syzbot


possible deadlock in ext4_xattr_set_handle (3)

Status: fixed on 2023/07/01 16:05
Subsystems: ext4
[Documentation on labels]
Reported-by: syzbot+edce54daffee36421b4c@syzkaller.appspotmail.com
Fix commit: b3e6bcb94590 ext4: add EA_INODE checking to ext4_iget()
First crash: 401d, last: 240d
Discussions (2)
Title Replies (including bot) Last reply
[PATCH 0/4] ext4: clean up ea_inode handling 5 (5) 2023/05/24 03:49
[syzbot] [ext4?] possible deadlock in ext4_xattr_set_handle (3) 2 (4) 2023/05/05 21:48
Similar bugs (6)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream possible deadlock in ext4_xattr_set_handle (4) ext4 5 36d 157d 0/26 upstream: reported on 2023/09/22 04:51
upstream possible deadlock in ext4_xattr_set_handle ext4 1 860d 856d 0/26 auto-closed as invalid on 2022/02/15 19:59
upstream possible deadlock in ext4_xattr_set_handle (2) ext4 1 594d 593d 0/26 auto-obsoleted due to no activity on 2022/11/08 16:24
linux-5.15 possible deadlock in ext4_xattr_set_handle C done 42 263d 355d 3/3 fixed on 2023/07/17 13:09
linux-4.19 possible deadlock in ext4_xattr_set_handle ext4 1 387d 387d 0/1 upstream: reported on 2023/02/03 16:43
linux-6.1 possible deadlock in ext4_xattr_set_handle C done 15 263d 351d 3/3 fixed on 2023/07/17 13:09
Last patch testing requests (1)
Created Duration User Patch Repo Result
2023/05/22 19:17 21m tytso@mit.edu git://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git test OK log

Sample crash report:
loop0: detected capacity change from 0 to 512
EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
======================================================
WARNING: possible circular locking dependency detected
6.4.0-rc3-syzkaller-geb0f1697d729 #0 Not tainted
------------------------------------------------------
syz-executor262/5971 is trying to acquire lock:
ffff0000dfa414c8 (&ei->xattr_sem){++++}-{3:3}, at: ext4_write_lock_xattr fs/ext4/xattr.h:155 [inline]
ffff0000dfa414c8 (&ei->xattr_sem){++++}-{3:3}, at: ext4_xattr_set_handle+0x1e0/0x12d8 fs/ext4/xattr.c:2372

but task is already holding lock:
ffff0000dfa41800 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:775 [inline]
ffff0000dfa41800 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 fs/xattr.c:321

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #1 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}:
       down_write+0x50/0xc0 kernel/locking/rwsem.c:1573
       inode_lock include/linux/fs.h:775 [inline]
       ext4_xattr_inode_create fs/ext4/xattr.c:1524 [inline]
       ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1607 [inline]
       ext4_xattr_set_entry+0x2394/0x2c3c fs/ext4/xattr.c:1736
       ext4_xattr_block_set+0x8e0/0x2cc4 fs/ext4/xattr.c:2042
       ext4_xattr_set_handle+0xb2c/0x12d8 fs/ext4/xattr.c:2457
       ext4_xattr_set+0x1e0/0x354 fs/ext4/xattr.c:2559
       ext4_xattr_trusted_set+0x4c/0x64 fs/ext4/xattr_trusted.c:38
       __vfs_setxattr+0x3d8/0x400 fs/xattr.c:201
       __vfs_setxattr_noperm+0x110/0x528 fs/xattr.c:235
       __vfs_setxattr_locked+0x1ec/0x218 fs/xattr.c:296
       vfs_setxattr+0x1a8/0x344 fs/xattr.c:322
       do_setxattr fs/xattr.c:630 [inline]
       setxattr+0x208/0x29c fs/xattr.c:653
       path_setxattr+0x17c/0x258 fs/xattr.c:672
       __do_sys_setxattr fs/xattr.c:688 [inline]
       __se_sys_setxattr fs/xattr.c:684 [inline]
       __arm64_sys_setxattr+0xbc/0xd8 fs/xattr.c:684
       __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
       invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
       el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
       do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193
       el0_svc+0x4c/0x15c arch/arm64/kernel/entry-common.c:637
       el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
       el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591

-> #0 (&ei->xattr_sem){++++}-{3:3}:
       check_prev_add kernel/locking/lockdep.c:3108 [inline]
       check_prevs_add kernel/locking/lockdep.c:3227 [inline]
       validate_chain kernel/locking/lockdep.c:3842 [inline]
       __lock_acquire+0x3310/0x75f0 kernel/locking/lockdep.c:5074
       lock_acquire+0x23c/0x71c kernel/locking/lockdep.c:5691
       down_write+0x50/0xc0 kernel/locking/rwsem.c:1573
       ext4_write_lock_xattr fs/ext4/xattr.h:155 [inline]
       ext4_xattr_set_handle+0x1e0/0x12d8 fs/ext4/xattr.c:2372
       ext4_xattr_set+0x1e0/0x354 fs/ext4/xattr.c:2559
       ext4_xattr_user_set+0xd4/0xfc fs/ext4/xattr_user.c:41
       __vfs_setxattr+0x3d8/0x400 fs/xattr.c:201
       __vfs_setxattr_noperm+0x110/0x528 fs/xattr.c:235
       __vfs_setxattr_locked+0x1ec/0x218 fs/xattr.c:296
       vfs_setxattr+0x1a8/0x344 fs/xattr.c:322
       do_setxattr fs/xattr.c:630 [inline]
       setxattr+0x208/0x29c fs/xattr.c:653
       path_setxattr+0x17c/0x258 fs/xattr.c:672
       __do_sys_setxattr fs/xattr.c:688 [inline]
       __se_sys_setxattr fs/xattr.c:684 [inline]
       __arm64_sys_setxattr+0xbc/0xd8 fs/xattr.c:684
       __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
       invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
       el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
       do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193
       el0_svc+0x4c/0x15c arch/arm64/kernel/entry-common.c:637
       el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
       el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&ea_inode->i_rwsem#8/1);
                               lock(&ei->xattr_sem);
                               lock(&ea_inode->i_rwsem#8/1);
  lock(&ei->xattr_sem);

