Warning: Permanently added '10.128.0.140' (ED25519) to the list of known hosts. executing program syzkaller login: [ 87.229542][ T4163] loop0: detected capacity change from 0 to 32768 [ 87.391238][ T4163] (syz-executor305,4163,1):ocfs2_block_check_validate:402 ERROR: CRC32 failed: stored: 0xb3775c19, computed 0x2dd1c265. Applying ECC. [ 87.427224][ T4163] (syz-executor305,4163,1):ocfs2_block_check_validate:402 ERROR: CRC32 failed: stored: 0xb3775c19, computed 0x2dd1c265. Applying ECC. [ 87.457398][ T4163] JBD2: Ignoring recovery information on journal [ 87.512309][ T4163] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 87.531759][ T9] ocfs2: Finishing quota recovery on device (7,0) for slot 0 [ 87.566326][ T4163] [ 87.568719][ T4163] ====================================================== [ 87.576618][ T4163] WARNING: possible circular locking dependency detected [ 87.583940][ T4163] 5.15.180-syzkaller #0 Not tainted [ 87.589226][ T4163] ------------------------------------------------------ [ 87.596427][ T4163] syz-executor305/4163 is trying to acquire lock: [ 87.603037][ T4163] ffff8881478bf138 ((wq_completion)ocfs2_wq){+.+.}-{0:0}, at: flush_workqueue+0x154/0x1610 [ 87.614233][ T4163] [ 87.614233][ T4163] but task is already holding lock: [ 87.622410][ T4163] ffff8880295360e0 (&type->s_umount_key#46){++++}-{3:3}, at: deactivate_super+0xa9/0xe0 [ 87.632317][ T4163] [ 87.632317][ T4163] which lock already depends on the new lock. [ 87.632317][ T4163] [ 87.643014][ T4163] [ 87.643014][ T4163] the existing dependency chain (in reverse order) is: [ 87.653465][ T4163] [ 87.653465][ T4163] -> #2 (&type->s_umount_key#46){++++}-{3:3}: [ 87.662998][ T4163] lock_acquire+0x1db/0x4f0 [ 87.669886][ T4163] down_read+0x45/0x2e0 [ 87.674765][ T4163] ocfs2_finish_quota_recovery+0x15a/0x2260 [ 87.684613][ T4163] ocfs2_complete_recovery+0x173c/0x24a0 [ 87.693292][ T4163] process_one_work+0x8a1/0x10c0 [ 87.699216][ T4163] worker_thread+0xaca/0x1280 [ 87.705199][ T4163] kthread+0x3f6/0x4f0 [ 87.710545][ T4163] ret_from_fork+0x1f/0x30 [ 87.716896][ T4163] [ 87.716896][ T4163] -> #1 ((work_completion)(&journal->j_recovery_work)){+.+.}-{0:0}: [ 87.728043][ T4163] lock_acquire+0x1db/0x4f0 [ 87.733345][ T4163] process_one_work+0x7f1/0x10c0 [ 87.739162][ T4163] worker_thread+0xaca/0x1280 [ 87.744660][ T4163] kthread+0x3f6/0x4f0 [ 87.750160][ T4163] ret_from_fork+0x1f/0x30 [ 87.755404][ T4163] [ 87.755404][ T4163] -> #0 ((wq_completion)ocfs2_wq){+.+.}-{0:0}: [ 87.764386][ T4163] validate_chain+0x1649/0x5930 [ 87.769929][ T4163] __lock_acquire+0x1295/0x1ff0 [ 87.775488][ T4163] lock_acquire+0x1db/0x4f0 [ 87.780748][ T4163] flush_workqueue+0x170/0x1610 [ 87.786603][ T4163] ocfs2_shutdown_local_alloc+0x105/0xa90 [ 87.792878][ T4163] ocfs2_dismount_volume+0x1db/0x8b0 [ 87.799238][ T4163] generic_shutdown_super+0x130/0x310 [ 87.805739][ T4163] kill_block_super+0x7a/0xe0 [ 87.811146][ T4163] deactivate_locked_super+0xa0/0x110 [ 87.817820][ T4163] cleanup_mnt+0x44e/0x500 [ 87.823697][ T4163] task_work_run+0x129/0x1a0 [ 87.829253][ T4163] do_exit+0x6a3/0x2480 [ 87.834770][ T4163] do_group_exit+0x144/0x310 [ 87.840659][ T4163] __x64_sys_exit_group+0x3b/0x40 [ 87.846688][ T4163] do_syscall_64+0x3b/0x80 [ 87.852692][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 87.859690][ T4163] [ 87.859690][ T4163] other info that might help us debug this: [ 87.859690][ T4163] [ 87.870782][ T4163] Chain exists of: [ 87.870782][ T4163] (wq_completion)ocfs2_wq --> (work_completion)(&journal->j_recovery_work) --> &type->s_umount_key#46 [ 87.870782][ T4163] [ 87.888908][ T4163] Possible unsafe locking scenario: [ 87.888908][ T4163] [ 87.896460][ T4163] CPU0 CPU1 [ 87.902119][ T4163] ---- ---- [ 87.907749][ T4163] lock(&type->s_umount_key#46); [ 87.913022][ T4163] lock((work_completion)(&journal->j_recovery_work)); [ 87.923136][ T4163] lock(&type->s_umount_key#46); [ 87.931626][ T4163] lock((wq_completion)ocfs2_wq); [ 87.936976][ T4163] [ 87.936976][ T4163] *** DEADLOCK *** [ 87.936976][ T4163] [ 87.945873][ T4163] 1 lock held by