Warning: Permanently added '10.128.1.108' (ED25519) to the list of known hosts. executing program [ 36.043241][ T6462] loop0: detected capacity change from 0 to 32768 [ 36.048317][ T6462] ======================================================= [ 36.048317][ T6462] WARNING: The mand mount option has been deprecated and [ 36.048317][ T6462] and is ignored by this kernel. Remove the mand [ 36.048317][ T6462] option from the mount to silence this warning. [ 36.048317][ T6462] ======================================================= [ 36.079617][ T6462] JBD2: Ignoring recovery information on journal [ 36.092396][ T6462] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 36.105196][ T6462] overlayfs: upper fs does not support tmpfile. [ 36.108690][ T6462] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 36.110775][ T6462] [ 36.111408][ T6462] ====================================================== [ 36.113493][ T6462] WARNING: possible circular locking dependency detected [ 36.115429][ T6462] 6.14.0-syzkaller-gd6b13dbd03b7 #0 Not tainted [ 36.117062][ T6462] ------------------------------------------------------ [ 36.119010][ T6462] syz-executor366/6462 is trying to acquire lock: [ 36.120703][ T6462] ffff0000dc9ea640 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{4:4}, at: ocfs2_reserve_local_alloc_bits+0x108/0x24f8 [ 36.124424][ T6462] [ 36.124424][ T6462] but task is already holding lock: [ 36.126367][ T6462] ffff0000dca3a378 (&oi->ip_xattr_sem){+.+.}-{4:4}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 36.128848][ T6462] [ 36.128848][ T6462] which lock already depends on the new lock. [ 36.128848][ T6462] [ 36.131613][ T6462] [ 36.131613][ T6462] the existing dependency chain (in reverse order) is: [ 36.134018][ T6462] [ 36.134018][ T6462] -> #4 (&oi->ip_xattr_sem){+.+.}-{4:4}: [ 36.136057][ T6462] down_write+0x50/0xc0 [ 36.137299][ T6462] ocfs2_xattr_set_handle+0x40c/0x824 [ 36.138897][ T6462] ocfs2_init_security_set+0xb4/0xd8 [ 36.140443][ T6462] ocfs2_mknod+0x1408/0x2438 [ 36.141774][ T6462] ocfs2_mkdir+0x194/0x4d4 [ 36.143153][ T6462] vfs_mkdir+0x27c/0x410 [ 36.144403][ T6462] do_mkdirat+0x250/0x584 [ 36.145713][ T6462] __arm64_sys_mkdirat+0x8c/0xa4 [ 36.147224][ T6462] invoke_syscall+0x98/0x2b8 [ 36.148659][ T6462] el0_svc_common+0x130/0x23c [ 36.150070][ T6462] do_el0_svc+0x48/0x58 [ 36.151343][ T6462] el0_svc+0x54/0x168 [ 36.152509][ T6462] el0t_64_sync_handler+0x84/0x108 [ 36.154035][ T6462] el0t_64_sync+0x198/0x19c [ 36.155395][ T6462] [ 36.155395][ T6462] -> #3 (jbd2_handle){.+.+}-{0:0}: [ 36.157387][ T6462] start_this_handle+0xf34/0x11c4 [ 36.158858][ T6462] jbd2__journal_start+0x298/0x544 [ 36.160364][ T6462] jbd2_journal_start+0x3c/0x4c [ 36.161847][ T6462] ocfs2_start_trans+0x3d0/0x71c [ 36.163339][ T6462] ocfs2_reserve_suballoc_bits+0x840/0x4254 [ 36.165035][ T6462] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 36.166816][ T6462] ocfs2_mknod+0xdc8/0x2438 [ 36.168139][ T6462] ocfs2_mkdir+0x194/0x4d4 [ 36.169429][ T6462] vfs_mkdir+0x27c/0x410 [ 36.170696][ T6462] do_mkdirat+0x250/0x584 [ 36.172013][ T6462] __arm64_sys_mkdirat+0x8c/0xa4 [ 36.173454][ T6462] invoke_syscall+0x98/0x2b8 [ 36.174789][ T6462] el0_svc_common+0x130/0x23c [ 36.176180][ T6462] do_el0_svc+0x48/0x58 [ 36.177468][ T6462] el0_svc+0x54/0x168 [ 36.178636][ T6462] el0t_64_sync_handler+0x84/0x108 [ 36.180315][ T6462] el0t_64_sync+0x198/0x19c [ 36.181658][ T6462] [ 36.181658][ T6462] -> #2 (&journal->j_trans_barrier){.