 *** DEADLOCK ***

2 locks held by syz-executor262/5971:
 #0: ffff0000c5df6460 (sb_writers#3){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c fs/namespace.c:394
 #1: ffff0000dfa41800 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:775 [inline]
 #1: ffff0000dfa41800 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 fs/xattr.c:321

stack backtrace:
CPU: 0 PID: 5971 Comm: syz-executor262 Not tainted 6.4.0-rc3-syzkaller-geb0f1697d729 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
Call trace:
 dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233
 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106
 dump_stack+0x1c/0x28 lib/dump_stack.c:113
 print_circular_bug+0x150/0x1b8 kernel/locking/lockdep.c:2066
 check_noncircular+0x2cc/0x378 kernel/locking/lockdep.c:2188
 check_prev_add kernel/locking/lockdep.c:3108 [inline]
 check_prevs_add kernel/locking/lockdep.c:3227 [inline]
 validate_chain kernel/locking/lockdep.c:3842 [inline]
 __lock_acquire+0x3310/0x75f0 kernel/locking/lockdep.c:5074
 lock_acquire+0x23c/0x71c kernel/locking/lockdep.c:5691
 down_write+0x50/0xc0 kernel/locking/rwsem.c:1573
 ext4_write_lock_xattr fs/ext4/xattr.h:155 [inline]
 ext4_xattr_set_handle+0x1e0/0x12d8 fs/ext4/xattr.c:2372
 ext4_xattr_set+0x1e0/0x354 fs/ext4/xattr.c:2559
 ext4_xattr_user_set+0xd4/0xfc fs/ext4/xattr_user.c:41
 __vfs_setxattr+0x3d8/0x400 fs/xattr.c:201
 __vfs_setxattr_noperm+0x110/0x528 fs/xattr.c:235
 __vfs_setxattr_locked+0x1ec/0x218 fs/xattr.c:296
 vfs_setxattr+0x1a8/0x344 fs/xattr.c:322
 do_setxattr fs/xattr.c:630 [inline]
 setxattr+0x208/0x29c fs/xattr.c:653
 path_setxattr+0x17c/0x258 fs/xattr.c:672
 __do_sys_setxattr fs/xattr.c:688 [inline]
 __se_sys_setxattr fs/xattr.c:684 [inline]
 __arm64_sys_setxattr+0xbc/0xd8 fs/xattr.c:684
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193
 el0_svc+0x4c/0x15c arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591

Crashes (451):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/06/01 21:28 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 a4ae4f42 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/05/05 21:47 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 14f8db1c0f9a 4cec9341 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/03/31 04:57 upstream 8bb95a1662f8 f325deb0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in ext4_xattr_set_handle
2023/03/31 05:46 upstream 8bb95a1662f8 f325deb0 .config console log report info ci-qemu-upstream-386 possible deadlock in ext4_xattr_set_handle
2023/01/21 00:21 upstream edc00350d205 7374c4e5 .config console log report info ci-qemu-upstream-386 possible deadlock in ext4_xattr_set_handle
2023/06/01 19:09 linux-next 715abedee4cd a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in ext4_xattr_set_handle
2023/07/01 06:43 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 af3053d2 .config console log report info ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/07/01 01:52 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 af3053d2 .config console log report info ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/30 12:42 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 01298212 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/30 10:54 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 01298212 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/30 04:44 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 01298212 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/29 17:21 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 134ddc02 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/29 04:18 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 ca69c785 .config console log report info ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/28 13:11 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 8064cb02 .config console log report info ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/27 14:42 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 4cd5bb25 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/27 06:24 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 4cd5bb25 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/27 00:12 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 4cd5bb25 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/24 02:38 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 79782afc .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/21 12:46 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 79782afc .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/21 10:08 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 79782afc .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/20 16:02 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 0cf1feea .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/19 22:16 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 d521bc56 .config console log report info ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/19 02:25 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes b104dbedbe61 f3921d4d .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 possible deadlock in ext4_xattr_set_handle
2023/06/09 06:46 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 908f31f2a05b 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/09 01:57 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 908f31f2a05b 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/08 22:35 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 908f31f2a05b 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/08 16:14 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 3bb1a3e1674b 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/08 10:42 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 3bb1a3e1674b 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/08 09:41 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 3bb1a3e1674b 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/07 21:42 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 7579d8f9bf90 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/07 20:25 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 7579d8f9bf90 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/07 13:48 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci cd6bd67ad7ab 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/07 11:03 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci cd6bd67ad7ab 7086cdb9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/07 07:10 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci cd6bd67ad7ab a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/07 05:30 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci cd6bd67ad7ab a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/06 22:55 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci cd6bd67ad7ab a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/06 21:52 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci cd6bd67ad7ab a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/06 19:57 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci cd6bd67ad7ab a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/05 05:53 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/04 23:54 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/04 20:17 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/04 17:04 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/04 01:18 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/01 18:03 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/01 16:23 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/01 13:13 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 babc4389 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/01 11:47 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 babc4389 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/06/01 04:54 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 babc4389 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
2023/05/31 17:28 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci eb0f1697d729 e2a77acd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in ext4_xattr_set_handle
* Struck through repros no longer work on HEAD.