Warning: Permanently added '10.128.1.15' (ED25519) to the list of known hosts. executing program [ 45.654710][ T6489] loop0: detected capacity change from 0 to 32768 [ 45.662914][ T6489] ======================================================= executing program [ 45.662914][ T6489] WARNING: The mand mount option has been deprecated and [ 45.662914][ T6489] and is ignored by this kernel. Remove the mand executing program [ 45.662914][ T6489] option from the mount to silence this warning. [ 45.662914][ T6489] ======================================================= [ 45.697357][ T6489] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 45.706659][ T6492] [ 45.707329][ T6492] ====================================================== [ 45.709133][ T6492] WARNING: possible circular locking dependency detected [ 45.710965][ T6492] 6.15.0-rc4-syzkaller-ge0f4c8dd9d2d #0 Not tainted [ 45.712668][ T6492] ------------------------------------------------------ [ 45.714557][ T6492] syz-executor352/6492 is trying to acquire lock: [ 45.716311][ T6492] ffff0000de8adbe0 (&oi->ip_alloc_sem){+.+.}-{4:4}, at: ocfs2_try_remove_refcount_tree+0xb4/0x2d8 [ 45.719210][ T6492] [ 45.719210][ T6492] but task is already holding lock: [ 45.721179][ T6492] ffff0000de8adc78 (&oi->ip_xattr_sem){++++}-{4:4}, at: ocfs2_try_remove_refcount_tree+0xa8/0x2d8 executing program [ 45.724046][ T6492] [ 45.724046][ T6492] which lock already depends on the new lock. [ 45.724046][ T6492] [ 45.726828][ T6492] [ 45.726828][ T6492] the existing dependency chain (in reverse order) is: [ 45.729207][ T6492] [ 45.729207][ T6492] -> #4 (&oi->ip_xattr_sem){++++}-{4:4}: [ 45.731262][ T6492] down_write+0x50/0xc0 [ 45.732488][ T6492] ocfs2_xattr_set_handle+0x2a8/0x5e4 [ 45.734047][ T6492] ocfs2_init_security_set+0xb4/0xd8 [ 45.735576][ T6492] ocfs2_mknod+0x106c/0x1cf0 [ 45.736924][ T6492] ocfs2_create+0x190/0x474 [ 45.738269][ T6492] path_openat+0x12d8/0x2c40 [ 45.739637][ T6492] do_filp_open+0x18c/0x36c [ 45.740955][ T6492] filp_open+0x15c/0x1b8 [ 45.742218][ T6492] do_coredump+0x1654/0x22c0 [ 45.743615][ T6492] get_signal+0xe38/0x12f8 [ 45.744924][ T6492] do_signal+0x1c0/0x36cc [ 45.746243][ T6492] do_notify_resume+0xac/0x1ec [ 45.747620][ T6492] el0_da+0xc0/0x160 [ 45.748795][ T6492] el0t_64_sync_handler+0x84/0x108 executing program [ 45.750308][ T6492] el0t_64_sync+0x198/0x19c [ 45.751636][ T6492] [ 45.751636][ T6492] -> #3 (jbd2_handle){++++}-{0:0}: [ 45.753608][ T6492] start_this_handle+0xe74/0x10dc [ 45.755087][ T6492] jbd2__journal_start+0x288/0x51c [ 45.756670][ T6492] jbd2_journal_start+0x3c/0x4c [ 45.758244][ T6492] ocfs2_start_trans+0x368/0x6ac [ 