ntfs: volume version 3.1. sp0: Synchronizing with TNC syz-executor.2 (12328): drop_caches: 1 ====================================================== WARNING: possible circular locking dependency detected 4.14.297-syzkaller #0 Not tainted ------------------------------------------------------ kworker/u4:2/34 is trying to acquire lock: (&rl->lock){++++}, at: [] ntfs_read_block fs/ntfs/aops.c:269 [inline] (&rl->lock){++++}, at: [] ntfs_readpage+0x1396/0x1ad0 fs/ntfs/aops.c:456 but task is already holding lock: (&ni->mrec_lock){+.+.}, at: [] map_mft_record+0x2b/0xbe0 fs/ntfs/mft.c:166 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&ni->mrec_lock){+.+.}: __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893 map_mft_record+0x2b/0xbe0 fs/ntfs/mft.c:166 ntfs_attr_extend_allocation+0x1e5/0x2f80 fs/ntfs/attrib.c:1996 ntfs_prepare_file_for_write fs/ntfs/file.c:412 [inline] ntfs_file_write_iter+0x61b/0x1f70 fs/ntfs/file.c:1949 call_write_iter include/linux/fs.h:1780 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x44c/0x630 fs/read_write.c:482 vfs_write+0x17f/0x4d0 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xf2/0x210 fs/read_write.c:582 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 -> #0 (&rl->lock){++++}: lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 down_read+0x36/0x80 kernel/locking/rwsem.c:24 ntfs_read_block fs/ntfs/aops.c:269 [inline] ntfs_readpage+0x1396/0x1ad0 fs/ntfs/aops.c:456 do_read_cache_page+0x38e/0xc10 mm/filemap.c:2713 read_mapping_page include/linux/pagemap.h:398 [inline] ntfs_map_page fs/ntfs/aops.h:89 [inline] ntfs_sync_mft_mirror+0x1f4/0x1560 fs/ntfs/mft.c:490 write_mft_record_nolock+0xece/0x1240 fs/ntfs/mft.c:793 write_mft_record fs/ntfs/mft.h:109 [inline] __ntfs_write_inode+0x58d/0xcc0 fs/ntfs/inode.c:3077 write_inode fs/fs-writeback.c:1241 [inline] __writeback_single_inode+0x6a4/0x1010 fs/fs-writeback.c:1439 writeback_sb_inodes+0x48b/0xd30 fs/fs-writeback.c:1645 wb_writeback+0x243/0xb80 fs/fs-writeback.c:1820 wb_do_writeback fs/fs-writeback.c:1952 [inline] wb_workfn+0x2bd/0xf50 fs/fs-writeback.c:1988 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:406 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ni->mrec_lock); lock(&rl->lock); lock(&ni->mrec_lock); lock(&rl->lock); *** DEADLOCK *** 3 locks held by kworker/u4:2/34: #0: ("writeback"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2088 #1: ((&(&wb->dwork)->work)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2092 #2: (&ni->mrec_lock){+.+.}, at: [] map_mft_record+0x2b/0xbe0 fs/ntfs/mft.c:166 stack backtrace: CPU: 0 PID: 34 Comm: kworker/u4:2 Not tainted 4.14.297-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 Workqueue: writeback wb_workfn (flush-7:4) Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_circular_bug.constprop.0.cold+0x2d7/0x41e kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1905 [inline] check_prevs_add kernel/locking/lockdep.c:2022 [inline] validate_chain kernel/locking/lockdep.c:2464 [inline] __lock_acquire+0x2e0e/0x3f20 kernel/locking/lockdep.c:3491 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 down_read+0x36/0x80 kernel/locking/rwsem.c:24 ntfs_read_block fs/ntfs/aops.c:269 [inline] ntfs_readpage+0x1396/0x1ad0 fs/ntfs/aops.c:456 do_read_cache_page+0x38e/0xc10 mm/filemap.c:2713 read_mapping_page include/linux/pagemap.h:398 [inline] ntfs_map_page fs/ntfs/aops.h:89 [inline] ntfs_sync_mft_mirror+0x1f4/0x1560 fs/ntfs/mft.c:490 write_mft_record_nolock+0xece/0x1240 fs/ntfs/mft.c:793 write_mft_record fs/ntfs/mft.h:109 [inline] __ntfs_write_inode+0x58d/0xcc0 fs/ntfs/inode.c:3077 write_inode fs/fs-writeback.c:1241 [inline] __writeback_single_inode+0x6a4/0x1010 fs/fs-writeback.c:1439 writeback_sb_inodes+0x48b/0xd30 fs/fs-writeback.c:1645 wb_writeback+0x243/0xb80 fs/fs-writeback.c:1820 wb_do_writeback fs/fs-writeback.c:1952 [inline] wb_workfn+0x2bd/0xf50 fs/fs-writeback.c:1988 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:406 syz-executor.2 (12328): drop_caches: 1 sp0: Synchronizing with TNC sp0: Synchronizing with TNC ntfs: volume version 3.1. sp0: Synchronizing with TNC sp0: Synchronizing with TNC sp1: Synchronizing with TNC ntfs: volume version 3.1. syz-executor.2 (12438): drop_caches: 1 syz-executor.2 (12438): drop_caches: 1 ntfs: volume version 3.1. syz-executor.1 (12540): drop_caches: 1 syz-executor.5 (12535): drop_caches: 1 syz-executor.2 (12536): drop_caches: 1 syz-executor.0 (12549): drop_caches: 1 syz-executor.5 (12535): drop_caches: 1 syz-executor.2 (12536): drop_caches: 1 syz-executor.1 (12540): drop_caches: 1 syz-executor.0 (12549): drop_caches: 1 syz-executor.5 (12582): drop_caches: 1 syz-executor.2 (12580): drop_caches: 1 EXT4-fs (loop4): VFS: Can't find ext4 filesystem syz-executor.1 (12586): drop_caches: 1 syz-executor.0 (12597): drop_caches: 1 syz-executor.2 (12580): drop_caches: 1 syz-executor.1 (12586): drop_caches: 1 syz-executor.5 (12582): drop_caches: 1 8021q: adding