Warning: Permanently added '10.128.1.172' (ED25519) to the list of known hosts. executing program [ 51.097096][ T3498] [ 51.099439][ T3498] ====================================================== [ 51.106445][ T3498] WARNING: possible circular locking dependency detected [ 51.113447][ T3498] 5.15.137-syzkaller #0 Not tainted [ 51.118628][ T3498] ------------------------------------------------------ [ 51.125899][ T3498] syz-executor292/3498 is trying to acquire lock: [ 51.132296][ T3498] ffff8880120b03f0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_bmap+0x4b/0x410 [ 51.141881][ T3498] [ 51.141881][ T3498] but task is already holding lock: [ 51.149236][ T3498] ffff88814b7da3f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: jbd2_journal_flush+0x31c/0xc90 [ 51.159830][ T3498] [ 51.159830][ T3498] which lock already depends on the new lock. [ 51.159830][ T3498] [ 51.170303][ T3498] [ 51.170303][ T3498] the existing dependency chain (in reverse order) is: [ 51.179305][ T3498] [ 51.179305][ T3498] -> #3 (&journal->j_checkpoint_mutex){+.+.}-{3:3}: [ 51.188086][ T3498] lock_acquire+0x1db/0x4f0 [ 51.193104][ T3498] __mutex_lock_common+0x1da/0x25a0 [ 51.198820][ T3498] mutex_lock_io_nested+0x45/0x60 [ 51.204374][ T3498] jbd2_journal_flush+0x290/0xc90 [ 51.209919][ T3498] ext4_ioctl+0x3249/0x5b80 [ 51.214935][ T3498] __se_sys_ioctl+0xf1/0x160 [ 51.220037][ T3498] do_syscall_64+0x3d/0xb0 [ 51.224965][ T3498] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.231463][ T3498] [ 51.231463][ T3498] -> #2 (&journal->j_barrier){+.+.}-{3:3}: [ 51.239450][ T3498] lock_acquire+0x1db/0x4f0 [ 51.244493][ T3498] __mutex_lock_common+0x1da/0x25a0 [ 51.250205][ T3498] mutex_lock_nested+0x17/0x20 [ 51.255604][ T3498] jbd2_journal_lock_updates+0x2aa/0x370 [ 51.261766][ T3498] ext4_change_inode_journal_flag+0x1a8/0x6e0 [ 51.268355][ T3498] ext4_fileattr_set+0xdf4/0x1750 [ 51.273892][ T3498] vfs_fileattr_set+0x8f3/0xd30 [ 51.279367][ T3498] do_vfs_ioctl+0x1d85/0x2b70 [ 51.284578][ T3498] __se_sys_ioctl+0x81/0x160 [ 51.289685][ T3498] do_syscall_64+0x3d/0xb0 [ 51.294625][ T3498] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.301150][ T3498] [ 51.301150][ T3498] -> #1 (&sbi->s_writepages_rwsem){++++}-{0:0}: [ 51.309756][ T3498] lock_acquire+0x1db/0x4f0 [ 51.314788][ T3498] percpu_down_write+0x52/0x2d0 [ 51.320149][ T3498] ext4_ind_migrate+0x254/0x760 [ 51.325512][ T3498] ext4_fileattr_set+0xe8b/0x1750 [ 51.331044][ T3498] vfs_fileattr_set+0x8f3/0xd30 [ 51.336401][ T3498] do_vfs_ioctl+0x1d85/0x2b70 [ 51.341584][ T3498] __se_sys_ioctl+0x81/0x160 [ 51.346678][ T3498] do_syscall_64+0x3d/0xb0 [ 51.351602][ T3498] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.358035][ T3498] [ 51.358035][ T3498] -> #0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}: [ 51.366623][ T3498] validate_chain+0x1646/0x58b0 [ 51.371983][ T3498] __lock_acquire+0x1295/0x1ff0 [ 51.377343][ T3498] lock_acquire+0x1db/0x4f0 [ 51.382354][ T3498] down_read+0x45/0x2e0 [ 51.387018][ T3498] ext4_bmap+0x4b/0x410 [ 51.391696][ T3498] bmap+0xa1/0xd0 [ 51.395839][ T3498] jbd2_journal_flush+0x7a2/0xc90 [ 51.401372][ T3498] ext4_ioctl+0x3249/0x5b80 [ 51.406381][ T3498] __se_sys_ioctl+0xf1/0x160 [ 51.411477][ T3498] do_syscall_64+0x3d/0xb0 [ 51.416400][ T3498] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.422801][ T3498] [ 51.422801][ T3498] other info that might help us debug this: [ 51.422801][ T3498] [ 51.433011][ T3498] Chain exists of: [ 51.433011][ T3498] &sb->s_type->i_mutex_key#9 --> &journal->j_barrier --> &journal->j_checkpoint_mutex [ 51.433011][ T3498] [ 51.448472][ T3498] Possible unsafe locking scenario: [ 51.448472][ T3498] [ 51.455907][ T3498] CPU0 CPU1 [ 51.461257][ T3498] ---- ---- [ 51.466604][ T3498] lock(&journal->j_checkpoint_mutex); [ 51.472138][ T3498] lock(&journal->j_barrier); [ 51.479406][ T3498] lock(&journal->j_checkpoint_mutex); [ 51.487456][ T3498] lock(&sb->s_type->i_mutex_key#9); [ 51.492818][ T3498] [ 51.492818][ T3498] *** DEADLOCK *** [ 51.492818][ T3498] [ 51.500946][ T3498] 2 locks held by syz-executor292/3498: [ 51.506480][ T3498] #0: ffff88814b7da170 (&journal->j_barrier){+.