| Title | Replies (including bot) | Last reply |
|---|---|---|
| [PATCH 0/4] ext4: clean up ea_inode handling | 5 (5) | 2023/05/24 03:49 |
| [syzbot] [ext4?] possible deadlock in ext4_setattr | 3 (5) | 2023/05/15 01:15 |
syzbot |
sign-in | mailing list | source | docs |
| Title | Replies (including bot) | Last reply |
|---|---|---|
| [PATCH 0/4] ext4: clean up ea_inode handling | 5 (5) | 2023/05/24 03:49 |
| [syzbot] [ext4?] possible deadlock in ext4_setattr | 3 (5) | 2023/05/15 01:15 |
| Kernel | Title | Rank 🛈 | Repro | Cause bisect | Fix bisect | Count | Last | Reported | Patched | Status |
|---|---|---|---|---|---|---|---|---|---|---|
| linux-5.15 | possible deadlock in ext4_setattr | 4 | 6 | 950d | 955d | 0/3 | auto-obsoleted due to no activity on 2023/07/21 04:14 | |||
| upstream | possible deadlock in ext4_setattr (2) ext4 | 4 | 2 | 497d | 509d | 0/29 | auto-obsoleted due to no activity on 2024/09/26 14:43 | |||
| upstream | possible deadlock in ext4_setattr (3) ext4 | 4 | 2 | 301d | 318d | 0/29 | auto-obsoleted due to no activity on 2025/04/10 15:09 |
EXT4-fs error (device loop0): ext4_xattr_block_set:2241: inode #12: comm syz-executor377: bad block 0
======================================================
WARNING: possible circular locking dependency detected
6.4.0-rc1-next-20230512-syzkaller #0 Not tainted
------------------------------------------------------
syz-executor377/5019 is trying to acquire lock:
ffff8880787f73a0 (mapping.invalidate_lock){++++}-{3:3}, at: filemap_invalidate_lock include/linux/fs.h:820 [inline]
ffff8880787f73a0 (mapping.invalidate_lock){++++}-{3:3}, at: ext4_setattr+0x68f/0x26c0 fs/ext4/inode.c:5359
but task is already holding lock:
ffff8880787f7200 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:775 [inline]
ffff8880787f7200 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: do_truncate+0x131/0x200 fs/open.c:64
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #3 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}:
down_write+0x92/0x200 kernel/locking/rwsem.c:1573
inode_lock include/linux/fs.h:775 [inline]
ext4_xattr_inode_create fs/ext4/xattr.c:1524 [inline]
ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1607 [inline]
ext4_xattr_set_entry+0x2b19/0x39e0 fs/ext4/xattr.c:1736
ext4_xattr_block_set+0xcb7/0x3030 fs/ext4/xattr.c:2042
ext4_xattr_set_handle+0xd8a/0x1510 fs/ext4/xattr.c:2457
ext4_xattr_set+0x144/0x360 fs/ext4/xattr.c:2559
__vfs_setxattr+0x173/0x1e0 fs/xattr.c:201
__vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:235
__vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:296
vfs_setxattr+0x143/0x340 fs/xattr.c:322
do_setxattr+0x147/0x190 fs/xattr.c:630
setxattr+0x146/0x160 fs/xattr.c:653
path_setxattr+0x197/0x1c0 fs/xattr.c:672
__do_sys_setxattr fs/xattr.c:688 [inline]
__se_sys_setxattr fs/xattr.c:684 [inline]
__x64_sys_setxattr+0xc4/0x160 fs/xattr.c:684
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
-> #2 (&ei->xattr_sem){++++}-{3:3}:
down_write+0x92/0x200 kernel/locking/rwsem.c:1573
ext4_write_lock_xattr fs/ext4/xattr.h:155 [inline]
ext4_xattr_set_handle+0x160/0x1510 fs/ext4/xattr.c:2372
ext4_xattr_set+0x144/0x360 fs/ext4/xattr.c:2559
__vfs_setxattr+0x173/0x1e0 fs/xattr.c:201
__vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:235
__vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:296
vfs_setxattr+0x143/0x340 fs/xattr.c:322
do_setxattr+0x147/0x190 fs/xattr.c:630
setxattr+0x146/0x160 fs/xattr.c:653
path_setxattr+0x197/0x1c0 fs/xattr.c:672
__do_sys_setxattr fs/xattr.c:688 [inline]
__se_sys_setxattr fs/xattr.c:684 [inline]
__x64_sys_setxattr+0xc4/0x160 fs/xattr.c:684
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
-> #1 (jbd2_handle){++++}-{0:0}:
start_this_handle+0xfe7/0x14e0 fs/jbd2/transaction.c:463
jbd2__journal_start+0x38a/0x6b0 fs/jbd2/transaction.c:520
__ext4_journal_start_sb+0x411/0x5d0 fs/ext4/ext4_jbd2.c:111
__ext4_journal_start fs/ext4/ext4_jbd2.h:326 [inline]
ext4_truncate+0x54f/0x1340 fs/ext4/inode.c:4126
ext4_setattr+0x1ac1/0x26c0 fs/ext4/inode.c:5436
notify_change+0xb2c/0x1180 fs/attr.c:483
do_truncate+0x143/0x200 fs/open.c:66
do_sys_ftruncate+0x53a/0x770 fs/open.c:194
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
-> #0 (mapping.invalidate_lock){++++}-{3:3}:
check_prev_add kernel/locking/lockdep.c:3113 [inline]
check_prevs_add kernel/locking/lockdep.c:3232 [inline]
validate_chain kernel/locking/lockdep.c:3847 [inline]
__lock_acquire+0x2fcd/0x5f30 kernel/locking/lockdep.c:5088
lock_acquire.part.0+0x11c/0x370 kernel/locking/lockdep.c:5705
