Warning: Permanently added '10.128.0.159' (ED25519) to the list of known hosts. executing program [ 50.628287][ T3499] [ 50.630642][ T3499] ====================================================== [ 50.637652][ T3499] WARNING: possible circular locking dependency detected [ 50.644657][ T3499] 5.15.146-syzkaller #0 Not tainted [ 50.649858][ T3499] ------------------------------------------------------ [ 50.656990][ T3499] syz-executor160/3499 is trying to acquire lock: [ 50.663397][ T3499] ffff888019ff03f0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_bmap+0x4b/0x410 [ 50.672981][ T3499] [ 50.672981][ T3499] but task is already holding lock: [ 50.680331][ T3499] ffff88814b2983f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: jbd2_journal_flush+0x31c/0xc90 [ 50.690949][ T3499] [ 50.690949][ T3499] which lock already depends on the new lock. [ 50.690949][ T3499] [ 50.701946][ T3499] [ 50.701946][ T3499] the existing dependency chain (in reverse order) is: [ 50.710948][ T3499] [ 50.710948][ T3499] -> #3 (&journal->j_checkpoint_mutex){+.+.}-{3:3}: [ 50.719713][ T3499] lock_acquire+0x1db/0x4f0 [ 50.724752][ T3499] __mutex_lock_common+0x1da/0x25a0 [ 50.730467][ T3499] mutex_lock_io_nested+0x45/0x60 [ 50.736007][ T3499] jbd2_journal_flush+0x290/0xc90 [ 50.741659][ T3499] ext4_ioctl+0x3249/0x5b80 [ 50.746690][ T3499] __se_sys_ioctl+0xf1/0x160 [ 50.751796][ T3499] do_syscall_64+0x3d/0xb0 [ 50.756725][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.763138][ T3499] [ 50.763138][ T3499] -> #2 (&journal->j_barrier){+.+.}-{3:3}: [ 50.771124][ T3499] lock_acquire+0x1db/0x4f0 [ 50.776153][ T3499] __mutex_lock_common+0x1da/0x25a0 [ 50.781875][ T3499] mutex_lock_nested+0x17/0x20 [ 50.787160][ T3499] jbd2_journal_lock_updates+0x2aa/0x370 [ 50.793737][ T3499] ext4_change_inode_journal_flag+0x1a8/0x6e0 [ 50.800334][ T3499] ext4_fileattr_set+0xdf4/0x1750 [ 50.805880][ T3499] vfs_fileattr_set+0x8f3/0xd30 [ 50.811246][ T3499] do_vfs_ioctl+0x1d85/0x2b70 [ 50.816434][ T3499] __se_sys_ioctl+0x81/0x160 [ 50.821621][ T3499] do_syscall_64+0x3d/0xb0 [ 50.826551][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.832960][ T3499] [ 50.832960][ T3499] -> #1 (&sbi->s_writepages_rwsem){++++}-{0:0}: [ 50.841461][ T3499] lock_acquire+0x1db/0x4f0 [ 50.846475][ T3499] percpu_down_write+0x52/0x2d0 [ 50.851926][ T3499] ext4_ind_migrate+0x254/0x760 [ 50.857289][ T3499] ext4_fileattr_set+0xe8b/0x1750 [ 50.862823][ T3499] vfs_fileattr_set+0x8f3/0xd30 [ 50.868184][ T3499] do_vfs_ioctl+0x1d85/0x2b70 [ 50.873373][ T3499] __se_sys_ioctl+0x81/0x160 [ 50.878472][ T3499] do_syscall_64+0x3d/0xb0 [ 50.883420][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.889843][ T3499] [ 50.889843][ T3499] -> #0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}: [ 50.898438][ T3499] validate_chain+0x1649/0x5930 [ 50.903803][ T3499] __lock_acquire+0x1295/0x1ff0 [ 50.909289][ T3499] lock_acquire+0x1db/0x4f0 [ 50.914302][ T3499] down_read+0x45/0x2e0 [ 50.918973][ T3499] ext4_bmap+0x4b/0x410 [ 50.923642][ T3499] bmap+0xa1/0xd0 [ 50.927790][ T3499] jbd2_journal_flush+0x7a2/0xc90 [ 50.933329][ T3499] ext4_ioctl+0x3249/0x5b80 [ 50.938348][ T3499] __se_sys_ioctl+0xf1/0x160 [ 50.943447][ T3499] do_syscall_64+0x3d/0xb0 [ 50.948375][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.954782][ T3499] [ 50.954782][ T3499] other info that might help us debug this: [ 50.954782][ T3499] [ 50.964998][ T3499] Chain exists of: [ 50.964998][ T3499] &sb->s_type->i_mutex_key#9 --> &journal->j_barrier --> &journal->j_checkpoint_mutex [ 50.964998][ T3499] [ 50.980471][ T3499] Possible unsafe locking scenario: [ 50.980471][ T3499] [ 50.987906][ T3499] CPU0 CPU1 [ 50.993264][ T3499] ---- ---- [ 50.998614][ T3499] lock(&journal->j_checkpoint_mutex); [ 51.004167][ T3499] lock(&journal->j_barrier); [ 51.011439][ T3499] lock(&journal->j_checkpoint_mutex); [ 51.019491][ T3499] lock(&sb->s_type->i_mutex_key#9); [ 51.024858][ T3499] [ 51.024858][ T3499] *** DEADLOCK *** [ 51.024858][ T3499] [ 51.032985][ T3499] 2 locks held by syz-executor160/3499: [ 51.038513][ T3499] #0: ffff88814b298170 (&journal->j_barrier){+.