Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp2387449rwi; Sat, 15 Oct 2022 12:57:03 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5ZfYWfUeskA11V9qmaFCTCCXqjnTL6XTj36z4eA7i1eLTVBVfTmAK4gRJqAOFDmsCbpiKs X-Received: by 2002:a17:903:22c7:b0:185:b0c:e150 with SMTP id y7-20020a17090322c700b001850b0ce150mr4361323plg.138.1665863822762; Sat, 15 Oct 2022 12:57:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665863822; cv=none; d=google.com; s=arc-20160816; b=H0yhU27MT6ehuGh3AzCm6VhQy0PPQs6B67Q1v9gAjwpYMGX01P6/z8oaelOJ3MRJ16 kdeR1q9jX4O9xtPUoPrwqh/eXA7MQlb5vPFDh0giygpLtJb10ppzP27kW8fAV1ce2QFB aPgk1R+0eHW83b6SNEfBte1tBhEO58xXv3U4YAHpipBPCyIhrssUVBCuff4reCaAtwid Zss0QpzzcmlZVzyFYtK6PLqHZhzAuCD19KitmYnH0HK08H5D/vY6uTas4n6l6fBTE6qJ UbWGK1jgzma5lxFI2KkIK7dGLoETjWRlLMWa1AESDckKW03P0RLKMfYQn0ZwvAiW+6yn pi6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:date:mime-version; bh=Kd7pUKJfcnF+A77XTHj4IFcp4k0hB9ABuZD1+aFBT2c=; b=aASjfg3liR92vJCn2jLSQ+l33LZhpI1lKRWQCDYj4U98z7C5G4tND7VPpYJR5Pc8wn ikpged1HV9PYz1qFZ6uvntzAceRzU+Jcn6dZ6rdkPoaAN6/p1nQO/XdqHjBhJk8Ff7aY XMQdedoqtolZ5MRr5EW2jO+GG1zyH7UZIUlSmkiaWoO1NzCeQJr5bPSwlx6YrMT5UzBp GMvUdwl5gc766bbLFOiAJ0zR1UJ6qD4A2Ul/s4Xva1vywNykXt3JJRbhcx9FVevk5QSk 1xXnF8lPouyMV8/nOekOigaHQwy/QrvgIdAD35jH1xm/UQ1WVQ8O72QDF9mmnuBUfQAc sUrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u17-20020a170902e81100b0017f6b2a8bc6si7309320plg.214.2022.10.15.12.56.50; Sat, 15 Oct 2022 12:57:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229717AbiJOTWw (ORCPT + 99 others); Sat, 15 Oct 2022 15:22:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229670AbiJOTWo (ORCPT ); Sat, 15 Oct 2022 15:22:44 -0400 Received: from mail-il1-f200.google.com (mail-il1-f200.google.com [209.85.166.200]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D5EDD48C88 for ; Sat, 15 Oct 2022 12:22:42 -0700 (PDT) Received: by mail-il1-f200.google.com with SMTP id l5-20020a056e0212e500b002fa8ea32922so6194830iln.15 for ; Sat, 15 Oct 2022 12:22:42 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=Kd7pUKJfcnF+A77XTHj4IFcp4k0hB9ABuZD1+aFBT2c=; b=tqRUqgP4VuSBKFO9CvaZRhbXMbSGvAl8WqQoYjmT5sykMxvFFoxLx6ayXv4LWq1qIV CsZFiwhcAIJQGhZQHjuT1PWXoQABOWEUtnTZ/WEe40Iub9eTKCJ2vs7qvItayuv2l14q wV2sgTzv+v+bSj99vSBIqyH1WcA0LTbsZmulMJqhNHusRi+FvlIwYSPwY8L2zyETsoSe FUvD8GLgQpFCf2vgLk0iwjRlsT+yhbIDTHZ0Gt6g2JkgwnqbE1nbnKF6w+B2XoRTIIsZ y5IIir2/Mh8HERb98MGjOFjMMGUK/nr0WPxlaMMQmUwfW0zgtuJUvFQE0QFn9aA9yY0w Aedg== X-Gm-Message-State: ACrzQf1jaOVN0CVS+6XH9l+f1WWnUCtSyYNoWVXu6yS9/lYWUM/uCo2Y w7b/Ds+QM1k9K4bYYdrWdEBptnkd3A5DAHCewpnWBAEUUAzR MIME-Version: 1.0 X-Received: by 2002:a6b:590b:0:b0:6bb:f8ce:1a15 with SMTP id n11-20020a6b590b000000b006bbf8ce1a15mr1662707iob.6.1665861762060; Sat, 15 Oct 2022 12:22:42 -0700 (PDT) Date: Sat, 15 Oct 2022 12:22:42 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <00000000000092950405eb17aac7@google.com> Subject: [syzbot] possible deadlock in __nilfs_error From: syzbot To: konishi.ryusuke@gmail.com, linux-kernel@vger.kernel.org, linux-nilfs@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.6 required=5.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: bbed346d5a96 Merge branch 'for-next/core' into for-kernelci git tree: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci console output: https://syzkaller.appspot.com/x/log.txt?x=12497f8a880000 kernel config: https://syzkaller.appspot.com/x/.config?x=3a4a45d2d827c1e dashboard link: https://syzkaller.appspot.com/bug?extid=3a94da2c82ba4f401b9e compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2 userspace arch: arm64 Unfortunately, I don't have any reproducer for this issue yet. Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/e8e91bc79312/disk-bbed346d.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/c1cb3fb3b77e/vmlinux-bbed346d.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+3a94da2c82ba4f401b9e@syzkaller.appspotmail.com WARNING: possible circular locking dependency detected 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 Not tainted ------------------------------------------------------ syz-executor.5/28633 is trying to acquire lock: ffff0001126ee890 (&nilfs->ns_sem){++++}-{3:3}, at: nilfs_set_error fs/nilfs2/super.c:92 [inline] ffff0001126ee890 (&nilfs->ns_sem){++++}-{3:3}, at: __nilfs_error+0xb4/0x284 fs/nilfs2/super.c:137 but task is already holding lock: ffff000123b51e70 (&dat_lock_key ){.+.+}-{3:3}, at: nilfs_get_block+0x64/0x364 fs/nilfs2/inode.c:84 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&dat_lock_key){.+.+}-{3:3}: down_read+0x5c/0x78 kernel/locking/rwsem.c:1499 nilfs_count_free_blocks+0x2c/0x6c fs/nilfs2/the_nilfs.c:693 nilfs_set_log_cursor fs/nilfs2/super.c:236 [inline] nilfs_cleanup_super+0x118/0x1f0 fs/nilfs2/super.c:318 nilfs_put_super+0x54/0x9c fs/nilfs2/super.c:472 generic_shutdown_super+0x8c/0x190 fs/super.c:491 kill_block_super+0x30/0x78 fs/super.c:1427 deactivate_locked_super+0x70/0xe8 fs/super.c:332 deactivate_super+0xd0/0xd4 fs/super.c:363 cleanup_mnt+0x1f8/0x234 fs/namespace.c:1186 __cleanup_mnt+0x20/0x30 fs/namespace.c:1193 task_work_run+0xc4/0x14c kernel/task_work.c:177 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] do_notify_resume+0x174/0x1f0 arch/arm64/kernel/signal.c:1127 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline] el0_svc+0x9c/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 -> #0 (&nilfs->ns_sem){++++}-{3:3}: check_prev_add kernel/locking/lockdep.c:3095 [inline] check_prevs_add kernel/locking/lockdep.c:3214 [inline] validate_chain kernel/locking/lockdep.c:3829 [inline] __lock_acquire+0x1530/0x30a4 kernel/locking/lockdep.c:5053 lock_acquire+0x100/0x1f8 kernel/locking/lockdep.c:5666 down_write+0x5c/0xcc kernel/locking/rwsem.c:1552 nilfs_set_error fs/nilfs2/super.c:92 [inline] __nilfs_error+0xb4/0x284 fs/nilfs2/super.c:137 nilfs_bmap_convert_error fs/nilfs2/bmap.c:35 [inline] nilfs_bmap_lookup_contig+0x98/0xc0 fs/nilfs2/bmap.c:95 nilfs_get_block+0x7c/0x364 fs/nilfs2/inode.c:85 block_truncate_page+0x1b4/0xab4 fs/buffer.c:2583 nilfs_truncate+0xb8/0x178 