45.759684][ T6492] ocfs2_reserve_suballoc_bits+0x630/0x3b60 [ 45.761404][ T6492] ocfs2_reserve_new_metadata_blocks+0x368/0x810 [ 45.763265][ T6492] ocfs2_mknod+0xbd8/0x1cf0 [ 45.764655][ T6492] ocfs2_create+0x190/0x474 [ 45.765987][ T6492] path_openat+0x12d8/0x2c40 [ 45.767360][ T6492] do_filp_open+0x18c/0x36c [ 45.768727][ T6492] filp_open+0x15c/0x1b8 [ 45.770006][ T6492] do_coredump+0x1654/0x22c0 [ 45.771366][ T6492] get_signal+0xe38/0x12f8 [ 45.772707][ T6492] do_signal+0x1c0/0x36cc [ 45.773999][ T6492] do_notify_resume+0xac/0x1ec [ 45.775439][ T6492] el0_da+0xc0/0x160 [ 45.776603][ T6492] el0t_64_sync_handler+0x84/0x108 [ 45.778125][ T6492] el0t_64_sync+0x198/0x19c [ 45.779463][ T6492] [ 45.779463][ T6492] -> #2 (&journal->j_trans_barrier){.+.+}-{4:4}: [ 45.781731][ T6492] down_read+0x58/0x2f8 [ 45.782974][ T6492] ocfs2_start_trans+0x35c/0x6ac [ 45.784439][ T6492] ocfs2_reserve_suballoc_bits+0x630/0x3b60 [ 45.786152][ T6492] ocfs2_reserve_new_metadata_blocks+0x368/0x810 [ 45.787993][ T6492] ocfs2_mknod+0xbd8/0x1cf0 executing program [ 45.789328][ T6492] ocfs2_create+0x190/0x474 [ 45.790647][ T6492] path_openat+0x12d8/0x2c40 [ 45.792010][ T6492] do_filp_open+0x18c/0x36c [ 45.793354][ T6492] filp_open+0x15c/0x1b8 [ 45.794606][ T6492] do_coredump+0x1654/0x22c0 [ 45.795964][ T6492] get_signal+0xe38/0x12f8 [ 45.797267][ T6492] do_signal+0x1c0/0x36cc [ 45.798551][ T6492] do_notify_resume+0xac/0x1ec [ 45.799941][ T6492] el0_da+0xc0/0x160 [ 45.801099][ T6492] el0t_64_sync_handler+0x84/0x108 [ 45.802575][ T6492] el0t_64_sync+0x198/0x19c [ 45.803900][ T6492] [ 45.803900][ T6492] -> #1 (sb_internal#2){.+.+}-{0:0}: [ 45.805920][ T6492] ocfs2_start_trans+0x1f4/0x6ac [ 45.807462][ T6492] ocfs2_truncate_file+0x5b0/0x12f4 [ 45.809006][ T6492] ocfs2_setattr+0x1148/0x17a0 [ 45.810450][ T6492] notify_change+0x9a4/0xc50 [ 45.811799][ T6492] do_truncate+0x178/0x1f0 [ 45.813105][ T6492] do_coredump+0x1cb0/0x22c0 [ 45.814458][ T6492] get_signal+0xe38/0x12f8 [ 45.815763][ T6492] do_signal+0x1c0/0x36cc [ 45.817036][ T6492] do_notify_resume+0xac/0x1ec [ 45.818411][ T6492] el0_da+0xc0/0x160 [ 45.819573][ T6492] el0t_64_sync_handler+0x84/0x108 [ 45.821058][ T6492] el0t_64_sync+0x198/0x19c [ 45.822389][ T6492] [ 45.822389][ T6492] -> #0 (&oi->ip_alloc_sem){+.+.