ci2 starts bisection 2026-01-04 22:17:38.255559045 +0000 UTC m=+3401270.432682102 bisecting fixing commit since cc5ec87693063acebb60f587e8a019ba9b94ae0e building syzkaller on 07e030dea6e6d9ca88b75bb3be2810f47083b328 ensuring issue is reproducible on original commit cc5ec87693063acebb60f587e8a019ba9b94ae0e testing commit cc5ec87693063acebb60f587e8a019ba9b94ae0e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 13c74ecb7c7bdb2bf3bd298a4b7f3f0108d781bb1c78dc3ccf953db11b143844 run #0: basic kernel testing failed: SYZFAIL: failed to recv rpc run #1: basic kernel testing failed: SYZFAIL: failed to recv rpc run #2: basic kernel testing failed: SYZFAIL: failed to recv rpc run #3: basic kernel testing failed: SYZFAIL: failed to recv rpc run #4: basic kernel testing failed: SYZFAIL: failed to recv rpc run #5: basic kernel testing failed: SYZFAIL: failed to recv rpc run #6: crashed: possible deadlock in ext4_xattr_set_entry run #7: crashed: possible deadlock in ext4_xattr_set_entry run #8: crashed: possible deadlock in ext4_xattr_set_entry run #9: crashed: possible deadlock in ext4_xattr_set_entry run #10: crashed: possible deadlock in ext4_xattr_set_entry run #11: crashed: possible deadlock in ext4_xattr_set_entry run #12: crashed: possible deadlock in ext4_xattr_set_entry run #13: crashed: possible deadlock in ext4_xattr_set_entry run #14: crashed: possible deadlock in ext4_xattr_set_entry run #15: crashed: possible deadlock in ext4_xattr_set_entry run #16: crashed: possible deadlock in ext4_xattr_set_entry run #17: crashed: possible deadlock in ext4_xattr_set_entry run #18: crashed: possible deadlock in ext4_xattr_set_entry run #19: crashed: possible deadlock in ext4_xattr_set_entry representative crash: possible deadlock in ext4_xattr_set_entry, types: [LOCKDEP] check whether we can drop unnecessary instrumentation disabling configs for [kasan atomic_sleep hang memleak ubsan bug_or_warning], they are not needed testing commit cc5ec87693063acebb60f587e8a019ba9b94ae0e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 9c3b54cabc0a3be895b323f9a31aad486a9b5564f0293677455eee7a1b18ab4d run #0: basic kernel testing failed: SYZFAIL: failed to recv rpc run #1: crashed: possible deadlock in ext4_xattr_set_entry run #2: crashed: possible deadlock in ext4_xattr_set_entry run #3: crashed: possible deadlock in ext4_xattr_set_entry run #4: crashed: possible deadlock in ext4_xattr_set_entry run #5: crashed: possible deadlock in ext4_xattr_set_entry run #6: crashed: possible deadlock in ext4_xattr_set_entry run #7: crashed: possible deadlock in ext4_xattr_set_entry run #8: crashed: possible deadlock in ext4_xattr_set_entry run #9: crashed: possible deadlock in ext4_xattr_set_entry representative crash: possible deadlock in ext4_xattr_set_entry, types: [LOCKDEP] the bug reproduces without the instrumentation disabling configs for [memleak ubsan bug_or_warning kasan atomic_sleep hang], they are not needed kconfig minimization: base=3707 full=7424 leaves diff=2100 split chunks (needed=false): <2100> split chunk #0 of len 2100 into 5 parts testing without sub-chunk 1/5 disabling configs for [kasan atomic_sleep hang memleak ubsan bug_or_warning], they are not needed testing commit cc5ec87693063acebb60f587e8a019ba9b94ae0e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3fa72292064d84b2ce4e26f186c0d767c3b77c7380c3fd400c7a0380b95840ee run #0: basic kernel testing failed: SYZFAIL: failed to recv rpc run #1: basic kernel testing failed: SYZFAIL: failed to recv rpc run #2: crashed: possible deadlock in ext4_xattr_set_entry run #3: crashed: possible deadlock in ext4_xattr_set_entry run #4: crashed: possible deadlock in ext4_xattr_set_entry run #5: crashed: possible deadlock in ext4_xattr_set_entry run #6: crashed: possible deadlock in