down_write+0x92/0x200 kernel/locking/rwsem.c:1573
filemap_invalidate_lock include/linux/fs.h:820 [inline]
ext4_setattr+0x68f/0x26c0 fs/ext4/inode.c:5359
notify_change+0xb2c/0x1180 fs/attr.c:483
do_truncate+0x143/0x200 fs/open.c:66
handle_truncate fs/namei.c:3295 [inline]
do_open fs/namei.c:3640 [inline]
path_openat+0x2083/0x2750 fs/namei.c:3791
do_filp_open+0x1ba/0x410 fs/namei.c:3818
do_sys_openat2+0x16d/0x4c0 fs/open.c:1356
do_sys_open fs/open.c:1372 [inline]
__do_sys_openat fs/open.c:1388 [inline]
__se_sys_openat fs/open.c:1383 [inline]
__x64_sys_openat+0x143/0x1f0 fs/open.c:1383
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
other info that might help us debug this:
Chain exists of:
mapping.invalidate_lock --> &ei->xattr_sem --> &ea_inode->i_rwsem#8/1
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(&ea_inode->i_rwsem#8/1);
lock(&ei->xattr_sem);
lock(&ea_inode->i_rwsem#8/1);
lock(mapping.invalidate_lock);
*** DEADLOCK ***
2 locks held by syz-executor377/5019:
#0: ffff888021c64460 (sb_writers#4){.+.+}-{0:0}, at: do_open fs/namei.c:3629 [inline]
#0: ffff888021c64460 (sb_writers#4){.+.+}-{0:0}, at: path_openat+0x19a4/0x2750 fs/namei.c:3791
#1: ffff8880787f7200 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:775 [inline]
#1: ffff8880787f7200 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: do_truncate+0x131/0x200 fs/open.c:64
stack backtrace:
CPU: 0 PID: 5019 Comm: syz-executor377 Not tainted 6.4.0-rc1-next-20230512-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
check_noncircular+0x25f/0x2e0 kernel/locking/lockdep.c:2188
check_prev_add kernel/locking/lockdep.c:3113 [inline]
check_prevs_add kernel/locking/lockdep.c:3232 [inline]
validate_chain kernel/locking/lockdep.c:3847 [inline]
__lock_acquire+0x2fcd/0x5f30 kernel/locking/lockdep.c:5088
lock_acquire.part.0+0x11c/0x370 kernel/locking/lockdep.c:5705
down_write+0x92/0x200 kernel/locking/rwsem.c:1573
filemap_invalidate_lock include/linux/fs.h:820 [inline]
ext4_setattr+0x68f/0x26c0 fs/ext4/inode.c:5359
notify_change+0xb2c/0x1180 fs/attr.c:483
do_truncate+0x143/0x200 fs/open.c:66
handle_truncate fs/namei.c:3295 [inline]
do_open fs/namei.c:3640 [inline]
path_openat+0x2083/0x2750 fs/namei.c:3791
do_filp_open+0x1ba/0x410 fs/namei.c:3818
do_sys_openat2+0x16d/0x4c0 fs/open.c:1356
do_sys_open fs/open.c:1372 [inline]
__do_sys_openat fs/open.c:1388 [inline]
__se_sys_openat fs/open.c:1383 [inline]
__x64_sys_openat+0x143/0x1f0 fs/open.c:1383
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fdbd832a659
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fdbd82d62f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007fdbd83af780 RCX: 00007fdbd832a659
RDX: 0000000000028200 RSI: 00000000200000c0 RDI: ffffffffffffff9c
RBP: 0030656c69662f2e R08: 0000000000000000 R09: 0000000000000000
R10: 000000000000002d R11: 0000000000000246 R12: 00007fdbd837c0c0
R13: 95ac780a7f2d2eef R14: 2f30656c69662f2e R15: 00007fdbd83af788
</TASK>
| Time | Kernel | Commit | Syzkaller | Config | Log | Report | Syz repro | C repro | VM info | Assets (help?) | Manager | Title |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2023/05/13 12:56 | linux-next | e922ba281a8d | 2b9ba477 | .config | strace log | report | syz | C | [disk image] [vmlinux] [kernel image] [mounted in repro #1] [mounted in repro #2] | ci-upstream-linux-next-kasan-gce-root | possible deadlock in ext4_setattr | |
| 2023/01/10 07:49 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | 358a161a6a9e | 1dac8c7a | .config | console log | report | syz | C | [disk image] [vmlinux] [kernel image] [mounted in repro] | ci-upstream-gce-arm64 | possible deadlock in ext4_setattr | |
| 2023/03/18 03:27 | upstream | 8d3c682a5e3d | 7939252e | .config | console log | report | info | ci-upstream-kasan-gce-selinux-root | possible deadlock in ext4_setattr | |||
| 2023/03/18 02:26 | upstream | 8d3c682a5e3d | 7939252e | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-kasan-gce-root | possible deadlock in ext4_setattr | ||
| 2023/03/18 09:50 | upstream | 478a351ce0d6 | 7939252e | .config | console log | report | info | ci-qemu-upstream-386 | possible deadlock in ext4_setattr | |||
| 2023/03/18 00:30 | upstream | cb80b960ce44 | 7939252e | .config | console log | report | info | ci-qemu-upstream-386 | possible deadlock in ext4_setattr | |||
| 2023/04/15 10:03 | linux-next | d3f2cd248191 | ec410564 | .config | console log | report | info | ci-upstream-linux-next-kasan-gce-root | possible deadlock in ext4_setattr |