ci2 starts bisection 2023-12-08 16:25:57.757412229 +0000 UTC m=+60714.863333589 bisecting fixing commit since ca48fc16c49388400eddd6c6614593ebf7c7726a building syzkaller on 90c93c40627cb0ac3c2c7cb99d807fd4c137adcb ensuring issue is reproducible on original commit ca48fc16c49388400eddd6c6614593ebf7c7726a testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a7205e5ee80f6852a365dd799cd1cb8678faee5c85e662e52e249f111f3fcca9 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] check whether we can drop unnecessary instrumentation disabling configs for [BUG KASAN ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6796de4f657b2208c4cfdde57f7aa06a69d1fe4e15486a3c98748b1bcb6e3498 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the bug reproduces without the instrumentation disabling configs for [BUG KASAN ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed kconfig minimization: base=3820 full=7524 leaves diff=1994 split chunks (needed=false): <1994> split chunk #0 of len 1994 into 5 parts testing without sub-chunk 1/5 disabling configs for [HANG LEAK UBSAN BUG KASAN ATOMIC_SLEEP], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 690924ced6e98bbcd6b864cfe1726d86c99ede476fc4dd525ced46ef2ba48dd8 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [UBSAN BUG KASAN ATOMIC_SLEEP HANG LEAK], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e9b5edd167c2ced434d7db1d7112d38bf69485f3f76afbf123467075fe53bdfc all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [BUG KASAN ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c101c259ab4e2072b2843addc2f8ff5ce5e94e585248f4b3a4e2a58c05a2d2a9 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [LEAK UBSAN BUG KASAN ATOMIC_SLEEP HANG], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 8af2d6a5f1ab3a22979a3d6b6df4143c7474cabc18ef4038b24e6b05606a661e all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [BUG KASAN ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d69d1a16376136f8d39b45c5f6d81c5e7574172f1def9202d5b8084a874ae9a9 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped disabling configs for [KASAN ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing current HEAD 6c6a6c7e211cc02943dcb8c073919d2105054886 testing commit 6c6a6c7e211cc02943dcb8c073919d2105054886 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c7e19d9d335f0988d8f3bad728723ff3e8f745e9b1bba9cd05eaa66f7fdd090c all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 52m14.535351206s (build: 26m33.089633165s, test: 23m4.375433896s) crash still not fixed or there were kernel test errors commit msg: Linux 6.1.66 crash: possible deadlock in ext4_xattr_inode_iget EXT4-fs (loop0): 1 truncate cleaned up EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. ====================================================== WARNING: possible circular locking dependency detected 6.1.66-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.0/1522 is trying to acquire lock: ffff888114a4bcd0 (&ea_inode->i_rwsem#7/1){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline] ffff888114a4bcd0 (&ea_inode->i_rwsem#7/1){+.+.}-{3:3}, at: ext4_xattr_inode_iget+0x151/0x170 fs/ext4/xattr.c:425 but task is already holding lock: ffff888114a4c4d0 (&ei->i_data_sem/3){++++}-{3:3}, at: ext4_setattr+0x5dd/0x700 fs/ext4/inode.c:5547 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&ei->i_data_sem/3){++++}-{3:3}: down_write+0x26/0xc0 kernel/locking/rwsem.c:1573 ext4_update_i_disksize fs/ext4/ext4.h:3377 [inline] ext4_xattr_inode_write fs/ext4/xattr.c:1397 [inline] ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1545 [inline] ext4_xattr_set_entry+0xca9/0x11b0 fs/ext4/xattr.c:1669 ext4_xattr_ibody_set+0x53/0xa0 fs/ext4/xattr.c:2237 ext4_xattr_set_handle+0x41a/0x690 fs/ext4/xattr.c:2394 ext4_xattr_set+0xe3/0x170 fs/ext4/xattr.c:2508 __vfs_setxattr+0x105/0x130 fs/xattr.c:182 __vfs_setxattr_noperm+0x8e/0x1f0 fs/xattr.c:216 vfs_setxattr+0xde/0x170 fs/xattr.c:309 do_setxattr fs/xattr.c:594 [inline] setxattr+0x131/0x170 fs/xattr.c:617 path_setxattr+0xab/0x120 fs/xattr.c:636 __do_sys_setxattr fs/xattr.c:652 [inline] __se_sys_setxattr fs/xattr.c:648 [inline] __x64_sys_setxattr+0x22/0x30 fs/xattr.c:648 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd -> #0 (&ea_inode->i_rwsem#7/1){+.+.}-{3:3}: check_prev_add kernel/locking/lockdep.c:3090 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain kernel/locking/lockdep.c:3825 [inline] __lock_acquire+0x146d/0x2830 kernel/locking/lockdep.c:5049 lock_acquire+0xe3/0x270 kernel/locking/lockdep.c:5662 down_write+0x26/0xc0 kernel/locking/rwsem.c:1573 inode_lock include/linux/fs.h:756 [inline] ext4_xattr_inode_iget+0x151/0x170 fs/ext4/xattr.c:425 ext4_xattr_inode_get+0x4f/0x210 fs/ext4/xattr.c:485 ext4_xattr_move_to_block fs/ext4/xattr.c:2590 [inline] ext4_xattr_make_inode_space fs/ext4/xattr.c:2692 [inline] ext4_expand_extra_isize_ea+0x43c/0x850 fs/ext4/xattr.c:2784 __ext4_expand_extra_isize+0xbc/0x130 fs/ext4/inode.c:5919 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5962 [inline] __ext4_mark_inode_dirty+0x17f/0x230 fs/ext4/inode.c:6040 ext4_setattr+0x607/0x700 fs/ext4/inode.c:5550 notify_change+0x3c2/0x420 fs/attr.c:499 do_truncate+0xdd/0x120 fs/open.c:65 handle_truncate fs/namei.c:3217 [inline] do_open fs/namei.c:3562 [inline] path_openat+0xb69/0xc40 fs/namei.c:3715 do_filp_open+0xa8/0x150 fs/namei.c:3742 do_sys_openat2+0x89/0x160 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_creat fs/open.c:1410 [inline] __se_sys_creat fs/open.c:1404 [inline] __x64_sys_creat+0x42/0x60 fs/open.c:1404 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ei->i_data_sem/3); lock(&ea_inode->i_rwsem#7/1); lock(&ei->i_data_sem/3); lock(&ea_inode->i_rwsem#7/1); *** DEADLOCK *** 5 locks held by syz-executor.0/1522: #0: ffff88810867c438 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write+0xe/0x30 fs/namespace.c:393 #1: ffff888114a4c648 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline] #1: ffff888114a4c648 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: do_truncate+0xcd/0x120 fs/open.c:63 #2: ffff888114a4c7e8 (mapping.invalidate_lock){++++}-{3:3}, at: filemap_invalidate_lock include/linux/fs.h:801 [inline] #2: ffff888114a4c7e8 (mapping.invalidate_lock){++++}-{3:3}, at: ext4_setattr+0x3ff/0x700 fs/ext4/inode.c:5507 #3: ffff888114a4c4d0 (&ei->i_data_sem/3){++++}-{3:3}, at: ext4_setattr+0x5dd/0x700 fs/ext4/inode.c:5547 #4: ffff888114a4c310 (&ei->xattr_sem){++++}-{3:3}, at: ext4_write_trylock_xattr fs/ext4/xattr.h:162 [inline] #4: ffff888114a4c310 (&ei->xattr_sem){++++}-{3:3}, at: ext4_try_to_expand_extra_isize fs/ext4/inode.c:5959 [inline] #4: ffff888114a4c310 (&ei->xattr_sem){++++}-{3:3}, at: __ext4_mark_inode_dirty+0x149/0x230 fs/ext4/inode.c:6040 stack backtrace: CPU: 0 PID: 1522 Comm: syz-executor.0 Not tainted 6.1.66-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x89/0xd7 lib/dump_stack.c:106 print_circular_bug+0x2c5/0x300 kernel/locking/lockdep.c:2048 check_noncircular+0x106/0x110 kernel/locking/lockdep.c:2170 check_prev_add kernel/locking/lockdep.c:3090 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain kernel/locking/lockdep.c:3825 [inline] __lock_acquire+0x146d/0x2830 kernel/locking/lockdep.c:5049 lock_acquire+0xe3/0x270 kernel/locking/lockdep.c:5662 down_write+0x26/0xc0 kernel/locking/rwsem.c:1573 inode_lock include/linux/fs.h:756 [inline] ext4_xattr_inode_iget+0x151/0x170 fs/ext4/xattr.c:425 ext4_xattr_inode_get+0x4f/0x210 fs/ext4/xattr.c:485 ext4_xattr_move_to_block fs/ext4/xattr.c:2590 [inline] ext4_xattr_make_inode_space fs/ext4/xattr.c:2692 [inline] ext4_expand_extra_isize_ea+0x43c/0x850 fs/ext4/xattr.c:2784 __ext4_expand_extra_isize+0xbc/0x130 fs/ext4/inode.c:5919 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5962 [inline] __ext4_mark_inode_dirty+0x17f/0x230 fs/ext4/inode.c:6040 ext4_setattr+0x607/0x700 fs/ext4/inode.c:5550 notify_change+0x3c2/0x420 fs/attr.c:499 do_truncate+0xdd/0x120 fs/open.c:65 handle_truncate fs/namei.c:3217 [inline] do_open fs/namei.c:3562 [inline] path_openat+0xb69/0xc40 fs/namei.c:3715 do_filp_open+0xa8/0x150 fs/namei.c:3742 do_sys_openat2+0x89/0x160 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_creat fs/open.c:1410 [inline] __se_sys_creat fs/open.c:1404 [inline] __x64_sys_creat+0x42/0x60 fs/open.c:1404 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f24f070c959 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f24f028f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 00007f24f082bf80 RCX: 00007f24f070c959 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f24f0768c88 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000006 R14: 00007f24f082bf80 R15: 00007ffd2618b9d8