ext4_xattr_set_entry run #7: crashed: possible deadlock in ext4_xattr_set_entry run #8: crashed: possible deadlock in ext4_xattr_set_entry run #9: crashed: possible deadlock in ext4_xattr_set_entry representative crash: possible deadlock in ext4_xattr_set_entry, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [hang memleak ubsan bug_or_warning kasan atomic_sleep], they are not needed testing commit cc5ec87693063acebb60f587e8a019ba9b94ae0e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 35e58bdb26c317375283b5e581603eaa868b5966ed3eb3d538d26a709c844479 run #0: basic kernel testing failed: SYZFAIL: failed to recv rpc run #1: crashed: possible deadlock in ext4_xattr_set_entry run #2: crashed: possible deadlock in ext4_xattr_set_entry run #3: crashed: possible deadlock in ext4_xattr_set_entry run #4: crashed: possible deadlock in ext4_xattr_set_entry run #5: crashed: possible deadlock in ext4_xattr_set_entry run #6: crashed: possible deadlock in ext4_xattr_set_entry run #7: crashed: possible deadlock in ext4_xattr_set_entry run #8: crashed: possible deadlock in ext4_xattr_set_entry run #9: crashed: possible deadlock in ext4_xattr_set_entry representative crash: possible deadlock in ext4_xattr_set_entry, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [hang memleak ubsan bug_or_warning kasan atomic_sleep], they are not needed testing commit cc5ec87693063acebb60f587e8a019ba9b94ae0e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 97a139a7a9bdd34b291c43bf59d78c468ff68f9c5833a65bdc0794f391ee0905 all runs: crashed: possible deadlock in ext4_xattr_set_entry representative crash: possible deadlock in ext4_xattr_set_entry, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [atomic_sleep hang memleak ubsan bug_or_warning kasan], they are not needed testing commit cc5ec87693063acebb60f587e8a019ba9b94ae0e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2bc6646068a16431c85b059b130b29a57c3d8d281de0ceabc718fe8e25284607 all runs: crashed: possible deadlock in ext4_xattr_set_entry representative crash: possible deadlock in ext4_xattr_set_entry, types: [LOCKDEP] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [atomic_sleep hang memleak ubsan bug_or_warning kasan], they are not needed testing commit cc5ec87693063acebb60f587e8a019ba9b94ae0e gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3eee93073926e1a25d7034c5f4454932eef0da4575b43f2e3dabbcfc23f8f589 run #0: basic kernel testing failed: SYZFAIL: failed to recv rpc run #1: crashed: possible deadlock in ext4_xattr_set_entry run #2: crashed: possible deadlock in ext4_xattr_set_entry run #3: crashed: possible deadlock in ext4_xattr_set_entry run #4: crashed: possible deadlock in ext4_xattr_set_entry run #5: crashed: possible deadlock in ext4_xattr_set_entry run #6: crashed: possible deadlock in ext4_xattr_set_entry run #7: crashed: possible deadlock in ext4_xattr_set_entry run #8: crashed: possible deadlock in ext4_xattr_set_entry run #9: crashed: possible deadlock in ext4_xattr_set_entry representative crash: possible deadlock in ext4_xattr_set_entry, types: [LOCKDEP] the chunk can be dropped disabling configs for [bug_or_warning kasan atomic_sleep hang memleak ubsan], they are not needed testing current HEAD 68efe5a6c16a05391e3d96025b41e9bf573f968c testing commit 68efe5a6c16a05391e3d96025b41e9bf573f968c gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 1f9c8c27fa4e690c1b57445dbb9e5ef307b28409c911f5c9eea7481daea27b69 run #0: basic kernel testing failed: SYZFAIL: failed to recv rpc run #1: crashed: possible deadlock in ext4_xattr_set_entry run #2: crashed: possible deadlock in ext4_xattr_set_entry run #3: crashed: possible deadlock in ext4_xattr_set_entry run #4: crashed: possible deadlock in ext4_xattr_set_entry run #5: crashed: possible deadlock in