Warning: Permanently added '10.128.1.18' (ED25519) to the list of known hosts. executing program [ 36.826168][ T4223] loop0: detected capacity change from 0 to 8192 [ 36.832141][ T4223] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 36.835453][ T4223] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 36.837972][ T4223] REISERFS (device loop0): using ordered data mode [ 36.839920][ T4223] reiserfs: using flush barriers [ 36.842699][ T4223] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 36.847027][ T4223] REISERFS (device loop0): checking transaction log (loop0) [ 36.850973][ T4223] REISERFS (device loop0): Using tea hash to sort names [ 36.853423][ T4223] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 36.856992][ T4223] [ 36.857636][ T4223] ====================================================== [ 36.859471][ T4223] WARNING: possible circular locking dependency detected [ 36.861309][ T4223] 6.1.46-syzkaller #0 Not tainted [ 36.862549][ T4223] ------------------------------------------------------ [ 36.864309][ T4223] syz-executor133/4223 is trying to acquire lock: [ 36.865915][ T4223] ffff0000e20902e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 36.868461][ T4223] [ 36.868461][ T4223] but task is already holding lock: [ 36.870369][ T4223] ffff0000d7ed0460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 36.872741][ T4223] [ 36.872741][ T4223] which lock already depends on the new lock. [ 36.872741][ T4223] [ 36.875499][ T4223] [ 36.875499][ T4223] the existing dependency chain (in reverse order) is: [ 36.877841][ T4223] [ 36.877841][ T4223] -> #2 (sb_writers#8){.+.+}-{0:0}: [ 36.879787][ T4223] sb_start_write+0x7c/0x308 [ 36.881076][ T4223] mnt_want_write_file+0x64/0x1e8 [ 36.882533][ T4223] reiserfs_ioctl+0x184/0x454 [ 36.883870][ T4223] __arm64_sys_ioctl+0x14c/0x1c8 [ 36.885287][ T4223] invoke_syscall+0x98/0x2c0 [ 36.886632][ T4223] el0_svc_common+0x138/0x258 [ 36.888001][ T4223] do_el0_svc+0x64/0x218 [ 36.889245][ T4223] el0_svc+0x58/0x168 [ 36.890476][ T4223] el0t_64_sync_handler+0x84/0xf0 [ 36.891846][ T4223] el0t_64_sync+0x18c/0x190 [ 36.893222][ T4223] [ 36.893222][ T4223] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 36.895057][ T4223] __mutex_lock_common+0x190/0x21a0 [ 36.896491][ T4223] mutex_lock_nested+0x38/0x44 [ 36.897815][ T4223] reiserfs_write_lock+0x7c/0xe8 [ 36.899329][ T4223] reiserfs_lookup+0x130/0x3c4 [ 36.900749][ T4223] __lookup_slow+0x250/0x374 [ 36.902076][ T4223] lookup_one_len+0x178/0x28c [ 36.903527][ T4223] reiserfs_lookup_privroot+0x8c/0x204 [ 36.905101][ T4223] reiserfs_fill_super+0x1bc0/0x2028 [ 36.906616][ T4223] mount_bdev+0x274/0x370 [ 36.907884][ T4223] get_super_block+0x44/0x58 [ 36.909251][ T4223] legacy_get_tree+0xd4/0x16c [ 36.910665][ T4223] vfs_get_tree+0x90/0x274 [ 36.911932][ T4223] do_new_mount+0x25c/0x8c4 [ 36.913230][ T4223] path_mount+0x590/0xe58 [ 36.914526][ T4223] __arm64_sys_mount+0x45c/0x594 [ 36.916031][ T4223] invoke_syscall+0x98/0x2c0 [ 36.917335][ T4223] el0_svc_common+0x138/0x258 [ 36.918664][ T4223] do_el0_svc+0x64/0x218 [ 36.919921][ T4223] el0_svc+0x58/0x168 [ 36.921098][ T4223] el0t_64_sync_handler+0x84/0xf0 [ 36.922511][ T4223] el0t_64_sync+0x18c/0x190 [ 36.923804][ T4223] [ 36.923804][ T4223] -> #0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}: [ 36.925929][ T4223] __lock_acquire+0x3338/0x764c [ 36.927350][ T4223] lock_acquire+0x26c/0x7cc [ 36.928698][ T4223] down_write+0x5c/0x88 [ 36.929934][ T4223] vfs_setxattr+0x17c/0x344 [ 36.931226][ T4223] setxattr+0x230/0x294 [ 36.932465][ T4223] path_setxattr+0x17c/0x258 [ 36.933769][ T4223] __arm64_sys_setxattr+0xbc/0xd8 [ 36.935105][ T4223] invoke_syscall+0x98/0x2c0 [ 36.936392][ T4223] el0_svc_common+0x138/0x258 [ 36.937742][ T4223] do_el0_svc+0x64/0x218 [ 36.938949][ T4223] el0_svc+0x58/0x168 [ 36.940068][ T4223] el0t_64_sync_handler+0x84/0xf0 [ 36.941538][ T4223] el0t_64_sync+0x18c/0x190 [ 36.942828][ T4223] [ 36.942828][ T4223] other info that might help us debug this: [ 36.942828][ T4223] [ 36.945544][ T4223] Chain exists of: [ 36.945544][ T4223] &type->i_mutex_dir_key#6 --> &sbi->lock --> sb_writers#8 [ 36.945544][ T4223] [ 36.948932][ T4223] Possible unsafe locking scenario: [ 36.948932][ T4223] [ 36.950887][ T4223] CPU0 CPU1 [ 36.952288][ T4223] ---- ---- [ 36.953723][ T4223] lock(sb_writers#8); [ 36.954774][ T4223] lock(&sbi->lock); [ 36.956296][ T4223] lock(sb_writers#8); [ 36.958086][ T4223] lock(&type->i_mutex_dir_key#6); [ 36.959475][ T4223] [ 36.959475][ T4223] *** DEADLOCK *** [ 36.959475][ T4223] [ 36.961597][ T4223] 1 lock held by syz-executor133/4223: [ 36.963007][ T4223] #0: ffff0000d7ed0460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 36.965429][ T4223] [ 36.965429][ T4223] stack backtrace: [ 36.966966][ T4223] CPU: 1 PID: 4223 Comm: syz-executor133 Not tainted 6.1.46-syzkaller #0 [ 36.969179][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 36.971756][ T4223] Call trace: [ 36.972610][ T4223] dump_backtrace+0x1c8/0x1f4 [ 36.973836][ T4223] show_stack+0x2c/0x3c [ 36.974911][ T4223] dump_stack_lvl+0x108/0x170 [ 36.976183][ T4223] dump_stack+0x1c/0x58 [ 36.977239][ T4223] print_circular_bug+0x150/0x1b8 [ 36.978550][ T4223] check_noncircular+0x2cc/0x378 [ 36.979805][ T4223] __lock_acquire+0x3338/0x764c [ 36.981072][ T4223] lock_acquire+0x26c/0x7cc [ 36.982216][ T4223] down_write+0x5c/0x88 [ 36.983297][ T4223] vfs_setxattr+0x17c/0x344 [ 36.984541][ T4223] setxattr+0x230/0x294 [ 36.985638][ T4223] path_setxattr+0x17c/0x258 [ 36.986810][ T4223] __arm64_sys_setxattr+0xbc/0xd8 [ 36.988069][ T4223] invoke_syscall+0x98/0x2c0 [ 36.989275][ T4223] el0_svc_common+0x138/0x258 [ 36.990409][ T4223] do_el0_svc+0x64/0x218 [ 36.991541][ T4223] el0_svc+0x58/0x168 [ 36.992594][ T4223] el0t_64_sync_handler+0x84/0xf0 [ 36.993926][ T4223] el0t_64_sync+0x18c/0x190