Warning: Permanently added '10.128.1.84' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 28.597239][ T3072] loop0: detected capacity change from 0 to 4096 [ 28.611078][ T3072] [ 28.611673][ T3072] ====================================================== [ 28.613459][ T3072] WARNING: possible circular locking dependency detected [ 28.615275][ T3072] 6.1.0-rc5-syzkaller-32254-g9e4ce762f0e7 #0 Not tainted [ 28.617017][ T3072] ------------------------------------------------------ [ 28.618846][ T3072] syz-executor410/3072 is trying to acquire lock: [ 28.620501][ T3072] ffff0000cb6210e0 (&sbi->s_lock){+.+.}-{3:3}, at: exfat_get_block+0x6c/0x9ec [ 28.622873][ T3072] [ 28.622873][ T3072] but task is already holding lock: [ 28.624802][ T3072] ffff0000ca589060 (mapping.invalidate_lock#3){.+.+}-{3:3}, at: page_cache_ra_unbounded+0x5c/0x400 [ 28.627562][ T3072] [ 28.627562][ T3072] which lock already depends on the new lock. [ 28.627562][ T3072] [ 28.630274][ T3072] [ 28.630274][ T3072] the existing dependency chain (in reverse order) is: [ 28.632626][ T3072] [ 28.632626][ T3072] -> #2 (mapping.invalidate_lock#3){.+.+}-{3:3}: [ 28.634845][ T3072] down_read+0x5c/0x78 [ 28.636057][ T3072] filemap_fault+0x104/0x7fc [ 28.637379][ T3072] __do_fault+0x60/0x358 [ 28.638616][ T3072] do_fault+0x338/0x550 [ 28.639852][ T3072] handle_mm_fault+0x78c/0xa48 [ 28.641236][ T3072] do_page_fault+0x428/0x79c [ 28.642575][ T3072] do_translation_fault+0x78/0x194 [ 28.644046][ T3072] do_mem_abort+0x54/0x130 [ 28.645317][ T3072] el1_abort+0x3c/0x5c [ 28.646495][ T3072] el1h_64_sync_handler+0x60/0xac [ 28.648000][ T3072] el1h_64_sync+0x64/0x68 [ 28.649353][ T3072] strncpy_from_user+0x1a8/0x3d8 [ 28.650757][ T3072] getname_flags+0x84/0x278 [ 28.652123][ T3072] getname+0x28/0x38 [ 28.653368][ T3072] do_sys_openat2+0x78/0x22c [ 28.654618][ T3072] __arm64_sys_openat+0xb0/0xe0 [ 28.655914][ T3072] el0_svc_common+0x138/0x220 [ 28.657295][ T3072] do_el0_svc+0x48/0x164 [ 28.658578][ T3072] el0_svc+0x58/0x150 [ 28.659706][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.661159][ T3072] el0t_64_sync+0x190/0x194 [ 28.662480][ T3072] [ 28.662480][ T3072] -> #1 (&mm->mmap_lock){++++}-{3:3}: [ 28.664452][ T3072] __might_fault+0x7c/0xb4 [ 28.665721][ T3072] filldir64+0x1e8/0x574 [ 28.667045][ T3072] exfat_iterate+0xd4/0xcb4 [ 28.668389][ T3072] iterate_dir+0x114/0x28c [ 28.669655][ T3072] __arm64_sys_getdents64+0x80/0x204 [ 28.671170][ T3072] el0_svc_common+0x138/0x220 [ 28.672537][ T3072] do_el0_svc+0x48/0x164 [ 28.673789][ T3072] el0_svc+0x58/0x150 [ 28.674940][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.676329][ T3072] el0t_64_sync+0x190/0x194 [ 28.677633][ T3072] [ 28.677633][ T3072] -> #0 (&sbi->s_lock){+.+.}-{3:3}: [ 28.679552][ T3072] __lock_acquire+0x1530/0x3084 [ 28.680942][ T3072] lock_acquire+0x100/0x1f8 [ 28.682275][ T3072] __mutex_lock_common+0xd4/0xca8 [ 28.683700][ T3072] mutex_lock_nested+0x38/0x44 [ 28.685080][ T3072] exfat_get_block+0x6c/0x9ec [ 28.686469][ T3072] do_mpage_readpage+0x474/0xd38 [ 28.687925][ T3072] mpage_readahead+0xf0/0x1b8 [ 28.689252][ T3072] exfat_readahead+0x28/0x38 [ 28.690572][ T3072] read_pages+0x8c/0x4f0 [ 28.691859][ T3072] page_cache_ra_unbounded+0x374/0x400 [ 