ext4_xattr_set_entry run #6: crashed: possible deadlock in ext4_xattr_set_entry run #7: crashed: possible deadlock in ext4_xattr_set_entry run #8: crashed: possible deadlock in ext4_xattr_set_entry run #9: crashed: possible deadlock in ext4_xattr_set_entry representative crash: possible deadlock in ext4_xattr_set_entry, types: [LOCKDEP] crash still not fixed/happens on the oldest tested release revisions tested: 8, total time: 1h4m26.906398906s (build: 29m24.944735502s, test: 31m34.880032354s) crash still not fixed or there were kernel test errors commit msg: Linux 5.15.197 crash: possible deadlock in ext4_xattr_set_entry EXT4-fs (loop3): mounted filesystem without journal. Opts: max_batch_time=0x0000000000000004,max_batch_time=0x0000000000000002,debug_want_extra_isize=0x000000000000006a,user_xattr,errors=remount-ro,nombcache,. Quota mode: none. ====================================================== WARNING: possible circular locking dependency detected syzkaller #0 Not tainted ------------------------------------------------------ syz.3.19/2562 is trying to acquire lock: ffff88810b7b32a8 (&sb->s_type->i_mutex_key#7/1){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:787 [inline] ffff88810b7b32a8 (&sb->s_type->i_mutex_key#7/1){+.+.}-{3:3}, at: ext4_xattr_inode_create fs/ext4/xattr.c:1475 [inline] ffff88810b7b32a8 (&sb->s_type->i_mutex_key#7/1){+.+.}-{3:3}, at: ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1557 [inline] ffff88810b7b32a8 (&sb->s_type->i_mutex_key#7/1){+.+.}-{3:3}, at: ext4_xattr_set_entry+0xfca/0x1330 fs/ext4/xattr.c:1685 but task is already holding lock: ffff88810b7b1528 (&ei->i_data_sem/3){++++}-{3:3}, at: ext4_setattr+0x5f4/0x9e0 fs/ext4/inode.c:5560 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&ei->i_data_sem/3){++++}-{3:3}: down_write+0x20/0xa0 kernel/locking/rwsem.c:1551 ext4_update_i_disksize fs/ext4/ext4.h:3419 [inline] ext4_xattr_inode_write fs/ext4/xattr.c:1413 [inline] ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1561 [inline] ext4_xattr_set_entry+0x1207/0x1330 fs/ext4/xattr.c:1685 ext4_xattr_ibody_set+0x4d/0xb0 fs/ext4/xattr.c:2253 ext4_xattr_set_handle+0x346/0x650 fs/ext4/xattr.c:2410 ext4_xattr_set+0x7c/0x150 fs/ext4/xattr.c:2523 __vfs_setxattr+0x62/0x80 fs/xattr.c:182 __vfs_setxattr_noperm+0x74/0x220 fs/xattr.c:216 vfs_setxattr+0x99/0x180 fs/xattr.c:303 setxattr+0x83/0xa0 fs/xattr.c:611 path_setxattr+0xbe/0xe0 fs/xattr.c:630 __do_sys_lsetxattr fs/xattr.c:653 [inline] __se_sys_lsetxattr fs/xattr.c:649 [inline] __x64_sys_lsetxattr+0x1f/0x30 fs/xattr.c:649 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 -> #0 (&sb->s_type->i_mutex_key#7/1){+.+.}-{3:3}: check_prev_add kernel/locking/lockdep.c:3053 [inline] check_prevs_add kernel/locking/lockdep.c:3172 [inline] validate_chain kernel/locking/lockdep.c:3788 [inline] __lock_acquire+0x10b6/0x1a40 kernel/locking/lockdep.c:5012 lock_acquire kernel/locking/lockdep.c:5623 [inline] lock_acquire+0xbb/0x290 kernel/locking/lockdep.c:5588 down_write+0x20/0xa0 kernel/locking/rwsem.c:1551 inode_lock include/linux/fs.h:787 [inline] ext4_xattr_inode_create fs/ext4/xattr.c:1475 [inline] ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1557 [inline] ext4_xattr_set_entry+0xfca/0x1330 fs/ext4/xattr.c:1685 ext4_xattr_block_set+0x45c/0xf90 fs/ext4/xattr.c:2005 ext4_xattr_move_to_block fs/ext4/xattr.c:2633 [inline] ext4_xattr_make_inode_space fs/ext4/xattr.c:2708 [inline] ext4_expand_extra_isize_ea+0x39a/0x900 fs/ext4/xattr.c:2800 __ext4_expand_extra_isize+0xc4/0x110 fs/ext4/inode.c:5901 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5944 [inline] __ext4_mark_inode_dirty+0x17b/0x220 fs/ext4/inode.c:6022 ext4_setattr+0x623/0x9e0 fs/ext4/inode.c:5563 notify_change+0x1f8/0x500 fs/attr.c:505 do_truncate+0x7b/0xd0 fs/open.c:65 