type=1326 audit(1670478412.168:25): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13493 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7f73c6567f8b code=0x0 audit: type=1326 audit(1670478412.208:26): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13491 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fbb827030d9 code=0x0 audit: type=1326 audit(1670478412.438:27): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13541 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe3308850d9 code=0x0 audit: type=1326 audit(1670478412.498:28): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13560 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f73c65b60d9 code=0x0 audit: type=1326 audit(1670478412.548:29): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13560 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7f73c6567f8b code=0x0 FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive!