ci2 starts bisection 2024-04-26 20:58:57.852290154 +0000 UTC m=+33815.091586647 bisecting fixing commit since ca48fc16c49388400eddd6c6614593ebf7c7726a building syzkaller on 90c93c40627cb0ac3c2c7cb99d807fd4c137adcb ensuring issue is reproducible on original commit ca48fc16c49388400eddd6c6614593ebf7c7726a testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 16faf1f5b2ea093a65ca22836ffde393e55b168c980b2168c7e86dda452071ce all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] check whether we can drop unnecessary instrumentation disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG KASAN], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c7ea9f0532791b9afc7a4f94d0cdef2eaeb21259919a540f90aceec793e0c3f5 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG KASAN ATOMIC_SLEEP], they are not needed kconfig minimization: base=3820 full=7524 leaves diff=1994 split chunks (needed=false): <1994> split chunk #0 of len 1994 into 5 parts testing without sub-chunk 1/5 disabling configs for [LEAK UBSAN BUG KASAN ATOMIC_SLEEP HANG], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 48e782209ba92286d02370490118ed8d563816294b1b5610f4d8c8525dc6dfaf all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [KASAN ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: d34b2b97c95242454d9c70e87f8f1ff8ee635a3d9a3f8841c5fa8b0b6601fe7a all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [KASAN ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2a4fbe88fe8d87a4cf206adcd6d9cd79f87eeae257dff6f292e37f0880089849 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [KASAN ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 37f27d93c73eee356f3248d84eccd74135c8f0319068b389481277978f8aebfb all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG KASAN], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 18803a17e302f02fe501fdbc173337c1124c2a767438d335cafcdce8fc3bd28a all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped disabling configs for [BUG KASAN ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing current HEAD 6741e066ec7633450d3186946035c1f80c4226b8 testing commit 6741e066ec7633450d3186946035c1f80c4226b8 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 233eba40d6ebae254cc7cb9b066ebecc488c38a11eee176655ca35b80c2f6497 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 2h19m15.340507479s (build: 52m4.132453253s, test: 1h23m31.069752679s) crash still not fixed or there were kernel test errors commit msg: Linux 6.1.87 crash: possible deadlock in ext4_xattr_inode_iget EXT4-fs (loop0): 1 truncate cleaned up EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. ====================================================== WARNING: possible circular locking dependency detected 6.1.87-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.0/1511 is trying to acquire lock: ffff888114da3358 (&ea_inode->i_rwsem#7/1){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:758 [inline] ffff888114da3358 (&ea_inode->i_rwsem#7/1){+.+.}-{3:3}, at: ext4_xattr_inode_iget+0x151/0x170 fs/ext4/xattr.c:425 but task is already holding lock: ffff888114da3b58 (&ei->i_data_sem/3){++++}-{3:3}, at: ext4_setattr+0x5dd/0x700 fs/ext4/inode.c:5547 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&ei->i_data_sem/3){++++}-{3:3}: down_write+0x26/0xc0 kernel/locking/rwsem.c:1573 ext4_update_i_disksize fs/ext4/ext4.h:3377 [inline] ext4_xattr_inode_write fs/ext4/xattr.c:1397 [inline] ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1545 [inline] ext4_xattr_set_entry+0xca9/0x11b0 fs/ext4/xattr.c:1669 ext4_xattr_ibody_set+0x53/0xa0 fs/ext4/xattr.c:2237 ext4_xattr_set_handle+0x41a/0x690 fs/ext4/xattr.c:2394 ext4_xattr_set+0xe3/0x170 fs/ext4/xattr.c:2508 __vfs_setxattr+0x105/0x130 fs/xattr.c:182 __vfs_setxattr_noperm+0x8e/0x1f0 fs/xattr.c:216 vfs_setxattr+0xde/0x170 fs/xattr.c:309 do_setxattr fs/xattr.c:594 [inline] setxattr+0x131/0x170 fs/xattr.c:617 path_setxattr+0xab/0x120 fs/xattr.c:636 __do_sys_setxattr fs/xattr.c:652 [inline] __se_sys_setxattr fs/xattr.c:648 [inline] __x64_sys_setxattr+0x22/0x30 fs/xattr.c:648 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0x80 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 -> #0 (&ea_inode->i_rwsem#7/1){+.+.