syzbot |
sign-in | mailing list | source | docs |
======================================================
[ INFO: possible circular locking dependency detected ]
4.9.119-g92e8704 #22 Not tainted
-------------------------------------------------------
syz-executor5/15249 is trying to acquire lock:
(sb_writers#19){.+.+.+}, at: [<ffffffff815e0e3f>] sb_start_write include/linux/fs.h:1573 [inline]
(sb_writers#19){.+.+.+}, at: [<ffffffff815e0e3f>] mnt_want_write+0x3f/0xb0 fs/namespace.c:391
but task is already holding lock:
(&fi->mutex){+.+.+.}, at: [<ffffffff81938832>] fuse_lock_inode+0xa2/0xd0 fs/fuse/inode.c:362
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
__lock_release kernel/locking/lockdep.c:3571 [inline]
lock_release+0x442/0xb80 kernel/locking/lockdep.c:3775
up_write+0x1a/0x60 kernel/locking/rwsem.c:113
inode_unlock include/linux/fs.h:771 [inline]
do_last fs/namei.c:3317 [inline]
path_openat+0xf23/0x3590 fs/namei.c:3534
do_filp_open+0x197/0x270 fs/namei.c:3568
do_sys_open+0x30d/0x5c0 fs/open.c:1072
SYSC_open fs/open.c:1090 [inline]
SyS_open fs/open.c:1085 [inline]
SYSC_creat fs/open.c:1110 [inline]
SyS_creat+0x27/0x30 fs/open.c:1108
do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282
entry_SYSCALL_64_after_swapgs+0x5d/0xdb
check_prev_add kernel/locking/lockdep.c:1828 [inline]
check_prevs_add kernel/locking/lockdep.c:1938 [inline]
validate_chain kernel/locking/lockdep.c:2265 [inline]
__lock_acquire+0x3019/0x4070 kernel/locking/lockdep.c:3345
lock_acquire+0x130/0x3e0 kernel/locking/lockdep.c:3756
percpu_down_read_preempt_disable include/linux/percpu-rwsem.h:35 [inline]
percpu_down_read include/linux/percpu-rwsem.h:58 [inline]
__sb_start_write+0x1c0/0x300 fs/super.c:1281
sb_start_write include/linux/fs.h:1573 [inline]
mnt_want_write+0x3f/0xb0 fs/namespace.c:391
do_last fs/namei.c:3400 [inline]
path_openat+0x11f4/0x3590 fs/namei.c:3534
do_filp_open+0x197/0x270 fs/namei.c:3568
do_sys_open+0x30d/0x5c0 fs/open.c:1072
SYSC_open fs/open.c:1090 [inline]
SyS_open fs/open.c:1085 [inline]
SYSC_creat fs/open.c:1110 [inline]
SyS_creat+0x27/0x30 fs/open.c:1108
do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282
entry_SYSCALL_64_after_swapgs+0x5d/0xdb
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(&fi->mutex);
lock(sb_writers#19);
lock(&fi->mutex);
lock(sb_writers#19);
*** DEADLOCK ***
1 lock held by syz-executor5/15249:
#0: (&fi->mutex){+.+.+.}, at: [<ffffffff81938832>] fuse_lock_inode+0xa2/0xd0 fs/fuse/inode.c:362
stack backtrace:
CPU: 0 PID: 15249 Comm: syz-executor5 Not tainted 4.9.119-g92e8704 #22
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ffff8801ca2ff7a8 ffffffff81eb4be9 ffffffff8561dec0 ffffffff8561e220
ffffffff8561dec0 ffff8801d952a0e8 ffff8801d9529800 ffff8801ca2ff7f0
ffffffff81426644 0000000000000001 00000000d9529800 0000000000000001
Call Trace:
[<ffffffff81eb4be9>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81eb4be9>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff81426644>] print_circular_bug.cold.51+0x1bd/0x27d kernel/locking/lockdep.c:1202
[<ffffffff812391a9>] check_prev_add kernel/locking/lockdep.c:1828 [inline]
[<ffffffff812391a9>] check_prevs_add kernel/locking/lockdep.c:1938 [inline]
[<ffffffff812391a9>] validate_chain kernel/locking/lockdep.c:2265 [inline]
[<ffffffff812391a9>] __lock_acquire+0x3019/0x4070 kernel/locking/lockdep.c:3345
[<ffffffff8123ac70>] lock_acquire+0x130/0x3e0 kernel/locking/lockdep.c:3756
[<ffffffff8157b710>] percpu_down_read_preempt_disable include/linux/percpu-rwsem.h:35 [inline]
[<ffffffff8157b710>] percpu_down_read include/linux/percpu-rwsem.h:58 [inline]
[<ffffffff8157b710>] __sb_start_write+0x1c0/0x300 fs/super.c:1281
[<ffffffff815e0e3f>] sb_start_write include/linux/fs.h:1573 [inline]
[<ffffffff815e0e3f>] mnt_want_write+0x3f/0xb0 fs/namespace.c:391
[<ffffffff815a54c4>] do_last fs/namei.c:3400 [inline]
[<ffffffff815a54c4>] path_openat+0x11f4/0x3590 fs/namei.c:3534
[<ffffffff815abb27>] do_filp_open+0x197/0x270 fs/namei.c:3568
[<ffffffff8156e2fd>] do_sys_open+0x30d/0x5c0 fs/open.c:1072
[<ffffffff8156e657>] SYSC_open fs/open.c:1090 [inline]
[<ffffffff8156e657>] SyS_open fs/open.c:1085 [inline]
[<ffffffff8156e657>] SYSC_creat fs/open.c:1110 [inline]
[<ffffffff8156e657>] SyS_creat+0x27/0x30 fs/open.c:1108
[<ffffffff81006316>] do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282
[<ffffffff839fccd3>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11634 sclass=netlink_route_socket pig=15396 comm=syz-executor2
program syz-executor2 is using a deprecated SCSI ioctl, please convert it to SG_IO
sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
program syz-executor2 is using a deprecated SCSI ioctl, please convert it to SG_IO
sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
| Time | Kernel | Commit | Syzkaller | Config | Log | Report | Syz repro | C repro | VM info | Assets (help?) | Manager | Title |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2018/08/10 00:19 | https://android.googlesource.com/kernel/common android-4.9 | 92e87041ed2d | 1fb62d58 | .config | console log | report | ci-android-49-kasan-gce-root |