Warning: Permanently added '10.128.1.59' (ED25519) to the list of known hosts. 2024/02/12 21:53:06 ignoring optional flag "sandboxArg"="0" 2024/02/12 21:53:06 parsed 1 programs 2024/02/12 21:53:07 executed programs: 0 [ 46.213865][ T2566] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.002148][ T2572] veth0_vlan: entered promiscuous mode [ 47.266876][ T2800] [ 47.269220][ T2800] ====================================================== [ 47.276204][ T2800] WARNING: possible circular locking dependency detected [ 47.283277][ T2800] 6.8.0-rc3-syzkaller #0 Not tainted [ 47.288532][ T2800] ------------------------------------------------------ [ 47.295525][ T2800] syz-executor.0/2800 is trying to acquire lock: [ 47.301815][ T2800] ffff88810df25920 (&mm->mmap_lock){++++}-{3:3}, at: lock_vma+0x4a/0xf0 [ 47.310195][ T2800] [ 47.310195][ T2800] but task is already holding lock: [ 47.317611][ T2800] ffff888112e3feb0 (&vma->vm_lock->lock){++++}-{3:3}, at: lock_vma+0x7c/0xf0 [ 47.326336][ T2800] [ 47.326336][ T2800] which lock already depends on the new lock. [ 47.326336][ T2800] [ 47.336977][ T2800] [ 47.336977][ T2800] the existing dependency chain (in reverse order) is: [ 47.345970][ T2800] [ 47.345970][ T2800] -> #1 (&vma->vm_lock->lock){++++}-{3:3}: [ 47.354789][ T2800] down_write+0x29/0xb0 [ 47.359430][ T2800] vma_link+0xe4/0x190 [ 47.364135][ T2800] insert_vm_struct+0xdd/0x120 [ 47.369387][ T2800] alloc_bprm+0x2de/0x470 [ 47.374547][ T2800] kernel_execve+0x53/0x210 [ 47.379619][ T2800] kernel_init+0xcb/0x190 [ 47.384604][ T2800] ret_from_fork+0x32/0x40 [ 47.389513][ T2800] ret_from_fork_asm+0x1b/0x30 [ 47.394932][ T2800] [ 47.394932][ T2800] -> #0 (&mm->mmap_lock){++++}-{3:3}: [ 47.402524][ T2800] __lock_acquire+0x11fd/0x2490 [ 47.407857][ T2800] lock_acquire+0xea/0x270 [ 47.412930][ T2800] down_read+0x4a/0x440 [ 47.417567][ T2800] lock_vma+0x4a/0xf0 [ 47.422041][ T2800] move_pages+0x78/0x2f0 [ 47.426767][ T2800] userfaultfd_ioctl+0x38e/0x25d0 [ 47.432292][ T2800] __se_sys_ioctl+0x6e/0xc0 [ 47.437649][ T2800] do_syscall_64+0xa7/0x1c0 [ 47.442645][ T2800] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 47.449025][ T2800] [ 47.449025][ T2800] other info that might help us debug this: [ 47.449025][ T2800] [ 47.459304][ T2800] Possible unsafe locking scenario: [ 47.459304][ T2800] [ 47.466815][ T2800] CPU0 CPU1 [ 47.472145][ T2800] ---- ---- [ 47.477477][ T2800] rlock(&vma->vm_lock->lock); [ 47.482462][ T2800] lock(&mm->mmap_lock); [ 47.489267][ T2800] lock(&vma->vm_lock->lock); [ 47.496514][ T2800] rlock(&mm->mmap_lock); [ 47.500918][ T2800] [ 47.500918][ T2800] *** DEADLOCK *** [ 47.500918][ T2800] [ 47.509114][ T2800] 1 lock held by syz-executor.0/2800: [ 47.514445][ T2800] #0: ffff888112e3feb0 (&vma->vm_lock->lock){++++}-{3:3}, at: lock_vma+0x7c/0xf0 [ 47.524229][ T2800] [ 47.524229][ T2800] stack backtrace: [ 47.530178][ T2800] CPU: 1 PID: 2800 Comm: syz-executor.0 Not tainted 6.8.0-rc3-syzkaller #0 [ 47.538813][ T2800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 47.548843][ T2800] Call Trace: [ 47.552092][ T2800] [ 47.555008][ T2800] dump_stack_lvl+0x8d/0xe0 [ 47.559574][ T2800] check_noncircular+0x119/0x140 [ 47.564477][ T2800] __lock_acquire+0x11fd/0x2490 [ 47.569291][ T2800] ? __lock_acquire+0x1cd0/0x2490 [ 47.574451][ T2800] ? lock_vma+0x4a/0xf0 [ 47.578581][ T2800] lock_acquire+0xea/0x270 [ 47.583094][ T2800] ? lock_vma+0x4a/0xf0 [ 47.587232][ T2800] down_read+0x4a/0x440 [ 47.591358][ T2800] ? lock_vma+0x4a/0xf0 [ 47.595480][ T2800] ? lock_vma_under_rcu+0x17e/0x220 [ 47.600646][ T2800] lock_vma+0x4a/0xf0 [ 47.604595][ T2800] move_pages+0x78/0x2f0 [ 47.608803][ T2800] userfaultfd_ioctl+0x38e/0x25d0 [ 47.613890][ T2800] __se_sys_ioctl+0x6e/0xc0 [ 47.618395][ T2800] do_syscall_64+0xa7/0x1c0 [ 47.622982][ T2800] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 47.628948][ T2800] RIP: 0033:0x7ffa1a38ada9 [ 47.633346][ T2800] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 47.653270][ T2800] RSP: 002b:00007ffa19f0c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 47.661648][ T2800] RAX: ffffffffffffffda RBX: 00007ffa1a4b8f80 RCX: 00007ffa1a38ada9 [ 47.669581][ T2800] RDX: 0000000020000040 RSI: 00000000c028aa05 RDI: 0000000000000003 [ 47.677624][ T2800] RBP: 00007ffa1a3d747a R08: 0000000000000000 R09: 0000000000000000 [ 47.685558][ T2800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 47.693675][ T2800] R13: 000000000000000b R14: 00007ffa1a4b8f80 R15: 00007fff54dc4838 [ 47.701612][ T2800] 2024/02/12 21:53:12 executed programs: 1638 2024/02/12 21:53:17 executed programs: 4158