Warning: Permanently added '10.128.1.150' (ED25519) to the list of known hosts. 2023/10/29 19:43:20 ignoring optional flag "sandboxArg"="0" 2023/10/29 19:43:20 parsed 1 programs 2023/10/29 19:43:20 executed programs: 0 [ 45.436541][ T2270] [ 45.439915][ T2270] ====================================================== [ 45.447427][ T2270] WARNING: possible circular locking dependency detected [ 45.454507][ T2270] 6.1.60-syzkaller #0 Not tainted [ 45.460018][ T2270] ------------------------------------------------------ [ 45.467202][ T2270] syz-executor.0/2270 is trying to acquire lock: [ 45.473777][ T2270] ffff8881013a1460 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write+0xe/0x30 [ 45.482373][ T2270] [ 45.482373][ T2270] but task is already holding lock: [ 45.489970][ T2270] ffff888103b32c48 (&iint->mutex){+.+.}-{3:3}, at: process_measurement+0x337/0x860 [ 45.499430][ T2270] [ 45.499430][ T2270] which lock already depends on the new lock. [ 45.499430][ T2270] [ 45.509990][ T2270] [ 45.509990][ T2270] the existing dependency chain (in reverse order) is: [ 45.519233][ T2270] [ 45.519233][ T2270] -> #1 (&iint->mutex){+.+.}-{3:3}: [ 45.526659][ T2270] __mutex_lock+0x99/0x970 [ 45.531629][ T2270] process_measurement+0x337/0x860 [ 45.537531][ T2270] ima_file_check+0x59/0x80 [ 45.542619][ T2270] path_openat+0xb2b/0xc70 [ 45.547614][ T2270] do_filp_open+0xa8/0x150 [ 45.552701][ T2270] do_sys_openat2+0x89/0x160 [ 45.557864][ T2270] __x64_sys_openat+0x78/0xa0 [ 45.563293][ T2270] do_syscall_64+0x3d/0x80 [ 45.568488][ T2270] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 45.575138][ T2270] [ 45.575138][ T2270] -> #0 (sb_writers#4){.+.+}-{0:0}: [ 45.582486][ T2270] __lock_acquire+0x1464/0x2830 [ 45.587821][ T2270] lock_acquire+0xe3/0x270 [ 45.592809][ T2270] sb_start_write+0x34/0xd0 [ 45.597797][ T2270] mnt_want_write+0xe/0x30 [ 45.603137][ T2270] ovl_maybe_copy_up+0x74/0xa0 [ 45.609014][ T2270] ovl_open+0x41/0xb0 [ 45.613834][ T2270] do_dentry_open+0x24c/0x3c0 [ 45.618997][ T2270] dentry_open+0x54/0x90 [ 45.623733][ T2270] ima_calc_file_hash+0x5e/0xad0 [ 45.629154][ T2270] ima_collect_measurement+0x168/0x290 [ 45.635213][ T2270] process_measurement+0x513/0x860 [ 45.641253][ T2270] ima_file_check+0x59/0x80 [ 45.646518][ T2270] path_openat+0xb2b/0xc70 [ 45.651696][ T2270] do_filp_open+0xa8/0x150 [ 45.656615][ T2270] do_sys_openat2+0x89/0x160 [ 45.661711][ T2270] __x64_sys_openat+0x78/0xa0 [ 45.666882][ T2270] do_syscall_64+0x3d/0x80 [ 45.671798][ T2270] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 45.678282][ T2270] [ 45.678282][ T2270] other info that might help us debug this: [ 45.678282][ T2270] [ 45.688693][ T2270] Possible unsafe locking scenario: [ 45.688693][ T2270] [ 45.696469][ T2270] CPU0 CPU1 [ 45.701804][ T2270] ---- ---- [ 45.707251][ T2270] lock(&iint->mutex); [ 45.711372][ T2270] lock(sb_writers#4); [ 45.718125][ T2270] lock(&iint->mutex); [ 45.724784][ T2270] lock(sb_writers#4); [ 45.729005][ T2270] [ 45.729005][ T2270] *** DEADLOCK *** [ 45.729005][ T2270] [ 45.737467][ T2270] 1 lock held by syz-executor.0/2270: [ 45.743110][ T2270] #0: ffff888103b32c48 (&iint->mutex){+.