Warning: Permanently added '10.128.1.191' (ED25519) to the list of known hosts. executing program syzkaller login: [ 38.381435][ T4289] loop0: detected capacity change from 0 to 32768 [ 38.384762][ T4289] ======================================================= [ 38.384762][ T4289] WARNING: The mand mount option has been deprecated and [ 38.384762][ T4289] and is ignored by this kernel. Remove the mand [ 38.384762][ T4289] option from the mount to silence this warning. [ 38.384762][ T4289] ======================================================= [ 38.405593][ T4289] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 38.412660][ T4289] [ 38.413168][ T4289] ====================================================== [ 38.414552][ T4289] WARNING: possible circular locking dependency detected [ 38.415993][ T4289] 6.1.118-syzkaller #0 Not tainted [ 38.417154][ T4289] ------------------------------------------------------ [ 38.418676][ T4289] syz-executor330/4289 is trying to acquire lock: [ 38.420057][ T4289] ffff0000e2369808 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3){+.+.}-{3:3}, at: ocfs2_reserve_suballoc_bits+0x164/0x4428 [ 38.422861][ T4289] [ 38.422861][ T4289] but task is already holding lock: [ 38.424590][ T4289] ffff0000e23cdc78 (&oi->ip_xattr_sem){++++}-{3:3}, at: ocfs2_xattr_set+0x4e4/0x1478 [ 38.426746][ T4289] [ 38.426746][ T4289] which lock already depends on the new lock. [ 38.426746][ T4289] [ 38.428965][ T4289] [ 38.428965][ T4289] the existing dependency chain (in reverse order) is: [ 38.430934][ T4289] [ 38.430934][ T4289] -> #5 (&oi->ip_xattr_sem){++++}-{3:3}: [ 38.432630][ T4289] down_read+0x64/0x308 [ 38.433710][ T4289] ocfs2_init_acl+0x2c8/0x764 [ 38.434786][ T4289] ocfs2_mknod+0x1574/0x2560 [ 38.435918][ T4289] ocfs2_create+0x1a8/0x560 [ 38.437048][ T4289] path_openat+0xeac/0x2548 [ 38.438156][ T4289] do_filp_open+0x1bc/0x3cc [ 38.439262][ T4289] do_sys_openat2+0x128/0x3e0 [ 38.440479][ T4289] __arm64_sys_openat+0x1f0/0x240 [ 38.441706][ T4289] invoke_syscall+0x98/0x2bc [ 38.442814][ T4289] el0_svc_common+0x138/0x258 [ 38.443961][ T4289] do_el0_svc+0x58/0x13c [ 38.445084][ T4289] el0_svc+0x58/0x168 [ 38.446007][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.447190][ T4289] el0t_64_sync+0x18c/0x190 [ 38.448312][ T4289] [ 38.448312][ T4289] -> #4 (jbd2_handle){++++}-{0:0}: [ 38.449877][ T4289] start_this_handle+0x1140/0x13ac [ 38.451185][ T4289] jbd2__journal_start+0x298/0x544 [ 38.452439][ T4289] jbd2_journal_start+0x3c/0x4c [ 38.453599][ T4289] ocfs2_start_trans+0x3e8/0x73c [ 38.454729][ T4289] ocfs2_mknod+0xe64/0x2560 [ 38.455768][ T4289] ocfs2_create+0x1a8/0x560 [ 38.456828][ T4289] path_openat+0xeac/0x2548 [ 38.457878][ T4289] do_filp_open+0x1bc/0x3cc [ 38.458896][ T4289] do_sys_openat2+0x128/0x3e0 [ 38.459942][ T4289] __arm64_sys_openat+0x1f0/0x240 [ 38.461004][ T4289] invoke_syscall+0x98/0x2bc [ 38.462217][ T4289] el0_svc_common+0x138/0x258 [ 38.463279][ T4289] do_el0_svc+0x58/0x13c [ 38.464406][ T4289] el0_svc+0x58/0x168 [ 38.465336][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.466437][ T4289] el0t_64_sync+0x18c/0x190 [ 38.467496][ T4289] [ 38.467496][ T4289] -> #3 (&journal->j_trans_barrier){.+.+}-{3:3}: [ 38.469390][ T4289] down_read+0x64/0x308 [ 38.470404][ T4289] ocfs2_start_trans+0x3dc/0x73c [ 38.471596][ T4289] ocfs2_mknod+0xe64/0x2560 [ 38.472695][ T4289] ocfs2_create+0x1a8/0x560 [ 38.473859][ T4289] path_openat+0xeac/0x2548 [ 38.474874][ T4289] do_filp_open+0x1bc/0x3cc [ 38.475956][ T4289] do_sys_openat2+0x128/0x3e0 [ 38.477146][ T4289] __arm64_sys_openat+0x1f0/0x240 [ 38.478431][ T4289] invoke_syscall+0x98/0x2bc [ 38.479560][ T4289] el0_svc_common+0x138/0x258 [ 38.480641][ T4289] do_el0_svc+0x58/0x13c [ 38.481596][ T4289] el0_svc+0x58/0x168 [ 38.482581][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.483787][ T4289] el0t_64_sync+0x18c/0x190 [ 38.484891][ T4289] [ 38.484891][ T4289] -> #2 (sb_internal#2){.+.+}-{0:0}: [ 38.486492][ T4289] ocfs2_start_trans+0x260/0x73c [ 38.487664][ T4289] ocfs2_mknod+0xe64/0x2560 [ 38.488679][ T4289] ocfs2_create+0x1a8/0x560 [ 38.489710][ T4289] path_openat+0xeac/0x2548 [ 38.490691][ T4289] do_filp_open+0x1bc/0x3cc [ 38.491809][ T4289] do_sys_openat2+0x128/0x3e0 [ 38.492927][ T4289] __arm64_sys_openat+0x1f0/0x240 [ 38.494083][ T4289] invoke_syscall+0x98/0x2bc [ 38.495292][ T4289] el0_svc_common+0x138/0x258 [ 38.496490][ T4289] do_el0_svc+0x58/0x13c [ 38.497467][ T4289] el0_svc+0x58/0x168 [ 38.498477][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.499623][ T4289] el0t_64_sync+0x18c/0x190 [ 38.500678][ T4289] [ 38.500678][ T4289] -> #1 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#4){+.+.}-{3:3}: [ 38.502914][ T4289] down_write+0x5c/0x88 [ 38.503826][ T4289] ocfs2_reserve_local_alloc_bits+0xfc/0x25dc [ 38.505182][ T4289] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 38.506814][ T4289] ocfs2_reserve_clusters+0x3c/0x50 [ 38.508043][ T4289] ocfs2_mknod+0xe04/0x2560 [ 38.509009][ T4289] ocfs2_create+0x1a8/0x560 [ 38.510162][ T4289] path_openat+0xeac/0x2548 [ 38.511329][ T4289] do_filp_open+0x1bc/0x3cc [ 38.512456][ T4289] do_sys_openat2+0x128/0x3e0 [ 38.513707][ T4289] __arm64_sys_openat+0x1f0/0x240 [ 38.514935][ T4289] invoke_syscall+0x98/0x2bc [ 38.516025][ T4289] el0_svc_common+0x138/0x258 [ 38.517086][ T4289] do_el0_svc+0x58/0x13c [ 38.518077][ T4289] el0_svc+0x58/0x168 [ 38.519148][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.520458][ T4289] el0t_64_sync+0x18c/0x190 [ 38.521428][ T4289] [ 38.521428][ T4289] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3){+.+.}-{3:3}: [ 38.523652][ T4289] __lock_acquire+0x3338/0x7680 [ 38.524807][ T4289] lock_acquire+0x26c/0x7cc [ 38.525851][ T4289] down_write+0x5c/0x88 [ 38.526905][ T4289] ocfs2_reserve_suballoc_bits+0x164/0x4428 [ 38.528304][ T4289] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 38.529727][ T4289] ocfs2_init_xattr_set_ctxt+0x3b0/0x9f8 [ 38.531064][ T4289] ocfs2_xattr_set+0xc08/0x1478 [ 38.532402][ T4289] ocfs2_xattr_trusted_set+0x4c/0x64 [ 38.533534][ T4289] __vfs_setxattr+0x388/0x3a4 [ 38.534571][ T4289] __vfs_setxattr_noperm+0x110/0x528 [ 38.535776][ T4289] __vfs_setxattr_locked+0x1ec/0x218 [ 38.536993][ T4289] vfs_setxattr+0x1a8/0x344 [ 38.538007][ T4289] setxattr+0x230/0x294 [ 38.538962][ T4289] path_setxattr+0x17c/0x258 [ 38.540021][ T4289] __arm64_sys_lsetxattr+0xbc/0xd8 [ 38.541188][ T4289] invoke_syscall+0x98/0x2bc [ 38.542293][ T4289] el0_svc_common+0x138/0x258 [ 38.543419][ T4289] do_el0_svc+0x58/0x13c [ 38.544432][ T4289] el0_svc+0x58/0x168 [ 38.545421][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.546629][ T4289] el0t_64_sync+0x18c/0x190 [ 38.547809][ T4289] [ 38.547809][ T4289] other info that might help us debug this: [ 38.547809][ T4289] [ 38.550081][ T4289] Chain exists of: [ 38.550081][ T4289] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3 --> jbd2_handle --> &oi->ip_xattr_sem [ 38.550081][ T4289] [ 38.553407][ T4289] Possible unsafe locking scenario: [ 38.553407][ T4289] [ 38.554915][ T4289] CPU0 CPU1 [ 38.556056][ T4289] ---- ---- [ 38.557214][ T4289] lock(&oi->ip_xattr_sem); [ 38.558152][ T4289] lock(jbd2_handle); [ 38.559795][ T4289] lock(&oi->ip_xattr_sem); [ 38.561407][ T4289] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3); [ 38.562974][ T4289] [ 38.562974][ T4289] *** DEADLOCK *** [ 38.562974][ T4289] [ 38.564666][ T4289] 3 locks held by syz-executor330/4289: [ 38.565829][ T4289] #0: ffff0000d4b72460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 38.567757][ T4289] #1: ffff0000e23cdf48 (&sb->s_type->i_mutex_key#17){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 38.570375][ T4289] #2: ffff0000e23cdc78 (&oi->ip_xattr_sem){++++}-{3:3}, at: ocfs2_xattr_set+0x4e4/0x1478 [ 38.572303][ T4289] [ 38.572303][ T4289] stack backtrace: [ 38.573494][ T4289] CPU: 0 PID: 4289 Comm: syz-executor330 Not tainted 6.1.118-syzkaller #0 [ 38.575654][ T4289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 38.577837][ T4289] Call trace: [ 38.578548][ T4289] dump_backtrace+0x1c8/0x1f4 [ 38.579594][ T4289] show_stack+0x2c/0x3c [ 38.580503][ T4289] dump_stack_lvl+0x108/0x170 [ 38.581530][ T4289] dump_stack+0x1c/0x5c [ 38.582467][ T4289] print_circular_bug+0x150/0x1b8 [ 38.583524][ T4289] check_noncircular+0x2cc/0x378 [ 38.584540][ T4289] __lock_acquire+0x3338/0x7680 [ 38.585583][ T4289] lock_acquire+0x26c/0x7cc [ 38.586516][ T4289] down_write+0x5c/0x88 [ 38.587437][ T4289] ocfs2_reserve_suballoc_bits+0x164/0x4428 [ 38.588770][ T4289] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 38.590237][ T4289] ocfs2_init_xattr_set_ctxt+0x3b0/0x9f8 [ 38.591526][ T4289] ocfs2_xattr_set+0xc08/0x1478 [ 38.592584][ T4289] ocfs2_xattr_trusted_set+0x4c/0x64 [ 38.593731][ T4289] __vfs_setxattr+0x388/0x3a4 [ 38.594712][ T4289] __vfs_setxattr_noperm+0x110/0x528 [ 38.595862][ T4289] __vfs_setxattr_locked+0x1ec/0x218 [ 38.597031][ T4289] vfs_setxattr+0x1a8/0x344 [ 38.598068][ T4289] setxattr+0x230/0x294 [ 38.598972][ T4289] path_setxattr+0x17c/0x258 [ 38.600026][ T4289] __arm64_sys_lsetxattr+0xbc/0xd8 [ 38.601136][ T4289] invoke_syscall+0x98/0x2bc [ 38.602105][ T4289] el0_svc_common+0x138/0x258 [ 38.603469][ T4289] do_el0_svc+0x58/0x13c [ 38.604374][ T4289] el0_svc+0x58/0x168 [ 38.605284][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.606357][ T4289] el0t_64_sync+0x18c/0x190