[ 15.252739][ T3892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 15.258753][ T3892] eql: remember to turn off Van-Jacobson compression on your slave devices [ 15.303593][ T1588] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 15.307713][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.86' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 36.190540][ T4217] loop0: detected capacity change from 0 to 512 [ 36.193521][ T4217] ======================================================= [ 36.193521][ T4217] WARNING: The mand mount option has been deprecated and [ 36.193521][ T4217] and is ignored by this kernel. Remove the mand [ 36.193521][ T4217] option from the mount to silence this warning. [ 36.193521][ T4217] ======================================================= [ 36.204404][ T4217] EXT4-fs (loop0): orphan cleanup on readonly fs [ 36.206681][ T4217] EXT4-fs warning (device loop0): ext4_enable_quotas:6988: Failed to enable quota tracking (type=2, err=-22, ino=15). Please run e2fsck to fix. [ 36.244590][ T4217] EXT4-fs (loop0): Cannot turn on quotas: error -22 [ 36.249207][ T4217] EXT4-fs (loop0): 1 truncate cleaned up [ 36.250433][ T4217] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 36.255089][ T4217] [ 36.255623][ T4217] ====================================================== [ 36.257118][ T4217] WARNING: possible circular locking dependency detected [ 36.258541][ T4217] 6.1.27-syzkaller #0 Not tainted [ 36.259595][ T4217] ------------------------------------------------------ [ 36.261138][ T4217] syz-executor110/4217 is trying to acquire lock: [ 36.262521][ T4217] ffff0000d516a460 (sb_writers#3){.+.+}-{0:0}, at: ext4_multi_mount_protect+0x2e0/0x8a4 [ 36.264588][ T4217] [ 36.264588][ T4217] but task is already holding lock: [ 36.266131][ T4217] ffff0000d516a0e0 (&type->s_umount_key#30){++++}-{3:3}, at: __arm64_sys_fsconfig+0xa14/0xd18 [ 36.268441][ T4217] [ 36.268441][ T4217] which lock already depends on the new lock. [ 36.268441][ T4217] [ 36.270763][ T4217] [ 36.270763][ T4217] the existing dependency chain (in reverse order) is: [ 36.272763][ T4217] [ 36.272763][ T4217] -> #1 (&type->s_umount_key#30){++++}-{3:3}: [ 36.274502][ T4217] down_write+0x5c/0x88 [ 36.275486][ T4217] __arm64_sys_quotactl_fd+0x2fc/0x4a4 [ 36.276820][ T4217] invoke_syscall+0x98/0x2c0 [ 36.277918][ T4217] el0_svc_common+0x138/0x258 [ 36.279111][ T4217] do_el0_svc+0x64/0x218 [ 36.280168][ T4217] el0_svc+0x58/0x168 [ 36.281095][ T4217] el0t_64_sync_handler+0x84/0xf0 [ 36.282408][ T4217] el0t_64_sync+0x18c/0x190 [ 36.283601][ T4217] [ 36.283601][ T4217] -> #0 (sb_writers#3){.+.+}-{0:0}: [ 36.285244][ T4217] __lock_acquire+0x3338/0x764c [ 36.286379][ T4217] lock_acquire+0x26c/0x7cc [ 36.287471][ T4217] write_mmp_block+0x100/0xb8c [ 36.288619][ T4217] ext4_multi_mount_protect+0x2e0/0x8a4 [ 36.289878][ T4217] ext4_reconfigure+0x218c/0x2934 [ 36.291126][ T4217] reconfigure_super+0x328/0x738 [ 36.292320][ T4217] __arm64_sys_fsconfig+0xa1c/0xd18 [ 36.293589][ T4217] invoke_syscall+0x98/0x2c0 [ 36.294715][ T4217] el0_svc_common+0x138/0x258 [ 36.295898][ T4217] do_el0_svc+0x64/0x218 [ 36.296943][ T4217] el0_svc+0x58/0x168 [ 36.297989][ T4217] el0t_64_sync_handler+0x84/0xf0 [ 36.299251][ T4217] el0t_64_sync+0x18c/0x190 [ 36.300403][ T4217] [ 36.300403][ T4217] other info that might help us debug this: [ 36.300403][ T4217] [ 36.302545][ T4217] Possible unsafe locking scenario: [ 36.302545][ T4217] [ 36.304267][ T4217] CPU0 CPU1 [ 36.305480][ T4217] ---- ---- [ 36.306602][ T4217] lock(&type->s_umount_key#30); [ 36.307668][ T4217] lock(sb_writers#3); [ 36.309046][ T4217] lock(&type->s_umount_key#30); [ 36.310710][ T4217] lock(sb_writers#3); [ 36.311752][ T4217] [ 36.311752][ T4217] *** DEADLOCK *** [ 36.311752][ T4217] [ 36.313548][ T4217] 2 locks held by syz-executor110/4217: [ 36.314810][ T4217] #0: ffff0000cf976870 (&fc->uapi_mutex){+.+.}-{3:3}, at: __arm64_sys_fsconfig+0x720/0xd18 [ 36.317116][ T4217] #1: ffff0000d516a0e0 (&type->s_umount_key#30){++++}-{3:3}, at: __arm64_sys_fsconfig+0xa14/0xd18 [ 36.319574][ T4217] [ 36.319574][ T4217] stack backtrace: [ 36.320902][ T4217] CPU: 1 PID: 4217 Comm: syz-executor110 Not tainted 6.1.27-syzkaller #0 [ 36.322702][ T4217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 36.324945][ T4217] Call trace: [ 36.325742][ T4217] dump_backtrace+0x1c8/0x1f4 [ 36.326793][ T4217] show_stack+0x2c/0x3c [ 36.327744][ T4217] dump_stack_lvl+0x108/0x170 [ 36.328834][ T4217] dump_stack+0x1c/0x5c [ 36.329698][ T4217] print_circular_bug+0x150/0x1b8 [ 36.330831][ T4217] check_noncircular+0x2cc/0x378 [ 36.331978][ T4217] __lock_acquire+0x3338/0x764c [ 36.333081][ T4217] lock_acquire+0x26c/0x7cc [ 36.334073][ T4217] write_mmp_block+0x100/0xb8c [ 36.335068][ T4217] ext4_multi_mount_protect+0x2e0/0x8a4 [ 36.336275][ T4217] ext4_reconfigure+0x218c/0x2934 [ 36.337357][ T4217] reconfigure_super+0x328/0x738 [ 36.338380][ T4217] __arm64_sys_fsconfig+0xa1c/0xd18 [ 36.339482][ T4217] invoke_syscall+0x98/0x2c0 [ 36.340366][ T4217] el0_svc_common+0x138/0x258 [ 36.341439][ T4217] do_el0_svc+0x64/0x218 [ 36.342363][ T4217] el0_svc+0x58/0x168 [ 36.343206][ T4217] el0t_64_sync_handler+0x84/0xf0 [ 36.344239][ T4217] el0t_64_sync+0x18c/0x190 [ 36.355740][ T4217] EXT4-fs warning (device loop0): ext4_enable_quotas:6988: Failed to enable quota tracking (type=2, err=-22, ino=15). Please run e2fsck to fix.