overlayfs: failed to create directory ./file1/index (errno: 30); mounting read-only CPU: 0 PID: 24772 Comm: syz-executor.0 Not tainted 4.14.138 #34 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ===================================== Call Trace: WARNING: bad unlock balance detected! __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 4.14.138 #34 Not tainted fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 ------------------------------------- should_failslab+0xdb/0x130 mm/failslab.c:32 syz-executor.3/24773 is trying to release lock (sb_writers slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 ) at: [] sb_end_write include/linux/fs.h:1500 [inline] [] mnt_drop_write+0x3e/0x50 fs/namespace.c:532 but there are no more locks to release! shmem_alloc_inode+0x1c/0x50 mm/shmem.c:3882 other info that might help us debug this: alloc_inode+0x64/0x180 fs/inode.c:209 1 lock held by syz-executor.3/24773: new_inode_pseudo+0x19/0xf0 fs/inode.c:891 #0: new_inode+0x1f/0x40 fs/inode.c:920 ( shmem_get_inode+0x75/0x750 mm/shmem.c:2172 &type->s_umount_key __shmem_file_setup.part.0+0x111/0x400 mm/shmem.c:4260 #57 /1 ){+.+.} __shmem_file_setup mm/shmem.c:4242 [inline] shmem_file_setup mm/shmem.c:4309 [inline] shmem_file_setup mm/shmem.c:4307 [inline] SYSC_memfd_create mm/shmem.c:3762 [inline] SyS_memfd_create+0x1f9/0x3a0 mm/shmem.c:3702 , at: [] alloc_super fs/super.c:251 [inline] , at: [] sget_userns+0x551/0xc30 fs/super.c:516 stack backtrace: do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007fc1c7ea4a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1c7ea56d4 R13: 00000000004c8976 R14: 00000000004df838 R15: 0000000000000003 CPU: 1 PID: 24773 Comm: syz-executor.3 Not tainted 4.14.138 #34 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 print_unlock_imbalance_bug kernel/locking/lockdep.c:3548 [inline] print_unlock_imbalance_bug.cold+0x114/0x123 kernel/locking/lockdep.c:3525 __lock_release kernel/locking/lockdep.c:3762 [inline] lock_release+0x616/0x940 kernel/locking/lockdep.c:4010 percpu_up_read_preempt_enable include/linux/percpu-rwsem.h:102 [inline] percpu_up_read include/linux/percpu-rwsem.h:108 [inline] __sb_end_write+0xc1/0x100 fs/super.c:1329 sb_end_write include/linux/fs.h:1500 [inline] mnt_drop_write+0x3e/0x50 fs/namespace.c:532 ovl_workdir_create.cold+0x101/0x10d fs/overlayfs/super.c:546 ovl_fill_super+0x1d7e/0x2660 fs/overlayfs/super.c:1084 mount_nodev+0x52/0xf0 fs/super.c:1180 ovl_mount+0x2d/0x40 fs/overlayfs/super.c:1204 mount_fs+0x97/0x2a1 fs/super.c:1237 vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0x417/0x27d0 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xab/0x120 fs/namespace.c:3072 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007fe8b64c6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459829 RDX: 0000000020000100 RSI: 0000000020000300 RDI: 0000000000400000 RBP: 000000000075bf20 R08: 00000000200002c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe8b64c76d4 R13: 00000000004c5e44 R14: 00000000004da948 R15: 00000000ffffffff kobject: 'loop4' (ffff8880a4a3c260): kobject_uevent_env kobject: 'loop1' (ffff8880a49749a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a3c260): fill_kobj_path: path = '/devices/virtual/block/loop4' overlayfs: try deleting index dir or mounting with '-o index=off' to disable inodes index. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop1' (ffff8880a49749a0): fill_kobj_path: path = '/devices/virtual/block/loop1' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (ffff88805604aca0): kobject_uevent_env kobject: 'loop1' (ffff8880a49749a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a3c260): kobject_uevent_env CPU: 0 PID: 24777 Comm: syz-executor.1 Not tainted 4.14.138 #34 kobject: 'loop1' (ffff8880a49749a0): fill_kobj_path: path = '/devices/virtual/block/loop1' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] inode_alloc_security security/selinux/hooks.c:233 [inline] selinux_inode_alloc_security+0xb6/0x2a0 security/selinux/hooks.c:2893 security_inode_alloc+0x94/0xd0 security/security.c:438 inode_init_always+0x552/0xaf0 fs/inode.c:167 kobject: 'loop4' (ffff8880a4a3c260): fill_kobj_path: path = '/devices/virtual/block/loop4' alloc_inode+0x81/0x180 fs/inode.c:216 new_inode_pseudo+0x19/0xf0 fs/inode.c:891 new_inode+0x1f/0x40 fs/inode.c:920 shmem_get_inode+0x75/0x750 mm/shmem.c:2172 __shmem_file_setup.part.0+0x111/0x400 mm/shmem.c:4260 __shmem_file_setup mm/shmem.c:4242 [inline] shmem_file_setup mm/shmem.c:4309 [inline] shmem_file_setup mm/shmem.c:4307 [inline] SYSC_memfd_create mm/shmem.c:3762 [inline] SyS_memfd_create+0x1f9/0x3a0 mm/shmem.c:3702 kobject: 'loop0' (ffff88805604aca0): fill_kobj_path: path = '/devices/virtual/block/loop0' do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop2' (ffff8880a497f2a0): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007f81f5127a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f kobject: 'loop2' (ffff8880a497f2a0): fill_kobj_path: path = '/devices/virtual/block/loop2' RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81f51286d4 R13: 00000000004c8976 R14: 00000000004df838 R15: 0000000000000003 kobject: 'loop2' (ffff8880a497f2a0): kobject_uevent_env ------------[ cut here ]------------ kobject: 'loop2' (ffff8880a497f2a0): fill_kobj_path: path = '/devices/virtual/block/loop2' WARNING: CPU: 0 PID: 23978 at fs/namespace.c:1178 cleanup_mnt+0x104/0x150 fs/namespace.c:1178