Warning: Permanently added '10.128.1.209' (ED25519) to the list of known hosts. executing program [ 34.760476][ T6406] loop0: detected capacity change from 0 to 32768 [ 34.763973][ T6406] ======================================================= [ 34.763973][ T6406] WARNING: The mand mount option has been deprecated and [ 34.763973][ T6406] and is ignored by this kernel. Remove the mand [ 34.763973][ T6406] option from the mount to silence this warning. [ 34.763973][ T6406] ======================================================= [ 34.792753][ T6406] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 34.810294][ T6406] [ 34.810849][ T6406] ====================================================== [ 34.812264][ T6406] WARNING: possible circular locking dependency detected [ 34.813692][ T6406] 6.11.0-rc7-syzkaller-g5f5673607153 #0 Not tainted [ 34.815097][ T6406] ------------------------------------------------------ [ 34.816553][ T6406] syz-executor348/6406 is trying to acquire lock: [ 34.817893][ T6406] ffff0000e1452640 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{3:3}, at: ocfs2_reserve_local_alloc_bits+0xfc/0x247c [ 34.820686][ T6406] [ 34.820686][ T6406] but task is already holding lock: [ 34.822260][ T6406] ffff0000e1453ff8 (&oi->ip_xattr_sem){+.+.}-{3:3}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 34.824271][ T6406] [ 34.824271][ T6406] which lock already depends on the new lock. [ 34.824271][ T6406] [ 34.826428][ T6406] [ 34.826428][ T6406] the existing dependency chain (in reverse order) is: [ 34.828317][ T6406] [ 34.828317][ T6406] -> #4 (&oi->ip_xattr_sem){+.+.}-{3:3}: [ 34.830087][ T6406] down_write+0x50/0xc0 [ 34.831042][ T6406] ocfs2_xattr_set_handle+0x40c/0x824 [ 34.832263][ T6406] ocfs2_init_security_set+0xb4/0xd8 [ 34.833480][ T6406] ocfs2_mknod+0x1408/0x243c [ 34.834556][ T6406] ocfs2_mkdir+0x194/0x4e0 [ 34.835592][ T6406] vfs_mkdir+0x27c/0x410 [ 34.836552][ T6406] do_mkdirat+0x248/0x574 [ 34.837570][ T6406] __arm64_sys_mkdirat+0x8c/0xa4 [ 34.838708][ T6406] invoke_syscall+0x98/0x2b8 [ 34.839808][ T6406] el0_svc_common+0x130/0x23c [ 34.840896][ T6406] do_el0_svc+0x48/0x58 [ 34.841953][ T6406] el0_svc+0x54/0x168 [ 34.842934][ T6406] el0t_64_sync_handler+0x84/0xfc [ 34.844121][ T6406] el0t_64_sync+0x190/0x194 [ 34.845144][ T6406] [ 34.845144][ T6406] -> #3 (jbd2_handle){.+.+}-{0:0}: [ 34.846672][ T6406] start_this_handle+0xf34/0x11c4 [ 34.847857][ T6406] jbd2__journal_start+0x298/0x544 [ 34.849019][ T6406] jbd2_journal_start+0x3c/0x4c [ 34.850161][ T6406] ocfs2_start_trans+0x3d0/0x71c [ 34.851293][ T6406] ocfs2_reserve_suballoc_bits+0x840/0x4288 [ 34.852643][ T6406] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 34.853968][ T6406] ocfs2_mknod+0xdc8/0x243c [ 34.855010][ T6406] ocfs2_mkdir+0x194/0x4e0 [ 34.856055][ T6406] vfs_mkdir+0x27c/0x410 [ 34.857045][ T6406] do_mkdirat+0x248/0x574 [ 34.858049][ T6406] __arm64_sys_mkdirat+0x8c/0xa4 [ 34.859181][ T6406] invoke_syscall+0x98/0x2b8 [ 34.860259][ T6406] el0_svc_common+0x130/0x23c [ 34.861396][ T6406] do_el0_svc+0x48/0x58 [ 34.862437][ T6406] el0_svc+0x54/0x168 [ 34.863368][ T6406] el0t_64_sync_handler+0x84/0xfc [ 34.864500][ T6406] el0t_64_sync+0x190/0x194 [ 34.865571][ T6406] [ 34.865571][ T6406] -> #2 (&journal->j_trans_barrier){.