Warning: Permanently added '10.128.1.182' (ED25519) to the list of known hosts. 2023/10/04 16:10:06 ignoring optional flag "sandboxArg"="0" 2023/10/04 16:10:06 parsed 1 programs 2023/10/04 16:10:07 executed programs: 0 [ 47.940090][ T3050] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.980601][ T3059] IPVS: ftp: loaded support on port[0] = 21 [ 49.613989][ T3431] [ 49.616464][ T3431] ====================================================== [ 49.624052][ T3431] WARNING: possible circular locking dependency detected [ 49.631272][ T3431] 5.12.0-rc6-syzkaller #0 Not tainted [ 49.637077][ T3431] ------------------------------------------------------ [ 49.644345][ T3431] syz-executor.0/3431 is trying to acquire lock: [ 49.651143][ T3431] ffff888105e46460 (sb_writers#4){.+.+}-{0:0}, at: ovl_maybe_copy_up+0x77/0xa0 [ 49.660938][ T3431] [ 49.660938][ T3431] but task is already holding lock: [ 49.668623][ T3431] ffff888106c386d8 (&iint->mutex){+.+.}-{3:3}, at: process_measurement+0x273/0x880 [ 49.679445][ T3431] [ 49.679445][ T3431] which lock already depends on the new lock. [ 49.679445][ T3431] [ 49.690142][ T3431] [ 49.690142][ T3431] the existing dependency chain (in reverse order) is: [ 49.699307][ T3431] [ 49.699307][ T3431] -> #1 (&iint->mutex){+.+.}-{3:3}: [ 49.706872][ T3431] __mutex_lock+0x72/0x660 [ 49.712171][ T3431] process_measurement+0x273/0x880 [ 49.717901][ T3431] ima_file_check+0x5f/0x80 [ 49.723086][ T3431] path_openat+0x603/0xaf0 [ 49.728825][ T3431] do_filp_open+0x83/0x130 [ 49.733957][ T3431] do_sys_openat2+0x92/0x150 [ 49.739526][ T3431] __x64_sys_openat+0x4f/0x90 [ 49.745683][ T3431] do_syscall_64+0x2d/0x40 [ 49.750775][ T3431] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.757532][ T3431] [ 49.757532][ T3431] -> #0 (sb_writers#4){.+.+}-{0:0}: [ 49.765079][ T3431] __lock_acquire+0x110e/0x1b00 [ 49.770841][ T3431] lock_acquire+0xc7/0x380 [ 49.776049][ T3431] mnt_want_write+0x32/0x1a0 [ 49.781367][ T3431] ovl_maybe_copy_up+0x77/0xa0 [ 49.787574][ T3431] ovl_open+0x25/0x80 [ 49.793723][ T3431] do_dentry_open+0x15c/0x3b0 [ 49.799761][ T3431] dentry_open+0x5d/0xa0 [ 49.804554][ T3431] ima_calc_file_hash+0xf9/0x160 [ 49.810231][ T3431] ima_collect_measurement+0x205/0x230 [ 49.817480][ T3431] process_measurement+0x3bd/0x880 [ 49.824026][ T3431] ima_file_check+0x5f/0x80 [ 49.829497][ T3431] path_openat+0x603/0xaf0 [ 49.835037][ T3431] do_filp_open+0x83/0x130 [ 49.841065][ T3431] do_sys_openat2+0x92/0x150 [ 49.846995][ T3431] __x64_sys_open+0x50/0x90 [ 49.852174][ T3431] do_syscall_64+0x2d/0x40 [ 49.857164][ T3431] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.863561][ T3431] [ 49.863561][ T3431] other info that might help us debug this: [ 49.863561][ T3431] [ 49.874094][ T3431] Possible unsafe locking scenario: [ 49.874094][ T3431] [ 49.881552][ T3431] CPU0 CPU1 [ 49.887275][ T3431] ---- ---- [ 49.892909][ T3431] lock(&iint->mutex); [ 49.897392][ T3431] lock(sb_writers#4); [ 49.904403][ T3431] lock(&iint->mutex); [ 49.911467][ T3431] lock(sb_writers#4); [ 49.916204][ T3431] [ 49.916204][ T3431] *** DEADLOCK *** [ 49.916204][ T3431] [ 49.925478][ T3431] 1 lock held by syz-executor.0/3431: [ 49.931393][ T3431] #0: ffff888106c386d8 (&iint->mutex){+.