Warning: Permanently added '10.128.0.178' (ED25519) to the list of known hosts. 2024/01/26 06:53:20 ignoring optional flag "sandboxArg"="0" 2024/01/26 06:53:20 parsed 1 programs 2024/01/26 06:53:20 executed programs: 0 [ 44.165556][ T2253] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 45.932686][ T2670] [ 45.935029][ T2670] ====================================================== [ 45.942115][ T2670] WARNING: possible circular locking dependency detected [ 45.949213][ T2670] 6.8.0-rc1-syzkaller #0 Not tainted [ 45.954462][ T2670] ------------------------------------------------------ [ 45.961474][ T2670] syz-executor.0/2670 is trying to acquire lock: [ 45.967781][ T2670] ffffffff833a7900 (fs_reclaim){+.+.}-{0:0}, at: kmalloc_trace+0x57/0x350 [ 45.976352][ T2670] [ 45.976352][ T2670] but task is already holding lock: [ 45.983690][ T2670] ffff888101eba8d8 (ptlock_ptr(ptdesc)){+.+.}-{2:2}, at: __unmap_hugepage_range+0x14b/0x810 [ 45.993750][ T2670] [ 45.993750][ T2670] which lock already depends on the new lock. [ 45.993750][ T2670] [ 46.004212][ T2670] [ 46.004212][ T2670] the existing dependency chain (in reverse order) is: [ 46.013194][ T2670] [ 46.013194][ T2670] -> #2 (ptlock_ptr(ptdesc)){+.+.}-{2:2}: [ 46.021103][ T2670] _raw_spin_lock+0x2e/0x40 [ 46.026091][ T2670] __split_huge_pmd+0xf5/0x1140 [ 46.031438][ T2670] vma_adjust_trans_huge+0xdd/0x1a0 [ 46.037118][ T2670] __split_vma+0x312/0x3f0 [ 46.042023][ T2670] vma_modify+0x8b/0xd0 [ 46.046668][ T2670] mprotect_fixup+0xad/0x3d0 [ 46.051839][ T2670] do_mprotect_pkey+0x30a/0x560 [ 46.057264][ T2670] __x64_sys_mprotect+0x1a/0x20 [ 46.062601][ T2670] do_syscall_64+0x84/0x180 [ 46.067621][ T2670] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 46.074004][ T2670] [ 46.074004][ T2670] -> #1 (&mapping->i_mmap_rwsem){++++}-{3:3}: [ 46.082297][ T2670] down_write+0x29/0xb0 [ 46.086939][ T2670] dma_resv_lockdep+0x1b2/0x2e0 [ 46.092273][ T2670] do_one_initcall+0x6b/0x300 [ 46.097446][ T2670] kernel_init_freeable+0x250/0x3f0 [ 46.103129][ T2670] kernel_init+0x15/0x190 [ 46.107953][ T2670] ret_from_fork+0x2c/0x40 [ 46.112854][ T2670] ret_from_fork_asm+0x11/0x20 [ 46.118100][ T2670] [ 46.118100][ T2670] -> #0 (fs_reclaim){+.+.}-{0:0}: [ 46.125444][ T2670] __lock_acquire+0x1293/0x1a70 [ 46.130780][ T2670] lock_acquire+0xcd/0x2d0 [ 46.135692][ T2670] fs_reclaim_acquire+0x9d/0xd0 [ 46.141025][ T2670] kmalloc_trace+0x57/0x350 [ 46.146007][ T2670] allocate_file_region_entries+0x9a/0x1c0 [ 46.152394][ T2670] region_chg+0x57/0x80 [ 46.157032][ T2670] __vma_reservation_common+0x12b/0x250 [ 46.163232][ T2670] __unmap_hugepage_range+0x4f2/0x810 [ 46.169345][ T2670] unmap_vmas+0xe7/0x1c0 [ 46.174082][ T2670] exit_mmap+0x100/0x470 [ 46.178805][ T2670] __mmput+0x3a/0x110 [ 46.183270][ T2670] do_exit+0x2fa/0xb90 [ 46.187945][ T2670] do_group_exit+0x32/0xa0 [ 46.192935][ T2670] __x64_sys_exit_group+0x13/0x20 [ 46.198444][ T2670] do_syscall_64+0x84/0x180 [ 46.203430][ T2670] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 46.209841][ T2670] [ 46.209841][ T2670] other info that might help us debug this: [ 46.209841][ T2670] [ 46.220040][ T2670] Chain exists of: [ 46.220040][ T2670] fs_reclaim --> &mapping->i_mmap_rwsem --> ptlock_ptr(ptdesc) [ 46.220040][ T2670] [ 46.233450][ T2670] Possible unsafe locking scenario: [ 46.233450][ T2670] [ 46.240883][ T2670] CPU0 CPU1 [ 46.246217][ T2670] ---- ---- [ 46.251550][ T2670] lock(ptlock_ptr(ptdesc)); [ 46.256192][ T2670] lock(&mapping->i_mmap_rwsem); [ 46.263709][ T2670] lock(ptlock_ptr(ptdesc)); [ 46.270952][ T2670] lock(fs_reclaim); [ 46.274911][ T2670] [ 46.274911][ T2670] *** DEADLOCK *** [ 46.274911][ T2670] [ 46.283023][ T2670] 4 locks held by syz-executor.0/2670: [ 46.288440][ T2670] #0: ffff888107b73620 (&mm->mmap_lock){++++}-{3:3}, at: exit_mmap+0x83/0x470 [ 46.297347][ T2670] #1: ffff8881073898e8 (&resv_map->rw_sema){++++}-{3:3}, at: __hugetlb_zap_begin+0x7b/0xa0 [ 46.307386][ T2670] #2: ffff888101ac4ce8 (&hugetlbfs_i_mmap_rwsem_key){+.+.}-{3:3}, at: unmap_vmas+0x132/0x1c0 [ 46.317885][ T2670] #3: ffff888101eba8d8 (ptlock_ptr(ptdesc)){+.+.}-{2:2}, at: __unmap_hugepage_range+0x14b/0x810 [ 46.328353][ T2670] [ 46.328353][ T2670] stack backtrace: [ 46.334202][ T2670] CPU: 0 PID: 2670 Comm: syz-executor.0 Not tainted 6.8.0-rc1-syzkaller #0 [ 46.342747][ T2670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 46.352767][ T2670] Call Trace: [ 46.356015][ T2670] [ 46.358916][ T2670] dump_stack_lvl+0x5c/0xb0 [ 46.363384][ T2670] check_noncircular+0x118/0x130 [ 46.368381][ T2670] __lock_acquire+0x1293/0x1a70 [ 46.373246][ T2670] ? stack_trace_save+0x50/0x70 [ 46.378066][ T2670] lock_acquire+0xcd/0x2d0 [ 46.382536][ T2670] ? kmalloc_trace+0x57/0x350 [ 46.387193][ T2670] ? lockdep_unlock+0x65/0x90 [ 46.391933][ T2670] ? __lock_acquire+0xfa6/0x1a70 [ 46.397093][ T2670] ? allocate_file_region_entries+0x9a/0x1c0 [ 46.403044][ T2670] fs_reclaim_acquire+0x9d/0xd0 [ 46.407879][ T2670] ? kmalloc_trace+0x57/0x350 [ 46.412635][ T2670] kmalloc_trace+0x57/0x350 [ 46.417197][ T2670] ? allocate_file_region_entries+0x9a/0x1c0 [ 46.423316][ T2670] allocate_file_region_entries+0x9a/0x1c0 [ 46.429189][ T2670] region_chg+0x57/0x80 [ 46.433403][ T2670] __vma_reservation_common+0x12b/0x250 [ 46.438917][ T2670] __unmap_hugepage_range+0x4f2/0x810 [ 46.444269][ T2670] unmap_vmas+0xe7/0x1c0 [ 46.448476][ T2670] exit_mmap+0x100/0x470 [ 46.452788][ T2670] __mmput+0x3a/0x110 [ 46.456734][ T2670] do_exit+0x2fa/0xb90 [ 46.460770][ T2670] do_group_exit+0x32/0xa0 [ 46.465218][ T2670] __x64_sys_exit_group+0x13/0x20 [ 46.470297][ T2670] do_syscall_64+0x84/0x180 [ 46.474859][ T2670] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 46.480816][ T2670] RIP: 0033:0x7f3c0687cda9 [ 46.485194][ T2670] Code: Unable to access opcode bytes at 0x7f3c0687cd7f. [ 46.492206][ T2670] RSP: 002b:00007ffcec5f6f98 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 46.501097][ T2670] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f3c0687cda9 [ 46.509296][ T2670] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 46.517233][ T2670] RBP: 0000000000000001 R08: 00007f3c069abf8c R09: 0000000000000000 [ 46.525183][ T2670] R10: 0000001b30e60000 R11: 0000000000000246 R12: 0000000000000000 [ 46.533741][ T2670] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 46.541867][ T2670] 2024/01/26 06:53:25 executed programs: 534 2024/01/26 06:53:30 executed programs: 1952