+.+}-{3:3}: [ 34.867315][ T6406] down_read+0x58/0x2fc [ 34.868274][ T6406] ocfs2_start_trans+0x3c4/0x71c [ 34.869389][ T6406] ocfs2_reserve_suballoc_bits+0x840/0x4288 [ 34.870745][ T6406] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 34.872219][ T6406] ocfs2_mknod+0xdc8/0x243c [ 34.873293][ T6406] ocfs2_mkdir+0x194/0x4e0 [ 34.874424][ T6406] vfs_mkdir+0x27c/0x410 [ 34.875403][ T6406] do_mkdirat+0x248/0x574 [ 34.876417][ T6406] __arm64_sys_mkdirat+0x8c/0xa4 [ 34.877503][ T6406] invoke_syscall+0x98/0x2b8 [ 34.878518][ T6406] el0_svc_common+0x130/0x23c [ 34.879598][ T6406] do_el0_svc+0x48/0x58 [ 34.880563][ T6406] el0_svc+0x54/0x168 [ 34.881499][ T6406] el0t_64_sync_handler+0x84/0xfc [ 34.882626][ T6406] el0t_64_sync+0x190/0x194 [ 34.883687][ T6406] [ 34.883687][ T6406] -> #1 (sb_internal#2){.+.+}-{0:0}: [ 34.885293][ T6406] ocfs2_start_trans+0x244/0x71c [ 34.886411][ T6406] ocfs2_mknod+0xe58/0x243c [ 34.887526][ T6406] ocfs2_mkdir+0x194/0x4e0 [ 34.888572][ T6406] vfs_mkdir+0x27c/0x410 [ 34.889674][ T6406] do_mkdirat+0x248/0x574 [ 34.890723][ T6406] __arm64_sys_mkdirat+0x8c/0xa4 [ 34.891885][ T6406] invoke_syscall+0x98/0x2b8 [ 34.892942][ T6406] el0_svc_common+0x130/0x23c [ 34.894030][ T6406] do_el0_svc+0x48/0x58 [ 34.895123][ T6406] el0_svc+0x54/0x168 [ 34.896190][ T6406] el0t_64_sync_handler+0x84/0xfc [ 34.897251][ T6406] el0t_64_sync+0x190/0x194 [ 34.898300][ T6406] [ 34.898300][ T6406] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{3:3}: [ 34.900498][ T6406] __lock_acquire+0x33d8/0x779c [ 34.901564][ T6406] lock_acquire+0x240/0x728 [ 34.902566][ T6406] down_write+0x50/0xc0 [ 34.903544][ T6406] ocfs2_reserve_local_alloc_bits+0xfc/0x247c [ 34.904883][ T6406] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 34.906375][ T6406] ocfs2_reserve_clusters+0x3c/0x50 [ 34.907591][ T6406] ocfs2_init_xattr_set_ctxt+0x404/0x968 [ 34.908901][ T6406] ocfs2_xattr_set+0xbe0/0x1448 [ 34.910036][ T6406] ocfs2_xattr_security_set+0x4c/0x64 [ 34.911274][ T6406] __vfs_setxattr+0x3d8/0x400 [ 34.912439][ T6406] __vfs_setxattr_noperm+0x110/0x578 [ 34.913656][ T6406] __vfs_setxattr_locked+0x1ec/0x218 [ 34.914961][ T6406] vfs_setxattr+0x1a8/0x344 [ 34.915972][ T6406] path_setxattr+0x30c/0x428 [ 34.917079][ T6406] __arm64_sys_setxattr+0xbc/0xd8 [ 34.918260][ T6406] invoke_syscall+0x98/0x2b8 [ 34.919314][ T6406] el0_svc_common+0x130/0x23c [ 34.920363][ T6406] do_el0_svc+0x48/0x58 [ 34.921375][ T6406] el0_svc+0x54/0x168 [ 34.922563][ T6406] el0t_64_sync_handler+0x84/0xfc [ 34.923779][ T6406] el0t_64_sync+0x190/0x194 [ 34.924783][ T6406] [ 34.924783][ T6406] other info that might help us debug this: [ 34.924783][ T6406] [ 34.926908][ T6406] Chain exists of: [ 34.926908][ T6406] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5 --> jbd2_handle --> &oi->ip_xattr_sem [ 34.926908][ T6406] [ 34.930333][ T6406] Possible unsafe locking scenario: [ 34.930333][ T6406] [ 34.931905][ T6406] CPU0 CPU1 [ 34.933145][ T6406] ---- ---- [ 34.934270][ T6406] lock(&oi->ip_xattr_sem); [ 34.935279][ T6406] lock(jbd2_handle); [ 34.936767][ T6406] lock(&oi->ip_xattr_sem); [ 34.938352][ T6406] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5); [ 34.939922][ T6406] [ 34.939922][ T6406] *** DEADLOCK *** [ 34.939922][ T6406] [ 34.941643][ T6406] 3 locks held by syz-executor348/6406: [ 34.942862][ T6406] #0: ffff0000c5d9c420 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 34.944850][ T6406] #1: ffff0000e14542c0 (&sb->s_type->i_mutex_key#16){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 34.947356][ T6406] #2: ffff0000e1453ff8 (&oi->ip_xattr_sem){+.+.}-{3:3}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 34.949685][ T6406] [ 34.949685][ T6406] stack backtrace: [ 34.950939][ T6406] CPU: 1 UID: 0 PID: 6406 Comm: syz-executor348 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0 [ 34.953420][ T6406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 34.955896][ T6406] Call trace: [ 34.956531][ T6406] dump_backtrace+0x1b8/0x1e4 [ 34.957534][ T6406] show_stack+0x2c/0x3c [ 34.958480][ T6406] dump_stack_lvl+0xe4/0x150 [ 34.959512][ T6406] dump_stack+0x1c/0x28 [ 34.960593][ T6406] print_circular_bug+0x150/0x1b8 [ 34.961693][ T6406] check_noncircular+0x310/0x404 [ 34.962875][ T6406] __lock_acquire+0x33d8/0x779c [ 34.963996][ T6406] lock_acquire+0x240/0x728 [ 34.964978][ T6406] down_write+0x50/0xc0 [ 34.965911][ T6406] ocfs2_reserve_local_alloc_bits+0xfc/0x247c [ 34.967209][ T6406] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 34.968538][ T6406] ocfs2_reserve_clusters+0x3c/0x50 [ 34.969664][ T6406] ocfs2_init_xattr_set_ctxt+0x404/0x968 [ 34.970780][ T6406] ocfs2_xattr_set+0xbe0/0x1448 [ 34.971818][ T6406] ocfs2_xattr_security_set+0x4c/0x64 [ 34.972862][ T6406] __vfs_setxattr+0x3d8/0x400 [ 34.973801][ T6406] __vfs_setxattr_noperm+0x110/0x578 [ 34.974937][ T6406] __vfs_setxattr_locked+0x1ec/0x218 [ 34.976138][ T6406] vfs_setxattr+0x1a8/0x344 [ 34.977154][ T6406] path_setxattr+0x30c/0x428 [ 34.978087][ T6406] __arm64_sys_setxattr+0xbc/0xd8 [ 34.979059][ T6406] invoke_syscall+0x98/0x2b8 [ 34.980047][ T6406] el0_svc_common+0x130/0x23c [ 34.981045][ T6406] do_el0_svc+0x48/0x58 [ 34.981930][ T6406] el0_svc+0x54/0x168 [ 34.982813][ T6406] el0t_64_sync_handler+0x84/0xfc [ 34.983973][ T6406] el0t_64_sync+0x190/0x194