+.}-{3:3}, at: process_measurement+0x273/0x880 [ 49.942155][ T3431] [ 49.942155][ T3431] stack backtrace: [ 49.948616][ T3431] CPU: 0 PID: 3431 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 49.957975][ T3431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 49.968403][ T3431] Call Trace: [ 49.971659][ T3431] dump_stack+0x7f/0xad [ 49.976417][ T3431] check_noncircular+0xcc/0xe0 [ 49.981156][ T3431] ? find_held_lock+0x2b/0x80 [ 49.985957][ T3431] __lock_acquire+0x110e/0x1b00 [ 49.990808][ T3431] lock_acquire+0xc7/0x380 [ 49.995204][ T3431] ? ovl_maybe_copy_up+0x77/0xa0 [ 50.000274][ T3431] ? smk_tskacc+0xc3/0xe0 [ 50.004705][ T3431] ? ovl_mmap+0xb0/0xb0 [ 50.009914][ T3431] mnt_want_write+0x32/0x1a0 [ 50.014569][ T3431] ? ovl_maybe_copy_up+0x77/0xa0 [ 50.019765][ T3431] ovl_maybe_copy_up+0x77/0xa0 [ 50.024544][ T3431] ovl_open+0x25/0x80 [ 50.028503][ T3431] do_dentry_open+0x15c/0x3b0 [ 50.033244][ T3431] dentry_open+0x5d/0xa0 [ 50.037650][ T3431] ima_calc_file_hash+0xf9/0x160 [ 50.042894][ T3431] ima_collect_measurement+0x205/0x230 [ 50.048415][ T3431] ? ovl_xattr_get+0x58/0x80 [ 50.053180][ T3431] process_measurement+0x3bd/0x880 [ 50.058371][ T3431] ? find_held_lock+0x2b/0x80 [ 50.063119][ T3431] ima_file_check+0x5f/0x80 [ 50.067684][ T3431] path_openat+0x603/0xaf0 [ 50.072274][ T3431] do_filp_open+0x83/0x130 [ 50.076693][ T3431] ? do_raw_spin_unlock+0x50/0xa0 [ 50.081690][ T3431] ? _raw_spin_unlock+0x24/0x40 [ 50.086594][ T3431] ? alloc_fd+0xf1/0x1e0 [ 50.090844][ T3431] do_sys_openat2+0x92/0x150 [ 50.095699][ T3431] __x64_sys_open+0x50/0x90 [ 50.100353][ T3431] do_syscall_64+0x2d/0x40 [ 50.104883][ T3431] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 50.111107][ T3431] RIP: 0033:0x7fa05ba91ae9 [ 50.115573][ T3431] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 50.136116][ T3431] RSP: 002b:00007fa05b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 50.145541][ T3431] RAX: ffffffffffffffda RBX: 00007fa05bbb0f80 RCX: 00007fa05ba91ae9 [ 50.153682][ T3431] RDX: 0000000000000000 RSI: 0000000000101003 RDI: 0000000020000000 [ 50.161973][ T3431] RBP: 00007fa05badd47a R08: 0000000000000000 R09: 0000000000000000 [ 50.170010][ T3431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 50.178311][ T3431] R13: 0000000000000006 R14: 00007fa05bbb0f80 R15: 00007ffce33ecf48 2023/10/04 16:10:12 executed programs: 195 2023/10/04 16:10:17 executed programs: 571