Warning: Permanently added '10.128.1.149' (ED25519) to the list of known hosts.
executing program
[   61.273033][ T3511] loop0: detected capacity change from 0 to 8192
[   61.283986][ T3511] REISERFS warning:  read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025
[   61.297264][ T3511] REISERFS (device loop0): found reiserfs format "3.5" with non-standard journal
[   61.306838][ T3511] REISERFS (device loop0): using ordered data mode
[   61.313441][ T3511] reiserfs: using flush barriers
[   61.320088][ T3511] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30
[   61.336828][ T3511] REISERFS (device loop0): checking transaction log (loop0)
[   61.388306][ T3511] REISERFS (device loop0): Using r5 hash to sort names
[   61.395474][ T3511] REISERFS (device loop0): using 3.5.x disk format
[   61.403070][ T3511] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage.
[   61.416286][   T27] audit: type=1800 audit(1692806024.938:2): pid=3511 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="loop0" ino=2 res=0 errno=0
[   61.459962][   T27] audit: type=1800 audit(1692806024.938:3): pid=3511 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="loop0" ino=2 res=0 errno=0
[   61.481226][   T27] audit: type=1800 audit(1692806024.938:4): pid=3511 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="loop0" ino=2 res=0 errno=0
[   61.550634][ T3511] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "���������<<�G4��mR����u����0��w/�^��������"
[   61.939104][ T3511] 
[   61.941454][ T3511] ======================================================
[   61.948670][ T3511] WARNING: possible circular locking dependency detected
[   61.955679][ T3511] 6.1.46-syzkaller #0 Not tainted
[   61.960713][ T3511] ------------------------------------------------------
[   61.967766][ T3511] syz-executor305/3511 is trying to acquire lock:
[   61.974182][ T3511] ffff88807e8e53d8 (&mm->mmap_lock){++++}-{3:3}, at: __might_fault+0x8f/0x110
[   61.983170][ T3511] 
[   61.983170][ T3511] but task is already holding lock:
[   61.990537][ T3511] ffff888017ee5090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock+0x76/0xd0
[   61.999637][ T3511] 
[   61.999637][ T3511] which lock already depends on the new lock.
[   61.999637][ T3511] 
[   62.010164][ T3511] 
[   62.010164][ T3511] the existing dependency chain (in reverse order) is:
[   62.019181][ T3511] 
[   62.019181][ T3511] -> #2 (&sbi->lock){+.+.}-{3:3}:
[   62.026394][ T3511]        lock_acquire+0x1f8/0x5a0
[   62.031503][ T3511]        __mutex_lock_common+0x1d4/0x2520
[   62.037230][ T3511]        mutex_lock_nested+0x17/0x20
[   62.042511][ T3511]        reiserfs_write_lock+0x76/0xd0
[   62.047978][ T3511]        reiserfs_dirty_inode+0xee/0x240
[   62.053617][ T3511]        __mark_inode_dirty+0x331/0xf80
[   62.059176][ T3511]        __file_update_time+0x221/0x240
[   62.064729][ T3511]        file_update_time+0x34c/0x3c0
[   62.070114][ T3511]        filemap_page_mkwrite+0x275/0x630
[   62.075968][ T3511]        do_page_mkwrite+0x1a1/0x5f0
[   62.081349][ T3511]        wp_page_shared+0x164/0x380
[   62.086558][ T3511]        handle_mm_fault+0x2522/0x5330
[   62.092066][ T3511]        exc_page_fault+0x26f/0x660
[   62.097292][ T3511]        asm_exc_page_fault+0x22/0x30
[   62.102686][ T3511] 
[   62.102686][ T3511] -> #1 (sb_pagefaults){.+.+}-{0:0}:
[   62.110175][ T3511]        lock_acquire+0x1f8/0x5a0
