audit: type=1800 audit(1674979112.224:227): pid=27481 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15510 res=0 ntfs: volume version 3.1. ====================================================== WARNING: possible circular locking dependency detected 4.19.211-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.3/27482 is trying to acquire lock: 0000000060a7f801 (&ni->mrec_lock){+.+.}, at: map_mft_record+0x3c/0xc70 fs/ntfs/mft.c:168 but task is already holding lock: 00000000ca8d044b (&rl->lock){++++}, at: ntfs_truncate+0x1a2/0x2820 fs/ntfs/inode.c:2390 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&rl->lock){++++}: ntfs_read_block fs/ntfs/aops.c:265 [inline] ntfs_readpage+0x1909/0x21b0 fs/ntfs/aops.c:452 do_read_cache_page+0x533/0x1170 mm/filemap.c:2828 read_mapping_page include/linux/pagemap.h:402 [inline] ntfs_map_page fs/ntfs/aops.h:89 [inline] ntfs_sync_mft_mirror+0x24f/0x1d00 fs/ntfs/mft.c:494 write_mft_record_nolock+0x13d2/0x16c0 fs/ntfs/mft.c:801 write_mft_record fs/ntfs/mft.h:109 [inline] __ntfs_write_inode+0x609/0xe10 fs/ntfs/inode.c:3064 write_inode fs/fs-writeback.c:1244 [inline] __writeback_single_inode+0x733/0x11d0 fs/fs-writeback.c:1442 writeback_sb_inodes+0x537/0xef0 fs/fs-writeback.c:1647 wb_writeback+0x28d/0xcc0 fs/fs-writeback.c:1820 wb_do_writeback fs/fs-writeback.c:1965 [inline] wb_workfn+0x29b/0x1250 fs/fs-writeback.c:2006 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 -> #0 (&ni->mrec_lock){+.+.}: __mutex_lock_common kernel/locking/mutex.c:937 [inline] __mutex_lock+0xd7/0x1190 kernel/locking/mutex.c:1078 map_mft_record+0x3c/0xc70 fs/ntfs/mft.c:168 ntfs_truncate+0x202/0x2820 fs/ntfs/inode.c:2395 ntfs_truncate_vfs fs/ntfs/inode.c:2875 [inline] ntfs_setattr+0x1b6/0x620 fs/ntfs/inode.c:2925 notify_change+0x70b/0xfc0 fs/attr.c:334 do_truncate+0x134/0x1f0 fs/open.c:63 handle_truncate fs/namei.c:3009 [inline] do_last fs/namei.c:3427 [inline] path_openat+0x2308/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&rl->lock); lock(&ni->mrec_lock); lock(&rl->lock); lock(&ni->mrec_lock); *** DEADLOCK *** 3 locks held by syz-executor.3/27482: #0: 00000000ce5f3d20 (sb_writers#29){.+.+}, at: sb_start_write include/linux/fs.h:1579 [inline] #0: 00000000ce5f3d20 (sb_writers#29){.+.+}, at: mnt_want_write+0x3a/0xb0 fs/namespace.c:360 #1: 000000004e3abbdf (&sb->s_type->i_mutex_key#36){+.+.}, at: inode_lock include/linux/fs.h:748 [inline] #1: 000000004e3abbdf (&sb->s_type->i_mutex_key#36){+.+.}, at: do_truncate+0x125/0x1f0 fs/open.c:61 #2: 00000000ca8d044b (&rl->lock){++++}, at: ntfs_truncate+0x1a2/0x2820 fs/ntfs/inode.c:2390 stack backtrace: CPU: 0 PID: 27482 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_circular_bug.constprop.0.cold+0x2d7/0x41e kernel/locking/lockdep.c:1222 check_prev_add kernel/locking/lockdep.c:1866 [inline] check_prevs_add kernel/locking/lockdep.c:1979 [inline] validate_chain kernel/locking/lockdep.c:2420 [inline] __lock_acquire+0x30c9/0x3ff0 kernel/locking/lockdep.c:3416 lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 __mutex_lock_common kernel/locking/mutex.c:937 [inline] __mutex_lock+0xd7/0x1190 kernel/locking/mutex.c:1078 map_mft_record+0x3c/0xc70 fs/ntfs/mft.c:168 ntfs_truncate+0x202/0x2820 fs/ntfs/inode.c:2395 ntfs_truncate_vfs fs/ntfs/inode.c:2875 [inline] ntfs_setattr+0x1b6/0x620 fs/ntfs/inode.c:2925 notify_change+0x70b/0xfc0 fs/attr.c:334 audit: type=1804 audit(1674979112.324:228): pid=27517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2480538585/syzkaller.yZdGNM/643/file1" dev="sda1" ino=14452 res=1 do_truncate+0x134/0x1f0 fs/open.c:63 handle_truncate fs/namei.c:3009 [inline] do_last fs/namei.c:3427 [inline] path_openat+0x2308/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1aa5cec0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1aa425e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 00007f1aa5e0bf80 