fs/nilfs2/inode.c:857 nilfs_setattr+0xf8/0x164 fs/nilfs2/inode.c:955 notify_change+0x758/0x7f0 fs/attr.c:420 do_truncate+0x108/0x150 fs/open.c:65 vfs_truncate+0x1dc/0x24c fs/open.c:111 do_sys_truncate+0x94/0x140 fs/open.c:134 __do_sys_truncate fs/open.c:146 [inline] __se_sys_truncate fs/open.c:144 [inline] __arm64_sys_truncate+0x20/0x30 fs/open.c:144 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&dat_lock_key); lock(&nilfs->ns_sem); lock(&dat_lock_key); lock(&nilfs->ns_sem); *** DEADLOCK *** 5 locks held by syz-executor.5/28633: #0: ffff0001199e2460 (sb_writers#16){.+.+}-{0:0}, at: mnt_want_write+0x20/0x64 fs/namespace.c:393 #1: ffff0001128b2648 (&sb->s_type->i_mutex_key#26){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline] #1: ffff0001128b2648 (&sb->s_type->i_mutex_key#26){+.+.}-{3:3}, at: do_truncate+0xf4/0x150 fs/open.c:63 #2: ffff0001199e2650 (sb_internal#3){.+.+}-{0:0}, at: nilfs_setattr+0x84/0x164 fs/nilfs2/inode.c:947 #3: ffff0001126eeaa0 (&nilfs->ns_segctor_sem){++++}-{3:3}, at: nilfs_transaction_begin+0x214/0x384 fs/nilfs2/segment.c:223 #4: ffff000123b51e70 (&dat_lock_key){.+.+}-{3:3}, at: nilfs_get_block+0x64/0x364 fs/nilfs2/inode.c:84 stack backtrace: CPU: 1 PID: 28633 Comm: syz-executor.5 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 Call trace: dump_backtrace+0x1c4/0x1f0 arch/arm64/kernel/stacktrace.c:156 show_stack+0x2c/0x54 arch/arm64/kernel/stacktrace.c:163 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x104/0x16c lib/dump_stack.c:106 dump_stack+0x1c/0x58 lib/dump_stack.c:113 print_circular_bug+0x2c4/0x2c8 kernel/locking/lockdep.c:2053 check_noncircular+0x14c/0x154 kernel/locking/lockdep.c:2175 check_prev_add kernel/locking/lockdep.c:3095 [inline] check_prevs_add kernel/locking/lockdep.c:3214 [inline] validate_chain kernel/locking/lockdep.c:3829 [inline] __lock_acquire+0x1530/0x30a4 kernel/locking/lockdep.c:5053 lock_acquire+0x100/0x1f8 kernel/locking/lockdep.c:5666 down_write+0x5c/0xcc kernel/locking/rwsem.c:1552 nilfs_set_error fs/nilfs2/super.c:92 [inline] __nilfs_error+0xb4/0x284 fs/nilfs2/super.c:137 nilfs_bmap_convert_error fs/nilfs2/bmap.c:35 [inline] nilfs_bmap_lookup_contig+0x98/0xc0 fs/nilfs2/bmap.c:95 nilfs_get_block+0x7c/0x364 fs/nilfs2/inode.c:85 block_truncate_page+0x1b4/0xab4 fs/buffer.c:2583 nilfs_truncate+0xb8/0x178 fs/nilfs2/inode.c:857 nilfs_setattr+0xf8/0x164 fs/nilfs2/inode.c:955 notify_change+0x758/0x7f0 fs/attr.c:420 do_truncate+0x108/0x150 fs/open.c:65 vfs_truncate+0x1dc/0x24c fs/open.c:111 do_sys_truncate+0x94/0x140 fs/open.c:134 __do_sys_truncate fs/open.c:146 [inline] __se_sys_truncate fs/open.c:144 [inline] __arm64_sys_truncate+0x20/0x30 fs/open.c:144 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Remounting filesystem read-only NILFS (loop5): bad btree node (ino=16, blocknr=15): level = 0, flags = 0x0, nchildren = 0 NILFS error (device loop5): nilfs_bmap_last_key: broken bmap (inode number=16) NILFS (loop5): error -5 truncating bmap (ino=16) --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot.