Warning: Permanently added '10.128.1.47' (ED25519) to the list of known hosts. 2024/10/02 04:43:04 ignoring optional flag "sandboxArg"="0" 2024/10/02 04:43:05 parsed 1 programs [ 62.021220][ T2540] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/10/02 04:43:09 executed programs: 0 [ 66.884668][ T3422] mmap: syz.0.15 (3422) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 66.898782][ T3422] [ 66.901093][ T3422] ====================================================== [ 66.908084][ T3422] WARNING: possible circular locking dependency detected [ 66.915063][ T3422] 6.11.0-rc1-syzkaller #0 Not tainted [ 66.920501][ T3422] ------------------------------------------------------ [ 66.927476][ T3422] syz.0.15/3422 is trying to acquire lock: [ 66.933242][ T3422] ffff888103b20198 (&mm->mmap_lock){++++}-{3:3}, at: upgrade_mmap_lock_carefully+0x45/0xa0 [ 66.943362][ T3422] [ 66.943362][ T3422] but task is already holding lock: [ 66.950685][ T3422] ffff88810432a650 (&sb->s_type->i_mutex_key#12){+.+.}-{3:3}, at: shmem_file_write_iter+0x2f/0x90 [ 66.961321][ T3422] [ 66.961321][ T3422] which lock already depends on the new lock. [ 66.961321][ T3422] [ 66.971687][ T3422] [ 66.971687][ T3422] the existing dependency chain (in reverse order) is: [ 66.980715][ T3422] [ 66.980715][ T3422] -> #1 (&sb->s_type->i_mutex_key#12){+.+.}-{3:3}: [ 66.989348][ T3422] down_write+0x29/0xb0 [ 66.993990][ T3422] process_measurement+0x154/0x900 [ 66.999593][ T3422] ima_file_mmap+0x74/0xe0 [ 67.004512][ T3422] security_mmap_file+0x3a7/0x480 [ 67.010014][ T3422] __se_sys_remap_file_pages+0x278/0x370 [ 67.016124][ T3422] do_syscall_64+0xa0/0x180 [ 67.021111][ T3422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.027484][ T3422] [ 67.027484][ T3422] -> #0 (&mm->mmap_lock){++++}-{3:3}: [ 67.034984][ T3422] __lock_acquire+0x122b/0x2530 [ 67.040316][ T3422] lock_acquire+0xeb/0x270 [ 67.045209][ T3422] down_write_killable+0x33/0xf0 [ 67.050625][ T3422] upgrade_mmap_lock_carefully+0x45/0xa0 [ 67.056757][ T3422] lock_mm_and_find_vma+0x79/0x130 [ 67.062361][ T3422] exc_page_fault+0x1d3/0x6a0 [ 67.067605][ T3422] asm_exc_page_fault+0x26/0x30 [ 67.073027][ T3422] fault_in_readable+0x78/0xd0 [ 67.078278][ T3422] fault_in_iov_iter_readable+0x3c/0xd0 [ 67.084314][ T3422] generic_perform_write+0xaa/0x3d0 [ 67.089993][ T3422] shmem_file_write_iter+0x67/0x90 [ 67.095582][ T3422] vfs_write+0x342/0x3d0 [ 67.100304][ T3422] ksys_write+0x70/0xe0 [ 67.104940][ T3422] do_syscall_64+0xa0/0x180 [ 67.109924][ T3422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.116296][ T3422] [ 67.116296][ T3422] other info that might help us debug this: [ 67.116296][ T3422] [ 67.126484][ T3422] Possible unsafe locking scenario: [ 67.126484][ T3422] [ 67.133896][ T3422] CPU0 CPU1 [ 67.139224][ T3422] ---- ---- [ 67.144550][ T3422] lock(&sb->s_type->i_mutex_key#12); [ 67.149978][ T3422] lock(&mm->mmap_lock); [ 67.156792][ T3422] lock(&sb->s_type->i_mutex_key#12); [ 67.164842][ T3422] lock(&mm->mmap_lock); [ 67.169241][ T3422] [ 67.169241][ T3422] *** DEADLOCK *** [ 67.169241][ T3422] [ 67.177348][ T3422] 3 locks held by syz.0.15/3422: [ 67.182246][ T3422] #0: ffff888103fab6c8 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x71/0xa0 [ 67.191229][ T3422] #1: ffff888104b67410 (sb_writers#5){.