Warning: Permanently added '10.128.0.170' (ED25519) to the list of known hosts. executing program [ 34.256784][ T6422] loop0: detected capacity change from 0 to 32768 [ 34.259927][ T6422] ======================================================= [ 34.259927][ T6422] WARNING: The mand mount option has been deprecated and [ 34.259927][ T6422] and is ignored by this kernel. Remove the mand [ 34.259927][ T6422] option from the mount to silence this warning. [ 34.259927][ T6422] ======================================================= [ 34.278581][ T6422] ocfs2: Mounting device (7,0) on (node local, slot 0) with writeback data mode. [ 34.287592][ T6422] [ 34.288111][ T6422] ====================================================== [ 34.289487][ T6422] WARNING: possible circular locking dependency detected [ 34.290794][ T6422] 6.12.0-syzkaller-g7b1d1d4cfac0 #0 Not tainted [ 34.292006][ T6422] ------------------------------------------------------ [ 34.293396][ T6422] syz-executor149/6422 is trying to acquire lock: [ 34.294631][ T6422] ffff0000dea9a640 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{3:3}, at: ocfs2_reserve_local_alloc_bits+0xfc/0x247c [ 34.297285][ T6422] [ 34.297285][ T6422] but task is already holding lock: [ 34.298809][ T6422] ffff0000dea9bff8 (&oi->ip_xattr_sem){++++}-{3:3}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 34.300760][ T6422] [ 34.300760][ T6422] which lock already depends on the new lock. [ 34.300760][ T6422] [ 34.302837][ T6422] [ 34.302837][ T6422] the existing dependency chain (in reverse order) is: [ 34.304609][ T6422] [ 34.304609][ T6422] -> #4 (&oi->ip_xattr_sem){++++}-{3:3}: [ 34.306197][ T6422] down_read+0x58/0x2fc [ 34.307155][ T6422] ocfs2_init_acl+0x2c8/0x764 [ 34.308169][ T6422] ocfs2_mknod+0x1388/0x243c [ 34.309186][ T6422] ocfs2_create+0x194/0x4e0 [ 34.310173][ T6422] path_openat+0x13e4/0x2b14 [ 34.311173][ T6422] do_filp_open+0x1bc/0x3cc [ 34.312182][ T6422] do_sys_openat2+0x124/0x1b8 [ 34.313202][ T6422] __arm64_sys_openat+0x1f0/0x240 [ 34.314271][ T6422] invoke_syscall+0x98/0x2b8 [ 34.315276][ T6422] el0_svc_common+0x130/0x23c [ 34.316354][ T6422] do_el0_svc+0x48/0x58 [ 34.317313][ T6422] el0_svc+0x54/0x168 [ 34.318207][ T6422] el0t_64_sync_handler+0x84/0x108 [ 34.319328][ T6422] el0t_64_sync+0x198/0x19c [ 34.320315][ T6422] [ 34.320315][ T6422] -> #3 (jbd2_handle){.+.+}-{0:0}: [ 34.321753][ T6422] start_this_handle+0xf34/0x11c4 [ 34.322850][ T6422] jbd2__journal_start+0x298/0x544 [ 34.323957][ T6422] jbd2_journal_start+0x3c/0x4c [ 34.325037][ T6422] ocfs2_start_trans+0x3d0/0x71c [ 34.326136][ T6422] ocfs2_reserve_suballoc_bits+0x840/0x4288 [ 34.327395][ T6422] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 34.328764][ T6422] ocfs2_mknod+0xdc8/0x243c [ 34.329802][ T6422] ocfs2_create+0x194/0x4e0 [ 34.330808][ T6422] path_openat+0x13e4/0x2b14 [ 34.331809][ T6422] do_filp_open+0x1bc/0x3cc [ 34.332846][ T6422] do_sys_openat2+0x124/0x1b8 [ 34.333917][ T6422] __arm64_sys_openat+0x1f0/0x240 [ 34.334994][ T6422] invoke_syscall+0x98/0x2b8 [ 34.336034][ T6422] el0_svc_common+0x130/0x23c [ 34.337117][ T6422] do_el0_svc+0x48/0x58 [ 34.338076][ T6422] el0_svc+0x54/0x168 [ 34.338973][ T6422] el0t_64_sync_handler+0x84/0x108 [ 34.340106][ T6422] el0t_64_sync+0x198/0x19c [ 34.341128][ T6422] [ 34.341128][ T6422] -> #2 (&journal->j_trans_barrier){.+.+}-{3:3}: [ 34.342854][ T6422] down_read+0x58/0x2fc [ 34.343777][ T6422] ocfs2_start_trans+0x3c4/0x71c [ 34.344870][ T6422] ocfs2_reserve_suballoc_bits+0x840/0x4288 [ 34.346181][ T6422] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 34.347591][ T6422] ocfs2_mknod+0xdc8/0x243c [ 34.348609][ T6422] ocfs2_create+0x194/0x4e0 [ 34.349595][ T6422] path_openat+0x13e4/0x2b14 [ 34.350613][ T6422] do_filp_open+0x1bc/0x3cc [ 34.351604][ T6422] do_sys_openat2+0x124/0x1b8 [ 34.352645][ T6422] __arm64_sys_openat+0x1f0/0x240 [ 34.353741][ T6422] invoke_syscall+0x98/0x2b8 [ 34.354734][ T6422] el0_svc_common+0x130/0x23c [ 34.355760][ T6422] do_el0_svc+0x48/0x58 [ 34.356708][ T6422] el0_svc+0x54/0x168 [ 34.357605][ T6422] el0t_64_sync_handler+0x84/0x108 [ 34.358722][ T6422] el0t_64_sync+0x198/0x19c [ 34.359696][ T6422] [ 34.359696][ T6422] -> #1 (sb_internal#2){.+.+}-{0:0}: [ 34.361196][ T6422] ocfs2_start_trans+0x244/0x71c [ 34.362281][ T6422] ocfs2_mknod+0xe58/0x243c [ 34.363295][ T6422] ocfs2_create+0x194/0x4e0 [ 34.364284][ T6422] path_openat+0x13e4/0x2b14 [ 34.365350][ T6422] do_filp_open+0x1bc/0x3cc [ 34.366387][ T6422] do_sys_openat2+0x124/0x1b8 [ 34.367441][ T6422] __arm64_sys_openat+0x1f0/0x240 [ 34.368553][ T6422] invoke_syscall+0x98/0x2b8 [ 34.369576][ T6422] el0_svc_common+0x130/0x23c [ 34.370636][ T6422] do_el0_svc+0x48/0x58 [ 34.371627][ T6422] el0_svc+0x54/0x168 [ 34.372528][ T6422] el0t_64_sync_handler+0x84/0x108 [ 34.373698][ T6422] el0t_64_sync+0x198/0x19c [ 34.374686][ T6422] [ 34.374686][ T6422] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{3:3}: [ 34.377025][ T6422] __lock_acquire+0x33f8/0x77c8 [ 34.378169][ T6422] lock_acquire+0x240/0x728 [ 34.379161][ T6422] down_write+0x50/0xc0 [ 34.380130][ T6422] ocfs2_reserve_local_alloc_bits+0xfc/0x247c [ 34.381441][ T6422] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 34.382845][ T6422] ocfs2_reserve_clusters+0x3c/0x50 [ 34.383960][ T6422] ocfs2_init_xattr_set_ctxt+0x404/0x968 [ 34.385214][ T6422] ocfs2_xattr_set+0xbe0/0x1448 [ 34.386314][ T6422] ocfs2_xattr_trusted_set+0x4c/0x64 [ 34.387580][ T6422] __vfs_setxattr+0x3d8/0x400 [ 34.388718][ T6422] __vfs_setxattr_noperm+0x110/0x578 [ 34.389908][ T6422] __vfs_setxattr_locked+0x1ec/0x218 [ 34.391035][ T6422] vfs_setxattr+0x1a8/0x344 [ 34.392056][ T6422] __arm64_sys_fsetxattr+0x36c/0x458 [ 34.393359][ T6422] invoke_syscall+0x98/0x2b8 [ 34.394438][ T6422] el0_svc_common+0x130/0x23c [ 34.395651][ T6422] do_el0_svc+0x48/0x58 [ 34.396711][ T6422] el0_svc+0x54/0x168 [ 34.397682][ T6422] el0t_64_sync_handler+0x84/0x108 [ 34.398958][ T6422] el0t_64_sync+0x198/0x19c [ 34.399964][ T6422] [ 34.399964][ T6422] other info that might help us debug this: [ 34.399964][ T6422] [ 34.401972][ T6422] Chain exists of: [ 34.401972][ T6422] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5 --> jbd2_handle --> &oi->ip_xattr_sem [ 34.401972][ T6422] [ 34.405342][ T6422] Possible unsafe locking scenario: [ 34.405342][ T6422] [ 34.406891][ T6422] CPU0 CPU1 [ 34.407908][ T6422] ---- ---- [ 34.409026][ T6422] lock(&oi->ip_xattr_sem); [ 34.409968][ T6422] lock(jbd2_handle); [ 34.411355][ T6422] lock(&oi->ip_xattr_sem); [ 34.412763][ T6422] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5); [ 34.414129][ T6422] [ 34.414129][ T6422] *** DEADLOCK *** [ 34.414129][ T6422] [ 34.415987][ T6422] 3 locks held by syz-executor149/6422: [ 34.417059][ T6422] #0: ffff0000c26b0420 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write_file+0x64/0x1e8 [ 34.419228][ T6422] #1: ffff0000dea9c2c0 (&sb->s_type->i_mutex_key#16){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 34.421366][ T6422] #2: ffff0000dea9bff8 (&oi->ip_xattr_sem){++++}-{3:3}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 34.423524][ T6422] [ 34.423524][ T6422] stack backtrace: [ 34.424766][ T6422] CPU: 1 UID: 0 PID: 6422 Comm: syz-executor149 Not tainted 6.12.0-syzkaller-g7b1d1d4cfac0 #0 [ 34.427024][ T6422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 34.429121][ T6422] Call trace: [ 34.429812][ T6422] show_stack+0x2c/0x3c (C) [ 34.430739][ T6422] dump_stack_lvl+0xe4/0x150 [ 34.431676][ T6422] dump_stack+0x1c/0x28 [ 34.432655][ T6422] print_circular_bug+0x154/0x1c0 [ 34.433822][ T6422] check_noncircular+0x310/0x404 [ 34.434881][ T6422] __lock_acquire+0x33f8