ci2 starts bisection 2024-01-08 02:02:41.003157312 +0000 UTC m=+184741.129335600 bisecting fixing commit since ca48fc16c49388400eddd6c6614593ebf7c7726a building syzkaller on 90c93c40627cb0ac3c2c7cb99d807fd4c137adcb ensuring issue is reproducible on original commit ca48fc16c49388400eddd6c6614593ebf7c7726a testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: cc874107929677c644d54012ced1f33cbb29258c9c39eeb07e7d5c3b6272d371 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] check whether we can drop unnecessary instrumentation disabling configs for [BUG KASAN ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 61f7a47983fba93d37e81ec6006f10bfa7c3369d3cc6aaf168c7d968868a6f34 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG KASAN ATOMIC_SLEEP], they are not needed kconfig minimization: base=3820 full=7524 leaves diff=1994 split chunks (needed=false): <1994> split chunk #0 of len 1994 into 5 parts testing without sub-chunk 1/5 disabling configs for [KASAN ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 94e29416ff99252d2684ceed974da094753eae0347b889d7f6b07c2cf8617f1a all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [HANG LEAK UBSAN BUG KASAN ATOMIC_SLEEP], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 105e530dbbb027f3dc049c360b07e4c27495ca0c62a64bee31f8c332205d2a42 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG KASAN], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fe7cba56bea8655c546148823c480d0635971de8b88820ecba8817eac9e03fd0 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [HANG LEAK UBSAN BUG KASAN ATOMIC_SLEEP], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 396ec64ce01e62e7c68501775ecb64d841a269f0bd2a95a1c38a5c15efb701f0 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [HANG LEAK UBSAN BUG KASAN ATOMIC_SLEEP], they are not needed testing commit ca48fc16c49388400eddd6c6614593ebf7c7726a gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ff1611d4e9ae7d65fda35cd57b810b976ecd0e92d7f1fd2a0ee6aaacf093da08 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] the chunk can be dropped disabling configs for [BUG KASAN ATOMIC_SLEEP HANG LEAK UBSAN], they are not needed testing current HEAD 38fb82ecd144fa22c5e41cb6e56f1fa8c98d6f61 testing commit 38fb82ecd144fa22c5e41cb6e56f1fa8c98d6f61 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b57f93fc7b136f6ef978926ca2bcf12beb7ca5bc9dc735584f9051b2612184b1 all runs: crashed: possible deadlock in ext4_xattr_inode_iget representative crash: possible deadlock in ext4_xattr_inode_iget, types: [LOCKDEP] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 1h3m54.496335636s (build: 29m46.537730472s, test: 26m29.908610403s) crash still not fixed or there were kernel test errors commit msg: Linux 6.1.71 crash: possible deadlock in ext4_xattr_inode_iget EXT4-fs (loop0): 1 truncate cleaned up EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. ====================================================== WARNING: possible circular locking dependency detected 6.1.71-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.0/1512 is trying to acquire lock: ffff8881152b3358 (&ea_inode->i_rwsem#7/1){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline] ffff8881152b3358 (&ea_inode->i_rwsem#7/1){+.+.}-{3:3}, at: ext4_xattr_inode_iget+0x151/0x170 fs/ext4/xattr.c:425 but task is already holding lock: ffff8881152b4e48 (&ei->i_data_sem/3){++++}-{3:3}, at: ext4_setattr+0x5dd/0x700 fs/ext4/inode.c:5547 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&ei->i_data_sem/3){++++}-{3:3}: down_write+0x26/0xc0 kernel/locking/rwsem.c:1573 ext4_update_i_disksize fs/ext4/ext4.h:3377 [inline] ext4_xattr_inode_write fs/ext4/xattr.c:1397 [inline] ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1545 [inline] ext4_xattr_set_entry+0xca9/0x11b0 fs/ext4/xattr.c:1669 ext4_xattr_ibody_set+0x53/0xa0 fs/ext4/xattr.c:2237 ext4_xattr_set_handle+0x41a/0x690 fs/ext4/xattr.c:2394 ext4_xattr_set+0xe3/0x170 fs/ext4/xattr.c:2508 __vfs_setxattr+0x105/0x130 fs/xattr.c:182 __vfs_setxattr_noperm+0x8e/0x1f0 fs/xattr.c:216 vfs_setxattr+0xde/0x170 fs/xattr.c:309 do_setxattr fs/xattr.c:594 [inline] setxattr+0x131/0x170 fs/xattr.c:617 path_setxattr+0xab/0x120 fs/xattr.c:636 __do_sys_setxattr fs/xattr.c:652 [inline] __se_sys_setxattr fs/xattr.c:648 [inline] __x64_sys_setxattr+0x22/0x30 fs/xattr.c:648 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3d/0x80 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x63/0xcd -> #0 (&ea_inode->i_rwsem#7/1){+.+.