Warning: Permanently added '10.128.0.223' (ED25519) to the list of known hosts. executing program [ 34.194393][ T6415] loop0: detected capacity change from 0 to 32768 [ 34.197867][ T6415] ======================================================= [ 34.197867][ T6415] WARNING: The mand mount option has been deprecated and [ 34.197867][ T6415] and is ignored by this kernel. Remove the mand [ 34.197867][ T6415] option from the mount to silence this warning. [ 34.197867][ T6415] ======================================================= [ 34.225695][ T6415] JBD2: Ignoring recovery information on journal [ 34.241227][ T6415] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 34.249640][ T6415] [ 34.250179][ T6415] ====================================================== [ 34.251748][ T6415] WARNING: possible circular locking dependency detected [ 34.253182][ T6415] 6.12.0-syzkaller-g7b1d1d4cfac0 #0 Not tainted [ 34.254488][ T6415] ------------------------------------------------------ [ 34.255908][ T6415] syz-executor242/6415 is trying to acquire lock: [ 34.257229][ T6415] ffff0000deb1a640 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{3:3}, at: ocfs2_reserve_local_alloc_bits+0xfc/0x247c [ 34.260128][ T6415] [ 34.260128][ T6415] but task is already holding lock: [ 34.261733][ T6415] ffff0000deb1bff8 (&oi->ip_xattr_sem){+.+.}-{3:3}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 34.263908][ T6415] [ 34.263908][ T6415] which lock already depends on the new lock. [ 34.263908][ T6415] [ 34.266018][ T6415] [ 34.266018][ T6415] the existing dependency chain (in reverse order) is: [ 34.267880][ T6415] [ 34.267880][ T6415] -> #4 (&oi->ip_xattr_sem){+.+.}-{3:3}: [ 34.269573][ T6415] down_write+0x50/0xc0 [ 34.270589][ T6415] ocfs2_xattr_set_handle+0x40c/0x824 [ 34.271821][ T6415] ocfs2_init_security_set+0xb4/0xd8 [ 34.273058][ T6415] ocfs2_mknod+0x1408/0x243c [ 34.274155][ T6415] ocfs2_create+0x194/0x4e0 [ 34.275314][ T6415] path_openat+0x13e4/0x2b14 [ 34.276349][ T6415] do_filp_open+0x1bc/0x3cc [ 34.277356][ T6415] do_sys_openat2+0x124/0x1b8 [ 34.278474][ T6415] __arm64_sys_openat+0x1f0/0x240 [ 34.279607][ T6415] invoke_syscall+0x98/0x2b8 [ 34.280622][ T6415] el0_svc_common+0x130/0x23c [ 34.281575][ T6415] do_el0_svc+0x48/0x58 [ 34.282670][ T6415] el0_svc+0x54/0x168 [ 34.283655][ T6415] el0t_64_sync_handler+0x84/0x108 [ 34.284770][ T6415] el0t_64_sync+0x198/0x19c [ 34.285884][ T6415] [ 34.285884][ T6415] -> #3 (jbd2_handle){.+.+}-{0:0}: [ 34.287417][ T6415] start_this_handle+0xf34/0x11c4 [ 34.288517][ T6415] jbd2__journal_start+0x298/0x544 [ 34.289676][ T6415] jbd2_journal_start+0x3c/0x4c [ 34.290772][ T6415] ocfs2_start_trans+0x3d0/0x71c [ 34.291932][ T6415] ocfs2_reserve_suballoc_bits+0x840/0x4288 [ 34.293307][ T6415] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 34.294796][ T6415] ocfs2_mknod+0xdc8/0x243c [ 34.295850][ T6415] ocfs2_create+0x194/0x4e0 [ 34.296913][ T6415] path_openat+0x13e4/0x2b14 [ 34.298041][ T6415] do_filp_open+0x1bc/0x3cc [ 34.299001][ T6415] do_sys_openat2+0x124/0x1b8 [ 34.300128][ T6415] __arm64_sys_openat+0x1f0/0x240 [ 34.301303][ T6415] invoke_syscall+0x98/0x2b8 [ 34.302368][ T6415] el0_svc_common+0x130/0x23c [ 34.303386][ T6415] do_el0_svc+0x48/0x58 [ 34.304331][ T6415] el0_svc+0x54/0x168 [ 34.305221][ T6415] el0t_64_sync_handler+0x84/0x108 [ 34.306520][ T6415] el0t_64_sync+0x198/0x19c [ 34.307558][ T6415] [ 34.307558][ T6415] -> #2 (&journal->j_trans_barrier){.+.+}-{3:3}: [ 34.309283][ T6415] down_read+0x58/0x2fc [ 34.310227][ T6415] ocfs2_start_trans+0x3c4/0x71c [ 34.311361][ T6415] ocfs2_reserve_suballoc_bits+0x840/0x4288 [ 34.312631][ T6415] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 34.314082][ T6415] ocfs2_mknod+0xdc8/0x243c [ 34.315093][ T6415] ocfs2_create+0x194/0x4e0 [ 34.316172][ T6415] path_openat+0x13e4/0x2b14 [ 34.317240][ T6415] do_filp_open+0x1bc/0x3cc [ 34.318242][ T6415] do_sys_openat2+0x124/0x1b8 [ 34.319328][ T6415] __arm64_sys_openat+0x1f0/0x240 [ 34.320505][ T6415] invoke_syscall+0x98/0x2b8 [ 34.321567][ T6415] el0_svc_common+0x130/0x23c [ 34.322623][ T6415] do_el0_svc+0x48/0x58 [ 34.323649][ T6415] el0_svc+0x54/0x168 [ 34.324555][ T6415] el0t_64_sync_handler+0x84/0x108 [ 34.325702][ T6415] el0t_64_sync+0x198/0x19c [ 34.326726][ T6415] [ 34.326726][ T6415] -> #1 (sb_internal#2){.+.+}-{0:0}: [ 34.328318][ T6415] ocfs2_start_trans+0x244/0x71c [ 34.329430][ T6415] ocfs2_mknod+0xe58/0x243c [ 34.330451][ T6415] ocfs2_create+0x194/0x4e0 [ 34.331501][ T6415] path_openat+0x13e4/0x2b14 [ 34.332684][ T6415] do_filp_open+0x1bc/0x3cc [ 34.333710][ T6415] do_sys_openat2+0x124/0x1b8 [ 34.334826][ T6415] __arm64_sys_openat+0x1f0/0x240 [ 34.336056][ T6415] invoke_syscall+0x98/0x2b8 [ 34.337198][ T6415] el0_svc_common+0x130/0x23c [ 34.338368][ T6415] do_el0_svc+0x48/0x58 [ 34.339338][ T6415] el0_svc+0x54/0x168 [ 34.340191][ T6415] el0t_64_sync_handler+0x84/0x108 [ 34.341376][ T6415] el0t_64_sync+0x198/0x19c [ 34.342464][ T6415] [ 34.342464][ T6415] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{3:3}: [ 34.344768][ T6415] __lock_acquire+0x33f8/0x77c8 [ 34.345931][ T6415] lock_acquire+0x240/0x728 [ 34.346973][ T6415] down_write+0x50/0xc0 [ 34.347928][ T6415] ocfs2_reserve_local_alloc_bits+0xfc/0x247c [ 34.349387][ T6415] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 34.350819][ T6415] ocfs2_reserve_clusters+0x3c/0x50 [ 34.352085][ T6415] ocfs2_init_xattr_set_ctxt+0x404/0x968 [ 34.353387][ T6415] ocfs2_xattr_set+0xbe0/0x1448 [ 34.354501][ T6415] ocfs2_xattr_trusted_set+0x4c/0x64 [ 34.355732][ T6415] __vfs_setxattr+0x3d8/0x400 [ 34.356871][ T6415] __vfs_setxattr_noperm+0x110/0x578 [ 34.358072][ T6415] __vfs_setxattr_locked+0x1ec/0x218 [ 34.359243][ T6415] vfs_setxattr+0x1a8/0x344 [ 34.360269][ T6415] __arm64_sys_fsetxattr+0x36c/0x458 [ 34.361418][ T6415] invoke_syscall+0x98/0x2b8 [ 34.362536][ T6415] el0_svc_common+0x130/0x23c [ 34.363714][ T6415] do_el0_svc+0x48/0x58 [ 34.364714][ T6415] el0_svc+0x54/0x168 [ 34.365696][ T6415] el0t_64_sync_handler+0x84/0x108 [ 34.366920][ T6415] el0t_64_sync+0x198/0x19c [ 34.367956][ T6415] [ 34.367956][ T6415] other info that might help us debug this: [ 34.367956][ T6415] [ 34.370087][ T6415] Chain exists of: [ 34.370087][ T6415] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5 --> jbd2_handle --> &oi->ip_xattr_sem [ 34.370087][ T6415] [ 34.373552][ T6415] Possible unsafe locking scenario: [ 34.373552][ T6415] [ 34.375121][ T6415] CPU0 CPU1 [ 34.376229][ T6415] ---- ---- [ 34.377448][ T6415] lock(&oi->ip_xattr_sem); [ 34.378453][ T6415] lock(jbd2_handle); [ 34.379843][ T6415] lock(&oi->ip_xattr_sem); [ 34.381358][ T6415] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5); [ 34.382900][ T6415] [ 34.382900][ T6415] *** DEADLOCK *** [ 34.382900][ T6415] [ 34.384581][ T6415] 3 locks held by syz-executor242/6415: [ 34.385790][ T6415] #0: ffff0000c2756420 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write_file+0x64/0x1e8 [ 34.387892][ T6415] #1: ffff0000deb1c2c0 (&sb->s_type->i_mutex_key#16){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 34.390073][ T6415] #2: ffff0000deb1bff8 (&oi->ip_xattr_sem){+.+.}-{3:3}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 34.392132][ T6415] [ 34.392132][ T6415] stack backtrace: [ 34.393366][ T6415] CPU: 1 UID: 0 PID: 6415 Comm: syz-executor242 Not tainted 6.12.0-syzkaller-g7b1d1d4cfac0 #0 [ 34.395503][ T6415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 34.397542][ T6415] Call trace: [ 34.398131][ T6415] show_stack+0x2c/0x3c (C) [ 34.399051][ T6415] dump_stack_lvl+0xe4/0x150 [ 34.400091][ T6415] dump_stack+0x1c/0x28 [ 34.400907][ T6415] print_circular_bug+0x154/0x1c0 [ 34.402090][ T6415] check_noncircular+0x310/0x404 [ 34.403063][ T6415] __lock_acquire+0x33f8/0x77c8 [ 34.404035][ T6415] lock_acquire+0x240/0x728 [ 34.404948][ T6415] down_write+0x50/0xc0 [ 34.405847][ T6415] ocfs2_reserve_local_alloc_bits+0xfc/0x247c [ 34.407152][ T6415] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 34.408520][ T6415] ocfs2_reserve_clusters+0x3c/0x50 [ 34.409587][ T6415] ocfs2_init_xattr_set_ctxt+0x404/0x968 [ 34.410772][ T6415] ocfs2_xattr_set+0xbe0/0x1448 [ 34.411806][ T6415] ocfs2_xattr_trusted_set+0x4c/0x64 [ 34.412892][ T6415] __vfs_setxattr+0x3d8/0x400 [ 34.413910][ T6415] __vfs_setxattr_noperm+0x110/0x578 [ 34.415070][ T6415] __vfs_setxattr_locked+0x1ec/0x218 [ 34.416180][ T6415] vfs_setxattr+0x1a8/0x344 [ 34.417136][ T6415] __arm64_sys_fsetxattr+0x36c/0x458 [ 34.418374][ T6415] invoke_syscall+0x98/0x2b8 [ 34.419356][ T6415] el0_svc_common+0x130/0x23c [ 34.420422][ T6415] do_el0_svc+0x48/0x58 [ 34.421314][ T6415] el0_svc+0x54/0x168 [ 34.422126][ T6415] el0t_64_sync_handler+0x84/0x108 [ 34.423288][ T6415] el0t_64_sync+0x198/0x19c executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program