Warning: Permanently added '10.128.0.152' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 31.831796] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 31.848711] REISERFS (device loop0): using ordered data mode [ 31.854532] reiserfs: using flush barriers [ 31.860465] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 31.876302] REISERFS (device loop0): checking transaction log (loop0) [ 31.884231] REISERFS (device loop0): Using rupasov hash to sort names [ 31.891895] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 31.901378] [ 31.903020] ====================================================== [ 31.909332] WARNING: possible circular locking dependency detected [ 31.915651] 4.14.299-syzkaller #0 Not tainted [ 31.920143] ------------------------------------------------------ [ 31.926464] syz-executor148/7988 is trying to acquire lock: [ 31.932165] (&journal->j_mutex){+.+.}, at: [] do_journal_begin_r+0x26b/0xde0 [ 31.940998] [ 31.940998] but task is already holding lock: [ 31.946952] (sb_writers#10){.+.+}, at: [] mnt_want_write_file+0xfd/0x3b0 [ 31.955440] [ 31.955440] which lock already depends on the new lock. [ 31.955440] [ 31.963740] [ 31.963740] the existing dependency chain (in reverse order) is: [ 31.971339] [ 31.971339] -> #2 (sb_writers#10){.+.+}: [ 31.976875] __sb_start_write+0x64/0x260 [ 31.981443] mnt_want_write_file+0xfd/0x3b0 [ 31.986268] reiserfs_ioctl+0x18e/0x8b0 [ 31.990749] do_vfs_ioctl+0x75a/0xff0 [ 31.995056] SyS_ioctl+0x7f/0xb0 [ 31.998925] do_syscall_64+0x1d5/0x640 [ 32.003314] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 32.009002] [ 32.009002] -> #1 (&sbi->lock){+.+.}: [ 32.014269] __mutex_lock+0xc4/0x1310 [ 32.018572] reiserfs_write_lock_nested+0x59/0xd0 [ 32.023916] do_journal_begin_r+0x276/0xde0 [ 32.028740] journal_begin+0x162/0x3d0 [ 32.033139] reiserfs_fill_super+0x18f4/0x2990 [ 32.038223] mount_bdev+0x2b3/0x360 [ 32.042352] mount_fs+0x92/0x2a0 [ 32.046224] vfs_kern_mount.part.0+0x5b/0x470 [ 32.051220] do_mount+0xe65/0x2a30 [ 32.055263] SyS_mount+0xa8/0x120 [ 32.059219] do_syscall_64+0x1d5/0x640 [ 32.063625] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 32.069314] [ 32.069314] -> #0 (&journal->j_mutex){+.+.}: [ 32.075190] lock_acquire+0x170/0x3f0 [ 32.079493] __mutex_lock+0xc4/0x1310 [ 32.083798] do_journal_begin_r+0x26b/0xde0 [ 32.088621] journal_begin+0x162/0x3d0 [ 32.093013] reiserfs_dirty_inode+0xd9/0x200 [ 32.097924] __mark_inode_dirty+0x11e/0xf40 [ 32.102746] reiserfs_ioctl+0x6f6/0x8b0 [ 32.107221] do_vfs_ioctl+0x75a/0xff0 [ 32.111524] SyS_ioctl+0x7f/0xb0 [ 32.115397] do_syscall_64+0x1d5/0x640 [ 32.119788] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 32.125475] [ 32.125475] other info that might help us debug this: [ 32.125475] [ 32.133693] Chain exists of: [ 32.133693] &journal->j_mutex --> &sbi->lock --> sb_writers#10 [ 32.133693] [ 32.144173] Possible unsafe locking scenario: [ 32.144173] [ 32.150212] CPU0 CPU1 [ 32.154866] ---- ---- [ 32.159517] lock(sb_writers#10); [ 32.163040] lock(&sbi->lock); [ 32.168817] lock(sb_writers#10); [ 32.174866] lock(&journal->j_mutex); [ 32.178752] [ 32.178752] *** DEADLOCK *** [ 32.178752] [ 32.184805] 1 lock held by syz-executor148/7988: [ 32.189550] #0: (sb_writers#10){.+.+}, at: [] mnt_want_write_file+0xfd/0x3b0 [ 32.198474] [ 32.198474] stack backtrace: [ 32.202955] CPU: 0 PID: 7988 Comm: syz-executor148 Not tainted 4.14.299-syzkaller #0 [ 32.210817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 32.220262] Call Trace: [ 32.222837] dump_stack+0x1b2/0x281 [ 32.226453] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 32.232343] __lock_acquire+0x2e0e/0x3f20 [ 32.236475] ? update_curr+0x28d/0x670 [ 32.240347] ? trace_hardirqs_on+0x10/0x10 [ 32.244565] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 32.250542] ? unwind_next_frame+0xe54/0x17d0 [ 32.255022] ? unwind_next_frame+0xe54/0x17d0 [ 32.259505] ? deref_stack_reg+0x124/0x1a0 [ 32.263910] lock_acquire+0x170/0x3f0 [ 32.267706] ? do_journal_begin_r+0x26b/0xde0 [ 32.272188] ? do_journal_begin_r+0x26b/0xde0 [ 32.276667] __mutex_lock+0xc4/0x1310 [ 32.280455] ? do_journal_begin_r+0x26b/0xde0 [ 32.284945] ? do_journal_begin_r+0x26b/0xde0 [ 32.289430] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 32.294870] ? __mutex_unlock_slowpath+0x75/0x770 [ 32.299703] ? wait_for_completion_io+0x10/0x10 [ 32.304356] ? __lock_acquire+0x2190/0x3f20 [ 32.308660] do_journal_begin_r+0x26b/0xde0 [ 32.312966] ? do_journal_end+0x4310/0x4310 [ 32.317271] ? trace_hardirqs_on+0x10/0x10 [ 32.321666] ? reiserfs_write_lock+0x75/0xf0 [ 32.326058] ? __mutex_lock+0x360/0x1310 [ 32.330100] journal_begin+0x162/0x3d0 [ 32.333973] reiserfs_dirty_inode+0xd9/0x200 [ 32.338366] ? reiserfs_unfreeze+0xa0/0xa0 [ 32.342581] ? mark_held_locks+0xa6/0xf0 [ 32.346626] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 32.352061] ? reiserfs_unfreeze+0xa0/0xa0 [ 32.356280] __mark_inode_dirty+0x11e/0xf40 [ 32.360583] reiserfs_ioctl+0x6f6/0x8b0 [ 32.364537] ? reiserfs_unpack+0x510/0x510 [ 32.368757] do_vfs_ioctl+0x75a/0xff0 [ 32.372538] ? getname_flags+0x2a2/0x550 [ 32.376583] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 32.381579] ? ioctl_prealloc