+.+}-{0:0}, at: vfs_write+0x111/0x3d0 [ 67.200037][ T3422] #2: ffff88810432a650 (&sb->s_type->i_mutex_key#12){+.+.}-{3:3}, at: shmem_file_write_iter+0x2f/0x90 [ 67.211019][ T3422] [ 67.211019][ T3422] stack backtrace: [ 67.216876][ T3422] CPU: 0 UID: 0 PID: 3422 Comm: syz.0.15 Not tainted 6.11.0-rc1-syzkaller #0 [ 67.225595][ T3422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 67.235616][ T3422] Call Trace: [ 67.238864][ T3422] [ 67.241764][ T3422] dump_stack_lvl+0xa3/0x100 [ 67.246313][ T3422] check_noncircular+0x119/0x140 [ 67.251211][ T3422] __lock_acquire+0x122b/0x2530 [ 67.256107][ T3422] ? upgrade_mmap_lock_carefully+0x45/0xa0 [ 67.261874][ T3422] lock_acquire+0xeb/0x270 [ 67.266247][ T3422] ? upgrade_mmap_lock_carefully+0x45/0xa0 [ 67.272106][ T3422] ? upgrade_mmap_lock_carefully+0x45/0xa0 [ 67.277870][ T3422] down_write_killable+0x33/0xf0 [ 67.282768][ T3422] ? upgrade_mmap_lock_carefully+0x45/0xa0 [ 67.288532][ T3422] upgrade_mmap_lock_carefully+0x45/0xa0 [ 67.294122][ T3422] lock_mm_and_find_vma+0x79/0x130 [ 67.299279][ T3422] exc_page_fault+0x1d3/0x6a0 [ 67.303917][ T3422] asm_exc_page_fault+0x26/0x30 [ 67.308734][ T3422] RIP: 0010:fault_in_readable+0x78/0xd0 [ 67.314326][ T3422] Code: 00 f0 ff ff eb 0a 4c 8d 87 ff 0f 00 00 48 89 f9 49 01 f0 49 81 e0 00 f0 ff ff 49 39 f8 72 4d 4c 39 c1 74 1a 48 89 ca 48 89 d1 <8a> 02 4c 89 c1 88 04 24 48 81 c2 00 10 00 00 4c 39 c2 75 e9 f3 0f [ 67.333893][ T3422] RSP: 0018:ffffc900023b3d5f EFLAGS: 00050287 [ 67.339924][ T3422] RAX: 1000000000000023 RBX: 000000000000fecc RCX: 0000000020001000 [ 67.347859][ T3422] RDX: 0000000020001000 RSI: 000000000000fecc RDI: 0000000020000100 [ 67.355799][ T3422] RBP: 000000000000fecc R08: 0000000020010000 R09: ffff888104b67000 [ 67.363730][ T3422] R10: 0000000000000003 R11: ffffffff81117fa0 R12: 0000000000000000 [ 67.371760][ T3422] R13: ffff88810432a728 R14: 000000000000fecc R15: 0000000000000000 [ 67.379783][ T3422] ? __pfx_hlock_conflict+0x10/0x10 [ 67.384950][ T3422] fault_in_iov_iter_readable+0x3c/0xd0 [ 67.390456][ T3422] generic_perform_write+0xaa/0x3d0 [ 67.395616][ T3422] shmem_file_write_iter+0x67/0x90 [ 67.400687][ T3422] vfs_write+0x342/0x3d0 [ 67.404894][ T3422] ksys_write+0x70/0xe0 [ 67.409014][ T3422] do_syscall_64+0xa0/0x180 [ 67.413477][ T3422] ? clear_bhb_loop+0x55/0xb0 [ 67.418118][ T3422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.423971][ T3422] RIP: 0033:0x7f119fb7dff9 [ 67.428347][ T3422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.447914][ T3422] RSP: 002b:00007f11a0a42038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 67.456458][ T3422] RAX: ffffffffffffffda RBX: 00007f119fd35f80 RCX: 00007f119fb7dff9 [ 67.464391][ T3422] RDX: 000000000000fecc RSI: 0000000020000100 RDI: 0000000000000003 [ 67.472323][ T3422] RBP: 00007f119fbf0296 R08: 0000000000000000 R09: 0000000000000000 [ 67.480257][ T3422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 67.488196][ T3422] R13: 0000000000000000 R14: 00007f119fd35f80 R15: 00007fff336106e8 [ 67.496131][ T3422] 2024/10/02 04:43:14 executed programs: 91 2024/10/02 04:43:19 executed programs: 281