Warning: Permanently added '10.128.1.143' (ED25519) to the list of known hosts. executing program [ 34.898363][ T6416] loop0: detected capacity change from 0 to 32768 [ 34.971713][ T6416] bcachefs (loop0): starting version 1.7: mi_btree_bitmap opts=ro,metadata_checksum=none,data_checksum=xxhash,compression=zstd,nojournal_transaction_names,read_only [ 34.975225][ T6416] [ 34.975729][ T6416] ============================================ [ 34.976959][ T6416] WARNING: possible recursive locking detected [ 34.978193][ T6416] 6.12.0-rc3-syzkaller-gd2b1b3bccef6 #0 Not tainted [ 34.979565][ T6416] -------------------------------------------- [ 34.980821][ T6416] syz-executor149/6416 is trying to acquire lock: [ 34.982047][ T6416] ffff0000df380908 (&c->sb_lock){+.+.}-{3:3}, at: bch2_replicas_entry_validate+0x34/0x88 [ 34.984171][ T6416] [ 34.984171][ T6416] but task is already holding lock: [ 34.985756][ T6416] ffff0000df380908 (&c->sb_lock){+.+.}-{3:3}, at: bch2_read_superblock_clean+0x44/0x444 [ 34.988165][ T6416] [ 34.988165][ T6416] other info that might help us debug this: [ 34.989895][ T6416] Possible unsafe locking scenario: [ 34.989895][ T6416] [ 34.991478][ T6416] CPU0 [ 34.992129][ T6416] ---- [ 34.992866][ T6416] lock(&c->sb_lock); [ 34.993811][ T6416] lock(&c->sb_lock); [ 34.994695][ T6416] [ 34.994695][ T6416] *** DEADLOCK *** [ 34.994695][ T6416] [ 34.996411][ T6416] May be due to missing lock nesting notation [ 34.996411][ T6416] [ 34.998183][ T6416] 2 locks held by syz-executor149/6416: [ 34.999420][ T6416] #0: ffff0000df380278 (&c->state_lock){+.+.}-{3:3}, at: bch2_fs_start+0x50/0x53c [ 35.001427][ T6416] #1: ffff0000df380908 (&c->sb_lock){+.+.}-{3:3}, at: bch2_read_superblock_clean+0x44/0x444 [ 35.003536][ T6416] [ 35.003536][ T6416] stack backtrace: [ 35.004752][ T6416] CPU: 0 UID: 0 PID: 6416 Comm: syz-executor149 Not tainted 6.12.0-rc3-syzkaller-gd2b1b3bccef6 #0 [ 35.006885][ T6416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 35.008976][ T6416] Call trace: [ 35.009593][ T6416] dump_backtrace+0x1b8/0x1e4 [ 35.010623][ T6416] show_stack+0x2c/0x3c [ 35.011475][ T6416] dump_stack_lvl+0xe4/0x150 [ 35.012433][ T6416] dump_stack+0x1c/0x28 [ 35.013331][ T6416] print_deadlock_bug+0x4e8/0x668 [ 35.014374][ T6416] __lock_acquire+0x6180/0x77c8 [ 35.015420][ T6416] lock_acquire+0x240/0x728 [ 35.016346][ T6416] __mutex_lock_common+0x190/0x21a0 [ 35.017399][ T6416] mutex_lock_nested+0x2c/0x38 [ 35.018412][ T6416] bch2_replicas_entry_validate+0x34/0x88 [ 35.019595][ T6416] journal_entry_data_usage_validate+0x268/0x5ac [ 35.020815][ T6416] bch2_journal_entry_validate+0xb8/0xec [ 35.021913][ T6416] bch2_read_superblock_clean+0x1ac/0x444 [ 35.023154][ T6416] bch2_fs_recovery+0x1b8/0x55a0 [ 35.024153][ T6416] bch2_fs_start+0x30c/0x53c [ 35.025160][ T6416] bch2_fs_get_tree+0x938/0x1030 [ 35.026220][ T6416] vfs_get_tree+0x90/0x28c [ 35.027145][ T6416] do_new_mount+0x278/0x900 [ 35.028141][ T6416] path_mount+0x590/0xe04 [ 35.028975][ T6416] __arm64_sys_mount+0x45c/0x5a8 [ 35.029952][ T6416] invoke_syscall+0x98/0x2b8 [ 35.030863][ T6416] el0_svc_common+0x130/0x23c [ 35.031963][ T6416] do_el0_svc+0x48/0x58 [ 35.032866][ T6416] el0_svc+0x54/0x168 [ 35.033716][ T6416] el0t_64_sync_handler+0x84/0x108 [ 35.034836][ T6416] el0t_64_sync+0x190/0x194