./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor800118803 <...> Warning: Permanently added '10.128.0.162' (ED25519) to the list of known hosts. execve("./syz-executor800118803", ["./syz-executor800118803"], 0x7ffd36aa8760 /* 10 vars */) = 0 brk(NULL) = 0x55555669f000 brk(0x55555669fd00) = 0x55555669fd00 arch_prctl(ARCH_SET_FS, 0x55555669f380) = 0 set_tid_address(0x55555669f650) = 5064 set_robust_list(0x55555669f660, 24) = 0 rseq(0x55555669fca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor800118803", 4096) = 27 getrandom("\xa4\x46\x3d\xa4\xfa\x02\x13\x6f", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55555669fd00 brk(0x5555566c0d00) = 0x5555566c0d00 brk(0x5555566c1000) = 0x5555566c1000 mprotect(0x7f86fc3d2000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 userfaultfd(UFFD_USER_MODE_ONLY|O_CLOEXEC) = 3 mprotect(0x204d9000, 8192, PROT_NONE) = 0 ioctl(3, UFFDIO_API, {api=0xaa, features=0 => features=UFFD_FEATURE_PAGEFAULT_FLAG_WP|UFFD_FEATURE_EVENT_FORK|UFFD_FEATURE_EVENT_REMAP|UFFD_FEATURE_EVENT_REMOVE|UFFD_FEATURE_MISSING_HUGETLBFS|UFFD_FEATURE_MISSING_SHMEM|UFFD_FEATURE_EVENT_UNMAP|UFFD_FEATURE_SIGBUS|UFFD_FEATURE_THREAD_ID|UFFD_FEATURE_MINOR_HUGETLBFS|UFFD_FEATURE_MINOR_SHMEM|UFFD_FEATURE_EXACT_ADDRESS|0x14000, ioctls=1<<_UFFDIO_REGISTER|1<<_UFFDIO_UNREGISTER|1<<_UFFDIO_API}) = 0 [ 55.714638][ T5064] [ 55.717021][ T5064] ====================================================== [ 55.724017][ T5064] WARNING: possible circular locking dependency detected [ 55.731010][ T5064] 6.8.0-rc4-next-20240212-syzkaller #0 Not tainted [ 55.737480][ T5064] ------------------------------------------------------ [ 55.744471][ T5064] syz-executor800/5064 is trying to acquire lock: [ 55.750858][ T5064] ffff888021d401a0 (&mm->mmap_lock){++++}-{3:3}, at: lock_vma+0xc5/0x260 [ 55.759377][ T5064] [ 55.759377][ T5064] but task is already holding lock: [ 55.766718][ T5064] ffff88802b989730 (&vma->vm_lock->lock){++++}-{3:3}, at: lock_vma+0x1a1/0x260 [ 55.775650][ T5064] [ 55.775650][ T5064] which lock already depends on the new lock. [ 55.775650][ T5064] [ 55.786126][ T5064] [ 55.786126][ T5064] the existing dependency chain (in reverse order) is: [ 55.795126][ T5064] [ 55.795126][ T5064] -> #1 (&vma->vm_lock->lock){++++}-{3:3}: [ 55.803202][ T5064] lock_acquire+0x1e4/0x530 [ 55.808209][ T5064] down_write+0x3a/0x50 [ 55.812875][ T5064] vma_link+0x2c6/0x550 [ 55.817534][ T5064] insert_vm_struct+0x1a3/0x260 [ 55.822886][ T5064] alloc_bprm+0x543/0xa00 [ 55.827806][ T5064] kernel_execve+0x99/0xa10 [ 55.832813][ T5064] kernel_init+0xe8/0x2b0 [ 55.837643][ T5064] ret_from_fork+0x4b/0x80 [ 55.842559][ T5064] ret_from_fork_asm+0x1a/0x30 [ 55.847829][ T5064] [ 55.847829][ T5064] -> #0 (&mm->mmap_lock){++++}-{3:3}: [ 55.855360][ T5064] validate_chain+0x18cb/0x58e0 [ 55.860714][ T5064] __lock_acquire+0x1346/0x1fd0 [ 55.866085][ T5064] lock_acquire+0x1e4/0x530 [ 55.871106][ T5064] down_read+0xb1/0xa40 [ 55.875764][ T5064] lock_vma+0xc5/0x260 [ 55.880333][ T5064] move_pages+0x18c/0xff0 [ 55.885171][ T5064] userfaultfd_ioctl+0x5c10/0x72c0 [ 55.890882][ T5064] __se_sys_ioctl+0xfc/0x170 [ 55.896068][ T5064] do_syscall_64+0xfb/0x240 [ 55.901105][ T5064] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 55.907510][ T5064] [ 55.907510][ T5064] other info that might help us debug this: [ 55.907510][ T5064] [ 55.917714][ T5064] Possible unsafe locking scenario: [ 55.917714][ T5064] [ 55.925143][ T5064] CPU0 CPU1 [ 55.930575][ T5064] ---- ---- [ 55.935920][ T5064] rlock(&vma->vm_lock->lock); [ 55.940757][ T5064] lock(&mm->mmap_lock); [ 55.947587][ T5064] lock(&vma->vm_lock->lock); [ 55.954944][ T5064] rlock(&mm->mmap_lock); [ 55.959351][ T5064] [ 55.959351][ T5064] *** DEADLOCK *** [ 55.959351][ T5064] [ 55.967746][ T5064] 1 lock held by syz-executor800/5064: [ 55.973193][ T5064] #0: ffff88802b989730 (&vma->vm_lock->lock){++++}-{3:3}, at: lock_vma+0x1a1/0x260 [ 55.982652][ T5064] [ 55.982652][ T5064] stack backtrace: [ 55.988517][ T5064] CPU: 1 PID: 5064 Comm: syz-executor800 Not tainted 6.8.0-rc4-next-20240212-syzkaller #0 [ 55.998379][ T5064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 56.008412][ T5064] Call Trace: [ 56.011673][ T5064] [ 56.014771][ T5064] dump_stack_lvl+0x241/0x360 [ 56.019433][ T5064] ? __pfx_dump_stack_lvl+0x10/0x10 [ 56.024610][ T5064] ? print_circular_bug+0x130/0x1a0 [ 56.029888][ T5064] check_noncircular+0x36a/0x4a0 [ 56.034804][ T5064] ? __pfx_check_noncircular+0x10/0x10 [ 56.040238][ T5064] ? lockdep_lock+0x123/0x2b0 [ 56.044904][ T5064] ? lockdep_unlock+0x16a/0x300 [ 56.049735][ T5064] ? __pfx_lockdep_unlock+0x10/0x10 [ 56.054914][ T5064] ? _find_first_zero_bit+0xd4/0x100 [ 56.060174][ T5064] validate_chain+0x18cb/0x58e0 [ 56.065039][ T5064] ? __pfx_validate_chain+0x10/0x10 [ 56.070219][ T5064] ? __pfx_validate_chain+0x10/0x10 [ 56.075401][ T5064] ? __pfx_validate_chain+0x10/0x10 [ 56.080574][ T5064] ? __pfx_validate_chain+0x10/0x10 [ 56.085749][ T5064] ? __pfx_validate_chain+0x10/0x10 [ 56.090929][ T5064] ? mark_lock+0x9a/0x350 [ 56.095259][ T5064] ? __lock_acquire+0x1346/0x1fd0 [ 56.100349][ T5064] ? mark_lock+0x9a/0x350 [ 56.104742][ T5064] ? reacquire_held_locks+0x3eb/0x690 [ 56.110108][ T5064] __lock_acquire+0x1346/0x1fd0 [ 56.115027][ T5064] lock_acquire+0x1e4/0x530 [ 56.119504][ T5064] ? lock_vma+0xc5/0x260 [ 56.123905][ T5064] ? __pfx_lock_acquire+0x10/0x10 [ 56.128908][ T5064] ? __pfx___might_resched+0x10/0x10 [ 56.134173][ T5064] ? lock_vma_under_rcu+0x18a/0x730 [ 56.139344][ T5064] ? __up_read+0x2c2/0x6b0 [ 56.143748][ T5064] ? __pfx_lock_release+0x10/0x10 [ 56.148760][ T5064] down_read+0xb1/0xa40 [ 56.152904][ T5064] ? lock_vma+0xc5/0x260 [ 56.157208][ T5064] ? lock_vma_under_rcu+0x5e2/0x730 [ 56.162383][ T5064] ? __pfx_down_read+0x10/0x10 [ 56.167392][ T5064] ? __pfx_lock_vma_under_rcu+0x10/0x10 [ 56.172920][ T5064] ? __up_read+0x2c2/0x6b0 [ 56.177318][ T5064] lock_vma+0xc5/0x260 [ 56.181362][ T5064] move_pages+0x18c/0xff0 [ 56.185667][ T5064] ? __pfx___might_resched+0x10/0x10 [ 56.190947][ T5064] ? __pfx_lock_release+0x10/0x10 [ 56.195949][ T5064] ? is_bpf_text_address+0x28d/0x2b0 [ 56.201213][ T5064] ? __pfx_move_pages+0x10/0x10 [ 56.206060][ T5064] ? __might_fault+0xc6/0x120 [ 56.210713][ T5064] userfaultfd_ioctl+0x5c10/0x72c0 [ 56.215810][ T5064] ? stack_trace_save+0x118/0x1d0 [ 56.220813][ T5064] ? __pfx_userfaultfd_ioctl+0x10/0x10 [ 56.226251][ T5064] ? tomoyo_path_number_perm+0x68d/0x880 [ 56.231858][ T5064] ? stack_depot_save_flags+0x29/0x860 [ 56.237290][ T5064] ? tomoyo_path_number_perm+0x68d/0x880 [ 56.242910][ T5064] ? kasan_save_track+0x51/0x80 [ 56.247740][ T5064] ? kasan_save_track+0x3f/0x80 [ 56.252668][ T5064] ? kasan_save_free_info+0x40/0x50 [ 56.257839][ T5064] ? poison_slab_object+0xa6/0xe0 [ 56.262838][ T5064] ? __kasan_slab_free+0x37/0x60 [ 56.267760][ T5064] ? kfree+0x14a/0x380 [ 56.271804][ T5064] ? tomoyo_path_number_perm+0x68d/0x880 [ 56.277420][ T5064] ? security_file_ioctl+0x75/0xb0 [ 56.282508][ T5064] ? __se_sys_ioctl+0x47/0x170 [ 56.287251][ T5064] ? do_syscall_64+0xfb/0x240 [ 56.291907][ T5064] ? entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 56.297960][ T5064] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 56.304290][ T5064] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 56.309312][ T5064] ? __pfx_lock_release+0x10/0x10 [ 56.314328][ T5064] ? kfree+0x14a/0x380 [ 56.318390][ T5064] ? tomoyo_path_number_perm+0x71a/0x880 [ 56.324007][ T5064] ? tomoyo_path_number_perm+0x208/0x880 [ 56.329629][ T5064] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 56.335595][ T5064] ? __pfx_ptrace_notify+0x10/0x10 [ 56.340697][ T5064] ? bpf_lsm_file_ioctl+0x9/0x10 [ 56.345616][ T5064] ? security_file_ioctl+0x87/0xb0 [ 56.350717][ T5064] ? __pfx_userfaultfd_ioctl+0x10/0x10 [ 56.356158][ T5064] __se_sys_ioctl+0xfc/0x170 [ 56.360728][ T5064] do_syscall_64+0xfb/0x240 [ 56.365216][ T5064] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 56.371093][ T5064] RIP: 0033:0x7f86fc35f329 [ 56.375486][ T5064] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 56.395072][ T5064] RSP: 002b:00007ffd53428e38 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 56.403465][ T5064] RAX: ffffffffffffffda RBX: 00007ffd53429008 RCX: 00007f86fc35f329 ioctl(3, _IOC(_IOC_READ|_IOC_WRITE, 0xaa, 0x5, 0x28), 0x20000040) = -1 EINVAL (Invalid argument) exit_group(0) = ? +++ exited with 0 +++ [ 56.411446][ T5064] RDX: 0000000020000040 RSI: 00000000c028aa05 RDI: