Warning: Permanently added '10.128.0.135' (ED25519) to the list of known hosts. executing program [ 38.820865][ T4296] loop0: detected capacity change from 0 to 32768 [ 38.824011][ T4296] ======================================================= [ 38.824011][ T4296] WARNING: The mand mount option has been deprecated and [ 38.824011][ T4296] and is ignored by this kernel. Remove the mand [ 38.824011][ T4296] option from the mount to silence this warning. [ 38.824011][ T4296] ======================================================= [ 38.844517][ T4296] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 38.854228][ T4296] [ 38.854743][ T4296] ====================================================== [ 38.856276][ T4296] WARNING: possible circular locking dependency detected [ 38.857826][ T4296] 6.1.124-syzkaller #0 Not tainted [ 38.858927][ T4296] ------------------------------------------------------ [ 38.860398][ T4296] syz-executor221/4296 is trying to acquire lock: [ 38.861826][ T4296] ffff0000e50ded88 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3){+.+.}-{3:3}, at: ocfs2_reserve_suballoc_bits+0x164/0x4428 [ 38.864738][ T4296] [ 38.864738][ T4296] but task is already holding lock: [ 38.866339][ T4296] ffff0000e50e3ff8 (&oi->ip_xattr_sem){++++}-{3:3}, at: ocfs2_xattr_set+0x4e4/0x1478 [ 38.868377][ T4296] [ 38.868377][ T4296] which lock already depends on the new lock. [ 38.868377][ T4296] [ 38.870573][ T4296] [ 38.870573][ T4296] the existing dependency chain (in reverse order) is: [ 38.872624][ T4296] [ 38.872624][ T4296] -> #5 (&oi->ip_xattr_sem){++++}-{3:3}: [ 38.874340][ T4296] down_read+0x64/0x308 [ 38.875264][ T4296] ocfs2_init_acl+0x2c8/0x764 [ 38.876420][ T4296] ocfs2_mknod+0x1574/0x2560 [ 38.877607][ T4296] ocfs2_create+0x1a8/0x560 [ 38.878779][ T4296] path_openat+0xeac/0x2548 [ 38.879819][ T4296] do_filp_open+0x1bc/0x3cc [ 38.880957][ T4296] do_sys_openat2+0x128/0x3e0 [ 38.882032][ T4296] __arm64_sys_openat+0x1f0/0x240 [ 38.883213][ T4296] invoke_syscall+0x98/0x2bc [ 38.884470][ T4296] el0_svc_common+0x138/0x258 [ 38.885537][ T4296] do_el0_svc+0x58/0x13c [ 38.886517][ T4296] el0_svc+0x58/0x168 [ 38.887527][ T4296] el0t_64_sync_handler+0x84/0xf0 [ 38.888751][ T4296] el0t_64_sync+0x18c/0x190 [ 38.889826][ T4296] [ 38.889826][ T4296] -> #4 (jbd2_handle){.+.+}-{0:0}: [ 38.891487][ T4296] start_this_handle+0x1140/0x13ac [ 38.892745][ T4296] jbd2__journal_start+0x298/0x544 [ 38.893966][ T4296] jbd2_journal_start+0x3c/0x4c [ 38.895069][ T4296] ocfs2_start_trans+0x3e8/0x73c [ 38.896318][ T4296] ocfs2_mknod+0xe64/0x2560 [ 38.897448][ T4296] ocfs2_create+0x1a8/0x560 [ 38.898599][ T4296] path_openat+0xeac/0x2548 [ 38.899748][ T4296] do_filp_open+0x1bc/0x3cc [ 38.900800][ T4296] do_sys_openat2+0x128/0x3e0 [ 38.902035][ T4296] __arm64_sys_openat+0x1f0/0x240 [ 38.903311][ T4296] invoke_syscall+0x98/0x2bc [ 38.904434][ T4296] el0_svc_common+0x138/0x258 [ 38.905472][ T4296] do_el0_svc+0x58/0x13c [ 38.906496][ T4296] el0_svc+0x58/0x168 [ 38.907437][ T4296] el0t_64_sync_handler+0x84/0xf0 [ 38.908627][ T4296] el0t_64_sync+0x18c/0x190 [ 38.909704][ T4296] [ 38.909704][ T4296] -> #3 (&journal->j_trans_barrier){.+.+}-{3:3}: [ 38.911616][ T4296] down_read+0x64/0x308 [ 38.912608][ T4296] ocfs2_start_trans+0x3dc/0x73c [ 38.913702][ T4296] ocfs2_mknod+0xe64/0x2560 [ 38.914824][ T4296] ocfs2_create+0x1a8/0x560 [ 38.916063][ T4296] path_openat+0xeac/0x2548 [ 38.917144][ T4296] do_filp_open+0x1bc/0x3cc [ 38.918203][ T4296] do_sys_openat2+0x128/0x3e0 [ 38.919371][ T4296] __arm64_sys_openat+0x1f0/0x240 [ 38.920562][ T4296] invoke_syscall+0x98/0x2bc [ 38.921668][ T4296] el0_svc_common+0x138/0x258 [ 38.922757][ T4296] do_el0_svc+0x58/0x13c [ 38.923728][ T4296] el0_svc+0x58/0x168 [ 38.924643][ T4296] el0t_64_sync_handler+0x84/0xf0 [ 38.925837][ T4296] el0t_64_sync+0x18c/0x190 [ 38.926858][ T4296] [ 38.926858][ T4296] -> #2 (sb_internal#2){.+.+}-{0:0}: [ 38.928477][ T4296] ocfs2_start_trans+0x260/0x73c [ 38.929626][ T4296] ocfs2_mknod+0xe64/0x2560 [ 38.930622][ T4296] ocfs2_create+0x1a8/0x560 [ 38.931647][ T4296] path_openat+0xeac/0x2548 [ 38.932675][ T4296] do_filp_open+0x1bc/0x3cc [ 38.933898][ T4296] do_sys_openat2+0x128/0x3e0 [ 38.935063][ T4296] __arm64_sys_openat+0x1f0/0x240 [ 38.936373][ T4296] invoke_syscall+0x98/0x2bc [ 38.937473][ T4296] el0_svc_common+0x138/0x258 [ 38.938674][ T4296] do_el0_svc+0x58/0x13c [ 38.939677][ T4296] el0_svc+0x58/0x168 [ 38.940636][ T4296] el0t_64_sync_handler+0x84/0xf0 [ 38.941769][ T4296] el0t_64_sync+0x18c/0x190 [ 38.942787][ T4296] [ 38.942787][ T4296] -> #1 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#4){+.+.}-{3:3}: [ 38.945064][ T4296] down_write+0x5c/0x88 [ 38.946123][ T4296] ocfs2_reserve_local_alloc_bits+0xfc/0x25dc [ 38.947458][ T4296] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 38.949057][ T4296] ocfs2_reserve_clusters+0x3c/0x50 [ 38.950300][ T4296] ocfs2_mknod+0xe04/0x2560 [ 38.951427][ T4296] ocfs2_create+0x1a8/0x560 [ 38.952519][ T4296] path_openat+0xeac/0x2548 [ 38.953636][ T4296] do_filp_open+0x1bc/0x3cc [ 38.954755][ T4296] do_sys_openat2+0x128/0x3e0 [ 38.955974][ T4296] __arm64_sys_openat+0x1f0/0x240 [ 38.957072][ T4296] invoke_syscall+0x98/0x2bc [ 38.958058][ T4296] el0_svc_common+0x138/0x258 [ 38.959305][ T4296] do_el0_svc+0x58/0x13c [ 38.960407][ T4296] el0_svc+0x58/0x168 [ 38.961391][ T4296] el0t_64_sync_handler+0x84/0xf0 [ 38.962612][ T4296] el0t_64_sync+0x18c/0x190 [ 38.963749][ T4296] [ 38.963749][ T4296] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3){+.+.}-{3:3}: [ 38.966061][ T4296] __lock_acquire+0x3338/0x7680 [ 38.967202][ T4296] lock_acquire+0x26c/0x7cc [ 38.968394][ T4296] down_write+0x5c/0x88 [ 38.969505][ T4296] ocfs2_reserve_suballoc_bits+0x164/0x4428 [ 38.970996][ T4296] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 38.972568][ T4296] ocfs2_init_xattr_set_ctxt+0x3b0/0x9f8 [ 38.973900][ T4296] ocfs2_xattr_set+0xc08/0x1478 [ 38.975073][ T4296] ocfs2_xattr_trusted_set+0x4c/0x64 [ 38.976269][ T4296] __vfs_setxattr+0x388/0x3a4 [ 38.977458][ T4296] __vfs_setxattr_noperm+0x110/0x528 [ 38.978696][ T4296] __vfs_setxattr_locked+0x1ec/0x218 [ 38.979860][ T4296] vfs_setxattr+0x1a8/0x344 [ 38.980959][ T4296] setxattr+0x230/0x294 [ 38.982017][ T4296] path_setxattr+0x17c/0x258 [ 38.983211][ T4296] __arm64_sys_lsetxattr+0xbc/0xd8 [ 38.984369][ T4296] invoke_syscall+0x98/0x2bc [ 38.985428][ T4296] el0_svc_common+0x138/0x258 [ 38.986468][ T4296] do_el0_svc+0x58/0x13c [ 38.987524][ T4296] el0_svc+0x58/0x168 [ 38.988494][ T4296] el0t_64_sync_handler+0x84/0xf0 [ 38.989726][ T4296] el0t_64_sync+0x18c/0x190 [ 38.990785][ T4296] [ 38.990785][ T4296] other info that might help us debug this: [ 38.990785][ T4296] [ 38.992910][ T4296] Chain exists of: [ 38.992910][ T4296] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3 --> jbd2_handle --> &oi->ip_xattr_sem [ 38.992910][ T4296] [ 38.996326][ T4296] Possible unsafe locking scenario: [ 38.996326][ T4296] [ 38.997948][ T4296] CPU0 CPU1 [ 38.999026][ T4296] ---- ---- [ 39.000294][ T4296] lock(&oi->ip_xattr_sem); [ 39.001311][ T4296] lock(jbd2_handle); [ 39.002766][ T4296] lock(&oi->ip_xattr_sem); [ 39.004339][ T4296] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3); [ 39.005997][ T4296] [ 39.005997][ T4296] *** DEADLOCK *** [ 39.005997][ T4296] [ 39.007792][ T4296] 3 locks held by syz-executor221/4296: [ 39.008923][ T4296] #0: ffff0000d359a460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 39.010932][ T4296] #1: ffff0000e50e42c8 (&sb->s_type->i_mutex_key#17){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 39.013241][ T4296] #2: ffff0000e50e3ff8 (&oi->ip_xattr_sem){++++}-{3:3}, at: ocfs2_xattr_set+0x4e4/0x1478 [ 39.015389][ T4296] [ 39.015389][ T4296] stack backtrace: [ 39.016636][ T4296] CPU: 0 PID: 4296 Comm: syz-executor221 Not tainted 6.1.124-syzkaller #0 [ 39.018411][ T4296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 39.020487][ T4296] Call trace: [ 39.021216][ T4296] dump_backtrace+0x1c8/0x1f4 [ 39.022248][ T4296] show_stack+0x2c/0x3c [ 39.023225][ T4296] dump_stack_lvl+0x108/0x170 [ 39.024219][ T4296] dump_stack+0x1c/0x5c [ 39.025074][ T4296] print_circular_bug+0x150/0x1b8 [ 39.026162][ T4296] check_noncircular+0x2cc/0x378 [ 39.027143][ T4296] __lock_acquire+0x3338/0x7680 [ 39.028152][ T4296] lock_acquire+0x26c/0x7cc [ 39.029088][ T4296] down_write+0x5c/0x88 [ 39.029958][ T4296] ocfs2_reserve_suballoc_bits+0x164/0x4428 [ 39.031266][ T4296] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 39.032604][ T4296] ocfs2_init_xattr_set_ctxt+0x3b0/0x9f8 [ 39.033731][ T4296] ocfs2_xattr_set+0xc08/0x1478 [ 39.034744][ T4296] ocfs2_xattr_trusted_set+0x4c/0x64 [ 39.035855][ T4296] __vfs_setxattr+0x388/0x3a4 [ 39.036846][ T4296] __vfs_setxattr_noperm+0x110/0x528 [ 39.038051][ T4296] __vfs_setxattr_locked+0x1ec/0x218 [ 39.039344][ T4296] vfs_setxattr+0x1a8/0x344 [ 39.040269][ T4296] setxattr+0x230/0x294 [ 39.041187][ T4296] path_setxattr+0x17c/0x258 [ 39.042167][ T4296] __arm64_sys_lsetxattr+0xbc/0xd8 [ 39.043278][ T4296] invoke_syscall+0x98/0x2bc [ 39.044314][ T4296] el0_svc_common+0x138/0x258 [ 39.045373][ T4296] do_el0_svc+0x58/0x13c [ 39.046297][ T4296] el0_svc+0x58/0x168 [ 39.047177][ T4296] el0t_64_sync_handler+0x84/0xf0 [ 39.048278][ T4296] el0t_64_sync+0x18c/0x190