Warning: Permanently added '10.128.1.149' (ED25519) to the list of known hosts.
executing program
[   34.359701][ T6435] loop0: detected capacity change from 0 to 32768
[   34.364681][ T6435] =======================================================
[   34.364681][ T6435] WARNING: The mand mount option has been deprecated and
[   34.364681][ T6435]          and is ignored by this kernel. Remove the mand
[   34.364681][ T6435]          option from the mount to silence this warning.
[   34.364681][ T6435] =======================================================
[   34.391906][ T6435] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode.
[   34.402398][ T6435] 
[   34.403075][ T6435] ======================================================
[   34.404902][ T6435] WARNING: possible circular locking dependency detected
[   34.406748][ T6435] 6.14.0-rc7-syzkaller-ga2392f333575 #0 Not tainted
[   34.408492][ T6435] ------------------------------------------------------
[   34.410402][ T6435] syz-executor397/6435 is trying to acquire lock:
[   34.412109][ T6435] ffff0000dbb82640 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{4:4}, at: ocfs2_reserve_local_alloc_bits+0x108/0x24f8
[   34.415722][ T6435] 
[   34.415722][ T6435] but task is already holding lock:
[   34.417697][ T6435] ffff0000dbb83ff8 (&oi->ip_xattr_sem){+.+.}-{4:4}, at: ocfs2_xattr_set+0x4e0/0x1448
[   34.420267][ T6435] 
[   34.420267][ T6435] which lock already depends on the new lock.
[   34.420267][ T6435] 
[   34.423110][ T6435] 
[   34.423110][ T6435] the existing dependency chain (in reverse order) is:
[   34.425507][ T6435] 
[   34.425507][ T6435] -> #4 (&oi->ip_xattr_sem){+.+.}-{4:4}:
[   34.427598][ T6435]        down_write+0x50/0xc0
[   34.428903][ T6435]        ocfs2_xattr_set_handle+0x40c/0x824
[   34.430538][ T6435]        ocfs2_init_security_set+0xb4/0xd8
[   34.432083][ T6435]        ocfs2_mknod+0x1408/0x2438
[   34.433454][ T6435]        ocfs2_create+0x194/0x4d4
[   34.434816][ T6435]        path_openat+0x13ec/0x2b1c
[   34.436163][ T6435]        do_filp_open+0x1e8/0x404
[   34.437546][ T6435]        do_sys_openat2+0x124/0x1b8
[   34.438975][ T6435]        __arm64_sys_openat+0x1f0/0x240
[   34.440522][ T6435]        invoke_syscall+0x98/0x2b8
[   34.441920][ T6435]        el0_svc_common+0x130/0x23c
[   34.443320][ T6435]        do_el0_svc+0x48/0x58
[   34.444583][ T6435]        el0_svc+0x54/0x168
[   34.445809][ T6435]        el0t_64_sync_handler+0x84/0x108
[   34.447364][ T6435]        el0t_64_sync+0x198/0x19c
[   34.448741][ T6435] 
[   34.448741][ T6435] -> #3 (jbd2_handle){.+.+}-{0:0}:
[   34.450758][ T6435]        start_this_handle+0xf34/0x11c4
[   34.452310][ T6435]        jbd2__journal_start+0x298/0x544
[   34.453826][ T6435]        jbd2_journal_start+0x3c/0x4c
[   34.455284][ T6435]        ocfs2_start_trans+0x3d0/0x71c
[   34.456749][ T6435]        ocfs2_reserve_suballoc_bits+0x840/0x4254
[   34.458437][ T6435]        ocfs2_reserve_new_metadata_blocks+0x384/0x848
[   34.460397][ T6435]        ocfs2_mknod+0xdc8/0x2438
[   34.461824][ T6435]        ocfs2_create+0x194/0x4d4
[   34.463259][ T6435]        path_openat+0x13ec/0x2b1c
[   34.464674][ T6435]        do_filp_open+0x1e8/0x404
[   34.466056][ T6435]        do_sys_openat2+0x124/0x1b8
