Warning: Permanently added '10.128.0.181' (ED25519) to the list of known hosts. executing program [ 35.841683][ T6082] syz-executor108[6082]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 35.883827][ T6082] loop0: detected capacity change from 0 to 8192 [ 35.889971][ T6082] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 35.893682][ T6082] REISERFS (device loop0): found reiserfs format "3.5" with non-standard journal [ 35.896199][ T6082] REISERFS (device loop0): using ordered data mode [ 35.897848][ T6082] reiserfs: using flush barriers [ 35.900005][ T6082] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 35.904612][ T6082] REISERFS (device loop0): checking transaction log (loop0) [ 35.908599][ T6082] REISERFS (device loop0): Using tea hash to sort names [ 35.911281][ T6082] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 35.914959][ T6082] [ 35.915596][ T6082] ====================================================== [ 35.917436][ T6082] WARNING: possible circular locking dependency detected [ 35.919290][ T6082] 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Not tainted [ 35.920961][ T6082] ------------------------------------------------------ [ 35.922796][ T6082] syz-executor108/6082 is trying to acquire lock: [ 35.924505][ T6082] ffff800096c390f0 (&journal->j_mutex){+.+.}-{3:3}, at: do_journal_begin_r+0x2e0/0xe40 [ 35.927254][ T6082] [ 35.927254][ T6082] but task is already holding lock: [ 35.929169][ T6082] ffff0000d5122410 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write_file+0x64/0x1e8 [ 35.931667][ T6082] [ 35.931667][ T6082] which lock already depends on the new lock. [ 35.931667][ T6082] [ 35.934475][ T6082] [ 35.934475][ T6082] the existing dependency chain (in reverse order) is: [ 35.936994][ T6082] [ 35.936994][ T6082] -> #2 (sb_writers#8){.+.+}-{0:0}: [ 35.938925][ T6082] sb_start_write+0x60/0x2ec [ 35.940416][ T6082] mnt_want_write_file+0x64/0x1e8 [ 35.942065][ T6082] reiserfs_ioctl+0x188/0x42c [ 35.943464][ T6082] __arm64_sys_ioctl+0x14c/0x1c8 [ 35.944898][ T6082] invoke_syscall+0x98/0x2b8 [ 35.946244][ T6082] el0_svc_common+0x130/0x23c [ 35.947647][ T6082] do_el0_svc+0x48/0x58 [ 35.948916][ T6082] el0_svc+0x54/0x158 [ 35.950125][ T6082] el0t_64_sync_handler+0x84/0xfc [ 35.951586][ T6082] el0t_64_sync+0x190/0x194 [ 35.952880][ T6082] [ 35.952880][ T6082] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 35.954860][ T6082] __mutex_lock_common+0x190/0x21a0 [ 35.956385][ T6082] mutex_lock_nested+0x2c/0x38 [ 35.957824][ T6082] reiserfs_write_lock_nested+0x68/0xd8 [ 35.959433][ T6082] do_journal_begin_r+0x2ec/0xe40 [ 35.960919][ T6082] journal_begin+0x110/0x2f4 [ 35.962290][ T6082] reiserfs_fill_super+0x14e0/0x2028 [ 35.963829][ T6082] mount_bdev+0x1e8/0x2b4 [ 35.965191][ T6082] get_super_block+0x44/0x58 [ 35.966557][ T6082] legacy_get_tree+0xd4/0x16c [ 35.967945][ T6082] vfs_get_tree+0x90/0x288 [ 35.969205][ T6082] do_new_mount+0x25c/0x8c8 [ 35.970517][ T6082] path_mount+0x590/0xe04 [ 35.971813][ T6082] __arm64_sys_mount+0x45c/0x594 [ 35.973269][ T6082] invoke_syscall+0x98/0x2b8 [ 35.974620][ T6082] el0_svc_common+0x130/0x23c [ 35.975987][ T6082] do_el0_svc+0x48/0x58 [ 35.977199][ T6082] el0_svc+0x54/0x158 [ 35.978401][ T6082] el0t_64_sync_handler+0x84/0xfc [ 35.979854][ T6082] el0t_64_sync+0x190/0x194 [ 35.981237][ T6082] [ 35.981237][ T6082] -> #0 (&journal->j_mutex){+.