}-{3:3}: check_prev_add kernel/locking/lockdep.c:3090 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain kernel/locking/lockdep.c:3825 [inline] __lock_acquire+0x146d/0x2830 kernel/locking/lockdep.c:5049 lock_acquire+0xe3/0x270 kernel/locking/lockdep.c:5662 down_write+0x26/0xc0 kernel/locking/rwsem.c:1573 inode_lock include/linux/fs.h:756 [inline] ext4_xattr_inode_iget+0x151/0x170 fs/ext4/xattr.c:425 ext4_xattr_inode_get+0x4f/0x210 fs/ext4/xattr.c:485 ext4_xattr_move_to_block fs/ext4/xattr.c:2590 [inline] ext4_xattr_make_inode_space fs/ext4/xattr.c:2692 [inline] ext4_expand_extra_isize_ea+0x43c/0x850 fs/ext4/xattr.c:2784 __ext4_expand_extra_isize+0xbc/0x130 fs/ext4/inode.c:5919 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5962 [inline] __ext4_mark_inode_dirty+0x17f/0x230 fs/ext4/inode.c:6040 ext4_setattr+0x607/0x700 fs/ext4/inode.c:5550 notify_change+0x3c2/0x420 fs/attr.c:499 do_truncate+0xdd/0x120 fs/open.c:65 handle_truncate fs/namei.c:3293 [inline] do_open fs/namei.c:3638 [inline] path_openat+0xb69/0xc40 fs/namei.c:3791 do_filp_open+0xa8/0x150 fs/namei.c:3818 do_sys_openat2+0x89/0x160 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_creat fs/open.c:1410 [inline] __se_sys_creat fs/open.c:1404 [inline] __x64_sys_creat+0x42/0x60 fs/open.c:1404 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3d/0x80 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x63/0xcd other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ei->i_data_sem/3); lock(&ea_inode->i_rwsem#7/1); lock(&ei->i_data_sem/3); lock(&ea_inode->i_rwsem#7/1); *** DEADLOCK *** 5 locks held by syz-executor.0/1512: #0: ffff888108664438 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write+0xe/0x30 fs/namespace.c:393 #1: ffff8881152b4fc0 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline] #1: ffff8881152b4fc0 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: do_truncate+0xcd/0x120 fs/open.c:63 #2: ffff8881152b5160 (mapping.invalidate_lock){++++}-{3:3}, at: filemap_invalidate_lock include/linux/fs.h:801 [inline] #2: ffff8881152b5160 (mapping.invalidate_lock){++++}-{3:3}, at: ext4_setattr+0x3ff/0x700 fs/ext4/inode.c:5507 #3: ffff8881152b4e48 (&ei->i_data_sem/3){++++}-{3:3}, at: ext4_setattr+0x5dd/0x700 fs/ext4/inode.c:5547 #4: ffff8881152b4c88 (&ei->xattr_sem){++++}-{3:3}, at: ext4_write_trylock_xattr fs/ext4/xattr.h:162 [inline] #4: ffff8881152b4c88 (&ei->xattr_sem){++++}-{3:3}, at: ext4_try_to_expand_extra_isize fs/ext4/inode.c:5959 [inline] #4: ffff8881152b4c88 (&ei->xattr_sem){++++}-{3:3}, at: __ext4_mark_inode_dirty+0x149/0x230 fs/ext4/inode.c:6040 stack backtrace: CPU: 0 PID: 1512 Comm: syz-executor.0 Not tainted 6.1.71-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x89/0xd7 lib/dump_stack.c:106 print_circular_bug+0x2c5/0x300 kernel/locking/lockdep.c:2048 check_noncircular+0x106/0x110 kernel/locking/lockdep.c:2170 check_prev_add kernel/locking/lockdep.c:3090 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain kernel/locking/lockdep.c:3825 [inline] __lock_acquire+0x146d/0x2830 kernel/locking/lockdep.c:5049 lock_acquire+0xe3/0x270 kernel/locking/lockdep.c:5662 down_write+0x26/0xc0 kernel/locking/rwsem.c:1573 inode_lock include/linux/fs.h:756 [inline] ext4_xattr_inode_iget+0x151/0x170 fs/ext4/xattr.c:425 ext4_xattr_inode_get+0x4f/0x210 fs/ext4/xattr.c:485 ext4_xattr_move_to_block fs/ext4/xattr.c:2590 [inline] ext4_xattr_make_inode_space fs/ext4/xattr.c:2692 [inline] ext4_expand_extra_isize_ea+0x43c/0x850 fs/ext4/xattr.c:2784 __ext4_expand_extra_isize+0xbc/0x130 fs/ext4/inode.c:5919 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5962 [inline] __ext4_mark_inode_dirty+0x17f/0x230 fs/ext4/inode.c:6040 ext4_setattr+0x607/0x700 fs/ext4/inode.c:5550 notify_change+0x3c2/0x420 fs/attr.c:499 do_truncate+0xdd/0x120 fs/open.c:65 handle_truncate fs/namei.c:3293 [inline] do_open fs/namei.c:3638 [inline] path_openat+0xb69/0xc40 fs/namei.c:3791 do_filp_open+0xa8/0x150 fs/namei.c:3818 do_sys_openat2+0x89/0x160 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_creat fs/open.c:1410 [inline] __se_sys_creat fs/open.c:1404 [inline] __x64_sys_creat+0x42/0x60 fs/open.c:1404 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3d/0x80 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fd3b1390959 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fd3b0f130c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 00007fd3b14aff80 RCX: 00007fd3b1390959 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007fd3b13ecc88 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000006 R14: 00007fd3b14aff80 R15: 00007fffad83b998