Warning: Permanently added '10.128.0.233' (ED25519) to the list of known hosts. executing program [ 33.939109][ T4297] loop0: detected capacity change from 0 to 32768 [ 33.962060][ T4297] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 33.965415][ T39] (kworker/u4:2,39,1):ocfs2_check_dir_entry:325 ERROR: bad entry in directory #72: rec_len % 4 != 0 - offset=16, inode=66, rec_len=491, name_len=2 [ 33.974546][ T4297] [ 33.975148][ T4297] ====================================================== [ 33.976964][ T4297] WARNING: possible circular locking dependency detected [ 33.978655][ T4297] 6.1.135-syzkaller #0 Not tainted [ 33.979969][ T4297] ------------------------------------------------------ [ 33.981754][ T4297] syz-executor108/4297 is trying to acquire lock: [ 33.983382][ T4297] ffff0000e17409c8 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3){+.+.}-{3:3}, at: ocfs2_reserve_suballoc_bits+0x12c/0x3cd4 [ 33.987137][ T4297] [ 33.987137][ T4297] but task is already holding lock: [ 33.989046][ T4297] ffff0000e1744e38 (&oi->ip_xattr_sem){++++}-{3:3}, at: ocfs2_xattr_set+0x32c/0xe98 [ 33.991471][ T4297] [ 33.991471][ T4297] which lock already depends on the new lock. [ 33.991471][ T4297] [ 33.993984][ T4297] [ 33.993984][ T4297] the existing dependency chain (in reverse order) is: [ 33.996239][ T4297] [ 33.996239][ T4297] -> #5 (&oi->ip_xattr_sem){++++}-{3:3}: [ 33.998209][ T4297] down_read+0x64/0x304 [ 33.999403][ T4297] ocfs2_init_acl+0x258/0x5f0 [ 34.000685][ T4297] ocfs2_mknod+0x1168/0x1f18 [ 34.001960][ T4297] ocfs2_create+0x19c/0x4f0 [ 34.003232][ T4297] path_openat+0x112c/0x2680 [ 34.004418][ T4297] do_filp_open+0x174/0x344 [ 34.005658][ T4297] do_sys_openat2+0x128/0x3d8 [ 34.006966][ T4297] __arm64_sys_openat+0x120/0x154 [ 34.008656][ T4297] invoke_syscall+0x98/0x2bc [ 34.010063][ T4297] el0_svc_common+0x138/0x258 [ 34.011395][ T4297] do_el0_svc+0x58/0x13c [ 34.012588][ T4297] el0_svc+0x58/0x138 [ 34.013732][ T4297] el0t_64_sync_handler+0x84/0xf0 [ 34.015206][ T4297] el0t_64_sync+0x18c/0x190 [ 34.016463][ T4297] [ 34.016463][ T4297] -> #4 (jbd2_handle){.+.+}-{0:0}: [ 34.018308][ T4297] start_this_handle+0xfe0/0x122c [ 34.019762][ T4297] jbd2__journal_start+0x288/0x51c [ 34.021219][ T4297] jbd2_journal_start+0x3c/0x4c [ 34.022540][ T4297] ocfs2_start_trans+0x380/0x6c4 [ 34.023926][ T4297] ocfs2_mknod+0xc7c/0x1f18 [ 34.025172][ T4297] ocfs2_create+0x19c/0x4f0 [ 34.026513][ T4297] path_openat+0x112c/0x2680 [ 34.027911][ T4297] do_filp_open+0x174/0x344 [ 34.029161][ T4297] do_sys_openat2+0x128/0x3d8 [ 34.030712][ T4297] __arm64_sys_openat+0x120/0x154 [ 34.032259][ T4297] invoke_syscall+0x98/0x2bc [ 34.033640][ T4297] el0_svc_common+0x138/0x258 [ 34.034958][ T4297] do_el0_svc+0x58/0x13c [ 34.036212][ T4297] el0_svc+0x58/0x138 [ 34.037284][ T4297] el0t_64_sync_handler+0x84/0xf0 [ 34.038638][ T4297] el0t_64_sync+0x18c/0x190 [ 34.039941][ T4297] [ 34.039941][ T4297] -> #3 (&journal->j_trans_barrier){.+.