+.}-{3:3}, at: process_measurement+0x337/0x860 [ 45.753604][ T2270] [ 45.753604][ T2270] stack backtrace: [ 45.759476][ T2270] CPU: 0 PID: 2270 Comm: syz-executor.0 Not tainted 6.1.60-syzkaller #0 [ 45.768564][ T2270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 45.779122][ T2270] Call Trace: [ 45.782377][ T2270] [ 45.785279][ T2270] dump_stack_lvl+0x89/0xd7 [ 45.789855][ T2270] print_circular_bug+0x2c5/0x300 [ 45.794892][ T2270] check_noncircular+0x106/0x110 [ 45.799883][ T2270] __lock_acquire+0x1464/0x2830 [ 45.804702][ T2270] ? tomoyo_check_open_permission+0xe1/0x2f0 [ 45.810915][ T2270] ? tomoyo_check_open_permission+0xe1/0x2f0 [ 45.817043][ T2270] ? tomoyo_check_open_permission+0x2b6/0x2f0 [ 45.823441][ T2270] ? mnt_want_write+0xe/0x30 [ 45.828146][ T2270] lock_acquire+0xe3/0x270 [ 45.832877][ T2270] ? mnt_want_write+0xe/0x30 [ 45.842050][ T2270] ? ovl_mmap+0x100/0x100 [ 45.847810][ T2270] sb_start_write+0x34/0xd0 [ 45.852515][ T2270] ? mnt_want_write+0xe/0x30 [ 45.857327][ T2270] mnt_want_write+0xe/0x30 [ 45.862675][ T2270] ovl_maybe_copy_up+0x74/0xa0 [ 45.867788][ T2270] ovl_open+0x41/0xb0 [ 45.872012][ T2270] do_dentry_open+0x24c/0x3c0 [ 45.880911][ T2270] dentry_open+0x54/0x90 [ 45.885206][ T2270] ima_calc_file_hash+0x5e/0xad0 [ 45.890238][ T2270] ? ext4_xattr_get+0x64/0x2e0 [ 45.895572][ T2270] ? ext4_xattr_get+0x64/0x2e0 [ 45.900567][ T2270] ? __lock_acquire+0x541/0x2830 [ 45.905643][ T2270] ? ext4_xattr_get+0xfc/0x2e0 [ 45.910636][ T2270] ? preempt_count_add+0x51/0x80 [ 45.915545][ T2270] ? __up_read+0xa3/0xe0 [ 45.920063][ T2270] ? ext4_xattr_get+0xfc/0x2e0 [ 45.924880][ T2270] ? security_inode_getsecurity+0x47/0x60 [ 45.930910][ T2270] ? ext4_initxattrs+0x60/0x60 [ 45.935827][ T2270] ? vfs_getxattr+0x24a/0x270 [ 45.940557][ T2270] ima_collect_measurement+0x168/0x290 [ 45.946092][ T2270] process_measurement+0x513/0x860 [ 45.951266][ T2270] ? ovl_open+0x66/0xb0 [ 45.955476][ T2270] ima_file_check+0x59/0x80 [ 45.960206][ T2270] path_openat+0xb2b/0xc70 [ 45.964617][ T2270] do_filp_open+0xa8/0x150 [ 45.969041][ T2270] do_sys_openat2+0x89/0x160 [ 45.973594][ T2270] __x64_sys_openat+0x78/0xa0 [ 45.978420][ T2270] do_syscall_64+0x3d/0x80 [ 45.982879][ T2270] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 45.988827][ T2270] RIP: 0033:0x7f1159c7c959 [ 45.993292][ T2270] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 46.013124][ T2270] RSP: 002b:00007f115a98a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 46.021603][ T2270] RAX: ffffffffffffffda RBX: 00007f1159d9bf80 RCX: 00007f1159c7c959 [ 46.029547][ T2270] RDX: 0000000000000003 RSI: 0000000020000340 RDI: 0000000000000006 [ 46.037571][ T2270] RBP: 00007f1159cd8c88 R08: 0000000000000000 R09: 0000000000000000 [ 46.045517][ T2270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 46.053991][ T2270] R13: 0000000000000006 R14: 00007f1159d9bf80 R15: 00007ffc2fdfc718 [ 46.062027][ T2270] 2023/10/29 19:43:25 executed programs: 172 2023/10/29 19:43:30 executed programs: 616