handle_truncate fs/namei.c:3273 [inline] do_open fs/namei.c:3620 [inline] path_openat+0x868/0xb10 fs/namei.c:3750 do_filp_open+0xa4/0x150 fs/namei.c:3777 do_sys_openat2+0x92/0x160 fs/open.c:1255 do_sys_open fs/open.c:1271 [inline] __do_sys_openat fs/open.c:1287 [inline] __se_sys_openat fs/open.c:1282 [inline] __x64_sys_openat+0x4f/0x90 fs/open.c:1282 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ei->i_data_sem/3); lock(&sb->s_type->i_mutex_key#7/1); lock(&ei->i_data_sem/3); lock(&sb->s_type->i_mutex_key#7/1); *** DEADLOCK *** 5 locks held by syz.3.19/2562: #0: ffff88810eeb7438 (sb_writers#4){.+.+}-{0:0}, at: do_open fs/namei.c:3609 [inline] #0: ffff88810eeb7438 (sb_writers#4){.+.+}-{0:0}, at: path_openat+0x81b/0xb10 fs/namei.c:3750 #1: ffff88810b7b16a0 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: inode_lock include/linux/fs.h:787 [inline] #1: ffff88810b7b16a0 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: do_truncate+0x6b/0xd0 fs/open.c:63 #2: ffff88810b7b1830 (mapping.invalidate_lock){++++}-{3:3}, at: filemap_invalidate_lock include/linux/fs.h:832 [inline] #2: ffff88810b7b1830 (mapping.invalidate_lock){++++}-{3:3}, at: ext4_setattr+0x364/0x9e0 fs/ext4/inode.c:5520 #3: ffff88810b7b1528 (&ei->i_data_sem/3){++++}-{3:3}, at: ext4_setattr+0x5f4/0x9e0 fs/ext4/inode.c:5560 #4: ffff88810b7b1378 (&ei->xattr_sem){++++}-{3:3}, at: ext4_write_trylock_xattr fs/ext4/xattr.h:162 [inline] #4: ffff88810b7b1378 (&ei->xattr_sem){++++}-{3:3}, at: ext4_try_to_expand_extra_isize fs/ext4/inode.c:5941 [inline] #4: ffff88810b7b1378 (&ei->xattr_sem){++++}-{3:3}, at: __ext4_mark_inode_dirty+0x140/0x220 fs/ext4/inode.c:6022 stack backtrace: CPU: 1 PID: 2562 Comm: syz.3.19 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x57/0x7d lib/dump_stack.c:106 check_noncircular+0xcc/0xe0 kernel/locking/lockdep.c:2133 check_prev_add kernel/locking/lockdep.c:3053 [inline] check_prevs_add kernel/locking/lockdep.c:3172 [inline] validate_chain kernel/locking/lockdep.c:3788 [inline] __lock_acquire+0x10b6/0x1a40 kernel/locking/lockdep.c:5012 lock_acquire kernel/locking/lockdep.c:5623 [inline] lock_acquire+0xbb/0x290 kernel/locking/lockdep.c:5588 down_write+0x20/0xa0 kernel/locking/rwsem.c:1551 inode_lock include/linux/fs.h:787 [inline] ext4_xattr_inode_create fs/ext4/xattr.c:1475 [inline] ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1557 [inline] ext4_xattr_set_entry+0xfca/0x1330 fs/ext4/xattr.c:1685 ext4_xattr_block_set+0x45c/0xf90 fs/ext4/xattr.c:2005 ext4_xattr_move_to_block fs/ext4/xattr.c:2633 [inline] ext4_xattr_make_inode_space fs/ext4/xattr.c:2708 [inline] ext4_expand_extra_isize_ea+0x39a/0x900 fs/ext4/xattr.c:2800 __ext4_expand_extra_isize+0xc4/0x110 fs/ext4/inode.c:5901 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5944 [inline] __ext4_mark_inode_dirty+0x17b/0x220 fs/ext4/inode.c:6022 ext4_setattr+0x623/0x9e0 fs/ext4/inode.c:5563 notify_change+0x1f8/0x500 fs/attr.c:505 do_truncate+0x7b/0xd0 fs/open.c:65 handle_truncate fs/namei.c:3273 [inline] do_open fs/namei.c:3620 [inline] path_openat+0x868/0xb10 fs/namei.c:3750 do_filp_open+0xa4/0x150 fs/namei.c:3777 do_sys_openat2+0x92/0x160 fs/open.c:1255 do_sys_open fs/open.c:1271 [inline] __do_sys_openat fs/open.c:1287 [inline] __se_sys_openat fs/open.c:1282 [inline] __x64_sys_openat+0x4f/0x90 fs/open.c:1282 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x33/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f17de2e46c9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f17de154038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f17de53afa0 RCX: 00007f17de2e46c9 RDX: 00000000000ce342 RSI: 00002000000002c0 RDI: ffffffffffffff9c RBP: 00007f17de366f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f17de53b038 R14: 00007f17de53afa0 R15: 00007ffc88c9fda8