+}-{3:3}: [ 34.042122][ T4297] down_read+0x64/0x304 [ 34.043269][ T4297] ocfs2_start_trans+0x374/0x6c4 [ 34.044638][ T4297] ocfs2_mknod+0xc7c/0x1f18 [ 34.045899][ T4297] ocfs2_create+0x19c/0x4f0 [ 34.047191][ T4297] path_openat+0x112c/0x2680 [ 34.048501][ T4297] do_filp_open+0x174/0x344 [ 34.049735][ T4297] do_sys_openat2+0x128/0x3d8 [ 34.051079][ T4297] __arm64_sys_openat+0x120/0x154 [ 34.052652][ T4297] invoke_syscall+0x98/0x2bc [ 34.054151][ T4297] el0_svc_common+0x138/0x258 [ 34.055579][ T4297] do_el0_svc+0x58/0x13c [ 34.056747][ T4297] el0_svc+0x58/0x138 [ 34.057926][ T4297] el0t_64_sync_handler+0x84/0xf0 [ 34.059309][ T4297] el0t_64_sync+0x18c/0x190 [ 34.060560][ T4297] [ 34.060560][ T4297] -> #2 (sb_internal#2){.+.+}-{0:0}: [ 34.062452][ T4297] ocfs2_start_trans+0x20c/0x6c4 [ 34.063784][ T4297] ocfs2_mknod+0xc7c/0x1f18 [ 34.065089][ T4297] ocfs2_create+0x19c/0x4f0 [ 34.066294][ T4297] path_openat+0x112c/0x2680 [ 34.067563][ T4297] do_filp_open+0x174/0x344 [ 34.068853][ T4297] do_sys_openat2+0x128/0x3d8 [ 34.070153][ T4297] __arm64_sys_openat+0x120/0x154 [ 34.071632][ T4297] invoke_syscall+0x98/0x2bc [ 34.072903][ T4297] el0_svc_common+0x138/0x258 [ 34.074383][ T4297] do_el0_svc+0x58/0x13c [ 34.075779][ T4297] el0_svc+0x58/0x138 [ 34.077029][ T4297] el0t_64_sync_handler+0x84/0xf0 [ 34.078397][ T4297] el0t_64_sync+0x18c/0x190 [ 34.079658][ T4297] [ 34.079658][ T4297] -> #1 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#4){+.+.}-{3:3}: [ 34.082326][ T4297] down_write+0x5c/0x88 [ 34.083520][ T4297] ocfs2_reserve_local_alloc_bits+0xf8/0x278c [ 34.085148][ T4297] ocfs2_reserve_clusters_with_limit+0x198/0x9e0 [ 34.086910][ T4297] ocfs2_reserve_clusters+0x3c/0x50 [ 34.088316][ T4297] ocfs2_mknod+0xc2c/0x1f18 [ 34.089548][ T4297] ocfs2_create+0x19c/0x4f0 [ 34.090830][ T4297] path_openat+0x112c/0x2680 [ 34.092131][ T4297] do_filp_open+0x174/0x344 [ 34.093430][ T4297] do_sys_openat2+0x128/0x3d8 [ 34.094674][ T4297] __arm64_sys_openat+0x120/0x154 [ 34.096220][ T4297] invoke_syscall+0x98/0x2bc [ 34.097672][ T4297] el0_svc_common+0x138/0x258 [ 34.099073][ T4297] do_el0_svc+0x58/0x13c [ 34.100245][ T4297] el0_svc+0x58/0x138 [ 34.101394][ T4297] el0t_64_sync_handler+0x84/0xf0 [ 34.102712][ T4297] el0t_64_sync+0x18c/0x190 [ 34.104016][ T4297] [ 34.104016][ T4297] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3){+.+.}-{3:3}: [ 34.106819][ T4297] __lock_acquire+0x293c/0x6544 [ 34.108191][ T4297] lock_acquire+0x20c/0x644 [ 34.109452][ T4297] down_write+0x5c/0x88 [ 34.110661][ T4297] ocfs2_reserve_suballoc_bits+0x12c/0x3cd4 [ 34.112401][ T4297] ocfs2_reserve_new_metadata_blocks+0x368/0x810 [ 34.114158][ T4297] ocfs2_init_xattr_set_ctxt+0x300/0x7bc [ 34.115668][ T4297] ocfs2_xattr_set+0x91c/0xe98 [ 34.116945][ T4297] ocfs2_xattr_trusted_set+0x4c/0x64 [ 34.118589][ T4297] __vfs_setxattr+0x388/0x3a4 [ 34.120061][ T4297] __vfs_setxattr_noperm+0x120/0x564 [ 34.121621][ T4297] __vfs_setxattr_locked+0x1ec/0x218 [ 34.123079][ T4297] vfs_setxattr+0x158/0x2ac [ 34.124407][ T4297] setxattr+0x228/0x28c [ 34.125577][ T4297] path_setxattr+0x12c/0x25c [ 34.126900][ T4297] __arm64_sys_lsetxattr+0xbc/0xd8 [ 34.128367][ T4297] invoke_syscall+0x98/0x2bc [ 34.129630][ T4297] el0_svc_common+0x138/0x258 [ 34.130955][ T4297] do_el0_svc+0x58/0x13c [ 34.132148][ T4297] el0_svc+0x58/0x138 [ 34.133235][ T4297] el0t_64_sync_handler+0x84/0xf0 [ 34.134619][ T4297] el0t_64_sync+0x18c/0x190 [ 34.135885][ T4297] [ 34.135885][ T4297] other info that might help us debug this: [ 34.135885][ T4297] [ 34.138479][ T4297] Chain exists of: [ 34.138479][ T4297] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3 --> jbd2_handle --> &oi->ip_xattr_sem [ 34.138479][ T4297] [ 34.142825][ T4297] Possible unsafe locking scenario: [ 34.142825][ T4297] [ 34.144707][ T4297] CPU0 CPU1 [ 34.146083][ T4297] ---- ---- [ 34.147361][ T4297] lock(&oi->ip_xattr_sem); [ 34.148496][ T4297] lock(jbd2_handle); [ 34.150177][ T4297] lock(&oi->ip_xattr_sem); [ 34.151926][ T4297] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#3); [ 34.153736][ T4297] [ 34.153736][ T4297] *** DEADLOCK *** [ 34.153736][ T4297] [ 34.155762][ T4297] 3 locks held by syz-executor108/4297: [ 34.157099][ T4297] #0: ffff0000d9c48460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 34.159460][ T4297] #1: ffff0000e1745108 (&sb->s_type->i_mutex_key#17){+.+.}-{3:3}, at: vfs_setxattr+0x138/0x2ac [ 34.162159][ T4297] #2: ffff0000e1744e38 (&oi->ip_xattr_sem){++++}-{3:3}, at: ocfs2_xattr_set+0x32c/0xe98 [ 34.164975][ T4297] [ 34.164975][ T4297] stack backtrace: [ 34.166482][ T4297] CPU: 0 PID: 4297 Comm: syz-executor108 Not tainted 6.1.135-syzkaller #0 [ 34.168627][ T4297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 34.171145][ T4297] Call trace: [ 34.171956][ T4297] dump_backtrace+0x1c8/0x1f4 [ 34.173151][ T4297] show_stack+0x2c/0x3c [ 34.174162][ T4297] __dump_stack+0x30/0x40 [ 34.175227][ T4297] dump_stack_lvl+0xf8/0x160 [ 34.176375][ T4297] dump_stack+0x1c/0x5c [ 34.177514][ T4297] print_circular_bug+0x148/0x1b0 [ 34.178806][ T4297] check_noncircular+0x240/0x2d4 [ 34.180039][ T4297] __lock_acquire+0x293c/0x6544 [ 34.181250][ T4297] lock_acquire+0x20c/0x644 [ 34.182375][ T4297] down_write+0x5c/0x88 [ 34.183464][ T4297] ocfs2_reserve_suballoc_bits+0x12c/0x3cd4 [ 34.185131][ T4297] ocfs2_reserve_new_metadata_blocks+0x368/0x810 [ 34.186959][ T4297] ocfs2_init_xattr_set_ctxt+0x300/0x7bc [ 34.188441][ T4297] ocfs2_xattr_set+0x91c/0xe98 [ 34.189626][ T4297] ocfs2_xattr_trusted_set+0x4c/0x64 [ 34.190945][ T4297] __vfs_setxattr+0x388/0x3a4 [ 34.192081][ T4297] __vfs_setxattr_noperm+0x120/0x564 [ 34.193410][ T4297] __vfs_setxattr_locked+0x1ec/0x218 [ 34.194724][ T4297] vfs_setxattr+0x158/0x2ac [ 34.195882][ T4297] setxattr+0x228/0x28c [ 34.196961][ T4297] path_setxattr+0x12c/0x25c [ 34.198129][ T4297] __arm64_sys_lsetxattr+0xbc/0xd8 [ 34.199374][ T4297] invoke_syscall+0x98/0x2bc [ 34.200558][ T4297] el0_svc_common+0x138/0x258 [ 34.201738][ T4297] do_el0_svc+0x58/0x13c [ 34.202711][ T4297] el0_svc+0x58/0x138 [ 34.203765][ T4297] el0t_64_sync_handler+0x84/0xf0 [ 34.205009][ T4297] el0t_64_sync+0x18c/0x190