RCX: 00007f1aa5cec0c9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f1aa5d47ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcabacd51f R14: 00007f1aa425e300 R15: 0000000000022000 capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure audit: type=1804 audit(1674979113.004:229): pid=27540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2480538585/syzkaller.yZdGNM/644/file1" dev="sda1" ino=15089 res=1 audit: type=1800 audit(1674979113.064:230): pid=27535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=15089 res=0 audit: type=1800 audit(1674979113.064:231): pid=27540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=15089 res=0 ntfs: volume version 3.1. ntfs: volume version 3.1. netlink: 'syz-executor.5': attribute type 12 has an invalid length. overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. ieee80211 phy17: Selected rate control algorithm 'minstrel_ht' overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. netlink: 'syz-executor.5': attribute type 12 has an invalid length. ieee80211 phy18: Selected rate control algorithm 'minstrel_ht' BTRFS info (device loop2): enabling inode map caching BTRFS warning (device loop2): excessive commit interval 622039222 BTRFS info (device loop2): unrecognized mount option 'comprzs-force' BTRFS error (device loop2): open_ctree failed BTRFS info (device loop2): enabling inode map caching BTRFS warning (device loop2): excessive commit interval 622039222 BTRFS info (device loop2): unrecognized mount option 'comprzs-force' BTRFS error (device loop2): open_ctree failed audit: type=1800 audit(1674979116.025:232): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 audit: type=1800 audit(1674979116.045:233): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 audit: type=1800 audit(1674979116.045:234): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 audit: type=1800 audit(1674979116.045:235): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 audit: type=1800 audit(1674979116.045:236): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 audit: type=1800 audit(1674979116.045:237): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 audit: type=1800 audit(1674979116.045:238): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 audit: type=1800 audit(1674979116.045:239): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 audit: type=1800 audit(1674979116.045:240): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 audit: type=1800 audit(1674979116.045:241): pid=27905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=13916 res=0 squashfs: SQUASHFS error: unable to read xattr id index table squashfs: SQUASHFS error: unable to read xattr id index table squashfs: SQUASHFS error: unable to read xattr id index table squashfs: SQUASHFS error: unable to read xattr id index table squashfs: SQUASHFS error: unable to read xattr id index table squashfs: SQUASHFS error: unable to read xattr id index table FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 28226 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 __should_failslab+0x115/0x180 mm/failslab.c:32 should_failslab+0x5/0x10 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2ab/0x3c0 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] __do_sys_memfd_create mm/memfd.c:295 [inline] __se_sys_memfd_create+0xf8/0x440 mm/memfd.c:268 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1896f500c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f18954c1f38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 0000000000000174 RCX: 00007f1896f500c9 RDX: 00007f18954c1fdc RSI: 0000000000000000 RDI: 00007f1896faae81 RBP: 0000000000000174 R08: 00007f18954c1e20 R09: ffffffffffffffff R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000180 R13: 00007f18954c1fdc R14: 00007f18954c1fe0 R15: 0000000020000240 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0