Warning: Permanently added '10.128.0.210' (ED25519) to the list of known hosts. executing program [ 36.284394][ T6412] loop0: detected capacity change from 0 to 32768 [ 36.287524][ T6412] ======================================================= [ 36.287524][ T6412] WARNING: The mand mount option has been deprecated and [ 36.287524][ T6412] and is ignored by this kernel. Remove the mand [ 36.287524][ T6412] option from the mount to silence this warning. [ 36.287524][ T6412] ======================================================= [ 36.318136][ T6412] ocfs2: Mounting device (7,0) on (node local, slot 0) with writeback data mode. [ 36.326604][ T6412] [ 36.327137][ T6412] ====================================================== [ 36.328741][ T6412] WARNING: possible circular locking dependency detected [ 36.330135][ T6412] 6.13.0-rc3-syzkaller-g573067a5a685 #0 Not tainted [ 36.331482][ T6412] ------------------------------------------------------ [ 36.333083][ T6412] syz-executor266/6412 is trying to acquire lock: [ 36.334406][ T6412] ffff0000dd6ea640 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{4:4}, at: ocfs2_reserve_local_alloc_bits+0x108/0x24cc [ 36.337376][ T6412] [ 36.337376][ T6412] but task is already holding lock: [ 36.338992][ T6412] ffff0000dd6ebff8 (&oi->ip_xattr_sem){++++}-{4:4}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 36.341074][ T6412] [ 36.341074][ T6412] which lock already depends on the new lock. [ 36.341074][ T6412] [ 36.343357][ T6412] [ 36.343357][ T6412] the existing dependency chain (in reverse order) is: [ 36.345314][ T6412] [ 36.345314][ T6412] -> #4 (&oi->ip_xattr_sem){++++}-{4:4}: [ 36.347090][ T6412] down_read+0x58/0x2fc [ 36.348111][ T6412] ocfs2_init_acl+0x2c8/0x764 [ 36.349266][ T6412] ocfs2_mknod+0x1388/0x2438 [ 36.350384][ T6412] ocfs2_create+0x194/0x4d4 [ 36.351438][ T6412] vfs_create+0x21c/0x36c [ 36.352475][ T6412] do_mknodat+0x3c4/0x564 [ 36.353527][ T6412] __arm64_sys_mknodat+0xac/0xc8 [ 36.354679][ T6412] invoke_syscall+0x98/0x2b8 [ 36.355811][ T6412] el0_svc_common+0x130/0x23c [ 36.357034][ T6412] do_el0_svc+0x48/0x58 [ 36.358078][ T6412] el0_svc+0x54/0x168 [ 36.359060][ T6412] el0t_64_sync_handler+0x84/0x108 [ 36.360299][ T6412] el0t_64_sync+0x198/0x19c [ 36.361426][ T6412] [ 36.361426][ T6412] -> #3 (jbd2_handle){.+.+}-{0:0}: [ 36.363047][ T6412] start_this_handle+0xf34/0x11c4 [ 36.364261][ T6412] jbd2__journal_start+0x298/0x544 [ 36.365539][ T6412] jbd2_journal_start+0x3c/0x4c [ 36.366763][ T6412] ocfs2_start_trans+0x3d0/0x71c [ 36.368067][ T6412] ocfs2_reserve_suballoc_bits+0x840/0x4254 [ 36.369496][ T6412] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 36.370952][ T6412] ocfs2_mknod+0xdc8/0x2438 [ 36.372068][ T6412] ocfs2_create+0x194/0x4d4 [ 36.373140][ T6412] vfs_create+0x21c/0x36c [ 36.374206][ T6412] do_mknodat+0x3c4/0x564 [ 36.375225][ T6412] __arm64_sys_mknodat+0xac/0xc8 [ 36.376401][ T6412] invoke_syscall+0x98/0x2b8 [ 36.377451][ T6412] el0_svc_common+0x130/0x23c [ 36.378536][ T6412] do_el0_svc+0x48/0x58 [ 36.379582][ T6412] el0_svc+0x54/0x168 [ 36.380608][ T6412] el0t_64_sync_handler+0x84/0x108 [ 36.381891][ T6412] el0t_64_sync+0x198/0x19c [ 36.383000][ T6412] [ 36.383000][ T6412] -> #2 (&journal->j_trans_barrier){.+.+}-{4:4}: [ 36.385026][ T6412] down_read+0x58/0x2fc [ 36.386203][ T6412] ocfs2_start_trans+0x3c4/0x71c [ 36.387429][ T6412] ocfs2_reserve_suballoc_bits+0x840/0x4254 [ 36.388777][ T6412] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 36.390311][ T6412] ocfs2_mknod+0xdc8/0x2438 [ 36.391524][ T6412] ocfs2_create+0x194/0x4d4 [ 36.392676][ T6412] vfs_create+0x21c/0x36c [ 36.393849][ T6412] do_mknodat+0x3c4/0x564 [ 36.394919][ T6412] __arm64_sys_mknodat+0xac/0xc8 [ 36.396098][ T6412] invoke_syscall+0x98/0x2b8 [ 36.397281][ T6412] el0_svc_common+0x130/0x23c [ 36.398428][ T6412] do_el0_svc+0x48/0x58 [ 36.399552][ T6412] el0_svc+0x54/0x168 [ 36.400457][ T6412] el0t_64_sync_handler+0x84/0x108 [ 36.401725][ T6412] el0t_64_sync+0x198/0x19c [ 36.402865][ T6412] [ 36.402865][ T6412] -> #1 (sb_internal#2){.+.+}-{0:0}: [ 36.404655][ T6412] ocfs2_start_trans+0x244/0x71c [ 36.405851][ T6412] ocfs2_mknod+0xe58/0x2438 [ 36.406939][ T6412] ocfs2_create+0x194/0x4d4 [ 36.408029][ T6412] vfs_create+0x21c/0x36c [ 36.409033][ T6412] do_mknodat+0x3c4/0x564 [ 36.410045][ T6412] __arm64_sys_mknodat+0xac/0xc8 [ 36.411253][ T6412] invoke_syscall+0x98/0x2b8 [ 36.412380][ T6412] el0_svc_common+0x130/0x23c [ 36.413495][ T6412] do_el0_svc+0x48/0x58 [ 36.414497][ T6412] el0_svc+0x54/0x168 [ 36.415452][ T6412] el0t_64_sync_handler+0x84/0x108 [ 36.416647][ T6412] el0t_64_sync+0x198/0x19c [ 36.417805][ T6412] [ 36.417805][ T6412] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{4:4}: [ 36.420079][ T6412] __lock_acquire+0x34f0/0x7904 [ 36.421258][ T6412] lock_acquire+0x23c/0x724 [ 36.422302][ T6412] down_write+0x50/0xc0 [ 36.423329][ T6412] ocfs2_reserve_local_alloc_bits+0x108/0x24cc [ 36.424732][ T6412] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 36.426286][ T6412] ocfs2_reserve_clusters+0x3c/0x50 [ 36.427523][ T6412] ocfs2_init_xattr_set_ctxt+0x3fc/0x95c [ 36.428983][ T6412] ocfs2_xattr_set+0xbe0/0x1448 [ 36.430200][ T6412] ocfs2_xattr_trusted_set+0x4c/0x64 [ 36.431493][ T6412] __vfs_setxattr+0x3d8/0x400 [ 36.432603][ T6412] __vfs_setxattr_noperm+0x110/0x578 [ 36.433954][ T6412] __vfs_setxattr_locked+0x1ec/0x218 [ 36.435203][ T6412] vfs_setxattr+0x1a8/0x344 [ 36.436282][ T6412] filename_setxattr+0x260/0x404 [ 36.437384][ T6412] path_setxattrat+0x370/0x41c [ 36.438553][ T6412] __arm64_sys_lsetxattr+0xc0/0xdc [ 36.439883][ T6412] invoke_syscall+0x98/0x2b8 [ 36.441035][ T6412] el0_svc_common+0x130/0x23c [ 36.442139][ T6412] do_el0_svc+0x48/0x58 [ 36.443173][ T6412] el0_svc+0x54/0x168 [ 36.444192][ T6412] el0t_64_sync_handler+0x84/0x108 [ 36.445416][ T6412] el0t_64_sync+0x198/0x19c [ 36.446573][ T6412] [ 36.446573][ T6412] other info that might help us debug this: [ 36.446573][ T6412] [ 36.449088][ T6412] Chain exists of: [ 36.449088][ T6412] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5 --> jbd2_handle --> &oi->ip_xattr_sem [ 36.449088][ T6412] [ 36.452738][ T6412] Possible unsafe locking scenario: [ 36.452738][ T6412] [ 36.454357][ T6412] CPU0 CPU1 [ 36.455619][ T6412] ---- ---- [ 36.456830][ T6412] lock(&oi->ip_xattr_sem); [ 36.457944][ T6412] lock(jbd2_handle); [ 36.459310][ T6412] lock(&oi->ip_xattr_sem); [ 36.460887][ T6412] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5); [ 36.462491][ T6412] [ 36.462491][ T6412] *** DEADLOCK *** [ 36.462491][ T6412] [ 36.464235][ T6412] 3 locks held by syz-executor266/6412: [ 36.465427][ T6412] #0: ffff0000c26d8420 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 36.467457][ T6412] #1: ffff0000dd6ec2c0 (&sb->s_type->i_mutex_key#16){+.+.}-{4:4}, at: vfs_setxattr+0x17c/0x344 [ 36.469792][ T6412] #2: ffff0000dd6ebff8 (&oi->ip_xattr_sem){++++}-{4:4}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 36.472018][ T6412] [ 36.472018][ T6412] stack backtrace: [ 36.473307][ T6412] CPU: 1 UID: 0 PID: 6412 Comm: syz-executor266 Not tainted 6.13.0-rc3-syzkaller-g573067a5a685 #0 [ 36.475634][ T6412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 36.478015][ T6412] Call trace: [ 36.478690][ T6412] show_stack+0x2c/0x3c (C) [ 36.479642][ T6412] dump_stack_lvl+0xe4/0x150 [ 36.480549][ T6412] dump_stack+0x1c/0x28 [ 36.481441][ T6412] print_circular_bug+0x154/0x1c0 [ 36.482577][ T6412] check_noncircular+0x310/0x404 [ 36.483584][ T6412] __lock_acquire+0x34f0/0x7904 [ 36.484640][ T6412] lock_acquire+0x23c/0x724 [ 36.485574][ T6412] down_write+0x50/0xc0 [ 36.486489][ T6412] ocfs2_reserve_local_alloc_bits+0x108/0x24cc [ 36.487832][ T6412] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 36.489238][ T6412] ocfs2_reserve_clusters+0x3c/0x50 [ 36.490562][ T6412] ocfs2_init_xattr_set_ctxt+0x3fc/0x95c [ 36.491702][ T6412] ocfs2_xattr_set+0xbe0/0x1448 [ 36.492818][ T6412] ocfs2_xattr_trusted_set+0x4c/0x64 [ 36.494053][ T6412] __vfs_setxattr+0x3d8/0x400 [ 36.495025][ T6412] __vfs_setxattr_noperm+0x110/0x578 [ 36.496137][ T6412] __vfs_setxattr_locked+0x1ec/0x218 [ 36.497297][ T6412] vfs_setxattr+0x1a8/0x344 [ 36.498280][ T6412] filename_setxattr+0x260/0x404 [ 36.499335][ T6412] path_setxattrat+0x370/0x41c [ 36.500449][ T6412] __arm64_sys_lsetxattr+0xc0/0xdc [ 36.501540][ T6412] invoke_syscall+0x98/0x2b8 [ 36.502563][ T6412] el0_svc_common+0x130/0x23c [ 36.503577][ T6412] do_el0_svc+0x48/0x58 [ 36.504554][ T6412] el0_svc+0x54/0x168 [ 36.505411][ T6412] el0t_64_sync_handler+0x84/0x108 [ 36.506487][ T6412] el0t_64_sync+0x198/0x19c