Warning: Permanently added '10.128.1.191' (ED25519) to the list of known hosts. 2023/10/21 00:37:49 ignoring optional flag "sandboxArg"="0" 2023/10/21 00:37:50 parsed 1 programs 2023/10/21 00:37:50 executed programs: 0 [ 43.823560][ T2282] [ 43.825910][ T2282] ====================================================== [ 43.832912][ T2282] WARNING: possible circular locking dependency detected [ 43.839902][ T2282] 5.15.136-syzkaller #0 Not tainted [ 43.845084][ T2282] ------------------------------------------------------ [ 43.852068][ T2282] syz-executor.0/2282 is trying to acquire lock: [ 43.858361][ T2282] ffff888142da7460 (sb_writers#4){.+.+}-{0:0}, at: ovl_maybe_copy_up+0x77/0xa0 [ 43.867275][ T2282] [ 43.867275][ T2282] but task is already holding lock: [ 43.874607][ T2282] ffff88810a20e7c0 (&iint->mutex){+.+.}-{3:3}, at: process_measurement+0x289/0x910 [ 43.883861][ T2282] [ 43.883861][ T2282] which lock already depends on the new lock. [ 43.883861][ T2282] [ 43.894236][ T2282] [ 43.894236][ T2282] the existing dependency chain (in reverse order) is: [ 43.903219][ T2282] [ 43.903219][ T2282] -> #1 (&iint->mutex){+.+.}-{3:3}: [ 43.910557][ T2282] __mutex_lock+0x6f/0x6c0 [ 43.915481][ T2282] process_measurement+0x289/0x910 [ 43.921097][ T2282] ima_file_check+0x5f/0x80 [ 43.926090][ T2282] path_openat+0x613/0xb10 [ 43.930996][ T2282] do_filp_open+0xa4/0x150 [ 43.935904][ T2282] do_sys_openat2+0x92/0x160 [ 43.940990][ T2282] __x64_sys_openat+0x4f/0x90 [ 43.946166][ T2282] do_syscall_64+0x35/0x80 [ 43.951079][ T2282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.957550][ T2282] [ 43.957550][ T2282] -> #0 (sb_writers#4){.+.+}-{0:0}: [ 43.964890][ T2282] __lock_acquire+0x1103/0x1a90 [ 43.970229][ T2282] lock_acquire+0xc9/0x2c0 [ 43.975143][ T2282] mnt_want_write+0x32/0x1b0 [ 43.980333][ T2282] ovl_maybe_copy_up+0x77/0xa0 [ 43.985944][ T2282] ovl_open+0x25/0x80 [ 43.990953][ T2282] do_dentry_open+0x16c/0x420 [ 43.996126][ T2282] dentry_open+0x5d/0xa0 [ 44.000856][ T2282] ima_calc_file_hash+0xf9/0x160 [ 44.006286][ T2282] ima_collect_measurement+0x205/0x230 [ 44.012236][ T2282] process_measurement+0x3d7/0x910 [ 44.017834][ T2282] ima_file_check+0x5f/0x80 [ 44.022823][ T2282] path_openat+0x613/0xb10 [ 44.027734][ T2282] do_filp_open+0xa4/0x150 [ 44.032636][ T2282] do_sys_openat2+0x92/0x160 [ 44.037721][ T2282] __x64_sys_openat+0x4f/0x90 [ 44.042884][ T2282] do_syscall_64+0x35/0x80 [ 44.047788][ T2282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.054171][ T2282] [ 44.054171][ T2282] other info that might help us debug this: [ 44.054171][ T2282] [ 44.064370][ T2282] Possible unsafe locking scenario: [ 44.064370][ T2282] [ 44.071788][ T2282] CPU0 CPU1 [ 44.077122][ T2282] ---- ---- [ 44.082458][ T2282] lock(&iint->mutex); [ 44.086582][ T2282] lock(sb_writers#4); [ 44.093222][ T2282] lock(&iint->mutex); [ 44.099861][ T2282] lock(sb_writers#4); [ 44.103988][ T2282] [ 44.103988][ T2282] *** DEADLOCK *** [ 44.103988][ T2282] [ 44.112116][ T2282] 1 lock held by syz-executor.0/2282: [ 44.117454][ T2282] #0: ffff88810a20e7c0 (&iint->mutex){+.