Warning: Permanently added '10.128.1.32' (ED25519) to the list of known hosts. executing program [ 66.604675][ T4163] loop0: detected capacity change from 0 to 32768 [ 66.692070][ T4163] (syz-executor465,4163,1):ocfs2_block_check_validate:402 ERROR: CRC32 failed: stored: 0xb3775c19, computed 0x2dd1c265. Applying ECC. [ 66.708374][ T4163] (syz-executor465,4163,1):ocfs2_block_check_validate:402 ERROR: CRC32 failed: stored: 0xb3775c19, computed 0x2dd1c265. Applying ECC. [ 66.735900][ T4163] JBD2: Ignoring recovery information on journal [ 66.767465][ T4163] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 66.782551][ T1240] ocfs2: Finishing quota recovery on device (7,0) for slot 0 [ 66.829073][ T4163] [ 66.831432][ T4163] ====================================================== [ 66.838441][ T4163] WARNING: possible circular locking dependency detected [ 66.845723][ T4163] 5.15.180-syzkaller #0 Not tainted [ 66.850911][ T4163] ------------------------------------------------------ [ 66.857923][ T4163] syz-executor465/4163 is trying to acquire lock: [ 66.864503][ T4163] ffff888074857138 ((wq_completion)ocfs2_wq){+.+.}-{0:0}, at: flush_workqueue+0x154/0x1610 [ 66.874526][ T4163] [ 66.874526][ T4163] but task is already holding lock: [ 66.881907][ T4163] ffff88802adb80e0 (&type->s_umount_key#46){++++}-{3:3}, at: deactivate_super+0xa9/0xe0 [ 66.891810][ T4163] [ 66.891810][ T4163] which lock already depends on the new lock. [ 66.891810][ T4163] [ 66.902453][ T4163] [ 66.902453][ T4163] the existing dependency chain (in reverse order) is: [ 66.911472][ T4163] [ 66.911472][ T4163] -> #2 (&type->s_umount_key#46){++++}-{3:3}: [ 66.919736][ T4163] lock_acquire+0x1db/0x4f0 [ 66.924883][ T4163] down_read+0x45/0x2e0 [ 66.929592][ T4163] ocfs2_finish_quota_recovery+0x15a/0x2260 [ 66.936114][ T4163] ocfs2_complete_recovery+0x173c/0x24a0 [ 66.942278][ T4163] process_one_work+0x8a1/0x10c0 [ 66.947744][ T4163] worker_thread+0xaca/0x1280 [ 66.952946][ T4163] kthread+0x3f6/0x4f0 [ 66.957793][ T4163] ret_from_fork+0x1f/0x30 [ 66.962908][ T4163] [ 66.962908][ T4163] -> #1 ((work_completion)(&journal->j_recovery_work)){+.+.}-{0:0}: [ 66.973158][ T4163] lock_acquire+0x1db/0x4f0 [ 66.978263][ T4163] process_one_work+0x7f1/0x10c0 [ 66.983835][ T4163] worker_thread+0xaca/0x1280 [ 66.989044][ T4163] kthread+0x3f6/0x4f0 [ 66.993639][ T4163] ret_from_fork+0x1f/0x30 [ 66.998577][ T4163] [ 66.998577][ T4163] -> #0 ((wq_completion)ocfs2_wq){+.+.}-{0:0}: [ 67.007033][ T4163] validate_chain+0x1649/0x5930 [ 67.012433][ T4163] __lock_acquire+0x1295/0x1ff0 [ 67.017815][ T4163] lock_acquire+0x1db/0x4f0 [ 67.022947][ T4163] flush_workqueue+0x170/0x1610 [ 67.028446][ T4163] ocfs2_shutdown_local_alloc+0x105/0xa90 [ 67.034717][ T4163] ocfs2_dismount_volume+0x1db/0x8b0 [ 67.040531][ T4163] generic_shutdown_super+0x130/0x310 [ 67.046427][ T4163] kill_block_super+0x7a/0xe0 [ 67.051616][ T4163] deactivate_locked_super+0xa0/0x110 [ 67.057509][ T4163] cleanup_mnt+0x44e/0x500 [ 67.062454][ T4163] task_work_run+0x129/0x1a0 [ 67.067914][ T4163] do_exit+0x6a3/0x2480 [ 67.072704][ T4163] do_group_exit+0x144/0x310 [ 67.077824][ T4163] __x64_sys_exit_group+0x3b/0x40 [ 67.083365][ T4163] do_syscall_64+0x3b/0xb0 [ 67.088443][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 67.095243][ T4163] [ 67.095243][ T4163] other info that might help us debug this: [ 67.095243][ T4163] [ 67.105565][ T4163] Chain exists of: [ 67.105565][ T4163] (wq_completion)ocfs2_wq --> (work_completion)(&journal->j_recovery_work) --> &type->s_umount_key#46 [ 67.105565][ T4163] [ 67.123175][ T4163] Possible unsafe locking scenario: [ 67.123175][ T4163] [ 67.131078][ T4163] CPU0 CPU1 [ 67.136630][ T4163] ---- ---- [ 67.142938][ T4163] lock(&type->s_umount_key#46); [ 67.148225][ T4163] lock((work_completion)(&journal->j_recovery_work)); [ 67.158956][ T4163] lock(&type->s_umount_key#46); [ 67.168090][ T4163] lock((wq_completion)ocfs2_wq); [ 67.173202][ T4163] [ 67.173202][ T4163] *** DEADLOCK *** [ 67.173202][ T4163] [ 67.181703][ T4163] 1 lock held by syz-executor465/4163: [ 67.187283][ T4163] #0: ffff88802adb80e0 (&type->s_umount_key#46){++++}-{3:3}, at: deactivate_super+0xa9/0xe0 [ 67.197471][ T4163] [ 67.197471][ T4163] stack backtrace: [ 67.203383][ T4163] CPU: 1 PID: 4163 Comm: syz-executor465 Not tainted 5.15.180-syzkaller #0 [ 67.212778][ T4163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 67.223614][ T4163] Call Trace: [ 67.227128][ T4163] [ 67.230164][ T4163] dump_stack_lvl+0x1e3/0x2d0 [ 67.235037][ T4163] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 67.240789][ T4163] ? print_circular_bug+0x12b/0x1a0 [ 67.246012][ T4163] check_noncircular+0x2f8/0x3b0 [ 67.251039][ T4163] ? add_chain_block+0x850/0x850 [ 67.255999][ T4163] ? lockdep_lock+0x11f/0x2a0 [ 67.260915][ T4163] validate_chain+0x1649/0x5930 [ 67.265811][ T4163] ? reacquire_held_locks+0x660/0x660 [ 67.271342][ T4163] ? read_lock_is_recursive+0x10/0x10 [ 67.276942][ T4163] ? debug_object_assert_init+0x2bf/0x420 [ 67.282884][ T4163] ? do_raw_spin_lock+0x14a/0x370 [ 67.287921][ T4163] ? __lock_acquire+0x1ff0/0x1ff0 [ 67.293064][ T4163] ? do_raw_spin_unlock+0x137/0x8b0 [ 67.298400][ T4163] ? mark_lock+0x98/0x340 [ 67.302853][ T4163] __lock_acquire+0x1295/0x1ff0 [ 67.307803][ T4163] lock_acquire+0x1db/0x4f0 [ 67.312666][ T4163] ? flush_workqueue+0x154/0x1610 [ 67.317818][ T4163] ? read_lock_is_recursive+0x10/0x10 [ 67.323216][ T4163] ? lockdep_softirqs_off+0x420/0x420 [ 67.328599][ T4163] ? del_timer+0x183/0x310 [ 67.333025][ T4163] ? __init_swait_queue_head+0xaa/0x140 [ 67.338682][ T4163] flush_workqueue+0x170/0x1610 [ 67.343633][ T4163] ? flush_workqueue+0x154/0x1610 [ 67.349015][ T4163] ? print_irqtrace_events+0x210/0x210 [ 67.354572][ T4163] ? flush_work+0x20/0x20 [ 67.358923][ T4163] ? rcu_work_rcufn+0x140/0x140 [ 67.363773][ T4163] ? print_irqtrace_events+0x210/0x210 [ 67.369231][ T4163] ocfs2_shutdown_local_alloc+0x105/0xa90 [ 67.374953][ T4163] ? __cancel_work_timer+0x5e8/0x6a0 [ 67.381446][ T4163] ? ocfs2_local_alloc_count_bits+0x230/0x230 [ 67.388875][ T4163] ? cancel_work_sync+0x20/0x20 [ 67.394102][ T4163] ? do_raw_spin_unlock+0x137/0x8b0 [ 67.399326][ T4163] ? _atomic_dec_and_lock+0x96/0x130 [ 67.404769][ T4163] ? iput+0x371/0x8b0 [ 67.408781][ T4163] ? ocfs2_disable_quotas+0x1b8/0x210 [ 67.414567][ T4163] ocfs2_dismount_volume+0x1db/0x8b0 [ 67.419976][ T4163] ? ocfs2_enable_quotas+0x440/0x440 [ 67.425371][ T4163] ? clear_inode+0x150/0x150 [ 67.430897][ T4163] ? ocfs2_free_inode+0x11/0x20 [ 67.435916][ T4163] ? ocfs2_free_inode+0x11/0x20 [ 67.440902][ T4163] ? ocfs2_free_inode+0x20/0x20 [ 67.445869][ T4163] generic_shutdown_super+0x130/0x310 [ 67.451611][ T4163] kill_block_super+0x7a/0xe0 [ 67.456509][ T4163] deactivate_locked_super+0xa0/0x110 [ 67.461930][ T4163] cleanup_mnt+0x44e/0x500 [ 67.466459][ T4163] ? lockdep_hardirqs_on+0x94/0x130 [ 67.471961][ T4163] task_work_run+0x129/0x1a0 [ 67.476888][ T4163] do_exit+0x6a3/0x2480 [ 67.481061][ T4163] ? put_task_struct+0x80/0x80 [ 67.486161][ T4163] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 67.492182][ T4163] ? vtime_user_exit+0x2d1/0x400 [ 67.497253][ T4163] do_group_exit+0x144/0x310 [ 67.502122][ T4163] __x64_sys_exit_group+0x3b/0x40 [ 67.507168][ T4163] do_syscall_64+0x3b/0xb0 [ 67.511592][ T4163] ? clear_bhb_loop+0x15/0x70 [ 67.516270][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 67.522164][ T4163] RIP: 0033:0x7fd01005bc09 [ 67.526578][ T4163] Code: Unable to access opcode bytes at RIP 0x7fd01005bbdf. [ 67.534184][ T4163] RSP: 002b:00007fff78065c18 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 67.543926][ T4163] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fd01005bc09 [ 67.552132][ T4163] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 67.560128][ T4163] RBP: 00007fd0100dc2b0 R08: ffffffffffffffb8 R09: 0000000000004701 [ 67.568286][ T4163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0100dc2b0 [ 67.576761][ T4163] R13: 0000000000000000 R14: 00007fd0100dd020 R15: 00007fd01002a130 [ 67.584885][ T4163] [ 67.596835][ T4163] ocfs2: Unmounting device (7,0) on (node local)