Warning: Permanently added '10.128.0.148' (ED25519) to the list of known hosts. executing program [ 33.740421][ T6411] loop0: detected capacity change from 0 to 32768 [ 33.743898][ T6411] ======================================================= [ 33.743898][ T6411] WARNING: The mand mount option has been deprecated and [ 33.743898][ T6411] and is ignored by this kernel. Remove the mand [ 33.743898][ T6411] option from the mount to silence this warning. [ 33.743898][ T6411] ======================================================= [ 33.773294][ T6411] ocfs2: Mounting device (7,0) on (node local, slot 0) with writeback data mode. [ 33.783052][ T6411] [ 33.783599][ T6411] ====================================================== [ 33.784927][ T6411] WARNING: possible circular locking dependency detected [ 33.786302][ T6411] 6.13.0-rc3-syzkaller-g06a573612678 #0 Not tainted [ 33.787646][ T6411] ------------------------------------------------------ [ 33.788969][ T6411] syz-executor742/6411 is trying to acquire lock: [ 33.790265][ T6411] ffff0000de766d80 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3){+.+.}-{4:4}, at: ocfs2_reserve_suballoc_bits+0x164/0x4254 [ 33.792954][ T6411] [ 33.792954][ T6411] but task is already holding lock: [ 33.794386][ T6411] ffff0000de7606f8 (&oi->ip_xattr_sem){++++}-{4:4}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 33.796332][ T6411] [ 33.796332][ T6411] which lock already depends on the new lock. [ 33.796332][ T6411] [ 33.798375][ T6411] [ 33.798375][ T6411] the existing dependency chain (in reverse order) is: [ 33.800185][ T6411] [ 33.800185][ T6411] -> #5 (&oi->ip_xattr_sem){++++}-{4:4}: [ 33.801694][ T6411] down_read+0x58/0x2fc [ 33.802671][ T6411] ocfs2_init_acl+0x2c8/0x764 [ 33.803728][ T6411] ocfs2_mknod+0x1388/0x2438 [ 33.804751][ T6411] ocfs2_create+0x194/0x4d4 [ 33.805731][ T6411] path_openat+0x13e4/0x2b14 [ 33.806691][ T6411] do_filp_open+0x1e8/0x404 [ 33.807709][ T6411] do_sys_openat2+0x124/0x1b8 [ 33.808781][ T6411] __arm64_sys_openat+0x1f0/0x240 [ 33.809821][ T6411] invoke_syscall+0x98/0x2b8 [ 33.810895][ T6411] el0_svc_common+0x130/0x23c [ 33.811983][ T6411] do_el0_svc+0x48/0x58 [ 33.812864][ T6411] el0_svc+0x54/0x168 [ 33.813739][ T6411] el0t_64_sync_handler+0x84/0x108 [ 33.814857][ T6411] el0t_64_sync+0x198/0x19c [ 33.815922][ T6411] [ 33.815922][ T6411] -> #4 (jbd2_handle){.+.+}-{0:0}: [ 33.817472][ T6411] start_this_handle+0xf34/0x11c4 [ 33.818586][ T6411] jbd2__journal_start+0x298/0x544 [ 33.819736][ T6411] jbd2_journal_start+0x3c/0x4c [ 33.820834][ T6411] ocfs2_start_trans+0x3d0/0x71c [ 33.821934][ T6411] ocfs2_reserve_suballoc_bits+0x840/0x4254 [ 33.823256][ T6411] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 33.824650][ T6411] ocfs2_mknod+0xdc8/0x2438 [ 33.825682][ T6411] ocfs2_create+0x194/0x4d4 [ 33.826688][ T6411] path_openat+0x13e4/0x2b14 [ 33.827678][ T6411] do_filp_open+0x1e8/0x404 [ 33.828865][ T6411] do_sys_openat2+0x124/0x1b8 [ 33.829907][ T6411] __arm64_sys_openat+0x1f0/0x240 [ 33.830989][ T6411] invoke_syscall+0x98/0x2b8 [ 33.832080][ T6411] el0_svc_common+0x130/0x23c [ 33.833093][ T6411] do_el0_svc+0x48/0x58 [ 33.833980][ T6411] el0_svc+0x54/0x168 [ 33.834864][ T6411] el0t_64_sync_handler+0x84/0x108 [ 33.836004][ T6411] el0t_64_sync+0x198/0x19c [ 33.837010][ T6411] [ 33.837010][ T6411] -> #3 (&journal->j_trans_barrier){.+.+}-{4:4}: [ 33.838835][ T6411] down_read+0x58/0x2fc [ 33.839860][ T6411] ocfs2_start_trans+0x3c4/0x71c [ 33.841051][ T6411] ocfs2_reserve_suballoc_bits+0x840/0x4254 [ 33.842348][ T6411] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 33.843849][ T6411] ocfs2_mknod+0xdc8/0x2438 [ 33.845006][ T6411] ocfs2_create+0x194/0x4d4 [ 33.846084][ T6411] path_openat+0x13e4/0x2b14 [ 33.847107][ T6411] do_filp_open+0x1e8/0x404 [ 33.848093][ T6411] do_sys_openat2+0x124/0x1b8 [ 33.849093][ T6411] __arm64_sys_openat+0x1f0/0x240 [ 33.850222][ T6411] invoke_syscall+0x98/0x2b8 [ 33.851250][ T6411] el0_svc_common+0x130/0x23c [ 33.852366][ T6411] do_el0_svc+0x48/0x58 [ 33.853506][ T6411] el0_svc+0x54/0x168 [ 33.854411][ T6411] el0t_64_sync_handler+0x84/0x108 [ 33.855662][ T6411] el0t_64_sync+0x198/0x19c [ 33.856706][ T6411] [ 33.856706][ T6411] -> #2 (sb_internal#2){.+.+}-{0:0}: [ 33.858077][ T6411] ocfs2_start_trans+0x244/0x71c [ 33.859181][ T6411] ocfs2_reserve_suballoc_bits+0x840/0x4254 [ 33.860459][ T6411] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 33.861770][ T6411] ocfs2_mknod+0xdc8/0x2438 [ 33.862755][ T6411] ocfs2_create+0x194/0x4d4 [ 33.863816][ T6411] path_openat+0x13e4/0x2b14 [ 33.864797][ T6411] do_filp_open+0x1e8/0x404 [ 33.865764][ T6411] do_sys_openat2+0x124/0x1b8 [ 33.866815][ T6411] __arm64_sys_openat+0x1f0/0x240 [ 33.867879][ T6411] invoke_syscall+0x98/0x2b8 [ 33.868857][ T6411] el0_svc_common+0x130/0x23c [ 33.869932][ T6411] do_el0_svc+0x48/0x58 [ 33.870933][ T6411] el0_svc+0x54/0x168 [ 33.871817][ T6411] el0t_64_sync_handler+0x84/0x108 [ 33.873054][ T6411] el0t_64_sync+0x198/0x19c [ 33.874059][ T6411] [ 33.874059][ T6411] -> #1 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#4){+.+.}-{4:4}: [ 33.876137][ T6411] down_write+0x50/0xc0 [ 33.877184][ T6411] ocfs2_reserve_suballoc_bits+0x164/0x4254 [ 33.878470][ T6411] ocfs2_reserve_clusters_with_limit+0x2ac/0xabc [ 33.879802][ T6411] ocfs2_reserve_suballoc_bits+0x820/0x4254 [ 33.881039][ T6411] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 33.882394][ T6411] ocfs2_mknod+0xdc8/0x2438 [ 33.883438][ T6411] ocfs2_create+0x194/0x4d4 [ 33.884389][ T6411] path_openat+0x13e4/0x2b14 [ 33.885444][ T6411] do_filp_open+0x1e8/0x404 [ 33.886499][ T6411] do_sys_openat2+0x124/0x1b8 [ 33.887506][ T6411] __arm64_sys_openat+0x1f0/0x240 [ 33.888557][ T6411] invoke_syscall+0x98/0x2b8 [ 33.889568][ T6411] el0_svc_common+0x130/0x23c [ 33.890727][ T6411] do_el0_svc+0x48/0x58 [ 33.891636][ T6411] el0_svc+0x54/0x168 [ 33.892558][ T6411] el0t_64_sync_handler+0x84/0x108 [ 33.893718][ T6411] el0t_64_sync+0x198/0x19c [ 33.894811][ T6411] [ 33.894811][ T6411] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3){+.+.}-{4:4}: [ 33.897013][ T6411] __lock_acquire+0x34f0/0x7904 [ 33.898131][ T6411] lock_acquire+0x23c/0x724 [ 33.899193][ T6411] down_write+0x50/0xc0 [ 33.900058][ T6411] ocfs2_reserve_suballoc_bits+0x164/0x4254 [ 33.901325][ T6411] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 33.902850][ T6411] ocfs2_init_xattr_set_ctxt+0x38c/0x95c [ 33.904161][ T6411] ocfs2_xattr_set+0xbe0/0x1448 [ 33.905271][ T6411] ocfs2_set_acl+0x410/0x4b4 [ 33.906304][ T6411] ocfs2_iop_set_acl+0x230/0x374 [ 33.907458][ T6411] vfs_set_acl+0x7a0/0xa24 [ 33.908413][ T6411] do_set_acl+0xe4/0x1ac [ 33.909372][ T6411] filename_setxattr+0x2e8/0x404 [ 33.910434][ T6411] path_setxattrat+0x370/0x41c [ 33.911492][ T6411] __arm64_sys_lsetxattr+0xc0/0xdc [ 33.912592][ T6411] invoke_syscall+0x98/0x2b8 [ 33.913687][ T6411] el0_svc_common+0x130/0x23c [ 33.914750][ T6411] do_el0_svc+0x48/0x58 [ 33.915630][ T6411] el0_svc+0x54/0x168 [ 33.916563][ T6411] el0t_64_sync_handler+0x84/0x108 [ 33.917823][ T6411] el0t_64_sync+0x198/0x19c [ 33.918818][ T6411] [ 33.918818][ T6411] other info that might help us debug this: [ 33.918818][ T6411] [ 33.920888][ T6411] Chain exists of: [ 33.920888][ T6411] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3 --> jbd2_handle --> &oi->ip_xattr_sem [ 33.920888][ T6411] [ 33.924203][ T6411] Possible unsafe locking scenario: [ 33.924203][ T6411] [ 33.925621][ T6411] CPU0 CPU1 [ 33.926726][ T6411] ---- ---- [ 33.927904][ T6411] lock(&oi->ip_xattr_sem); [ 33.928855][ T6411] lock(jbd2_handle); [ 33.930430][ T6411] lock(&oi->ip_xattr_sem); [ 33.931961][ T6411] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3); [ 33.933558][ T6411] [ 33.933558][ T6411] *** DEADLOCK *** [ 33.933558][ T6411] [ 33.935210][ T6411] 3 locks held by syz-executor742/6411: [ 33.936309][ T6411] #0: ffff0000d977c420 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 33.938246][ T6411] #1: ffff0000de7609c0 (&type->i_mutex_dir_key#6){+.+.}-{4:4}, at: vfs_set_acl+0x374/0xa24 [ 33.940289][ T6411] #2: ffff0000de7606f8 (&oi->ip_xattr_sem){++++}-{4:4}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 33.942310][ T6411] [ 33.942310][ T6411] stack backtrace: [ 33.943510][ T6411] CPU: 0 UID: 0 PID: 6411 Comm: syz-executor742 Not tainted 6.13.0-rc3-syzkaller-g06a573612678 #0 [ 33.945679][ T6411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 33.947627][ T6411] Call trace: [ 33.948288][ T6411] show_stack+0x2c/0x3c (C) [ 33.949207][ T6411] dump_stack_lvl+0xe4/0x150 [ 33.950114][ T6411] dump_stack+0x1c/0x28 [ 33.950957][ T6411] print_circular_bug+0x154/0x1c0 [ 33.951993][ T6411] check_noncircular+0x310/0x404 [ 33.952998][ T6411] __lock_acquire+0x34f0/0x7904 [ 33.953921][ T6411] lock_acquire+0x23c/0x724 [ 33.954776][ T6411] down_write+0x50/0xc0 [ 33.955674][ T6411] ocfs2_reserve_suballoc_bits+0x164/0x4254 [ 33.956890][ T6411] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 33.958230][ T6411] ocfs2_init_xattr_set_ctxt+0x38c/0x95c [ 33.959421][ T6411] ocfs2_xattr_set+0xbe0/0x1448 [ 33.960377][ T6411] ocfs2_set_acl+0x410/0x4b4 [ 33.961346][ T6411] ocfs2_iop_set_acl+0x230/0x374 [ 33.962424][ T6411] vfs_set_acl+0x7a0/0xa24 [ 33.963348][ T6411] do_set_acl+0xe4/0x1ac [ 33.964159][ T6411] filename_setxattr+0x2e8/0x404 [ 33.965173][ T6411] path_setxattrat+0x370/0x41c [ 33.966189][ T6411] __arm64_sys_lsetxattr+0xc0/0xdc [ 33.967261][ T6411] invoke_syscall+0x98/0x2b8 [ 33.968163][ T6411] el0_svc_common+0x130/0x23c [ 33.969098][ T6411] do_el0_svc+0x48/0x58 [ 33.969998][ T6411] el0_svc+0x54/0x168 [ 33.970821][ T6411] el0t_64_sync_handler+0x84/0x108 [ 33.971822][ T6411] el0t_64_sync+0x198/0x19c