[   34.467454][ T6435]        __arm64_sys_openat+0x1f0/0x240
[   34.469011][ T6435]        invoke_syscall+0x98/0x2b8
[   34.470443][ T6435]        el0_svc_common+0x130/0x23c
[   34.471927][ T6435]        do_el0_svc+0x48/0x58
[   34.473237][ T6435]        el0_svc+0x54/0x168
[   34.474507][ T6435]        el0t_64_sync_handler+0x84/0x108
[   34.476078][ T6435]        el0t_64_sync+0x198/0x19c
[   34.477471][ T6435] 
[   34.477471][ T6435] -> #2 (&journal->j_trans_barrier){.+.+}-{4:4}:
[   34.479852][ T6435]        down_read+0x58/0x2fc
[   34.481155][ T6435]        ocfs2_start_trans+0x3c4/0x71c
[   34.482655][ T6435]        ocfs2_reserve_suballoc_bits+0x840/0x4254
[   34.484425][ T6435]        ocfs2_reserve_new_metadata_blocks+0x384/0x848
[   34.486324][ T6435]        ocfs2_mknod+0xdc8/0x2438
[   34.487740][ T6435]        ocfs2_create+0x194/0x4d4
[   34.489124][ T6435]        path_openat+0x13ec/0x2b1c
[   34.490529][ T6435]        do_filp_open+0x1e8/0x404
[   34.491913][ T6435]        do_sys_openat2+0x124/0x1b8
[   34.493370][ T6435]        __arm64_sys_openat+0x1f0/0x240
[   34.494964][ T6435]        invoke_syscall+0x98/0x2b8
[   34.496400][ T6435]        el0_svc_common+0x130/0x23c
[   34.497853][ T6435]        do_el0_svc+0x48/0x58
[   34.499157][ T6435]        el0_svc+0x54/0x168
[   34.500339][ T6435]        el0t_64_sync_handler+0x84/0x108
[   34.501919][ T6435]        el0t_64_sync+0x198/0x19c
[   34.503300][ T6435] 
[   34.503300][ T6435] -> #1 (sb_internal#2){.+.+}-{0:0}:
[   34.505380][ T6435]        ocfs2_start_trans+0x244/0x71c
[   34.506932][ T6435]        ocfs2_mknod+0xe58/0x2438
[   34.508334][ T6435]        ocfs2_create+0x194/0x4d4
[   34.509721][ T6435]        path_openat+0x13ec/0x2b1c
[   34.511150][ T6435]        do_filp_open+0x1e8/0x404
[   34.512550][ T6435]        do_sys_openat2+0x124/0x1b8
[   34.514018][ T6435]        __arm64_sys_openat+0x1f0/0x240
[   34.515610][ T6435]        invoke_syscall+0x98/0x2b8
[   34.517005][ T6435]        el0_svc_common+0x130/0x23c
[   34.518446][ T6435]        do_el0_svc+0x48/0x58
[   34.519742][ T6435]        el0_svc+0x54/0x168
[   34.521013][ T6435]        el0t_64_sync_handler+0x84/0x108
[   34.522545][ T6435]        el0t_64_sync+0x198/0x19c
[   34.523935][ T6435] 
[   34.523935][ T6435] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{4:4}:
[   34.526873][ T6435]        __lock_acquire+0x34f0/0x7904
[   34.528321][ T6435]        lock_acquire+0x23c/0x724
[   34.529712][ T6435]        down_write+0x50/0xc0
[   34.530971][ T6435]        ocfs2_reserve_local_alloc_bits+0x108/0x24f8
[   34.532828][ T6435]        ocfs2_reserve_clusters_with_limit+0x194/0xabc
[   34.534732][ T6435]        ocfs2_reserve_clusters+0x3c/0x50
[   34.536309][ T6435]        ocfs2_init_xattr_set_ctxt+0x428/0x978
[   34.538005][ T6435]        ocfs2_xattr_set+0xbe0/0x1448
[   34.539454][ T6435]        ocfs2_xattr_security_set+0x4c/0x64
[   34.541044][ T6435]        __vfs_setxattr+0x3d8/0x400
[   34.542479][ T6435]        __vfs_setxattr_noperm+0x110/0x578
[   34.544114][ T6435]        __vfs_setxattr_locked+0x1ec/0x218
[   34.545680][ T6435]        vfs_setxattr+0x1a8/0x344
[   34.547094][ T6435]        filename_setxattr+0x268/0x3fc
[   34.548593][ T6435]        path_setxattrat+0x370/0x41c
[   34.550096][ T6435]        __arm64_sys_lsetxattr+0xc0/0xdc
