Warning: Permanently added '10.128.10.5' (ED25519) to the list of known hosts. executing program [ 42.960661][ T3967] loop0: detected capacity change from 0 to 8192 [ 42.965672][ T3967] REISERFS (device loop0): found reiserfs format "3.5" with non-standard journal [ 42.967767][ T3967] REISERFS (device loop0): using ordered data mode [ 42.969214][ T3967] reiserfs: using flush barriers [ 42.971584][ T3967] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 42.975318][ T3967] REISERFS (device loop0): checking transaction log (loop0) [ 42.978750][ T3967] REISERFS (device loop0): Using tea hash to sort names [ 42.981013][ T3967] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 42.984113][ T3967] [ 42.984644][ T3967] ====================================================== [ 42.986089][ T3967] WARNING: possible circular locking dependency detected [ 42.987538][ T3967] 5.15.135-syzkaller #0 Not tainted [ 42.988652][ T3967] ------------------------------------------------------ [ 42.990152][ T3967] syz-executor228/3967 is trying to acquire lock: [ 42.991546][ T3967] ffff80001afd90f0 (&journal->j_mutex){+.+.}-{3:3}, at: do_journal_begin_r+0x2e8/0xe3c [ 42.993681][ T3967] [ 42.993681][ T3967] but task is already holding lock: [ 42.995230][ T3967] ffff0000c877a460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write_file+0x64/0x1e8 [ 42.997244][ T3967] [ 42.997244][ T3967] which lock already depends on the new lock. [ 42.997244][ T3967] [ 42.999469][ T3967] [ 42.999469][ T3967] the existing dependency chain (in reverse order) is: [ 43.001438][ T3967] [ 43.001438][ T3967] -> #2 (sb_writers#8){.+.+}-{0:0}: [ 43.003072][ T3967] sb_start_write+0xf0/0x3ac [ 43.004215][ T3967] mnt_want_write_file+0x64/0x1e8 [ 43.005444][ T3967] reiserfs_ioctl+0x188/0x4b8 [ 43.006631][ T3967] __arm64_sys_ioctl+0x14c/0x1c8 [ 43.007846][ T3967] invoke_syscall+0x98/0x2b8 [ 43.008993][ T3967] el0_svc_common+0x138/0x258 [ 43.010141][ T3967] do_el0_svc+0x58/0x14c [ 43.011169][ T3967] el0_svc+0x7c/0x1f0 [ 43.012218][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 43.013413][ T3967] el0t_64_sync+0x1a0/0x1a4 [ 43.014538][ T3967] [ 43.014538][ T3967] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 43.016145][ T3967] __mutex_lock_common+0x194/0x2154 [ 43.017384][ T3967] mutex_lock_nested+0xa4/0xf8 [ 43.018574][ T3967] reiserfs_write_lock_nested+0x68/0xd8 [ 43.019899][ T3967] do_journal_begin_r+0x2f4/0xe3c [ 43.021071][ T3967] journal_begin+0x110/0x2f4 [ 43.022185][ T3967] reiserfs_fill_super+0x13c0/0x1e8c [ 43.023449][ T3967] mount_bdev+0x274/0x370 [ 43.024498][ T3967] get_super_block+0x44/0x58 [ 43.025595][ T3967] legacy_get_tree+0xd4/0x16c [ 43.026740][ T3967] vfs_get_tree+0x90/0x274 [ 43.027807][ T3967] do_new_mount+0x25c/0x8c4 [ 43.028857][ T3967] path_mount+0x594/0x101c [ 43.029912][ T3967] __arm64_sys_mount+0x510/0x5e0 [ 43.031104][ T3967] invoke_syscall+0x98/0x2b8 [ 43.032301][ T3967] el0_svc_common+0x138/0x258 [ 43.033418][ T3967] do_el0_svc+0x58/0x14c [ 43.034408][ T3967] el0_svc+0x7c/0x1f0 [ 43.035401][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 43.036539][ T3967] el0t_64_sync+0x1a0/0x1a4 [ 43.037623][ T3967] [ 43.037623][ T3967] -> #0 (&journal->j_mutex){+.