Warning: Permanently added '10.128.0.103' (ED25519) to the list of known hosts. executing program [ 38.596335][ T4289] loop0: detected capacity change from 0 to 32768 [ 38.599670][ T4289] ======================================================= [ 38.599670][ T4289] WARNING: The mand mount option has been deprecated and [ 38.599670][ T4289] and is ignored by this kernel. Remove the mand [ 38.599670][ T4289] option from the mount to silence this warning. [ 38.599670][ T4289] ======================================================= [ 38.616331][ T4289] ocfs2: Slot 0 on device (7,0) was already allocated to this node! [ 38.623241][ T4289] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 38.637627][ T4289] [ 38.638198][ T4289] ====================================================== [ 38.639970][ T4289] WARNING: possible circular locking dependency detected [ 38.641691][ T4289] 6.1.129-syzkaller #0 Not tainted [ 38.642972][ T4289] ------------------------------------------------------ [ 38.644819][ T4289] syz-executor246/4289 is trying to acquire lock: [ 38.646453][ T4289] ffff0000de81e650 (sb_internal#2){.+.+}-{0:0}, at: ocfs2_truncate_file+0x640/0x1618 [ 38.648897][ T4289] [ 38.648897][ T4289] but task is already holding lock: [ 38.650829][ T4289] ffff0000e16d0660 (&oi->ip_alloc_sem){++++}-{3:3}, at: ocfs2_truncate_file+0x38c/0x1618 [ 38.653435][ T4289] [ 38.653435][ T4289] which lock already depends on the new lock. [ 38.653435][ T4289] [ 38.656123][ T4289] [ 38.656123][ T4289] the existing dependency chain (in reverse order) is: [ 38.658448][ T4289] [ 38.658448][ T4289] -> #3 (&oi->ip_alloc_sem){++++}-{3:3}: [ 38.660389][ T4289] down_read+0x64/0x308 [ 38.661563][ T4289] ocfs2_read_virt_blocks+0x2bc/0x9f8 [ 38.662971][ T4289] ocfs2_find_entry+0x3d0/0x23c4 [ 38.664263][ T4289] ocfs2_rename+0x1cb4/0x3588 [ 38.665504][ T4289] vfs_rename+0xac8/0xe04 [ 38.666706][ T4289] do_renameat2+0x9ec/0xe64 [ 38.667901][ T4289] __arm64_sys_renameat2+0xe0/0xfc [ 38.669439][ T4289] invoke_syscall+0x98/0x2bc [ 38.670721][ T4289] el0_svc_common+0x138/0x258 [ 38.672022][ T4289] do_el0_svc+0x58/0x13c [ 38.673275][ T4289] el0_svc+0x58/0x168 [ 38.674518][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.676005][ T4289] el0t_64_sync+0x18c/0x190 [ 38.677359][ T4289] [ 38.677359][ T4289] -> #2 (jbd2_handle){.+.+}-{0:0}: [ 38.679386][ T4289] start_this_handle+0x1140/0x13ac [ 38.680981][ T4289] jbd2__journal_start+0x298/0x544 [ 38.682434][ T4289] jbd2_journal_start+0x3c/0x4c [ 38.683787][ T4289] ocfs2_start_trans+0x3e8/0x73c [ 38.685106][ T4289] ocfs2_reserve_local_alloc_bits+0x9b4/0x2610 [ 38.686791][ T4289] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 38.688631][ T4289] ocfs2_reserve_clusters+0x3c/0x50 [ 38.690019][ T4289] ocfs2_mknod+0xe04/0x2560 [ 38.691205][ T4289] ocfs2_mkdir+0x1a8/0x560 [ 38.692441][ T4289] vfs_mkdir+0x334/0x4e4 [ 38.693654][ T4289] do_mkdirat+0x220/0x510 [ 38.695018][ T4289] __arm64_sys_mkdirat+0x90/0xa8 [ 38.696441][ T4289] invoke_syscall+0x98/0x2bc [ 38.697831][ T4289] el0_svc_common+0x138/0x258 [ 38.699207][ T4289] do_el0_svc+0x58/0x13c [ 38.700530][ T4289] el0_svc+0x58/0x168 [ 38.701672][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.703185][ T4289] el0t_64_sync+0x18c/0x190 [ 38.704507][ T4289] [ 38.704507][ T4289] -> #1 (&journal->j_trans_barrier){.+.