audit: type=1800 audit(1676441960.198:14): pid=10517 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file2" dev="sda1" ino=14017 res=0 ============================================ WARNING: possible recursive locking detected 4.14.305-syzkaller #0 Not tainted -------------------------------------------- syz-executor.3/10528 is trying to acquire lock: (&HFSPLUS_I(inode)->extents_lock){+.+.}, at: [] hfsplus_get_block+0x1f9/0x820 fs/hfsplus/extents.c:260 but task is already holding lock: (&HFSPLUS_I(inode)->extents_lock){+.+.}, at: [] hfsplus_file_extend+0x188/0xef0 fs/hfsplus/extents.c:452 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&HFSPLUS_I(inode)->extents_lock); lock(&HFSPLUS_I(inode)->extents_lock); *** DEADLOCK *** audit: type=1804 audit(1676441960.438:15): pid=10513 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3931510674/syzkaller.HwJhrI/32/bus" dev="sda1" ino=14018 res=1 May be due to missing lock nesting notation 5 locks held by syz-executor.3/10528: #0: (&type->s_umount_key#50/1){+.+.}, at: [] alloc_super fs/super.c:251 [inline] #0: (&type->s_umount_key#50/1){+.+.}, at: [] sget_userns+0x556/0xc10 fs/super.c:516 #1: (&sbi->vh_mutex){+.+.}, at: [] hfsplus_fill_super+0x1314/0x1850 fs/hfsplus/super.c:553 #2: (&tree->tree_lock){+.+.}, at: [] hfsplus_find_init+0x1a8/0x220 fs/hfsplus/bfind.c:30 #3: (&HFSPLUS_I(inode)->extents_lock){+.+.}, at: [] hfsplus_file_extend+0x188/0xef0 fs/hfsplus/extents.c:452 #4: (&sbi->alloc_mutex){+.+.}, at: [] hfsplus_block_allocate+0xd2/0x910 fs/hfsplus/bitmap.c:35 stack backtrace: CPU: 0 PID: 10528 Comm: syz-executor.3 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_deadlock_bug kernel/locking/lockdep.c:1800 [inline] check_deadlock kernel/locking/lockdep.c:1847 [inline] validate_chain kernel/locking/lockdep.c:2448 [inline] __lock_acquire.cold+0x180/0x97c kernel/locking/lockdep.c:3491 audit: type=1804 audit(1676441960.658:16): pid=10538 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3931510674/syzkaller.HwJhrI/33/bus" dev="sda1" ino=13994 res=1 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893 audit: type=1800 audit(1676441960.658:17): pid=10539 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file2" dev="sda1" ino=14001 res=0 hfsplus_get_block+0x1f9/0x820 fs/hfsplus/extents.c:260 audit: type=1804 audit(1676441960.658:18): pid=10546 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3931510674/syzkaller.HwJhrI/34/bus" dev="sda1" ino=13994 res=1 block_read_full_page+0x25e/0x8d0 fs/buffer.c:2316 do_read_cache_page+0x38e/0xc10 mm/filemap.c:2713 read_mapping_page include/linux/pagemap.h:398 [inline] hfsplus_block_allocate+0x189/0x910 fs/hfsplus/bitmap.c:37 hfsplus_file_extend+0x421/0xef0 fs/hfsplus/extents.c:463 hfsplus_bmap_reserve+0x26e/0x410 fs/hfsplus/btree.c:357 hfsplus_create_cat+0x1af/0x10d0 fs/hfsplus/catalog.c:272 hfsplus_fill_super+0x1386/0x1850 fs/hfsplus/super.c:560 audit: type=1804 audit(1676441960.658:19): pid=10522 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3581913960/syzkaller.cnK2oC/29/cgroup.controllers" dev="sda1" ino=13969 res=1 mount_bdev+0x2b3/0x360 fs/super.c:1134 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2572 [inline] do_mount+0xe65/0x2a30 fs/namespace.c:2905 SYSC_mount fs/namespace.c:3121 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3098 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f2f799b462a RSP: 002b:00007f2f77f24f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 000000000000061b RCX: 00007f2f799b462a RDX: 0000000020000600 RSI: 00000000200001c0 RDI: 00007f2f77f24fe0 RBP: 00007f2f77f25020 R08: 00007f2f77f25020 R09: 0000000001a00010 R10: 0000000001a00010 R11: 0000000000000202 R12: 0000000020000600 R13: 00000000200001c0 R14: 00007f2f77f24fe0 R15: 0000000020000140 XFS (loop0): Super block does not support project and group quota together audit: type=1804 audit(1676441961.638:20): pid=10569 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3931510674/syzkaller.HwJhrI/35/bus" dev="sda1" ino=13989 res=1 audit: type=1800 audit(1676441961.768:21): pid=10586 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file2" dev="sda1" ino=14026 res=0 ====================================================== WARNING: the mand mount option is being deprecated and will be removed in v5.15! ====================================================== UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) audit: type=1804 audit(1676441962.268:22): pid=10580 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3581913960/syzkaller.cnK2oC/30/cgroup.controllers" dev="sda1" ino=14024 res=1 UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) audit: type=1804 audit(1676441962.418:23): pid=10581 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir3947232306/syzkaller.uaNHe7/30/cgroup.controllers" dev="sda1" ino=14025 res=1 UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) XFS (loop0): Super block does not support project and group quota together UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) nla_parse: 1 callbacks suppressed netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. audit: type=1804 audit(1676441962.898:24): pid=10644 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3581913960/syzkaller.cnK2oC/31/cgroup.controllers" dev="sda1" ino=14017 res=1 Zero length message leads to an empty skb usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #1 syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 35 audit: type=1804 audit(1676441963.298:25): pid=10658 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir3947232306/syzkaller.uaNHe7/31/cgroup.controllers" dev="sda1" ino=14020 res=1 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. audit: type=1800 audit(1676441963.488:26): pid=10696 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=14036 res=0 audit: type=1800 audit(1676441963.528:27): pid=10696 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=14036 res=0 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. audit: type=1804 audit(1676441963.768:28): pid=10720 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3581913960/syzkaller.cnK2oC/32/cgroup.controllers" dev="sda1" ino=14037 res=1 audit: type=1800 audit(1676441964.098:29): pid=10737 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=13999 res=0 (unnamed net_device) (uninitialized): Unable to set down delay as MII monitoring is disabled UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) NILFS (loop1): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. NILFS (loop1): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) NILFS (loop1): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds NILFS (loop1): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds kauditd_printk_skb: 16 callbacks suppressed audit: type=1804 audit(1676441966.659:46): pid=10993 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3931510674/syzkaller.HwJhrI/51/bus" dev="sda1" ino=14049 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) audit: type=1804 audit(1676441967.569:47): pid=11017 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir3931510674/syzkaller.HwJhrI/51/bus" dev="sda1" ino=14049 res=1 UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) audit: type=1804 audit(1676441967.919:48): pid=11087 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3931510674/syzkaller.HwJhrI/52/bus" dev="sda1" ino=14045 res=1 EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. mmap: syz-executor.5 (11091) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue audit: type=1804 audit(1676441969.699:49): pid=11104 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir3931510674/syzkaller.HwJhrI/52/bus" dev="sda1" ino=14045 res=1 EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue