Warning: Permanently added '10.128.1.128' (ED25519) to the list of known hosts. executing program [ 35.715869][ T6419] loop0: detected capacity change from 0 to 32768 [ 35.783815][ T6419] bcachefs (loop0): starting version 1.7: mi_btree_bitmap opts=metadata_checksum=none,data_checksum=crc64,background_compression=zstd,str_hash=crc32c,nojournal_transaction_names [ 35.787527][ T6419] [ 35.788039][ T6419] ============================================ [ 35.789286][ T6419] WARNING: possible recursive locking detected [ 35.790553][ T6419] 6.12.0-rc3-syzkaller-g9ec59cb3edc7 #0 Tainted: G W [ 35.792153][ T6419] -------------------------------------------- [ 35.793332][ T6419] syz-executor120/6419 is trying to acquire lock: [ 35.794654][ T6419] ffff0000e1c00908 (&c->sb_lock){+.+.}-{3:3}, at: bch2_replicas_entry_validate+0x34/0x88 [ 35.796655][ T6419] [ 35.796655][ T6419] but task is already holding lock: [ 35.798256][ T6419] ffff0000e1c00908 (&c->sb_lock){+.+.}-{3:3}, at: bch2_read_superblock_clean+0x44/0x444 [ 35.800204][ T6419] [ 35.800204][ T6419] other info that might help us debug this: [ 35.801857][ T6419] Possible unsafe locking scenario: [ 35.801857][ T6419] [ 35.803351][ T6419] CPU0 [ 35.804135][ T6419] ---- [ 35.804777][ T6419] lock(&c->sb_lock); [ 35.805625][ T6419] lock(&c->sb_lock); [ 35.806489][ T6419] [ 35.806489][ T6419] *** DEADLOCK *** [ 35.806489][ T6419] [ 35.807995][ T6419] May be due to missing lock nesting notation [ 35.807995][ T6419] [ 35.809698][ T6419] 2 locks held by syz-executor120/6419: [ 35.810879][ T6419] #0: ffff0000e1c00278 (&c->state_lock){+.+.}-{3:3}, at: bch2_fs_start+0x50/0x53c [ 35.812833][ T6419] #1: ffff0000e1c00908 (&c->sb_lock){+.+.}-{3:3}, at: bch2_read_superblock_clean+0x44/0x444 [ 35.814949][ T6419] [ 35.814949][ T6419] stack backtrace: [ 35.816213][ T6419] CPU: 1 UID: 0 PID: 6419 Comm: syz-executor120 Tainted: G W 6.12.0-rc3-syzkaller-g9ec59cb3edc7 #0 [ 35.818664][ T6419] Tainted: [W]=WARN [ 35.819409][ T6419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 35.821522][ T6419] Call trace: [ 35.822259][ T6419] show_stack+0x2c/0x3c (C) [ 35.823226][ T6419] dump_stack_lvl+0xe4/0x150 [ 35.824113][ T6419] dump_stack+0x1c/0x28 [ 35.824936][ T6419] print_deadlock_bug+0x4e8/0x668 [ 35.825916][ T6419] __lock_acquire+0x6180/0x77c8 [ 35.826861][ T6419] lock_acquire+0x240/0x728 [ 35.827784][ T6419] __mutex_lock_common+0x190/0x21a0 [ 35.828830][ T6419] mutex_lock_nested+0x2c/0x38 [ 35.829850][ T6419] bch2_replicas_entry_validate+0x34/0x88 [ 35.830993][ T6419] journal_entry_data_usage_validate+0x268/0x5ac [ 35.832319][ T6419] bch2_journal_entry_validate+0xb8/0xec [ 35.833530][ T6419] bch2_read_superblock_clean+0x1ac/0x444 [ 35.834749][ T6419] bch2_fs_recovery+0x1b8/0x55a0 [ 35.835783][ T6419] bch2_fs_start+0x30c/0x53c [ 35.836831][ T6419] bch2_fs_get_tree+0x938/0x1030 [ 35.837823][ T6419] vfs_get_tree+0x90/0x28c [ 35.838834][ T6419] do_new_mount+0x278/0x900 [ 35.839901][ T6419] path_mount+0x590/0xe04 [ 35.840909][ T6419] __arm64_sys_mount+0x45c/0x5a8 [ 35.842083][ T6419] invoke_syscall+0x98/0x2b8 [ 35.843097][ T6419] el0_svc_common+0x130/0x23c [ 35.844035][ T6419] do_el0_svc+0x48/0x58 [ 35.844854][ T6419] el0_svc+0x54/0x168 [ 35.845686][ T6419] el0t_64_sync_handler+0x84/0x108 [ 35.846695][ T6419] el0t_64_sync+0x198/0x19c