VLAN 0 to HW filter on device team0 syz-executor.0 (12597): drop_caches: 1 bond0: Enslaving team0 as an active interface with an up link bond0: Releasing backup interface team0 bridge0: port 3(team0) entered blocking state bridge0: port 3(team0) entered disabled state device team0 entered promiscuous mode device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode syz-executor.1 (12629): drop_caches: 1 EXT4-fs (loop4): VFS: Can't find ext4 filesystem device team0 left promiscuous mode syz-executor.0 (12638): drop_caches: 1 device team_slave_0 left promiscuous mode device team_slave_1 left promiscuous mode syz-executor.5 (12635): drop_caches: 1 bridge0: port 3(team0) entered disabled state 8021q: adding VLAN 0 to HW filter on device team0 bond0: Enslaving team0 as an active interface with an up link bond0: Releasing backup interface team0 bridge0: port 3(team0) entered blocking state bridge0: port 3(team0) entered disabled state device team0 entered promiscuous mode syz-executor.0 (12638): drop_caches: 1 device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode syz-executor.1 (12629): drop_caches: 1 syz-executor.2 (12655) used greatest stack depth: 24024 bytes left syz-executor.5 (12635): drop_caches: 1 device team0 left promiscuous mode device team_slave_0 left promiscuous mode device team_slave_1 left promiscuous mode bridge0: port 3(team0) entered disabled state EXT4-fs (loop1): VFS: Can't find ext4 filesystem ISO 9660 Extensions: Microsoft Joliet Level 3 8021q: adding VLAN 0 to HW filter on device team0 isofs_fill_super: get root inode failed EXT4-fs (loop4): VFS: Can't find ext4 filesystem bond0: Enslaving team0 as an active interface with an up link syz-executor.2 (12672) used greatest stack depth: 23952 bytes left bond0: Releasing backup interface team0 bridge0: port 3(team0) entered blocking state bridge0: port 3(team0) entered disabled state device team0 entered promiscuous mode device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode ISO 9660 Extensions: Microsoft Joliet Level 3 EXT4-fs (loop1): VFS: Can't find ext4 filesystem isofs_fill_super: get root inode failed device team0 left promiscuous mode device team_slave_0 left promiscuous mode unregister_netdevice: waiting for ip6gre0 to become free. Usage count = -1 device team_slave_1 left promiscuous mode bridge0: port 3(team0) entered disabled state EXT4-fs (loop4): VFS: Can't find ext4 filesystem 8021q: adding VLAN 0 to HW filter on device team0 bond0: Enslaving team0 as an active interface with an up link bond0: Releasing backup interface team0 bridge0: port 3(team0) entered blocking state ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: get root inode failed ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: get root inode failed bridge0: port 3(team0) entered disabled state device team0 entered promiscuous mode device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode EXT4-fs (loop1): VFS: Can't find ext4 filesystem print_req_error: I/O error, dev loop3, sector 4 Buffer I/O error on dev loop3, logical block 1, async page read ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: get root inode failed ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: get root inode failed ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: get root inode failed audit: type=1800 audit(1667339726.737:64): pid=12861 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=13892 res=0 print_req_error: I/O error, dev loop2, sector 4 Buffer I/O error on dev loop2, logical block 1, async page read audit: type=1804 audit(1667339726.747:65): pid=12861 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir2649957399/syzkaller.gC1LQH/123/file0" dev="sda1" ino=13892 res=1 audit: type=1804 audit(1667339726.747:66): pid=12861 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir2649957399/syzkaller.gC1LQH/123/file0" dev="sda1" ino=13892 res=1 audit: type=1804 audit(1667339726.917:67): pid=12863 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir2649957399/syzkaller.gC1LQH/123/file0" dev="sda1" ino=13892 res=1 ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: get root inode failed ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: get root inode failed ISO 9660 Extensions: Microsoft Joliet Level 3 audit: type=1800 audit(1667339727.537:68): pid=12936 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=13938 res=0 isofs_fill_super: get root inode failed audit: type=1804 audit(1667339727.547:69): pid=12936 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir2649957399/syzkaller.gC1LQH/124/file0" dev="sda1" ino=13938 res=1 audit: type=1804 audit(1667339727.547:70): pid=12936 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir2649957399/syzkaller.gC1LQH/124/file0" dev="sda1" ino=13938 res=1 audit: type=1804 audit(1667339727.707:71): pid=12939 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir2649957399/syzkaller.gC1LQH/124/file0" dev="sda1" ino=13938 res=1