====================================================== WARNING: possible circular locking dependency detected 6.14.0-rc5-syzkaller-g14d05f12084d #0 Not tainted ------------------------------------------------------ syz.3.255/8279 is trying to acquire lock: ffff0000f1950610 (sb_internal#2){.+.+}-{0:0}, at: ocfs2_orphan_for_truncate fs/ocfs2/file.c:396 [inline] ffff0000f1950610 (sb_internal#2){.+.+}-{0:0}, at: ocfs2_truncate_file+0x600/0x14b4 fs/ocfs2/file.c:500 but task is already holding lock: ffff0000dda43120 (&ocfs2_file_ip_alloc_sem_key){++++}-{4:4}, at: ocfs2_truncate_file+0x318/0x14b4 fs/ocfs2/file.c:471 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #4 (&ocfs2_file_ip_alloc_sem_key){++++}-{4:4}: down_write+0x50/0xc0 kernel/locking/rwsem.c:1577 ocfs2_try_remove_refcount_tree+0xb4/0x2f0 fs/ocfs2/refcounttree.c:932 ocfs2_xattr_set+0x670/0x1448 fs/ocfs2/xattr.c:3669 ocfs2_set_acl+0x410/0x4b4 fs/ocfs2/acl.c:254 ocfs2_iop_set_acl+0x230/0x374 fs/ocfs2/acl.c:286 set_posix_acl fs/posix_acl.c:954 [inline] vfs_remove_acl+0x470/0x6f4 fs/posix_acl.c:1241 removexattr fs/xattr.c:1022 [inline] filename_removexattr fs/xattr.c:1052 [inline] path_removexattrat+0x2ec/0x5b4 fs/xattr.c:1088 __do_sys_lremovexattr fs/xattr.c:1106 [inline] __se_sys_lremovexattr fs/xattr.c:1103 [inline] __arm64_sys_lremovexattr+0x64/0x7c fs/xattr.c:1103 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 -> #3 (&oi->ip_xattr_sem){++++}-{4:4}: down_read+0x58/0x2fc kernel/locking/rwsem.c:1524 ocfs2_xattr_get+0x104/0x28c fs/ocfs2/xattr.c:1338 ocfs2_xattr_security_get+0x40/0x54 fs/ocfs2/xattr.c:7231 __vfs_getxattr+0x394/0x3c0 fs/xattr.c:423 smk_fetch+0xc8/0x150 security/smack/smack_lsm.c:290 smack_d_instantiate+0x594/0x880 security/smack/smack_lsm.c:3599 security_d_instantiate+0x100/0x204 security/security.c:4079 d_instantiate+0x5c/0xa0 fs/dcache.c:1919 ocfs2_mknod+0x1998/0x2438 fs/ocfs2/namei.c:450 ocfs2_mkdir+0x194/0x4d4 fs/ocfs2/namei.c:656 vfs_mkdir+0x27c/0x410 fs/namei.c:4313 do_mkdirat+0x250/0x584 fs/namei.c:4336 __do_sys_mkdirat fs/namei.c:4351 [inline] __se_sys_mkdirat fs/namei.c:4349 [inline] __arm64_sys_mkdirat+0x8c/0xa4 fs/namei.c:4349 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 -> #2 (jbd2_handle){++++}-{0:0}: start_this_handle+0xf34/0x11c4 fs/jbd2/transaction.c:448 jbd2__journal_start+0x298/0x544 fs/jbd2/transaction.c:505 jbd2_journal_start+0x3c/0x4c fs/jbd2/transaction.c:544 ocfs2_start_trans+0x3d0/0x71c fs/ocfs2/journal.c:352 ocfs2_modify_bh+0xe4/0x484 fs/ocfs2/quota_local.c:101 ocfs2_local_read_info+0x1220/0x15bc fs/ocfs2/quota_local.c:771 dquot_load_quota_sb+0x6e4/0xb24 fs/quota/dquot.c:2459 dquot_load_quota_inode+0x280/0x4f4 fs/quota/dquot.c:2496 ocfs2_enable_quotas+0x17c/0x3cc fs/ocfs2/super.c:930 ocfs2_fill_super+0x4f34/0x60fc fs/ocfs2/super.c:1140 get_tree_bdev_flags+0x38c/0x494 fs/super.c:1636 get_tree_bdev+0x2c/0x3c fs/super.c:1659 ocfs2_get_tree+0x28/0x38 fs/ocfs2/super.c:1184 vfs_get_tree+0x90/0x28c fs/super.c:1814 do_new_mount+0x278/0x900 fs/namespace.c:3560 path_mount+0x590/0xe04 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount fs/namespace.c:4088 [inline] __arm64_sys_mount+0x4f4/0x5d0 fs/namespace.c:4088 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 -> #1 (&journal->j_trans_barrier){.+.+}-{4:4}: down_read+0x58/0x2fc kernel/locking/rwsem.c:1524 ocfs2_start_trans+0x3c4/0x71c fs/ocfs2/journal.c:350 ocfs2_modify_bh+0xe4/0x484 fs/ocfs2/quota_local.c:101 ocfs2_local_read_info+0x1220/0x15bc fs/ocfs2/quota_local.c:771 dquot_load_quota_sb+0x6e4/0xb24 fs/quota/dquot.c:2459 dquot_load_quota_inode+0x280/0x4f4 fs/quota/dquot.c:2496 ocfs2_enable_quotas+0x17c/0x3cc fs/ocfs2/super.c:930 ocfs2_fill_super+0x4f34/0x60fc fs/ocfs2/super.c:1140 get_tree_bdev_flags+0x38c/0x494 fs/super.c:1636 get_tree_bdev+0x2c/0x3c fs/super.c:1659 ocfs2_get_tree+0x28/0x38 fs/ocfs2/super.c:1184 vfs_get_tree+0x90/0x28c fs/super.c:1814 do_new_mount+0x278/0x900 fs/namespace.c:3560 path_mount+0x590/0xe04 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount fs/namespace.c:4088 [inline] __arm64_sys_mount+0x4f4/0x5d0 fs/namespace.c:4088 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 -> #0 (sb_internal#2){.+.+}-{0:0}: check_prev_add kernel/locking/lockdep.c:3163 [inline] check_prevs_add kernel/locking/lockdep.c:3282 [inline] validate_chain kernel/locking/lockdep.c:3906 [inline] __lock_acquire+0x34f0/0x7904 kernel/locking/lockdep.c:5228 lock_acquire+0x23c/0x724 kernel/locking/lockdep.c:5851 percpu_down_read include/linux/percpu-rwsem.h:51 [inline] __sb_start_write include/linux/fs.h:1785 [inline] sb_start_intwrite include/linux/fs.h:1968 [inline] ocfs2_start_trans+0x244/0x71c fs/ocfs2/journal.c:348 ocfs2_orphan_for_truncate fs/ocfs2/file.c:396 [inline] ocfs2_truncate_file+0x600/0x14b4 fs/ocfs2/file.c:500 ocfs2_setattr+0x1328/0x19e4 fs/ocfs2/file.c:1212 notify_change+0x9f0/0xca0 fs/attr.c:552 do_truncate+0x1c0/0x28c fs/open.c:65 do_coredump+0x242c/0x29a0 fs/coredump.c:735 get_signal+0xf6c/0x1500 kernel/signal.c:3021 do_signal+0x1a4/0x3a04 arch/arm64/kernel/signal.c:1658 do_notify_resume+0x74/0x1f4 arch/arm64/kernel/entry-common.c:148 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:169 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:178 [inline] el0_da+0xbc/0x178 arch/arm64/kernel/entry-common.c:605 el0t_64_sync_handler+0xcc/0x108 arch/arm64/kernel/entry-common.c:765 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 other info that might help us debug this: Chain exists of: sb_internal#2 --> &oi->ip_xattr_sem --> &ocfs2_file_ip_alloc_sem_key Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ocfs2_file_ip_alloc_sem_key); lock(&oi->ip_xattr_sem); lock(&ocfs2_file_ip_alloc_sem_key); rlock(sb_internal#2); *** DEADLOCK *** 2 locks held by syz.3.255/8279: #0: ffff0000dda43480 (&sb->s_type->i_mutex_key#33){+.+.}-{4:4}, at: inode_lock include/linux/fs.h:877 [inline] #0: ffff0000dda43480 (&sb->s_type->i_mutex_key#33){+.+.}-{4:4}, at: do_truncate+0x1ac/0x28c fs/open.c:63 #1: ffff0000dda43120 (&ocfs2_file_ip_alloc_sem_key){++++}-{4:4}, at: ocfs2_truncate_file+0x318/0x14b4 fs/ocfs2/file.c:471 stack backtrace: CPU: 1 UID: 0 PID: 8279 Comm: syz.3.255 Not tainted 6.14.0-rc5-syzkaller-g14d05f12084d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120 dump_stack+0x1c/0x28 lib/dump_stack.c:129 print_circular_bug+0x154/0x1c0 kernel/locking/lockdep.c:2076 check_noncircular+0x310/0x404 kernel/locking/lockdep.c:2208 check_prev_add kernel/locking/lockdep.c:3163 [inline] check_prevs_add kernel/locking/lockdep.c:3282 [inline] validate_chain kernel/locking/lockdep.c:3906 [inline] __lock_acquire+0x34f0/0x7904 kernel/locking/lockdep.c:5228 lock_acquire+0x23c/0x724 kernel/locking/lockdep.c:5851 percpu_down_read include/linux/percpu-rwsem.h:51 [inline] __sb_start_write include/linux/fs.h:1785 [inline] sb_start_intwrite include/linux/fs.h:1968 [inline] ocfs2_start_trans+0x244/0x71c fs/ocfs2/journal.c:348 ocfs2_orphan_for_truncate fs/ocfs2/file.c:396 [inline] ocfs2_truncate_file+0x600/0x14b4 fs/ocfs2/file.c:500 ocfs2_setattr+0x1328/0x19e4 fs/ocfs2/file.c:1212 notify_change+0x9f0/0xca0 fs/attr.c:552 do_truncate+0x1c0/0x28c fs/open.c:65 do_coredump+0x242c/0x29a0 fs/coredump.c:735 get_signal+0xf6c/0x1500 kernel/signal.c:3021 do_signal+0x1a4/0x3a04 arch/arm64/kernel/signal.c:1658 do_notify_resume+0x74/0x1f4 arch/arm64/kernel/entry-common.c:148 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:169 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:178 [inline] el0_da+0xbc/0x178 arch/arm64/kernel/entry-common.c:605 el0t_64_sync_handler+0xcc/0x108 arch/arm64/kernel/entry-common.c:765 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600