+.}-{3:3}, at: jbd2_journal_lock_updates+0x2aa/0x370 [ 51.049382][ T3499] #1: ffff88814b2983f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: jbd2_journal_flush+0x31c/0xc90 [ 51.060431][ T3499] [ 51.060431][ T3499] stack backtrace: [ 51.066304][ T3499] CPU: 1 PID: 3499 Comm: syz-executor160 Not tainted 5.15.146-syzkaller #0 [ 51.074879][ T3499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 51.084925][ T3499] Call Trace: [ 51.088194][ T3499] [ 51.091116][ T3499] dump_stack_lvl+0x1e3/0x2cb [ 51.095788][ T3499] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 51.101415][ T3499] ? print_circular_bug+0x12b/0x1a0 [ 51.106604][ T3499] check_noncircular+0x2f8/0x3b0 [ 51.111717][ T3499] ? add_chain_block+0x850/0x850 [ 51.116679][ T3499] ? lockdep_lock+0x11f/0x2a0 [ 51.121351][ T3499] ? print_irqtrace_events+0x210/0x210 [ 51.126839][ T3499] ? do_raw_spin_unlock+0x137/0x8b0 [ 51.132030][ T3499] validate_chain+0x1649/0x5930 [ 51.136880][ T3499] ? lockdep_hardirqs_on+0x94/0x130 [ 51.142115][ T3499] ? reacquire_held_locks+0x660/0x660 [ 51.147494][ T3499] ? reacquire_held_locks+0x660/0x660 [ 51.152873][ T3499] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 51.158850][ T3499] ? release_firmware_map_entry+0x18b/0x18b [ 51.164864][ T3499] ? do_raw_spin_unlock+0x137/0x8b0 [ 51.170072][ T3499] ? mark_lock+0x98/0x340 [ 51.174392][ T3499] __lock_acquire+0x1295/0x1ff0 [ 51.179409][ T3499] lock_acquire+0x1db/0x4f0 [ 51.183902][ T3499] ? ext4_bmap+0x4b/0x410 [ 51.188227][ T3499] ? read_lock_is_recursive+0x10/0x10 [ 51.193590][ T3499] ? bit_waitqueue+0x30/0x30 [ 51.198192][ T3499] ? __might_sleep+0xc0/0xc0 [ 51.202798][ T3499] ? ext4_journalled_write_end+0xee0/0xee0 [ 51.208600][ T3499] down_read+0x45/0x2e0 [ 51.212769][ T3499] ? ext4_bmap+0x4b/0x410 [ 51.217098][ T3499] ? ext4_journalled_write_end+0xee0/0xee0 [ 51.222897][ T3499] ext4_bmap+0x4b/0x410 [ 51.227052][ T3499] ? ext4_journalled_write_end+0xee0/0xee0 [ 51.232865][ T3499] bmap+0xa1/0xd0 [ 51.236505][ T3499] jbd2_journal_flush+0x7a2/0xc90 [ 51.241559][ T3499] ? __bpf_trace_jbd2_shrink_checkpoint_list+0x50/0x50 [ 51.248409][ T3499] ? bpf_lsm_capable+0x5/0x10 [ 51.253083][ T3499] ? security_capable+0x86/0xb0 [ 51.258053][ T3499] ext4_ioctl+0x3249/0x5b80 [ 51.262583][ T3499] ? do_vfs_ioctl+0x1b66/0x2b70 [ 51.267467][ T3499] ? ext4_fileattr_set+0x1750/0x1750 [ 51.272771][ T3499] ? __x64_compat_sys_ioctl+0x80/0x80 [ 51.278138][ T3499] ? __lock_acquire+0x1ff0/0x1ff0 [ 51.283413][ T3499] ? slab_free_freelist_hook+0xdd/0x160 [ 51.288988][ T3499] ? tomoyo_path_number_perm+0x648/0x810 [ 51.294647][ T3499] ? kfree+0xf1/0x270 [ 51.298627][ T3499] ? tomoyo_path_number_perm+0x6ab/0x810 [ 51.304257][ T3499] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 51.309724][ T3499] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 51.315700][ T3499] ? print_irqtrace_events+0x210/0x210 [ 51.321247][ T3499] ? vtime_user_exit+0x2d1/0x400 [ 51.326178][ T3499] ? bpf_lsm_file_ioctl+0x5/0x10 [ 51.331108][ T3499] ? security_file_ioctl+0x7d/0xa0 [ 51.336208][ T3499] ? ext4_fileattr_set+0x1750/0x1750 [ 51.341482][ T3499] __se_sys_ioctl+0xf1/0x160 [ 51.346069][ T3499] do_syscall_64+0x3d/0xb0 [ 51.350494][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.356379][ T3499] RIP: 0033:0x7f548f666329 [ 51.360789][ T3499] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 51.380398][ T3499] RSP: 002b:00007ffc37a59968 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 51.388814][ T3499] RAX: ffffffffffffffda RBX: 00007ffc37a59b38 RCX: 00007f548f666329 [ 51.396780][ T3499] RDX: 00000000200005c0 RSI: 000000004004662b RDI: 0000000000000004 [ 51.404740][ T3499] RBP: 00007f548f6d9610 R08: 00007ffc37a59b38 R09: 00007ffc37a59b38 [ 51.412722][ T3499] R10: 00007ffc37a59b38 R11: 0000000000000246 R12: 0000000000000001 [ 51.420691][ T3499] R13: 00007ffc37a59b28 R14: 0000000000000001 R15: 0000000000000001 [ 51.428783][ T3499]