RBP: 00007fb5713d01d0 R08: 0000000000000000 R09: 0000000000000000 R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffd1a537b0f R14: 00007fb5713d0300 R15: 0000000000022000 audit: type=1804 audit(1617307506.397:1690): pid=28552 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir755267054/syzkaller.y7o7qO/1453/file1/bus" dev="loop0" ino=130 res=1 ====================================================== WARNING: possible circular locking dependency detected 4.14.228-syzkaller #0 Not tainted ------------------------------------------------------ kworker/1:2/3626 is trying to acquire lock: (&sb->s_type->i_mutex_key#10){++++}, at: [] inode_lock include/linux/fs.h:719 [inline] (&sb->s_type->i_mutex_key#10){++++}, at: [] __generic_file_fsync+0x9e/0x190 fs/libfs.c:989 but task is already holding lock: ((&dio->complete_work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2091 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 ((&dio->complete_work)){+.+.}: process_one_work+0x736/0x14a0 kernel/workqueue.c:2092 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2250 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 -> #1 ("dio/%s"sb->s_id){+.+.}: flush_workqueue+0xfa/0x1310 kernel/workqueue.c:2624 drain_workqueue+0x177/0x3e0 kernel/workqueue.c:2789 destroy_workqueue+0x71/0x710 kernel/workqueue.c:4109 __alloc_workqueue_key+0xd50/0x1080 kernel/workqueue.c:4086 sb_init_dio_done_wq+0x34/0x80 fs/direct-io.c:624 dio_set_defer_completion fs/direct-io.c:647 [inline] get_more_blocks fs/direct-io.c:725 [inline] do_direct_IO fs/direct-io.c:1003 [inline] do_blockdev_direct_IO fs/direct-io.c:1336 [inline] __blockdev_direct_IO+0x77db/0xdc60 fs/direct-io.c:1422 ext4_direct_IO_write fs/ext4/inode.c:3724 [inline] ext4_direct_IO+0x888/0x1b80 fs/ext4/inode.c:3865 generic_file_direct_write+0x1df/0x420 mm/filemap.c:2958 __generic_file_write_iter+0x2a2/0x590 mm/filemap.c:3137 ext4_file_write_iter+0x276/0xd20 fs/ext4/file.c:270 call_write_iter include/linux/fs.h:1778 [inline] aio_write+0x2ed/0x560 fs/aio.c:1553 io_submit_one fs/aio.c:1641 [inline] do_io_submit+0x847/0x1570 fs/aio.c:1709 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb -> #0 (&sb->s_type->i_mutex_key#10){++++}: FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 down_write+0x34/0x90 kernel/locking/rwsem.c:54 inode_lock include/linux/fs.h:719 [inline] __generic_file_fsync+0x9e/0x190 fs/libfs.c:989 ext4_sync_file+0x8ed/0x12c0 fs/ext4/fsync.c:118 vfs_fsync_range+0x103/0x260 fs/sync.c:196 generic_write_sync include/linux/fs.h:2682 [inline] dio_complete+0x561/0x8d0 fs/direct-io.c:330 audit: type=1804 audit(1617307506.637:1691): pid=28552 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir755267054/syzkaller.y7o7qO/1453/file1/bus" dev="loop0" ino=130 res=1 process_one_work+0x793/0x14a0 kernel/workqueue.c:2116 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2250 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 other info that might help us debug this: Chain exists of: &sb->s_type->i_mutex_key#10 --> "dio/%s"sb->s_id --> (&dio->complete_work) Possible unsafe locking scenario: CPU: 0 PID: 28566 Comm: syz-executor.2 Not tainted 4.14.228-syzkaller #0 CPU0 CPU1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ---- ---- Call Trace: lock((&dio->complete_work)); __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 lock("dio/%s"sb->s_id); fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 lock((&dio->complete_work)); should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4131 [inline] __alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4179 lock(&sb->s_type->i_mutex_key#10); *** DEADLOCK *** 2 locks held by kworker/1:2/3626: #0: ( "dio/%s"sb->s_id){+.+.} , at: [] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2087 #1: ( (&dio->complete_work)){+.+.} , at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2091 stack backtrace: alloc_pages_current+0x155/0x260 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:520 [inline] push_pipe+0x3b0/0x750 lib/iov_iter.c:515 __pipe_get_pages lib/iov_iter.c:1035 [inline] pipe_get_pages_alloc lib/iov_iter.c:1139 [inline] iov_iter_get_pages_alloc+0x4d7/0xf00 lib/iov_iter.c:1157 default_file_splice_read+0x171/0x910 fs/splice.c:390 do_splice_to+0xfb/0x140 fs/splice.c:880 splice_direct_to_actor+0x207/0x730 fs/splice.c:952 do_splice_direct+0x164/0x210 fs/splice.c:1061 do_sendfile+0x47f/0xb30 fs/read_write.c:1441 SYSC_sendfile64 fs/read_write.c:1502 [inline] SyS_sendfile64+0xff/0x110 fs/read_write.c:1488 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x466459 RSP: 002b:00007fb5713d0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 RBP: 00007fb5713d01d0 R08: 0000000000000000 R09: 0000000000000000 R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffd1a537b0f R14: 00007fb5713d0300 R15: 0000000000022000 CPU: 1 PID: 3626 Comm: kworker/1:2 Not tainted 4.14.228-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: dio/sda1 dio_aio_complete_work Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_circular_bug.constprop.0.cold+0x2d7/0x41e kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1905 [inline] check_prevs_add kernel/locking/lockdep.c:2022 [inline] validate_chain kernel/locking/lockdep.c:2464 [inline] __lock_acquire+0x2e0e/0x3f20 kernel/locking/lockdep.c:3491 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 down_write+0x34/0x90 kernel/locking/rwsem.c:54 inode_lock include/linux/fs.h:719 [inline] __generic_file_fsync+0x9e/0x190 fs/libfs.c:989 ext4_sync_file+0x8ed/0x12c0 fs/ext4/fsync.c:118 vfs_fsync_range+0x103/0x260 fs/sync.c:196 generic_write_sync include/linux/fs.h:2682 [inline] dio_complete+0x561/0x8d0 fs/direct-io.c:330 process_one_work+0x793/0x14a0 kernel/workqueue.c:2116 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2250 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28581 Comm: syz-executor.2 Not tainted 4.14.228-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4131 [inline] __alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4179 alloc_pages_current+0x155/0x260 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:520 [inline] push_pipe+0x3b0/0x750 lib/iov_iter.c:515 __pipe_get_pages lib/iov_iter.c:1035 [inline] pipe_get_pages_alloc lib/iov_iter.c:1139 [inline] iov_iter_get_pages_alloc+0x4d7/0xf00 lib/iov_iter.c:1157 default_file_splice_read+0x171/0x910 fs/splice.c:390 do_splice_to+0xfb/0x140 fs/splice.c:880 splice_direct_to_actor+0x207/0x730 fs/splice.c:952 do_splice_direct+0x164/0x210 fs/splice.c:1061 do_sendfile+0x47f/0xb30 fs/read_write.c:1441 SYSC_sendfile64 fs/read_write.c:1502 [inline] SyS_sendfile64+0xff/0x110 fs/read_write.c:1488 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x466459 RSP: 002b:00007fb5713d0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 RBP: 00007fb5713d01d0 R08: 0000000000000000 R09: 0000000000000000 R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffd1a537b0f R14: 00007fb5713d0300 R15: 0000000000022000 EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000243" or missing value EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000243" or missing value EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000243" or missing value CUSE: unknown device info "" CUSE: unknown device info "!" CUSE: unknown device info "* 2ՖI?" CUSE: DEVNAME unspecified FAT-fs (loop5): Unrecognized mount option "rootcontext=unconfined_u" or missing value CUSE: unknown device info "" CUSE: unknown device info "!" EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000243" or missing value CUSE: unknown device info "* 2ՖI?" CUSE: DEVNAME unspecified EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000243" or missing value FAT-fs (loop4): Unrecognized mount option "8" or missing value FAT-fs (loop4): Unrecognized mount option "8" or missing value FAT-fs (loop4): Unrecognized mount option "8" or missing value FAT-fs (loop3): Unrecognized mount option "2ބ=]= Ccq`) 9P#wr^+*y݉wĊ;+qVImЪuKppj%uj݃-DWJן>:S‡/p]q.0;A^(M Oq*Hݿ84^te3M7d\ǒC#/ 8X!" or missing value FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 29286 Comm: syz-executor.0 Not tainted 4.14.228-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] rw_copy_check_uvector+0x226/0x2b0 fs/read_write.c:776 import_iovec+0x94/0x360 lib/iov_iter.c:1411 vfs_readv+0xa8/0x120 fs/read_write.c:979 do_preadv fs/read_write.c:1065 [inline] SYSC_preadv fs/read_write.c:1115 [inline] SyS_preadv+0x15a/0x200 fs/read_write.c:1110 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x466459 RSP: 002b:00007f80447a4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 RDX: 0000000000000343 RSI: 00000000200017c0 RDI: 0000000000000003 RBP: 00007f80447a41d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007fffaa6e600f R14: 00007f80447a4300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 29340 Comm: syz-executor.0 Not tainted 4.14.228-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4131 [inline] __alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4179 __alloc_pages include/linux/gfp.h:484 [inline] __alloc_pages_node include/linux/gfp.h:497 [inline] kmem_getpages mm/slab.c:1419 [inline] cache_grow_begin+0x91/0x630 mm/slab.c:2676 cache_alloc_refill+0x273/0x350 mm/slab.c:3043 ____cache_alloc mm/slab.c:3125 [inline] __do_cache_alloc mm/slab.c:3347 [inline] slab_alloc mm/slab.c:3382 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x378/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] rw_copy_check_uvector+0x226/0x2b0 fs/read_write.c:776 import_iovec+0x94/0x360 lib/iov_iter.c:1411 vfs_readv+0xa8/0x120 fs/read_write.c:979 do_preadv fs/read_write.c:1065 [inline] SYSC_preadv fs/read_write.c:1115 [inline] SyS_preadv+0x15a/0x200 fs/read_write.c:1110 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x466459 RSP: 002b:00007f80447a4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 RDX: 0000000000000343 RSI: 00000000200017c0 RDI: 0000000000000003 RBP: 00007f80447a41d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007fffaa6e600f R14: 00007f80447a4300 R15: 0000000000022000