Warning: Permanently added '10.128.1.62' (ED25519) to the list of known hosts. executing program [ 45.982793][ T3967] loop0: detected capacity change from 0 to 32768 [ 46.086286][ T3967] BTRFS: device fsid c9fe44da-de57-406a-8241-57ec7d4412cf devid 1 transid 8 /dev/loop0 scanned by syz-executor843 (3967) [ 46.132547][ T3967] BTRFS info (device loop0): using crc32c (crc32c-generic) checksum algorithm [ 46.135227][ T3967] BTRFS info (device loop0): setting nodatasum [ 46.136898][ T3967] BTRFS info (device loop0): force zlib compression, level 3 [ 46.138929][ T3967] BTRFS info (device loop0): turning on flush-on-commit [ 46.140912][ T3967] BTRFS info (device loop0): enabling auto defrag [ 46.142649][ T3967] BTRFS info (device loop0): using free space tree [ 46.145353][ T3967] BTRFS info (device loop0): has skinny extents [ 46.164885][ T3967] BTRFS info (device loop0): enabling ssd optimizations executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 69.636583][ T1528] cfg80211: failed to load regulatory.db executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 76.679012][ T3988] [ 76.679773][ T3988] ====================================================== [ 76.681678][ T3988] WARNING: possible circular locking dependency detected [ 76.683644][ T3988] 5.15.163-syzkaller #0 Not tainted [ 76.685094][ T3988] ------------------------------------------------------ [ 76.687042][ T3988] btrfs-transacti/3988 is trying to acquire lock: [ 76.688939][ T3988] ffff0000d9bedce0 (&fs_devs->device_list_mutex){+.+.}-{3:3}, at: btrfs_run_dev_stats+0xe4/0xe24 [ 76.691842][ T3988] [ 76.691842][ T3988] but task is already holding lock: [ 76.693931][ T3988] ffff0000d652c720 (&fs_info->tree_log_mutex){+.+.}-{3:3}, at: btrfs_commit_transaction+0xe34/0x30f0 [ 76.696940][ T3988] [ 76.696940][ T3988] which lock already depends on the new lock. [ 76.696940][ T3988] [ 76.699769][ T3988] [ 76.699769][ T3988] the existing dependency chain (in reverse order) is: [ 76.702232][ T3988] [ 76.702232][ T3988] -> #4 (&fs_info->tree_log_mutex){+.+.}-{3:3}: [ 76.704562][ T3988] __mutex_lock_common+0x194/0x2154 [ 76.706115][ T3988] mutex_lock_nested+0xa4/0xf8 [ 76.707523][ T3988] btrfs_commit_transaction+0xe34/0x30f0 [ 76.709189][ T3988] transaction_kthread+0x284/0x3f4 [ 76.710729][ T3988] kthread+0x37c/0x45c [ 76.712000][ T3988] ret_from_fork+0x10/0x20 [ 76.713326][ T3988] [ 76.713326][ T3988] -> #3 (&fs_info->reloc_mutex){+.+.}-{3:3}: [ 76.715643][ T3988] __mutex_lock_common+0x194/0x2154 [ 76.717219][ T3988] mutex_lock_nested+0xa4/0xf8 [ 76.718685][ T3988] start_transaction+0x450/0x1480 [ 76.720149][ T3988] btrfs_start_transaction+0x34/0x44 [ 76.721796][ T3988] btrfs_create+0x134/0x56c [ 76.723231][ T3988] path_openat+0xf18/0x26cc [ 76.724630][ T3988] do_filp_open+0x1a8/0x3b4 [ 76.726035][ T3988] do_sys_openat2+0x128/0x3e0 [ 76.727490][ T3988] __arm64_sys_openat+0x1f0/0x240 [ 76.728997][ T3988] invoke_syscall+0x98/0x2b8 [ 76.730376][ T3988] el0_svc_common+0x138/0x258 [ 76.731752][ T3988] do_el0_svc+0x58/0x14c [ 76.733103][ T3988] el0_svc+0x7c/0x1f0 [ 76.734405][ T3988] el0t_64_sync_handler+0x84/0xe4 [ 76.735886][ T3988] el0t_64_sync+0x1a0/0x1a4 [ 76.737232][ T3988] [ 76.737232][ T3988] -> #2 (sb_internal#2){.+.