28.693484][ T3072] page_cache_ra_order+0x348/0x380 [ 28.694968][ T3072] ondemand_readahead+0x340/0x720 [ 28.696396][ T3072] page_cache_sync_ra+0xc4/0xdc [ 28.697763][ T3072] filemap_get_pages+0x118/0x598 [ 28.699208][ T3072] filemap_read+0x14c/0x6f4 [ 28.700472][ T3072] generic_file_read_iter+0x6c/0x25c [ 28.702010][ T3072] vfs_read+0x2d4/0x448 [ 28.703210][ T3072] ksys_read+0xb4/0x160 [ 28.704409][ T3072] __arm64_sys_read+0x24/0x34 [ 28.705770][ T3072] el0_svc_common+0x138/0x220 [ 28.707124][ T3072] do_el0_svc+0x48/0x164 [ 28.708333][ T3072] el0_svc+0x58/0x150 [ 28.709512][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.710953][ T3072] el0t_64_sync+0x190/0x194 [ 28.712241][ T3072] [ 28.712241][ T3072] other info that might help us debug this: [ 28.712241][ T3072] [ 28.714948][ T3072] Chain exists of: [ 28.714948][ T3072] &sbi->s_lock --> &mm->mmap_lock --> mapping.invalidate_lock#3 [ 28.714948][ T3072] [ 28.718478][ T3072] Possible unsafe locking scenario: [ 28.718478][ T3072] [ 28.720390][ T3072] CPU0 CPU1 [ 28.721775][ T3072] ---- ---- [ 28.723191][ T3072] lock(mapping.invalidate_lock#3); [ 28.724581][ T3072] lock(&mm->mmap_lock); [ 28.726386][ T3072] lock(mapping.invalidate_lock#3); [ 28.728443][ T3072] lock(&sbi->s_lock); [ 28.729509][ T3072] [ 28.729509][ T3072] *** DEADLOCK *** [ 28.729509][ T3072] [ 28.731614][ T3072] 1 lock held by syz-executor410/3072: [ 28.733037][ T3072] #0: ffff0000ca589060 (mapping.invalidate_lock#3){.+.+}-{3:3}, at: page_cache_ra_unbounded+0x5c/0x400 [ 28.736033][ T3072] [ 28.736033][ T3072] stack backtrace: [ 28.737594][ T3072] CPU: 0 PID: 3072 Comm: syz-executor410 Not tainted 6.1.0-rc5-syzkaller-32254-g9e4ce762f0e7 #0 [ 28.740304][ T3072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 28.742975][ T3072] Call trace: [ 28.743865][ T3072] dump_backtrace+0x1c4/0x1f0 [ 28.745207][ T3072] show_stack+0x2c/0x54 [ 28.746273][ T3072] dump_stack_lvl+0x104/0x16c [ 28.747479][ T3072] dump_stack+0x1c/0x58 [ 28.748592][ T3072] print_circular_bug+0x2c4/0x2c8 [ 28.749906][ T3072] check_noncircular+0x14c/0x154 [ 28.751191][ T3072] __lock_acquire+0x1530/0x3084 [ 28.752498][ T3072] lock_acquire+0x100/0x1f8 [ 28.753713][ T3072] __mutex_lock_common+0xd4/0xca8 [ 28.755144][ T3072] mutex_lock_nested+0x38/0x44 [ 28.756341][ T3072] exfat_get_block+0x6c/0x9ec [ 28.757527][ T3072] do_mpage_readpage+0x474/0xd38 [ 28.758823][ T3072] mpage_readahead+0xf0/0x1b8 [ 28.760199][ T3072] exfat_readahead+0x28/0x38 [ 28.761409][ T3072] read_pages+0x8c/0x4f0 [ 28.762512][ T3072] page_cache_ra_unbounded+0x374/0x400 [ 28.763968][ T3072] page_cache_ra_order+0x348/0x380 [ 28.765382][ T3072] ondemand_readahead+0x340/0x720 [ 28.766636][ T3072] page_cache_sync_ra+0xc4/0xdc [ 28.767814][ T3072] filemap_get_pages+0x118/0x598 [ 28.769102][ T3072] filemap_read+0x14c/0x6f4 [ 28.770291][ T3072] generic_file_read_iter+0x6c/0x25c [ 28.771683][ T3072] vfs_read+0x2d4/0x448 [ 28.772871][ T3072] ksys_read+0xb4/0x160 [ 28.773936][ T3072] __arm64_sys_read+0x24/0x34 [ 28.775294][ T3072] el0_svc_common+0x138/0x220 [ 28.776516][ T3072] do_el0_svc+0x48/0x164 [ 28.777601][ T3072] el0_svc+0x58/0x150 [ 28.778662][ T3072] el0t_64_sync_handler+0x84/0xf0 [ 28.780006][ T3072] el0t_64_sync+0x190/0x194