}-{3:3}: check_prev_add kernel/locking/lockdep.c:3090 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain kernel/locking/lockdep.c:3825 [inline] __lock_acquire+0x146d/0x2830 kernel/locking/lockdep.c:5049 lock_acquire+0xe3/0x270 kernel/locking/lockdep.c:5662 down_write+0x26/0xc0 kernel/locking/rwsem.c:1573 inode_lock include/linux/fs.h:758 [inline] ext4_xattr_inode_iget+0x151/0x170 fs/ext4/xattr.c:425 ext4_xattr_inode_get+0x4f/0x210 fs/ext4/xattr.c:485 ext4_xattr_move_to_block fs/ext4/xattr.c:2590 [inline] ext4_xattr_make_inode_space fs/ext4/xattr.c:2692 [inline] ext4_expand_extra_isize_ea+0x43c/0x850 fs/ext4/xattr.c:2784 __ext4_expand_extra_isize+0xbc/0x130 fs/ext4/inode.c:5919 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5962 [inline] __ext4_mark_inode_dirty+0x17f/0x230 fs/ext4/inode.c:6040 ext4_setattr+0x607/0x700 fs/ext4/inode.c:5550 notify_change+0x3c2/0x420 fs/attr.c:499 do_truncate+0xdd/0x120 fs/open.c:65 handle_truncate fs/namei.c:3287 [inline] do_open fs/namei.c:3632 [inline] path_openat+0xb69/0xc40 fs/namei.c:3785 do_filp_open+0xa8/0x150 fs/namei.c:3812 do_sys_openat2+0x89/0x160 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_creat fs/open.c:1410 [inline] __se_sys_creat fs/open.c:1404 [inline] __x64_sys_creat+0x42/0x60 fs/open.c:1404 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0x80 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ei->i_data_sem/3); lock(&ea_inode->i_rwsem#7/1); lock(&ei->i_data_sem/3); lock(&ea_inode->i_rwsem#7/1); *** DEADLOCK *** 5 locks held by syz-executor.0/1511: #0: ffff888106260438 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write+0xe/0x30 fs/namespace.c:393 #1: ffff888114da3cd0 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: inode_lock include/linux/fs.h:758 [inline] #1: ffff888114da3cd0 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: do_truncate+0xcd/0x120 fs/open.c:63 #2: ffff888114da3e70 (mapping.invalidate_lock){++++}-{3:3}, at: filemap_invalidate_lock include/linux/fs.h:803 [inline] #2: ffff888114da3e70 (mapping.invalidate_lock){++++}-{3:3}, at: ext4_setattr+0x3ff/0x700 fs/ext4/inode.c:5507 #3: ffff888114da3b58 (&ei->i_data_sem/3){++++}-{3:3}, at: ext4_setattr+0x5dd/0x700 fs/ext4/inode.c:5547 #4: ffff888114da3998 (&ei->xattr_sem){++++}-{3:3}, at: ext4_write_trylock_xattr fs/ext4/xattr.h:162 [inline] #4: ffff888114da3998 (&ei->xattr_sem){++++}-{3:3}, at: ext4_try_to_expand_extra_isize fs/ext4/inode.c:5959 [inline] #4: ffff888114da3998 (&ei->xattr_sem){++++}-{3:3}, at: __ext4_mark_inode_dirty+0x149/0x230 fs/ext4/inode.c:6040 stack backtrace: CPU: 1 PID: 1511 Comm: syz-executor.0 Not tainted 6.1.87-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x89/0xd7 lib/dump_stack.c:106 print_circular_bug+0x2c5/0x300 kernel/locking/lockdep.c:2048 check_noncircular+0x106/0x110 kernel/locking/lockdep.c:2170 check_prev_add kernel/locking/lockdep.c:3090 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain kernel/locking/lockdep.c:3825 [inline] __lock_acquire+0x146d/0x2830 kernel/locking/lockdep.c:5049 lock_acquire+0xe3/0x270 kernel/locking/lockdep.c:5662 down_write+0x26/0xc0 kernel/locking/rwsem.c:1573 inode_lock include/linux/fs.h:758 [inline] ext4_xattr_inode_iget+0x151/0x170 fs/ext4/xattr.c:425 ext4_xattr_inode_get+0x4f/0x210 fs/ext4/xattr.c:485 ext4_xattr_move_to_block fs/ext4/xattr.c:2590 [inline] ext4_xattr_make_inode_space fs/ext4/xattr.c:2692 [inline] ext4_expand_extra_isize_ea+0x43c/0x850 fs/ext4/xattr.c:2784 __ext4_expand_extra_isize+0xbc/0x130 fs/ext4/inode.c:5919 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5962 [inline] __ext4_mark_inode_dirty+0x17f/0x230 fs/ext4/inode.c:6040 ext4_setattr+0x607/0x700 fs/ext4/inode.c:5550 notify_change+0x3c2/0x420 fs/attr.c:499 do_truncate+0xdd/0x120 fs/open.c:65 handle_truncate fs/namei.c:3287 [inline] do_open fs/namei.c:3632 [inline] path_openat+0xb69/0xc40 fs/namei.c:3785 do_filp_open+0xa8/0x150 fs/namei.c:3812 do_sys_openat2+0x89/0x160 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_creat fs/open.c:1410 [inline] __se_sys_creat fs/open.c:1404 [inline] __x64_sys_creat+0x42/0x60 fs/open.c:1404 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0x80 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f3bea69a959 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f3bea21d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 00007f3bea7b9f80 RCX: 00007f3bea69a959 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f3bea6f6c88 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000006 R14: 00007f3bea7b9f80 R15: 00007ffd0d68f138