+.}-{3:3}, at: jbd2_journal_lock_updates+0x2aa/0x370 [ 51.517345][ T3498] #1: ffff88814b7da3f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: jbd2_journal_flush+0x31c/0xc90 [ 51.528394][ T3498] [ 51.528394][ T3498] stack backtrace: [ 51.534268][ T3498] CPU: 1 PID: 3498 Comm: syz-executor292 Not tainted 5.15.137-syzkaller #0 [ 51.542927][ T3498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 51.552968][ T3498] Call Trace: [ 51.556236][ T3498] [ 51.559155][ T3498] dump_stack_lvl+0x1e3/0x2cb [ 51.563825][ T3498] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 51.569448][ T3498] ? print_circular_bug+0x12b/0x1a0 [ 51.574637][ T3498] check_noncircular+0x2f8/0x3b0 [ 51.579564][ T3498] ? add_chain_block+0x850/0x850 [ 51.584490][ T3498] ? lockdep_lock+0x11f/0x2a0 [ 51.589158][ T3498] ? print_irqtrace_events+0x210/0x210 [ 51.594607][ T3498] ? do_raw_spin_unlock+0x137/0x8b0 [ 51.599806][ T3498] validate_chain+0x1646/0x58b0 [ 51.604649][ T3498] ? lockdep_hardirqs_on+0x94/0x130 [ 51.609864][ T3498] ? reacquire_held_locks+0x660/0x660 [ 51.615226][ T3498] ? reacquire_held_locks+0x660/0x660 [ 51.620700][ T3498] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 51.626672][ T3498] ? __sched_text_start+0x8/0x8 [ 51.631514][ T3498] ? do_raw_spin_unlock+0x137/0x8b0 [ 51.636703][ T3498] ? mark_lock+0x98/0x340 [ 51.641021][ T3498] __lock_acquire+0x1295/0x1ff0 [ 51.646065][ T3498] lock_acquire+0x1db/0x4f0 [ 51.650650][ T3498] ? ext4_bmap+0x4b/0x410 [ 51.654995][ T3498] ? read_lock_is_recursive+0x10/0x10 [ 51.660364][ T3498] ? bit_waitqueue+0x30/0x30 [ 51.665041][ T3498] ? __might_sleep+0xc0/0xc0 [ 51.669646][ T3498] ? ext4_journalled_write_end+0xee0/0xee0 [ 51.675446][ T3498] down_read+0x45/0x2e0 [ 51.679592][ T3498] ? ext4_bmap+0x4b/0x410 [ 51.683915][ T3498] ? ext4_journalled_write_end+0xee0/0xee0 [ 51.689720][ T3498] ext4_bmap+0x4b/0x410 [ 51.693879][ T3498] ? ext4_journalled_write_end+0xee0/0xee0 [ 51.699675][ T3498] bmap+0xa1/0xd0 [ 51.703297][ T3498] jbd2_journal_flush+0x7a2/0xc90 [ 51.708577][ T3498] ? __bpf_trace_jbd2_shrink_checkpoint_list+0x50/0x50 [ 51.715675][ T3498] ? bpf_lsm_capable+0x5/0x10 [ 51.720384][ T3498] ? security_capable+0x86/0xb0 [ 51.725349][ T3498] ext4_ioctl+0x3249/0x5b80 [ 51.729855][ T3498] ? do_vfs_ioctl+0x1b66/0x2b70 [ 51.734738][ T3498] ? ext4_fileattr_set+0x1750/0x1750 [ 51.740020][ T3498] ? __x64_compat_sys_ioctl+0x80/0x80 [ 51.745388][ T3498] ? __lock_acquire+0x1ff0/0x1ff0 [ 51.750401][ T3498] ? slab_free_freelist_hook+0xdd/0x160 [ 51.755955][ T3498] ? tomoyo_path_number_perm+0x648/0x810 [ 51.761585][ T3498] ? kfree+0xf1/0x270 [ 51.765572][ T3498] ? tomoyo_path_number_perm+0x6ab/0x810 [ 51.771196][ T3498] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 51.776654][ T3498] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 51.782627][ T3498] ? print_irqtrace_events+0x210/0x210 [ 51.788079][ T3498] ? vtime_user_exit+0x2d1/0x400 [ 51.793013][ T3498] ? bpf_lsm_file_ioctl+0x5/0x10 [ 51.797942][ T3498] ? security_file_ioctl+0x7d/0xa0 [ 51.803046][ T3498] ? ext4_fileattr_set+0x1750/0x1750 [ 51.808322][ T3498] __se_sys_ioctl+0xf1/0x160 [ 51.812903][ T3498] do_syscall_64+0x3d/0xb0 [ 51.817312][ T3498] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.823196][ T3498] RIP: 0033:0x7fc9077af329 [ 51.827601][ T3498] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 51.847198][ T3498] RSP: 002b:00007