+.}-{3:3}, at: process_measurement+0x289/0x910 [ 44.127138][ T2282] [ 44.127138][ T2282] stack backtrace: [ 44.133013][ T2282] CPU: 1 PID: 2282 Comm: syz-executor.0 Not tainted 5.15.136-syzkaller #0 [ 44.141482][ T2282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 44.151514][ T2282] Call Trace: [ 44.154769][ T2282] [ 44.157674][ T2282] dump_stack_lvl+0x57/0x7d [ 44.162147][ T2282] check_noncircular+0xcc/0xe0 [ 44.166877][ T2282] __lock_acquire+0x1103/0x1a90 [ 44.171697][ T2282] lock_acquire+0xc9/0x2c0 [ 44.176081][ T2282] ? ovl_maybe_copy_up+0x77/0xa0 [ 44.183504][ T2282] ? ovl_file_accessed.part.0+0x90/0x90 [ 44.189017][ T2282] mnt_want_write+0x32/0x1b0 [ 44.193594][ T2282] ? ovl_maybe_copy_up+0x77/0xa0 [ 44.198501][ T2282] ovl_maybe_copy_up+0x77/0xa0 [ 44.203235][ T2282] ovl_open+0x25/0x80 [ 44.207188][ T2282] do_dentry_open+0x16c/0x420 [ 44.211848][ T2282] dentry_open+0x5d/0xa0 [ 44.216147][ T2282] ima_calc_file_hash+0xf9/0x160 [ 44.221053][ T2282] ima_collect_measurement+0x205/0x230 [ 44.226487][ T2282] ? ovl_xattr_get+0x58/0x80 [ 44.231045][ T2282] process_measurement+0x3d7/0x910 [ 44.236123][ T2282] ? lock_acquire+0xc9/0x2c0 [ 44.240681][ T2282] ? find_held_lock+0x2b/0x80 [ 44.245326][ T2282] ima_file_check+0x5f/0x80 [ 44.249973][ T2282] path_openat+0x613/0xb10 [ 44.254361][ T2282] do_filp_open+0xa4/0x150 [ 44.258766][ T2282] ? do_raw_spin_unlock+0x50/0xa0 [ 44.263773][ T2282] ? _raw_spin_unlock+0x24/0x40 [ 44.268594][ T2282] ? alloc_fd+0x134/0x200 [ 44.272893][ T2282] do_sys_openat2+0x92/0x160 [ 44.277451][ T2282] __x64_sys_openat+0x4f/0x90 [ 44.282095][ T2282] do_syscall_64+0x35/0x80 [ 44.286479][ T2282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.292339][ T2282] RIP: 0033:0x7efef85638d9 [ 44.296724][ T2282] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 44.316382][ T2282] RSP: 002b:00007efef80e60c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 44.324868][ T2282] RAX: ffffffffffffffda RBX: 00007efef8682f80 RCX: 00007efef85638d9 [ 44.332810][ T2282] RDX: 0000000000000003 RSI: 0000000020000340 RDI: 0000000000000006 [ 44.341290][ T2282] RBP: 00007efef85bfb20 R08: 0000000000000000 R09: 0000000000000000 [ 44.349230][ T2282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 44.357176][ T2282] R13: 0000000000000006 R14: 00007efef8682f80 R15: 00007ffdc3cf9548 [ 44.365130][ T2282] 2023/10/21 00:37:55 executed programs: 264 2023/10/21 00:38:00 executed programs: 756