overlayfs: fs on 'file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. BUG: MAX_LOCKDEP_CHAINS too low! turning off the locking correctness validator. CPU: 1 PID: 11116 Comm: syz-executor.2 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 add_chain_cache kernel/locking/lockdep.c:2303 [inline] lookup_chain_cache_add kernel/locking/lockdep.c:2415 [inline] validate_chain kernel/locking/lockdep.c:2435 [inline] __lock_acquire.cold+0x19a/0x97c kernel/locking/lockdep.c:3491 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:152 perf_ctx_lock kernel/events/core.c:163 [inline] perf_event_context_sched_in kernel/events/core.c:3266 [inline] __perf_event_task_sched_in+0x43d/0x8c0 kernel/events/core.c:3324 perf_event_task_sched_in include/linux/perf_event.h:1087 [inline] finish_task_switch+0x3c9/0x610 kernel/sched/core.c:2664 context_switch kernel/sched/core.c:2811 [inline] __schedule+0x893/0x1de0 kernel/sched/core.c:3384 preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:3508 ___preempt_schedule+0x16/0x18 __raw_spin_unlock include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock+0x3b/0x40 kernel/locking/spinlock.c:184 spin_unlock include/linux/spinlock.h:357 [inline] iput_final fs/inode.c:1522 [inline] iput+0x450/0x7e0 fs/inode.c:1551 dentry_unlink_inode+0x25c/0x310 fs/dcache.c:387 __dentry_kill+0x320/0x550 fs/dcache.c:591 dentry_kill fs/dcache.c:632 [inline] dput.part.0+0x56f/0x710 fs/dcache.c:847 dput fs/dcache.c:811 [inline] do_one_tree fs/dcache.c:1507 [inline] shrink_dcache_for_umount+0xcb/0x270 fs/dcache.c:1521 generic_shutdown_super+0x68/0x370 fs/super.c:431 kill_anon_super+0x36/0x90 fs/super.c:1006 deactivate_locked_super+0x6c/0xd0 fs/super.c:319 deactivate_super+0x7f/0xa0 fs/super.c:350 cleanup_mnt+0x186/0x2c0 fs/namespace.c:1183 task_work_run+0x11f/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4665f9 RSP: 002b:00007fa0b3779188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffea RBX: 000000000056bf60 RCX: 00000000004665f9 RDX: 0000000020000400 RSI: 00000000200003c0 RDI: 0000000000000000 RBP: 00000000004bfce1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007fffdf25f2af R14: 00007fa0b3779300 R15: 0000000000022000 overlayfs: fs on 'file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. Bluetooth: hci4 command 0x0406 tx timeout overlayfs: fs on 'file0' does not support file handles, falling back to index=off. overlayfs: fs on 'file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 bond0: team0 is up - this may be due to an out of date ifenslave bond0: team0 is up - this may be due to an out of date ifenslave audit: type=1804 audit(1620803507.895:30218): pid=11441 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir877327468/syzkaller.3DLXqe/1778/bus" dev="sda1" ino=14564 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. bond0: team0 is up - this may be due to an out of date ifenslave bond0: team0 is up - this may be due to an out of date ifenslave audit: type=1804 audit(1620803508.725:30219): pid=11441 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir877327468/syzkaller.3DLXqe/1778/bus" dev="sda1" ino=14564 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. bond0: team0 is up - this may be due to an out of date ifenslave audit: type=1804 audit(1620803508.955:30220): pid=11506 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir877327468/syzkaller.3DLXqe/1779/bus" dev="sda1" ino=14502 res=1 bond0: team0 is up - this may be due to an out of date ifenslave TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. bond0: team0 is up - this may be due to an out of date ifenslave bond0: team0 is up - this may be due to an out of date ifenslave audit: type=1804 audit(1620803509.385:30221): pid=11534 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir517124671/syzkaller.3pmWbS/116/bus" dev="sda1" ino=14581 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1620803510.735:30222): pid=11563 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir884741778/syzkaller.uUs91c/137/bus" dev="sda1" ino=14617 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1620803510.885:30223): pid=11570 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir877327468/syzkaller.3DLXqe/1780/bus" dev="sda1" ino=14618 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1620803512.125:30224): pid=11591 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir517124671/syzkaller.3pmWbS/117/bus" dev="sda1" ino=14546 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1620803512.315:30225): pid=11602 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir049615813/syzkaller.cW95p4/129/bus" dev="sda1" ino=14621 res=1 audit: type=1804 audit(1620803512.365:30226): pid=11603 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir795979178/syzkaller.xuapli/1929/bus" dev="sda1" ino=14677 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1620803513.605:30227): pid=11620 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir877327468/syzkaller.3DLXqe/1781/bus" dev="sda1" ino=14374 res=1 audit: type=1804 audit(1620803513.675:30228): pid=11621 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir884741778/syzkaller.uUs91c/138/bus" dev="sda1" ino=14376 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1620803514.935:30229): pid=11635 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir517124671/syzkaller.3pmWbS/118/bus" dev="sda1" ino=14328 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1620803515.145:30230): pid=11647 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir049615813/syzkaller.cW95p4/130/bus" dev="sda1" ino=14381 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1620803515.905:30231): pid=11655 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir795979178/syzkaller.xuapli/1930/bus" dev="sda1" ino=14327 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1620803516.425:30232): pid=11665 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir884741778/syzkaller.uUs91c/139/bus" dev="sda1" ino=14423 res=1 audit: type=1804 audit(1620803516.485:30233): pid=11667 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir877327468/syzkaller.3DLXqe/1782/bus" dev="sda1" ino=14409 res=1