syz-executor305/4163: [ 87.951568][ T4163] #0: ffff8880295360e0 (&type->s_umount_key#46){++++}-{3:3}, at: deactivate_super+0xa9/0xe0 [ 87.962988][ T4163] [ 87.962988][ T4163] stack backtrace: [ 87.969203][ T4163] CPU: 0 PID: 4163 Comm: syz-executor305 Not tainted 5.15.180-syzkaller #0 [ 87.978175][ T4163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 87.988636][ T4163] Call Trace: [ 87.992197][ T4163] [ 87.995379][ T4163] dump_stack_lvl+0x1e3/0x2d0 [ 88.000337][ T4163] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 88.006382][ T4163] ? print_circular_bug+0x12b/0x1a0 [ 88.011785][ T4163] check_noncircular+0x2f8/0x3b0 [ 88.018054][ T4163] ? add_chain_block+0x850/0x850 [ 88.023718][ T4163] ? lockdep_lock+0x11f/0x2a0 [ 88.029027][ T4163] validate_chain+0x1649/0x5930 [ 88.034810][ T4163] ? reacquire_held_locks+0x660/0x660 [ 88.040337][ T4163] ? read_lock_is_recursive+0x10/0x10 [ 88.045828][ T4163] ? debug_object_assert_init+0x2bf/0x420 [ 88.052010][ T4163] ? do_raw_spin_lock+0x14a/0x370 [ 88.057279][ T4163] ? __lock_acquire+0x1ff0/0x1ff0 [ 88.062664][ T4163] ? do_raw_spin_unlock+0x137/0x8b0 [ 88.068205][ T4163] ? mark_lock+0x98/0x340 [ 88.072829][ T4163] __lock_acquire+0x1295/0x1ff0 [ 88.077789][ T4163] lock_acquire+0x1db/0x4f0 [ 88.083248][ T4163] ? flush_workqueue+0x154/0x1610 [ 88.088611][ T4163] ? read_lock_is_recursive+0x10/0x10 [ 88.094404][ T4163] ? lockdep_softirqs_off+0x420/0x420 [ 88.100099][ T4163] ? del_timer+0x183/0x310 [ 88.105122][ T4163] ? __init_swait_queue_head+0xaa/0x140 [ 88.110686][ T4163] flush_workqueue+0x170/0x1610 [ 88.115803][ T4163] ? flush_workqueue+0x154/0x1610 [ 88.120845][ T4163] ? print_irqtrace_events+0x210/0x210 [ 88.127088][ T4163] ? flush_work+0x20/0x20 [ 88.131994][ T4163] ? rcu_work_rcufn+0x140/0x140 [ 88.137423][ T4163] ? print_irqtrace_events+0x210/0x210 [ 88.143720][ T4163] ocfs2_shutdown_local_alloc+0x105/0xa90 [ 88.150305][ T4163] ? __cancel_work_timer+0x5e8/0x6a0 [ 88.157121][ T4163] ? ocfs2_local_alloc_count_bits+0x230/0x230 [ 88.164212][ T4163] ? cancel_work_sync+0x20/0x20 [ 88.169645][ T4163] ? do_raw_spin_unlock+0x137/0x8b0 [ 88.175307][ T4163] ? _atomic_dec_and_lock+0x96/0x130 [ 88.182931][ T4163] ? iput+0x371/0x8b0 [ 88.187347][ T4163] ? ocfs2_disable_quotas+0x1b8/0x210 [ 88.193691][ T4163] ocfs2_dismount_volume+0x1db/0x8b0 [ 88.199287][ T4163] ? ocfs2_enable_quotas+0x440/0x440 [ 88.204724][ T4163] ? clear_inode+0x150/0x150 [ 88.209330][ T4163] ? ocfs2_alloc_inode+0x11/0x70 [ 88.214305][ T4163] ? ocfs2_alloc_inode+0x11/0x70 [ 88.219813][ T4163] ? ocfs2_free_inode+0x20/0x20 [ 88.224874][ T4163] generic_shutdown_super+0x130/0x310 [ 88.230291][ T4163] kill_block_super+0x7a/0xe0 [ 88.235193][ T4163] deactivate_locked_super+0xa0/0x110 [ 88.240858][ T4163] cleanup_mnt+0x44e/0x500 [ 88.245653][ T4163] ? lockdep_hardirqs_on+0x94/0x130 [ 88.251219][ T4163] task_work_run+0x129/0x1a0 [ 88.256397][ T4163] do_exit+0x6a3/0x2480 [ 88.261282][ T4163] ? put_task_struct+0x80/0x80 [ 88.266954][ T4163] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 88.273282][ T4163] ? vtime_user_exit+0x2d1/0x400 [ 88.278926][ T4163] do_group_exit+0x144/0x310 [ 88.284209][ T4163] __x64_sys_exit_group+0x3b/0x40 [ 88.289989][ T4163] do_syscall_64+0x3b/0x80 [ 88.295114][ T4163] ? clear_bhb_loop+0x15/0x70 [ 88.299966][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 88.306084][ T4163] RIP: 0033:0x7feca9ca6c09 [ 88.310880][ T4163] Code: Unable to access opcode bytes at RIP 0x7feca9ca6bdf. [ 88.318429][ T4163] RSP: 002b:00007ffe0cf957e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 88.327555][ T4163] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007feca9ca6c09 [ 88.336143][ T4163] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 88.344471][ T4163] RBP: 00007feca9d272b0 R08: ffffffffffffffb8 R09: 0000000000004701 [ 88.353080][ T4163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feca9d272b0 [ 88.361356][ T4163] R13: 0000000000000000 R14: 00007feca9d28020 R15: 00007feca9c75130 [ 88.369435][ T4163] [ 88.382963][ T4163] ocfs2: Unmounting device (7,0) on (node local)