+}-{0:0}: [ 76.739265][ T3988] start_transaction+0x644/0x1480 [ 76.740759][ T3988] btrfs_start_transaction+0x34/0x44 [ 76.742347][ T3988] btrfs_create+0x134/0x56c [ 76.743715][ T3988] path_openat+0xf18/0x26cc [ 76.745075][ T3988] do_filp_open+0x1a8/0x3b4 [ 76.746443][ T3988] do_sys_openat2+0x128/0x3e0 [ 76.747847][ T3988] __arm64_sys_openat+0x1f0/0x240 [ 76.749345][ T3988] invoke_syscall+0x98/0x2b8 [ 76.750731][ T3988] el0_svc_common+0x138/0x258 [ 76.752108][ T3988] do_el0_svc+0x58/0x14c [ 76.753398][ T3988] el0_svc+0x7c/0x1f0 [ 76.754661][ T3988] el0t_64_sync_handler+0x84/0xe4 [ 76.756130][ T3988] el0t_64_sync+0x1a0/0x1a4 [ 76.757472][ T3988] [ 76.757472][ T3988] -> #1 (&type->i_mutex_dir_key#6){++++}-{3:3}: [ 76.759820][ T3988] down_read+0xc0/0x398 [ 76.761127][ T3988] lookup_slow+0x50/0x84 [ 76.762412][ T3988] walk_component+0x394/0x4cc [ 76.763784][ T3988] path_lookupat+0x13c/0x3d0 [ 76.765226][ T3988] filename_lookup+0x1c4/0x4c8 [ 76.766653][ T3988] kern_path+0x4c/0x194 [ 76.767915][ T3988] lookup_bdev+0xc0/0x25c [ 76.769248][ T3988] btrfs_free_stale_devices+0x658/0x9ec [ 76.770847][ T3988] btrfs_forget_devices+0x5c/0x98 [ 76.772362][ T3988] btrfs_control_ioctl+0x12c/0x248 [ 76.773910][ T3988] __arm64_sys_ioctl+0x14c/0x1c8 [ 76.775412][ T3988] invoke_syscall+0x98/0x2b8 [ 76.776787][ T3988] el0_svc_common+0x138/0x258 [ 76.778216][ T3988] do_el0_svc+0x58/0x14c [ 76.779512][ T3988] el0_svc+0x7c/0x1f0 [ 76.780706][ T3988] el0t_64_sync_handler+0x84/0xe4 [ 76.782161][ T3988] el0t_64_sync+0x1a0/0x1a4 [ 76.783547][ T3988] [ 76.783547][ T3988] -> #0 (&fs_devs->device_list_mutex){+.+.}-{3:3}: [ 76.785922][ T3988] __lock_acquire+0x32d4/0x7638 [ 76.787398][ T3988] lock_acquire+0x240/0x77c [ 76.788790][ T3988] __mutex_lock_common+0x194/0x2154 [ 76.790349][ T3988] mutex_lock_nested+0xa4/0xf8 [ 76.791773][ T3988] btrfs_run_dev_stats+0xe4/0xe24 [ 76.793314][ T3988] commit_cowonly_roots+0x17c/0x808 [ 76.794808][ T3988] btrfs_commit_transaction+0xef4/0x30f0 [ 76.796487][ T3988] transaction_kthread+0x284/0x3f4 [ 76.797997][ T3988] kthread+0x37c/0x45c [ 76.799226][ T3988] ret_from_fork+0x10/0x20 [ 76.800597][ T3988] [ 76.800597][ T3988] other info that might help us debug this: [ 76.800597][ T3988] [ 76.803352][ T3988] Chain exists of: [ 76.803352][ T3988] &fs_devs->device_list_mutex --> &fs_info->reloc_mutex --> &fs_info->tree_log_mutex [ 76.803352][ T3988] [ 76.807493][ T3988] Possible unsafe locking scenario: [ 76.807493][ T3988] [ 76.809479][ T3988] CPU0 CPU1 [ 76.810908][ T3988] ---- ---- [ 76.812352][ T3988] lock(&fs_info->tree_log_mutex); [ 76.813728][ T3988] lock(&fs_info->reloc_mutex); [ 76.815665][ T3988] lock(&fs_info->tree_log_mutex); [ 76.817662][ T3988] lock(&fs_devs->device_list_mutex); [ 76.819126][ T3988] [ 76.819126][ T3988] *** DEADLOCK *** [ 76.819126][ T3988] [ 76.821312][ T3988] 3 locks held by btrfs-transacti/3988: [ 76.822775][ T3988] #0: ffff0000d652c7b0 (&fs_info->transaction_kthread_mutex){+.+.}-{3:3}, at: transaction_kthread+0xd0/0x3f4 [ 76.825885][ T3988] #1: ffff0000d652cc90 (&fs_info->reloc_mutex){+.+.}-{3:3}, at: btrfs_commit_transaction+0xd9c/0x30f0 [ 76.828938][ T3988] #2: ffff0000d652c720 (&fs_info->tree_log_mutex){+.+.}-{3:3}, at: btrfs_commit_transaction+0xe34/0x30f0 [ 76.831964][ T3988] [ 76.831964][ T3988] stack backtrace: [ 76.833514][ T3988] CPU: 1 PID: 3988 Comm: btrfs-transacti Not tainted 5.15.163-syzkaller #0 [ 76.835792][ T3988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 76.838456][ T3988] Call trace: [ 76.839345][ T3988] dump_backtrace+0x0/0x530 [ 76.840682][ T3988] show_stack+0x2c/0x3c [ 76.841853][ T3988] dump_stack_lvl+0x108/0x170 [ 76.843173][ T3988] dump_stack+0x1c/0x58 [ 76.844298][ T3988] print_circular_bug+0x150/0x1b8 [ 76.845659][ T3988] check_noncircular+0x2cc/0x378 [ 76.847001][ T3988] __lock_acquire+0x32d4/0x7638 [ 76.848333][ T3988] lock_acquire+0x240/0x77c [ 76.849529][ T3988] __mutex_lock_common+0x194/0x2154 [ 76.850941][ T3988] mutex_lock_nested+0xa4/0xf8 [ 76.852239][ T3988] btrfs_run_dev_stats+0xe4/0xe24 [ 76.853595][ T3988] commit_cowonly_roots+0x17c/0x808 [ 76.854954][ T3988] btrfs_commit_transaction+0xef4/0x30f0 [ 76.856498][ T3988] transaction_kthread+0x284/0x3f4 [ 76.857894][ T3988] kthread+0x37c/0x45c [ 76.858964][ T3988] ret_from_fork+0x10/0x20 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program