+.}-{3:3}: [ 35.983256][ T6082] __lock_acquire+0x3370/0x75e8 [ 35.984715][ T6082] lock_acquire+0x23c/0x71c [ 35.986055][ T6082] __mutex_lock_common+0x190/0x21a0 [ 35.987595][ T6082] mutex_lock_nested+0x2c/0x38 [ 35.988976][ T6082] do_journal_begin_r+0x2e0/0xe40 [ 35.990440][ T6082] journal_begin+0x110/0x2f4 [ 35.991767][ T6082] reiserfs_dirty_inode+0x104/0x204 [ 35.993320][ T6082] __mark_inode_dirty+0x2b0/0x10f4 [ 35.994880][ T6082] reiserfs_ioctl+0x330/0x42c [ 35.996288][ T6082] __arm64_sys_ioctl+0x14c/0x1c8 [ 35.997762][ T6082] invoke_syscall+0x98/0x2b8 [ 35.999115][ T6082] el0_svc_common+0x130/0x23c [ 36.000470][ T6082] do_el0_svc+0x48/0x58 [ 36.001710][ T6082] el0_svc+0x54/0x158 [ 36.002886][ T6082] el0t_64_sync_handler+0x84/0xfc [ 36.004364][ T6082] el0t_64_sync+0x190/0x194 [ 36.005715][ T6082] [ 36.005715][ T6082] other info that might help us debug this: [ 36.005715][ T6082] [ 36.008475][ T6082] Chain exists of: [ 36.008475][ T6082] &journal->j_mutex --> &sbi->lock --> sb_writers#8 [ 36.008475][ T6082] [ 36.011782][ T6082] Possible unsafe locking scenario: [ 36.011782][ T6082] [ 36.013773][ T6082] CPU0 CPU1 [ 36.015212][ T6082] ---- ---- [ 36.016554][ T6082] rlock(sb_writers#8); [ 36.017641][ T6082] lock(&sbi->lock); [ 36.019362][ T6082] lock(sb_writers#8); [ 36.021117][ T6082] lock(&journal->j_mutex); [ 36.022352][ T6082] [ 36.022352][ T6082] *** DEADLOCK *** [ 36.022352][ T6082] [ 36.024400][ T6082] 1 lock held by syz-executor108/6082: [ 36.025856][ T6082] #0: ffff0000d5122410 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write_file+0x64/0x1e8 [ 36.028497][ T6082] [ 36.028497][ T6082] stack backtrace: [ 36.030024][ T6082] CPU: 0 PID: 6082 Comm: syz-executor108 Not tainted 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 [ 36.032713][ T6082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 36.035465][ T6082] Call trace: [ 36.036341][ T6082] dump_backtrace+0x1b8/0x1e4 [ 36.037600][ T6082] show_stack+0x2c/0x44 [ 36.038775][ T6082] dump_stack_lvl+0xd0/0x124 [ 36.039967][ T6082] dump_stack+0x1c/0x28 [ 36.041053][ T6082] print_circular_bug+0x150/0x1b8 [ 36.042445][ T6082] check_noncircular+0x310/0x404 [ 36.043802][ T6082] __lock_acquire+0x3370/0x75e8 [ 36.045080][ T6082] lock_acquire+0x23c/0x71c [ 36.046308][ T6082] __mutex_lock_common+0x190/0x21a0 [ 36.047679][ T6082] mutex_lock_nested+0x2c/0x38 [ 36.048913][ T6082] do_journal_begin_r+0x2e0/0xe40 [ 36.050252][ T6082] journal_begin+0x110/0x2f4 [ 36.051477][ T6082] reiserfs_dirty_inode+0x104/0x204 [ 36.052843][ T6082] __mark_inode_dirty+0x2b0/0x10f4 [ 36.054188][ T6082] reiserfs_ioctl+0x330/0x42c [ 36.055522][ T6082] __arm64_sys_ioctl+0x14c/0x1c8 [ 36.056837][ T6082] invoke_syscall+0x98/0x2b8 [ 36.058088][ T6082] el0_svc_common+0x130/0x23c [ 36.059348][ T6082] do_el0_svc+0x48/0x58 [ 36.060510][ T6082] el0_svc+0x54/0x158 [ 36.061614][ T6082] el0t_64_sync_handler+0x84/0xfc [ 36.062995][ T6082] el0t_64_sync+0x190/0x194