+}-{3:3}: [ 38.706823][ T4289] down_read+0x64/0x308 [ 38.708089][ T4289] ocfs2_start_trans+0x3dc/0x73c [ 38.709555][ T4289] ocfs2_reserve_local_alloc_bits+0x9b4/0x2610 [ 38.711295][ T4289] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 38.713106][ T4289] ocfs2_reserve_clusters+0x3c/0x50 [ 38.714655][ T4289] ocfs2_mknod+0xe04/0x2560 [ 38.715950][ T4289] ocfs2_mkdir+0x1a8/0x560 [ 38.717193][ T4289] vfs_mkdir+0x334/0x4e4 [ 38.718406][ T4289] do_mkdirat+0x220/0x510 [ 38.719697][ T4289] __arm64_sys_mkdirat+0x90/0xa8 [ 38.721119][ T4289] invoke_syscall+0x98/0x2bc [ 38.722444][ T4289] el0_svc_common+0x138/0x258 [ 38.723741][ T4289] do_el0_svc+0x58/0x13c [ 38.724956][ T4289] el0_svc+0x58/0x168 [ 38.726168][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.727580][ T4289] el0t_64_sync+0x18c/0x190 [ 38.728967][ T4289] [ 38.728967][ T4289] -> #0 (sb_internal#2){.+.+}-{0:0}: [ 38.730950][ T4289] __lock_acquire+0x3338/0x7680 [ 38.732328][ T4289] lock_acquire+0x26c/0x7cc [ 38.733666][ T4289] ocfs2_start_trans+0x260/0x73c [ 38.735087][ T4289] ocfs2_truncate_file+0x640/0x1618 [ 38.736452][ T4289] ocfs2_setattr+0x142c/0x1b5c [ 38.737843][ T4289] notify_change+0xb58/0xe1c [ 38.739156][ T4289] do_truncate+0x1c0/0x28c [ 38.740459][ T4289] path_openat+0x1fa0/0x2548 [ 38.741798][ T4289] do_filp_open+0x1bc/0x3cc [ 38.743109][ T4289] do_sys_openat2+0x128/0x3e0 [ 38.744415][ T4289] __arm64_sys_openat+0x1f0/0x240 [ 38.745806][ T4289] invoke_syscall+0x98/0x2bc [ 38.747216][ T4289] el0_svc_common+0x138/0x258 [ 38.748578][ T4289] do_el0_svc+0x58/0x13c [ 38.749747][ T4289] el0_svc+0x58/0x168 [ 38.750806][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.752148][ T4289] el0t_64_sync+0x18c/0x190 [ 38.753361][ T4289] [ 38.753361][ T4289] other info that might help us debug this: [ 38.753361][ T4289] [ 38.755819][ T4289] Chain exists of: [ 38.755819][ T4289] sb_internal#2 --> jbd2_handle --> &oi->ip_alloc_sem [ 38.755819][ T4289] [ 38.758826][ T4289] Possible unsafe locking scenario: [ 38.758826][ T4289] [ 38.760623][ T4289] CPU0 CPU1 [ 38.761915][ T4289] ---- ---- [ 38.763370][ T4289] lock(&oi->ip_alloc_sem); [ 38.764510][ T4289] lock(jbd2_handle); [ 38.766215][ T4289] lock(&oi->ip_alloc_sem); [ 38.767999][ T4289] lock(sb_internal#2); [ 38.769140][ T4289] [ 38.769140][ T4289] *** DEADLOCK *** [ 38.769140][ T4289] [ 38.771251][ T4289] 3 locks held by syz-executor246/4289: [ 38.772700][ T4289] #0: ffff0000de81e460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 38.775166][ T4289] #1: ffff0000e16d09c8 (&sb->s_type->i_mutex_key#20){+.+.}-{3:3}, at: do_truncate+0x1ac/0x28c [ 38.777840][ T4289] #2: ffff0000e16d0660 (&oi->ip_alloc_sem){++++}-{3:3}, at: ocfs2_truncate_file+0x38c/0x1618 [ 38.780404][ T4289] [ 38.780404][ T4289] stack backtrace: [ 38.781848][ T4289] CPU: 1 PID: 4289 Comm: syz-executor246 Not tainted 6.1.129-syzkaller #0 [ 38.783992][ T4289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 38.786576][ T4289] Call trace: [ 38.787411][ T4289] dump_backtrace+0x1c8/0x1f4 [ 38.788568][ T4289] show_stack+0x2c/0x3c [ 38.789599][ T4289] dump_stack_lvl+0x108/0x170 [ 38.790772][ T4289] dump_stack+0x1c/0x58 [ 38.791809][ T4289] print_circular_bug+0x150/0x1b8 [ 38.793039][ T4289] check_noncircular+0x2cc/0x378 [ 38.794288][ T4289] __lock_acquire+0x3338/0x7680 [ 38.795539][ T4289] lock_acquire+0x26c/0x7cc [ 38.796735][ T4289] ocfs2_start_trans+0x260/0x73c [ 38.797957][ T4289] ocfs2_truncate_file+0x640/0x1618 [ 38.799283][ T4289] ocfs2_setattr+0x142c/0x1b5c [ 38.800548][ T4289] notify_change+0xb58/0xe1c [ 38.801775][ T4289] do_truncate+0x1c0/0x28c [ 38.802922][ T4289] path_openat+0x1fa0/0x2548 [ 38.804107][ T4289] do_filp_open+0x1bc/0x3cc [ 38.805219][ T4289] do_sys_openat2+0x128/0x3e0 [ 38.806462][ T4289] __arm64_sys_openat+0x1f0/0x240 [ 38.807757][ T4289] invoke_syscall+0x98/0x2bc [ 38.808973][ T4289] el0_svc_common+0x138/0x258 [ 38.810160][ T4289] do_el0_svc+0x58/0x13c [ 38.811267][ T4289] el0_svc+0x58/0x168 [ 38.812273][ T4289] el0t_64_sync_handler+0x84/0xf0 [ 38.813480][ T4289] el0t_64_sync+0x18c/0x190