+.+}-{4:4}: [ 36.183955][ T6462] down_read+0x58/0x2fc [ 36.185237][ T6462] ocfs2_start_trans+0x3c4/0x71c [ 36.186698][ T6462] ocfs2_reserve_suballoc_bits+0x840/0x4254 [ 36.188414][ T6462] ocfs2_reserve_new_metadata_blocks+0x384/0x848 [ 36.190252][ T6462] ocfs2_mknod+0xdc8/0x2438 [ 36.191544][ T6462] ocfs2_mkdir+0x194/0x4d4 [ 36.192896][ T6462] vfs_mkdir+0x27c/0x410 [ 36.194122][ T6462] do_mkdirat+0x250/0x584 [ 36.195410][ T6462] __arm64_sys_mkdirat+0x8c/0xa4 [ 36.196831][ T6462] invoke_syscall+0x98/0x2b8 [ 36.198168][ T6462] el0_svc_common+0x130/0x23c [ 36.199534][ T6462] do_el0_svc+0x48/0x58 [ 36.200789][ T6462] el0_svc+0x54/0x168 [ 36.202005][ T6462] el0t_64_sync_handler+0x84/0x108 [ 36.203506][ T6462] el0t_64_sync+0x198/0x19c [ 36.204820][ T6462] [ 36.204820][ T6462] -> #1 (sb_internal#2){.+.+}-{0:0}: [ 36.206766][ T6462] ocfs2_start_trans+0x244/0x71c [ 36.208221][ T6462] ocfs2_mknod+0xe58/0x2438 [ 36.209543][ T6462] ocfs2_mkdir+0x194/0x4d4 [ 36.210846][ T6462] vfs_mkdir+0x27c/0x410 [ 36.212132][ T6462] do_mkdirat+0x250/0x584 [ 36.213418][ T6462] __arm64_sys_mkdirat+0x8c/0xa4 [ 36.214847][ T6462] invoke_syscall+0x98/0x2b8 [ 36.216189][ T6462] el0_svc_common+0x130/0x23c [ 36.217589][ T6462] do_el0_svc+0x48/0x58 [ 36.218802][ T6462] el0_svc+0x54/0x168 [ 36.219981][ T6462] el0t_64_sync_handler+0x84/0x108 [ 36.221531][ T6462] el0t_64_sync+0x198/0x19c [ 36.222938][ T6462] [ 36.222938][ T6462] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5){+.+.}-{4:4}: [ 36.225873][ T6462] __lock_acquire+0x34f0/0x7904 [ 36.227411][ T6462] lock_acquire+0x23c/0x724 [ 36.228727][ T6462] down_write+0x50/0xc0 [ 36.229986][ T6462] ocfs2_reserve_local_alloc_bits+0x108/0x24f8 [ 36.231791][ T6462] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 36.233550][ T6462] ocfs2_reserve_clusters+0x3c/0x50 [ 36.235052][ T6462] ocfs2_init_xattr_set_ctxt+0x428/0x978 [ 36.236637][ T6462] ocfs2_xattr_set+0xbe0/0x1448 [ 36.238097][ T6462] ocfs2_xattr_trusted_set+0x4c/0x64 [ 36.239646][ T6462] __vfs_setxattr+0x3d8/0x400 [ 36.241024][ T6462] __vfs_setxattr_noperm+0x110/0x578 [ 36.242684][ T6462] __vfs_setxattr_locked+0x1ec/0x218 [ 36.244569][ T6462] vfs_setxattr+0x1a8/0x344 [ 36.245941][ T6462] ovl_get_workdir+0xb08/0x143c [ 36.247416][ T6462] ovl_fill_super+0xff8/0x2e88 [ 36.248763][ T6462] get_tree_nodev+0xb4/0x144 [ 36.250155][ T6462] ovl_get_tree+0x28/0x38 [ 36.251507][ T6462] vfs_get_tree+0x90/0x28c [ 36.252785][ T6462] do_new_mount+0x278/0x900 [ 36.254140][ T6462] path_mount+0x590/0xe04 [ 36.255392][ T6462] __arm64_sys_mount+0x4f4/0x5d0 [ 36.256872][ T6462] invoke_syscall+0x98/0x2b8 [ 36.258319][ T6462] el0_svc_common+0x130/0x23c [ 36.259716][ T6462] do_el0_svc+0x48/0x58 [ 36.260969][ T6462] el0_svc+0x54/0x168 [ 36.262136][ T6462] el0t_64_sync_handler+0x84/0x108 [ 36.263673][ T6462] el0t_64_sync+0x198/0x19c [ 36.264990][ T6462] [ 36.264990][ T6462] other info that might help us debug this: [ 36.264990][ T6462] [ 36.267646][ T6462] Chain exists of: [ 36.267646][ T6462] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5 --> jbd2_handle --> &oi->ip_xattr_sem [ 36.267646][ T6462] [ 36.271788][ T6462] Possible unsafe locking scenario: [ 36.271788][ T6462] [ 36.273814][ T6462] CPU0 CPU1 [ 36.275242][ T6462] ---- ---- [ 36.276651][ T6462] lock(&oi->ip_xattr_sem); [ 36.277899][ T6462] lock(jbd2_handle); [ 36.279703][ T6462] lock(&oi->ip_xattr_sem); [ 36.281651][ T6462] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#5); [ 36.283652][ T6462] [ 36.283652][ T6462] *** DEADLOCK *** [ 36.283652][ T6462] [ 36.285816][ T6462] 4 locks held by syz-executor366/6462: [ 36.287363][ T6462] #0: ffff0000c79740e0 (&type->s_umount_key#42/1){+.+.}-{4:4}, at: alloc_super+0x1b0/0x834 [ 36.290062][ T6462] #1: ffff0000c75be420 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 36.292527][ T6462] #2: ffff0000dca3a640 (&sb->s_type->i_mutex_key#18){++++}-{4:4}, at: vfs_setxattr+0x17c/0x344 [ 36.295307][ T6462] #3: ffff0000dca3a378 (&oi->ip_xattr_sem){+.+.}-{4:4}, at: ocfs2_xattr_set+0x4e0/0x1448 [ 36.298009][ T6462] [ 36.298009][ T6462] stack backtrace: [ 36.299579][ T6462] CPU: 1 UID: 0 PID: 6462 Comm: syz-executor366 Not tainted 6.14.0-syzkaller-gd6b13dbd03b7 #0 [ 36.299593][ T6462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 36.299601][ T6462] Call trace: [ 36.299605][ T6462] show_stack+0x2c/0x3c (C) [ 36.299619][ T6462] dump_stack_lvl+0xe4/0x150 [ 36.299631][ T6462] dump_stack+0x1c/0x28 [ 36.299642][ T6462] print_circular_bug+0x154/0x1c0 [ 36.299656][ T6462] check_noncircular+0x310/0x404 [ 36.299670][ T6462] __lock_acquire+0x34f0/0x7904 [ 36.299683][ T6462] lock_acquire+0x23c/0x724 [ 36.299695][ T6462] down_write+0x50/0xc0 [ 36.299708][ T6462] ocfs2_reserve_local_alloc_bits+0x108/0x24f8 [ 36.299720][ T6462] ocfs2_reserve_clusters_with_limit+0x194/0xabc [ 36.299734][ T6462] ocfs2_reserve_clusters+0x3c/0x50 [ 36.299747][ T6462] ocfs2_init_xattr_set_ctxt+0x428/0x978 [ 36.299758][ T6462] ocfs2_xattr_set+0xbe0/0x1448 [ 36.299768][ T6462] ocfs2_xattr_trusted_set+0x4c/0x64 [ 36.299779][ T6462] __vfs_setxattr+0x3d8/0x400 [ 36.299792][ T6462] __vfs_setxattr_noperm+0x110/0x578 [ 36.299805][ T6462] __vfs_setxattr_locked+0x1ec/0x218 [ 36.299818][ T6462] vfs_setxattr+0x1a8/0x344 [ 36.299830][ T6462] ovl_get_workdir+0xb08/0x143c [ 36.299844][ T6462] ovl_fill_super+0xff8/0x2e88 [ 36.299857][ T6462] get_tree_nodev+0xb4/0x144 [ 36.299868][ T6462] ovl_get_tree+0x28/0x38 [ 36.299881][ T6462] vfs_get_tree+0x90/0x28c [ 36.299892][ T6462] do_new_mount+0x278/0x900 [ 36.299904][ T6462] path_mount+0x590/0xe04 [ 36.299914][ T6462] __arm64_sys_mount+0x4f4/0x5d0 [ 36.299926][ T6462] invoke_syscall+0x98/0x2b8 [ 36.299936][ T6462] el0_svc_common+0x130/0x23c [ 36.299947][ T6462] do_el0_svc+0x48/0x58 [ 36.299957][ T6462] el0_svc+0x54/0x168 [ 36.299969][ T6462] el0t_64_sync_handler+0x84/0x108 [ 36.299982][ T6462] el0t_64_sync+0x198/0x19c [ 36.349426][ T6462] overlayfs: upper fs missing required features.