}-{4:4}: [ 45.824513][ T6492] __lock_acquire+0x1728/0x3058 [ 45.825934][ T6492] lock_acquire+0x14c/0x2e0 [ 45.827293][ T6492] down_write+0x50/0xc0 [ 45.828532][ T6492] ocfs2_try_remove_refcount_tree+0xb4/0x2d8 [ 45.830295][ T6492] ocfs2_truncate_file+0xc28/0x12f4 [ 45.831825][ T6492] ocfs2_setattr+0x1148/0x17a0 [ 45.833232][ T6492] notify_change+0x9a4/0xc50 [ 45.834618][ T6492] do_truncate+0x178/0x1f0 [ 45.835922][ T6492] do_coredump+0x1cb0/0x22c0 [ 45.837263][ T6492] get_signal+0xe38/0x12f8 [ 45.838566][ T6492] do_signal+0x1c0/0x36cc [ 45.839858][ T6492] do_notify_resume+0xac/0x1ec [ 45.841303][ T6492] el0_da+0xc0/0x160 [ 45.842461][ T6492] el0t_64_sync_handler+0x84/0x108 [ 45.843960][ T6492] el0t_64_sync+0x198/0x19c [ 45.845335][ T6492] [ 45.845335][ T6492] other info that might help us debug this: [ 45.845335][ T6492] [ 45.848092][ T6492] Chain exists of: [ 45.848092][ T6492] &oi->ip_alloc_sem --> jbd2_handle --> &oi->ip_xattr_sem [ 45.848092][ T6492] executing program [ 45.851651][ T6492] Possible unsafe locking scenario: [ 45.851651][ T6492] [ 45.853572][ T6492] CPU0 CPU1 [ 45.854983][ T6492] ---- ---- [ 45.856460][ T6492] lock(&oi->ip_xattr_sem); [ 45.857699][ T6492] lock(jbd2_handle); [ 45.859448][ T6492] lock(&oi->ip_xattr_sem); [ 45.861345][ T6492] lock(&oi->ip_alloc_sem); [ 45.862577][ T6492] [ 45.862577][ T6492] *** DEADLOCK *** [ 45.862577][ T6492] [ 45.864781][ T6492] 2 locks held by syz-executor352/6492: [ 45.866272][ T6492] #0: ffff0000de8adf40 (&sb->s_type->i_mutex_key#19){+.+.}-{4:4}, at: do_truncate+0x164/0x1f0 [ 45.869115][ T6492] #1: ffff0000de8adc78 (&oi->ip_xattr_sem){++++}-{4:4}, at: ocfs2_try_remove_refcount_tree+0xa8/0x2d8 [ 45.872066][ T6492] [ 45.872066][ T6492] stack backtrace: [ 45.873606][ T6492] CPU: 1 UID: 0 PID: 6492 Comm: syz-executor352 Not tainted 6.15.0-rc4-syzkaller-ge0f4c8dd9d2d #0 PREEMPT [ 45.876596][ T6492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 45.879228][ T6492] Call trace: [ 45.880081][ T6492] show_stack+0x2c/0x3c (C) [ 45.881274][ T6492] __dump_stack+0x30/0x40 [ 45.882408][ T6492] dump_stack_lvl+0xd8/0x12c [ 45.883611][ T6492] dump_stack+0x1c/0x28 [ 45.884701][ T6492] print_circular_bug+0x324/0x32c [ 45.886064][ T6492] check_noncircular+0x154/0x174 [ 45.887367][ T6492] __lock_acquire+0x1728/0x3058 [ 45.888636][ T6492] lock_acquire+0x14c/0x2e0 [ 45.889835][ T6492] down_write+0x50/0xc0 [ 45.890936][ T6492] ocfs2_try_remove_refcount_tree+0xb4/0x2d8 [ 45.892535][ T6492] ocfs2_truncate_file+0xc28/0x12f4 [ 45.893940][ T6492] ocfs2_setattr+0x1148/0x17a0 [ 45.895231][ T6492] notify_change+0x9a4/0xc50 [ 45.896527][ T6492] do_truncate+0x178/0x1f0 [ 45.897687][ T6492] do_coredump+0x1cb0/0x22c0 [ 45.898900][ T6492] get_signal+0xe38/0x12f8 [ 45.900078][ T6492] do_signal+0x1c0/0x36cc [ 45.901232][ T6492] do_notify_resume+0xac/0x1ec [ 45.902554][ T6492] el0_da+0xc0/0x160 [ 45.903618][ T6492] el0t_64_sync_handler+0x84/0x108 [ 45.904961][ T6492] el0t_64_sync+0x198/0x19c executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program