+.}-{3:3}: [ 43.039386][ T3967] __lock_acquire+0x32cc/0x7620 [ 43.040587][ T3967] lock_acquire+0x240/0x77c [ 43.041655][ T3967] __mutex_lock_common+0x194/0x2154 [ 43.042870][ T3967] mutex_lock_nested+0xa4/0xf8 [ 43.044018][ T3967] do_journal_begin_r+0x2e8/0xe3c [ 43.045229][ T3967] journal_begin+0x110/0x2f4 [ 43.046367][ T3967] reiserfs_dirty_inode+0x104/0x204 [ 43.047604][ T3967] __mark_inode_dirty+0x2b0/0x10f4 [ 43.048796][ T3967] reiserfs_ioctl+0x3c0/0x4b8 [ 43.049944][ T3967] __arm64_sys_ioctl+0x14c/0x1c8 [ 43.051171][ T3967] invoke_syscall+0x98/0x2b8 [ 43.052366][ T3967] el0_svc_common+0x138/0x258 [ 43.053537][ T3967] do_el0_svc+0x58/0x14c [ 43.054615][ T3967] el0_svc+0x7c/0x1f0 [ 43.055582][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 43.056786][ T3967] el0t_64_sync+0x1a0/0x1a4 [ 43.057855][ T3967] [ 43.057855][ T3967] other info that might help us debug this: [ 43.057855][ T3967] [ 43.060041][ T3967] Chain exists of: [ 43.060041][ T3967] &journal->j_mutex --> &sbi->lock --> sb_writers#8 [ 43.060041][ T3967] [ 43.062781][ T3967] Possible unsafe locking scenario: [ 43.062781][ T3967] [ 43.064358][ T3967] CPU0 CPU1 [ 43.065504][ T3967] ---- ---- [ 43.066702][ T3967] lock(sb_writers#8); [ 43.067618][ T3967] lock(&sbi->lock); [ 43.069093][ T3967] lock(sb_writers#8); [ 43.070562][ T3967] lock(&journal->j_mutex); [ 43.071577][ T3967] [ 43.071577][ T3967] *** DEADLOCK *** [ 43.071577][ T3967] [ 43.073369][ T3967] 1 lock held by syz-executor228/3967: [ 43.074555][ T3967] #0: ffff0000c877a460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write_file+0x64/0x1e8 [ 43.076627][ T3967] [ 43.076627][ T3967] stack backtrace: [ 43.077900][ T3967] CPU: 0 PID: 3967 Comm: syz-executor228 Not tainted 5.15.135-syzkaller #0 [ 43.079805][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 43.082108][ T3967] Call trace: [ 43.082842][ T3967] dump_backtrace+0x0/0x530 [ 43.083830][ T3967] show_stack+0x2c/0x3c [ 43.084772][ T3967] dump_stack_lvl+0x108/0x170 [ 43.085775][ T3967] dump_stack+0x1c/0x58 [ 43.086666][ T3967] print_circular_bug+0x150/0x1b8 [ 43.087721][ T3967] check_noncircular+0x2cc/0x378 [ 43.088776][ T3967] __lock_acquire+0x32cc/0x7620 [ 43.089822][ T3967] lock_acquire+0x240/0x77c [ 43.090768][ T3967] __mutex_lock_common+0x194/0x2154 [ 43.091924][ T3967] mutex_lock_nested+0xa4/0xf8 [ 43.093011][ T3967] do_journal_begin_r+0x2e8/0xe3c [ 43.094110][ T3967] journal_begin+0x110/0x2f4 [ 43.095089][ T3967] reiserfs_dirty_inode+0x104/0x204 [ 43.096227][ T3967] __mark_inode_dirty+0x2b0/0x10f4 [ 43.097350][ T3967] reiserfs_ioctl+0x3c0/0x4b8 [ 43.098356][ T3967] __arm64_sys_ioctl+0x14c/0x1c8 [ 43.099476][ T3967] invoke_syscall+0x98/0x2b8 [ 43.100515][ T3967] el0_svc_common+0x138/0x258 [ 43.101576][ T3967] do_el0_svc+0x58/0x14c [ 43.102540][ T3967] el0_svc+0x7c/0x1f0 [ 43.103398][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 43.104474][ T3967] el0t_64_sync+0x1a0/0x1a4