Warning: Permanently added '10.128.1.83' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 33.135659] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 33.144247] REISERFS (device loop0): using ordered data mode [ 33.151490] reiserfs: using flush barriers [ 33.157493] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 33.173403] REISERFS (device loop0): checking transaction log (loop0) [ 33.181287] REISERFS (device loop0): Using rupasov hash to sort names [ 33.188685] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 33.362718] [ 33.364371] ====================================================== [ 33.370661] WARNING: possible circular locking dependency detected [ 33.376953] 4.19.211-syzkaller #0 Not tainted [ 33.381467] ------------------------------------------------------ [ 33.387781] syz-executor265/8115 is trying to acquire lock: [ 33.393462] 00000000a945bb43 (&journal->j_mutex){+.+.}, at: do_journal_begin_r+0x298/0x10b0 [ 33.401934] [ 33.401934] but task is already holding lock: [ 33.407877] 000000005053606c (sb_writers#11){.+.+}, at: mnt_want_write_file+0x63/0x1d0 [ 33.415917] [ 33.415917] which lock already depends on the new lock. [ 33.415917] [ 33.424204] [ 33.424204] the existing dependency chain (in reverse order) is: [ 33.431796] [ 33.431796] -> #2 (sb_writers#11){.+.+}: [ 33.437318] mnt_want_write_file+0x63/0x1d0 [ 33.442137] reiserfs_ioctl+0x1a7/0x9a0 [ 33.446609] do_vfs_ioctl+0xcdb/0x12e0 [ 33.450990] ksys_ioctl+0x9b/0xc0 [ 33.454936] __x64_sys_ioctl+0x6f/0xb0 [ 33.459320] do_syscall_64+0xf9/0x620 [ 33.463617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 33.469502] [ 33.469502] -> #1 (&sbi->lock){+.+.}: [ 33.474825] reiserfs_write_lock_nested+0x65/0xe0 [ 33.480163] do_journal_begin_r+0x2a2/0x10b0 [ 33.485064] journal_begin+0x162/0x400 [ 33.489451] reiserfs_fill_super+0x1a81/0x2d80 [ 33.494528] mount_bdev+0x2fc/0x3b0 [ 33.498654] mount_fs+0xa3/0x310 [ 33.502516] vfs_kern_mount.part.0+0x68/0x470 [ 33.507506] do_mount+0x115c/0x2f50 [ 33.511630] ksys_mount+0xcf/0x130 [ 33.515667] __x64_sys_mount+0xba/0x150 [ 33.520138] do_syscall_64+0xf9/0x620 [ 33.524435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 33.530115] [ 33.530115] -> #0 (&journal->j_mutex){+.+.}: [ 33.535981] __mutex_lock+0xd7/0x1190 [ 33.540276] do_journal_begin_r+0x298/0x10b0 [ 33.545180] journal_begin+0x162/0x400 [ 33.549570] reiserfs_dirty_inode+0xff/0x250 [ 33.554476] __mark_inode_dirty+0x16b/0x1140 [ 33.559396] reiserfs_ioctl+0x7dc/0x9a0 [ 33.564580] do_vfs_ioctl+0xcdb/0x12e0 [ 33.569148] ksys_ioctl+0x9b/0xc0 [ 33.573196] __x64_sys_ioctl+0x6f/0xb0 [ 33.577590] do_syscall_64+0xf9/0x620 [ 33.581917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 33.587779] [ 33.587779] other info that might help us debug this: [ 33.587779] [ 33.595895] Chain exists of: [ 33.595895] &journal->j_mutex --> &sbi->lock --> sb_writers#11 [ 33.595895] [ 33.606468] Possible unsafe locking scenario: [ 33.606468] [ 33.612501] CPU0 CPU1 [ 33.617142] ---- ---- [ 33.622050] lock(sb_writers#11); [ 33.625574] lock(&sbi->lock); [ 33.631355] lock(sb_writers#11); [ 33.637748] lock(&journal->j_mutex); [ 33.641710] [ 33.641710] *** DEADLOCK *** [ 33.641710] [ 33.647759] 1 lock held by syz-executor265/8115: [ 33.652503] #0: 000000005053606c (sb_writers#11){.+.+}, at: mnt_want_write_file+0x63/0x1d0 [ 33.660982] [ 33.660982] stack backtrace: [ 33.665463] CPU: 0 PID: 8115 Comm: syz-executor265 Not tainted 4.19.211-syzkaller #0 [ 33.673317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 33.682646] Call Trace: [ 33.685232] dump_stack+0x1fc/0x2ef [ 33.688849] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 33.694635] __lock_acquire+0x30c9/0x3ff0 [ 33.698862] ? mark_held_locks+0xf0/0xf0 [ 33.702909] ? mark_held_locks+0xf0/0xf0 [ 33.707003] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 33.712868] lock_acquire+0x170/0x3c0 [ 33.716658] ? do_journal_begin_r+0x298/0x10b0 [ 33.721218] ? do_journal_begin_r+0x298/0x10b0 [ 33.725777] __mutex_lock+0xd7/0x1190 [ 33.729558] ? do_journal_begin_r+0x298/0x10b0 [ 33.734128] ? lock_downgrade+0x720/0x720 [ 33.738252] ? do_journal_begin_r+0x298/0x10b0 [ 33.742916] ? mutex_trylock+0x1a0/0x1a0 [ 33.746954] ? __mutex_unlock_slowpath+0xea/0x610 [ 33.751797] ? wait_for_completion_io+0x10/0x10 [ 33.756443] do_journal_begin_r+0x298/0x10b0 [ 33.760829] ? do_journal_end+0x4840/0x4840 [ 33.765126] ? mark_held_locks+0xf0/0xf0 [ 33.769163] ? current_time+0x6f/0x1c0 [ 33.773047] journal_begin+0x162/0x400 [ 33.776915] reiserfs_dirty_inode+0xff/0x250 [ 33.781301] ? reiserfs_unfreeze+0xa0/0xa0 [ 33.785513] ? check_preemption_disabled+0x41/0x280 [ 33.790507] ? reiserfs_unfreeze+0xa0/0xa0 [ 33.794720] __mark_inode_dirty+0x16b/0x1140 [ 33.799114] reiserfs_ioctl+0x7dc/0x9a0 [ 33.803066] ? reiserfs_unpack+0x5c0/0x5c0 [ 33.807893] do_vfs_ioctl+0xcdb/0x12e0 [ 33.811761] ? iterate_bdevs+0x234/0x290 [ 33.815797] ? ioctl_preallocate+0x200/0x200 [ 33.820183] ? _atomic_dec_and_lock+0x122/0x1d0 [ 33.824826] ? cpumask_any_but+0x130/0x130 [ 33.829035] ? iput+0xc9/0x860 [ 33.832204] ? ksys_sync+0xfc/0x150 [ 33.835810] ksys_ioctl+0x9b/0xc0 [ 33.839238] __x64_sys_ioctl+0x6f/0xb0 [ 33.843102] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 33.847667] do_syscall_64+0xf9/0x620 [ 33.851446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 33.856611] RIP: 0033:0x7fb4d141d009 [ 33.860304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 33.879178] RSP: 002b:00007ffd6484cfc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 33.886862] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb4d141d009 [ 33.894104] RDX: 0000000020000040 RSI: 0000000040087602 RDI: 0000000000000005 [ 33.901346] RBP: 00007fb4d13dc8a0 R08: 0000000000000000 R09: 0000000000000000 [ 33.908595] R10: 000055555588c2c0 R11: 0000000000000246 R12: 00007fb4d13d