Warning: Permanently added '10.128.0.170' (ED25519) to the list of known hosts. executing program [ 68.399496][ T3510] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 68.676905][ T3510] [ 68.688522][ T3510] ====================================================== [ 68.695526][ T3510] WARNING: possible circular locking dependency detected [ 68.702705][ T3510] 6.1.46-syzkaller #0 Not tainted [ 68.707734][ T3510] ------------------------------------------------------ [ 68.714749][ T3510] syz-executor290/3510 is trying to acquire lock: [ 68.721153][ T3510] ffff888140d38400 (&sb->s_type->i_mutex_key#8){++++}-{3:3}, at: ext4_bmap+0x4b/0x410 [ 68.730757][ T3510] [ 68.730757][ T3510] but task is already holding lock: [ 68.738125][ T3510] ffff88807ee8a3f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: jbd2_journal_flush+0x323/0xc40 [ 68.748747][ T3510] [ 68.748747][ T3510] which lock already depends on the new lock. [ 68.748747][ T3510] [ 68.759166][ T3510] [ 68.759166][ T3510] the existing dependency chain (in reverse order) is: [ 68.768169][ T3510] [ 68.768169][ T3510] -> #3 (&journal->j_checkpoint_mutex){+.+.}-{3:3}: [ 68.776936][ T3510] lock_acquire+0x1f8/0x5a0 [ 68.781974][ T3510] __mutex_lock_common+0x1d4/0x2520 [ 68.787700][ T3510] mutex_lock_io_nested+0x43/0x60 [ 68.793240][ T3510] jbd2_journal_flush+0x29b/0xc40 [ 68.798790][ T3510] ext4_ioctl+0x3986/0x5f60 [ 68.803810][ T3510] __se_sys_ioctl+0xf1/0x160 [ 68.808913][ T3510] do_syscall_64+0x3d/0xb0 [ 68.813850][ T3510] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.820265][ T3510] [ 68.820265][ T3510] -> #2 (&journal->j_barrier){+.+.}-{3:3}: [ 68.828253][ T3510] lock_acquire+0x1f8/0x5a0 [ 68.833272][ T3510] __mutex_lock_common+0x1d4/0x2520 [ 68.838998][ T3510] mutex_lock_nested+0x17/0x20 [ 68.844279][ T3510] jbd2_journal_lock_updates+0x2a8/0x370 [ 68.850437][ T3510] ext4_change_inode_journal_flag+0x1a8/0x6e0 [ 68.857021][ T3510] ext4_fileattr_set+0xe04/0x1770 [ 68.862584][ T3510] vfs_fileattr_set+0x8f3/0xd30 [ 68.867968][ T3510] do_vfs_ioctl+0x1cd1/0x2a90 [ 68.873169][ T3510] __se_sys_ioctl+0x81/0x160 [ 68.878278][ T3510] do_syscall_64+0x3d/0xb0 [ 68.883217][ T3510] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.889642][ T3510] [ 68.889642][ T3510] -> #1 (&sbi->s_writepages_rwsem){++++}-{0:0}: [ 68.898173][ T3510] lock_acquire+0x1f8/0x5a0 [ 68.903241][ T3510] percpu_down_write+0x50/0x2e0 [ 68.908631][ T3510] ext4_ind_migrate+0x254/0x760 [ 68.914029][ T3510] ext4_fileattr_set+0xe9b/0x1770 [ 68.919573][ T3510] vfs_fileattr_set+0x8f3/0xd30 [ 68.924940][ T3510] do_vfs_ioctl+0x1cd1/0x2a90 [ 68.930129][ T3510] __se_sys_ioctl+0x81/0x160 [ 68.935234][ T3510] do_syscall_64+0x3d/0xb0 [ 68.940175][ T3510] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.946589][ T3510] [ 68.946589][ T3510] -> #0 (&sb->s_type->i_mutex_key#8){++++}-{3:3}: [ 68.955188][ T3510] validate_chain+0x1667/0x58e0 [ 68.960557][ T3510] __lock_acquire+0x125b/0x1f80 [ 68.965924][ T3510] lock_acquire+0x1f8/0x5a0 [ 68.970938][ T3510] down_read+0x43/0x2e0 [ 68.975609][ T3510] ext4_bmap+0x4b/0x410 [ 68.980301][ T3510] bmap+0xa1/0xd0 [ 68.984459][ T3510] jbd2_journal_flush+0x5b5/0xc40 [ 68.990000][ T3510] ext4_ioctl+0x3986/0x5f60 [ 68.995016][ T3510] __se_sys_ioctl+0xf1/0x160 [ 69.000119][ T3510] do_syscall_64+0x3d/0xb0 [ 69.005057][ T3510] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 69.011473][ T3510] [ 69.011473][ T3510] other info that might help us debug this: [ 69.011473][ T3510] [ 69.021693][ T3510] Chain exists of: [ 69.021693][ T3510] &sb->s_type->i_mutex_key#8 --> &journal->j_barrier --> &journal->j_checkpoint_mutex [ 69.021693][ T3510] [ 69.037160][ T3510] Possible unsafe locking scenario: [ 69.037160][ T3510] [ 69.044597][ T3510] CPU0 CPU1 [ 69.049948][ T3510] ---- ---- [ 69.055304][ T3510] lock(&journal->j_checkpoint_mutex); [ 69.060849][ T3510] lock(&journal->j_barrier); [ 69.068154][ T3510] lock(&journal->j_checkpoint_mutex); [ 69.076213][ T3510] lock(&sb->s_type->i_mutex_key#8); [ 69.081587][ T3510] [ 69.081587][ T3510] *** DEADLOCK *** [ 69.081587][ T3510] [ 69.089717][ T3510] 2 locks held by syz-executor290/3510: [ 69.095259][ T3510] #0: ffff88807ee8a170 (&journal->j_barrier){+.