[   34.551695][ T6435]        invoke_syscall+0x98/0x2b8
[   34.553109][ T6435]        el0_svc_common+0x130/0x23c
[   34.554519][ T6435]        do_el0_svc+0x48/0x58
[   34.555784][ T6435]        el0_svc+0x54/0x168
[   34.557045][ T6435]        el0t_64_sync_handler+0x84/0x108
[   34.558591][ T6435]        el0t_64_sync+0x198/0x19c
[   34.559957][ T6435] 
[   34.559957][ T6435] other info that might help us debug this:
[   34.559957][ T6435] 
[   34.562713][ T6435] Chain exists of:
[   34.562713][ T6435]   &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5 --> jbd2_handle --> &oi->ip_xattr_sem
[   34.562713][ T6435] 
[   34.567093][ T6435]  Possible unsafe locking scenario:
[   34.567093][ T6435] 
[   34.569077][ T6435]        CPU0                    CPU1
[   34.570547][ T6435]        ----                    ----
[   34.571972][ T6435]   lock(&oi->ip_xattr_sem);
[   34.573210][ T6435]                                lock(jbd2_handle);
[   34.574980][ T6435]                                lock(&oi->ip_xattr_sem);
[   34.576894][ T6435]   lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5);
[   34.578967][ T6435] 
[   34.578967][ T6435]  *** DEADLOCK ***
[   34.578967][ T6435] 
[   34.581144][ T6435] 3 locks held by syz-executor397/6435:
[   34.582725][ T6435]  #0: ffff0000c6b78420 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c
[   34.585174][ T6435]  #1: ffff0000dbb842c0 (&sb->s_type->i_mutex_key#16){+.+.}-{4:4}, at: vfs_setxattr+0x17c/0x344
[   34.588022][ T6435]  #2: ffff0000dbb83ff8 (&oi->ip_xattr_sem){+.+.}-{4:4}, at: ocfs2_xattr_set+0x4e0/0x1448
[   34.590791][ T6435] 
[   34.590791][ T6435] stack backtrace:
[   34.592403][ T6435] CPU: 0 UID: 0 PID: 6435 Comm: syz-executor397 Not tainted 6.14.0-rc7-syzkaller-ga2392f333575 #0
[   34.592417][ T6435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   34.592424][ T6435] Call trace:
[   34.592429][ T6435]  show_stack+0x2c/0x3c (C)
[   34.592446][ T6435]  dump_stack_lvl+0xe4/0x150
[   34.592460][ T6435]  dump_stack+0x1c/0x28
[   34.592472][ T6435]  print_circular_bug+0x154/0x1c0
[   34.592485][ T6435]  check_noncircular+0x310/0x404
[   34.592497][ T6435]  __lock_acquire+0x34f0/0x7904
[   34.592508][ T6435]  lock_acquire+0x23c/0x724
[   34.592527][ T6435]  down_write+0x50/0xc0
[   34.592542][ T6435]  ocfs2_reserve_local_alloc_bits+0x108/0x24f8
[   34.592556][ T6435]  ocfs2_reserve_clusters_with_limit+0x194/0xabc
[   34.592568][ T6435]  ocfs2_reserve_clusters+0x3c/0x50
[   34.592579][ T6435]  ocfs2_init_xattr_set_ctxt+0x428/0x978
[   34.592592][ T6435]  ocfs2_xattr_set+0xbe0/0x1448
[   34.592604][ T6435]  ocfs2_xattr_security_set+0x4c/0x64
[   34.592616][ T6435]  __vfs_setxattr+0x3d8/0x400
[   34.592627][ T6435]  __vfs_setxattr_noperm+0x110/0x578
[   34.592638][ T6435]  __vfs_setxattr_locked+0x1ec/0x218
[   34.592650][ T6435]  vfs_setxattr+0x1a8/0x344
[   34.592660][ T6435]  filename_setxattr+0x268/0x3fc
[   34.592672][ T6435]  path_setxattrat+0x370/0x41c
[   34.592692][ T6435]  __arm64_sys_lsetxattr+0xc0/0xdc
[   34.592704][ T6435]  invoke_syscall+0x98/0x2b8
[   34.592717][ T6435]  el0_svc_common+0x130/0x23c
[   34.592729][ T6435]  do_el0_svc+0x48/0x58
[   34.592741][ T6435]  el0_svc+0x54/0x168
[   34.592752][ T6435]  el0t_64_sync_handler+0x84/0x108
[   34.592763][ T6435]  el0t_64_sync+0x198/0x19c