+.}-{3:3}, at: jbd2_journal_lock_updates+0x2a8/0x370 [ 69.106144][ T3510] #1: ffff88807ee8a3f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: jbd2_journal_flush+0x323/0xc40 [ 69.117192][ T3510] [ 69.117192][ T3510] stack backtrace: [ 69.123091][ T3510] CPU: 1 PID: 3510 Comm: syz-executor290 Not tainted 6.1.46-syzkaller #0 [ 69.131581][ T3510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 69.141639][ T3510] Call Trace: [ 69.144917][ T3510] [ 69.147847][ T3510] dump_stack_lvl+0x1e3/0x2cb [ 69.152543][ T3510] ? nf_tcp_handle_invalid+0x642/0x642 [ 69.158013][ T3510] ? print_circular_bug+0x12b/0x1a0 [ 69.163231][ T3510] check_noncircular+0x2fa/0x3b0 [ 69.168183][ T3510] ? add_chain_block+0x850/0x850 [ 69.173118][ T3510] ? lockdep_lock+0x11f/0x2a0 [ 69.177794][ T3510] ? _find_first_zero_bit+0xd0/0x100 [ 69.183086][ T3510] validate_chain+0x1667/0x58e0 [ 69.187943][ T3510] ? reacquire_held_locks+0x660/0x660 [ 69.193312][ T3510] ? __schedule+0x1334/0x4330 [ 69.197986][ T3510] ? reacquire_held_locks+0x660/0x660 [ 69.203356][ T3510] ? mark_lock+0x9a/0x340 [ 69.207690][ T3510] ? release_firmware_map_entry+0x185/0x185 [ 69.213582][ T3510] ? mark_lock+0x9a/0x340 [ 69.217926][ T3510] __lock_acquire+0x125b/0x1f80 [ 69.222781][ T3510] lock_acquire+0x1f8/0x5a0 [ 69.227276][ T3510] ? ext4_bmap+0x4b/0x410 [ 69.231621][ T3510] ? read_lock_is_recursive+0x10/0x10 [ 69.237005][ T3510] ? __might_sleep+0xb0/0xb0 [ 69.241599][ T3510] ? jbd2_journal_flush+0x374/0xc40 [ 69.246797][ T3510] ? ext4_journalled_write_end+0xec0/0xec0 [ 69.252595][ T3510] down_read+0x43/0x2e0 [ 69.256745][ T3510] ? ext4_bmap+0x4b/0x410 [ 69.261068][ T3510] ? ext4_journalled_write_end+0xec0/0xec0 [ 69.266869][ T3510] ext4_bmap+0x4b/0x410 [ 69.271021][ T3510] ? ext4_journalled_write_end+0xec0/0xec0 [ 69.276842][ T3510] bmap+0xa1/0xd0 [ 69.280482][ T3510] jbd2_journal_flush+0x5b5/0xc40 [ 69.285542][ T3510] ? jbd2_journal_lock_updates+0x2a8/0x370 [ 69.291443][ T3510] ? __bpf_trace_jbd2_shrink_checkpoint_list+0x50/0x50 [ 69.298314][ T3510] ? bpf_lsm_capable+0x5/0x10 [ 69.302993][ T3510] ? security_capable+0x86/0xb0 [ 69.307844][ T3510] ext4_ioctl+0x3986/0x5f60 [ 69.312341][ T3510] ? kasan_set_track+0x4b/0x70 [ 69.317115][ T3510] ? security_file_ioctl+0x6d/0xa0 [ 69.322225][ T3510] ? __se_sys_ioctl+0x47/0x160 [ 69.326980][ T3510] ? do_syscall_64+0x3d/0xb0 [ 69.331575][ T3510] ? ext4_fileattr_set+0x1770/0x1770 [ 69.336947][ T3510] ? do_vfs_ioctl+0x1ab2/0x2a90 [ 69.341793][ T3510] ? __x64_compat_sys_ioctl+0x80/0x80 [ 69.347183][ T3510] ? __lock_acquire+0x1f80/0x1f80 [ 69.352211][ T3510] ? lockdep_hardirqs_on+0x94/0x130 [ 69.357429][ T3510] ? __kmem_cache_free+0x25c/0x3c0 [ 69.362553][ T3510] ? tomoyo_path_number_perm+0x5f4/0x7b0 [ 69.368194][ T3510] ? tomoyo_path_number_perm+0x657/0x7b0 [ 69.373827][ T3510] ? print_irqtrace_events+0x210/0x210 [ 69.379288][ T3510] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 69.384746][ T3510] ? lockdep_hardirqs_on+0x94/0x130 [ 69.389960][ T3510] ? kmem_cache_free+0x292/0x510 [ 69.394906][ T3510] ? do_sys_openat2+0x42b/0x500 [ 69.399764][ T3510] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 69.405758][ T3510] ? print_irqtrace_events+0x210/0x210 [ 69.411224][ T3510] ? print_irqtrace_events+0x210/0x210 [ 69.416701][ T3510] ? bpf_lsm_file_ioctl+0x5/0x10 [ 69.421659][ T3510] ? security_file_ioctl+0x7d/0xa0 [ 69.426791][ T3510] ? ext4_fileattr_set+0x1770/0x1770 [ 69.432090][ T3510] __se_sys_ioctl+0xf1/0x160 [ 69.436688][ T3510] do_syscall_64+0x3d/0xb0 [ 69.441117][ T3510] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 69.447038][ T3510] RIP: 0033:0x7fa51a990329 [ 69.451505][ T3510] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 69.471223][ T3510] RSP: 002b:00007ffecb8948b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 69.47