[   62.115203][ T3511]        filemap_page_mkwrite+0x16a/0x630
[   62.120930][ T3511]        do_page_mkwrite+0x1a1/0x5f0
[   62.126232][ T3511]        handle_mm_fault+0x22e8/0x5330
[   62.131707][ T3511]        exc_page_fault+0x26f/0x660
[   62.136920][ T3511]        asm_exc_page_fault+0x22/0x30
[   62.142312][ T3511] 
[   62.142312][ T3511] -> #0 (&mm->mmap_lock){++++}-{3:3}:
[   62.149877][ T3511]        validate_chain+0x1667/0x58e0
[   62.155270][ T3511]        __lock_acquire+0x125b/0x1f80
[   62.160668][ T3511]        lock_acquire+0x1f8/0x5a0
[   62.165705][ T3511]        __might_fault+0xb2/0x110
[   62.170741][ T3511]        reiserfs_ioctl+0x11d/0x340
[   62.176392][ T3511]        __se_sys_ioctl+0xf1/0x160
[   62.181505][ T3511]        do_syscall_64+0x3d/0xb0
[   62.186455][ T3511]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   62.192876][ T3511] 
[   62.192876][ T3511] other info that might help us debug this:
[   62.192876][ T3511] 
[   62.203100][ T3511] Chain exists of:
[   62.203100][ T3511]   &mm->mmap_lock --> sb_pagefaults --> &sbi->lock
[   62.203100][ T3511] 
[   62.215544][ T3511]  Possible unsafe locking scenario:
[   62.215544][ T3511] 
[   62.222986][ T3511]        CPU0                    CPU1
[   62.228344][ T3511]        ----                    ----
[   62.233706][ T3511]   lock(&sbi->lock);
[   62.237702][ T3511]                                lock(sb_pagefaults);
[   62.244474][ T3511]                                lock(&sbi->lock);
[   62.250998][ T3511]   lock(&mm->mmap_lock);
[   62.255341][ T3511] 
[   62.255341][ T3511]  *** DEADLOCK ***
[   62.255341][ T3511] 
[   62.263481][ T3511] 1 lock held by syz-executor305/3511:
[   62.268937][ T3511]  #0: ffff888017ee5090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock+0x76/0xd0
[   62.278361][ T3511] 
[   62.278361][ T3511] stack backtrace:
[   62.284345][ T3511] CPU: 0 PID: 3511 Comm: syz-executor305 Not tainted 6.1.46-syzkaller #0
[   62.292778][ T3511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[   62.302868][ T3511] Call Trace:
[   62.306155][ T3511]  <TASK>
[   62.309090][ T3511]  dump_stack_lvl+0x1e3/0x2cb
[   62.313788][ T3511]  ? nf_tcp_handle_invalid+0x642/0x642
[   62.319270][ T3511]  ? print_circular_bug+0x12b/0x1a0
[   62.324493][ T3511]  check_noncircular+0x2fa/0x3b0
[   62.329442][ T3511]  ? add_chain_block+0x850/0x850
[   62.334385][ T3511]  ? lockdep_lock+0x11f/0x2a0
[   62.339172][ T3511]  ? tomoyo_path_number_perm+0x5f4/0x7b0
[   62.344817][ T3511]  ? reacquire_held_locks+0x660/0x660
[   62.350193][ T3511]  ? kasan_set_track+0x60/0x70
[   62.354975][ T3511]  ? kasan_save_free_info+0x27/0x40
[   62.360178][ T3511]  ? ____kasan_slab_free+0xd6/0x120
[   62.365376][ T3511]  ? _find_first_zero_bit+0xd0/0x100
[   62.370671][ T3511]  validate_chain+0x1667/0x58e0
[   62.375544][ T3511]  ? reacquire_held_locks+0x660/0x660
[   62.380919][ T3511]  ? __lock_acquire+0x125b/0x1f80
[   62.385955][ T3511]  ? mark_lock+0x9a/0x340
[   62.390290][ T3511]  __lock_acquire+0x125b/0x1f80
[   62.395152][ T3511]  lock_acquire+0x1f8/0x5a0
[   62.399657][ T3511]  ? __might_fault+0x8f/0x110
[   62.404342][ T3511]  ? read_lock_is_recursive+0x10/0x10
[   62.409740][ T3511]  ? __might_sleep+0xb0/0xb0
[   62.414339][ T3511]  ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[   62.420323][ T3511]  __might_fault+0xb2/0x110
[   62.424830][ T3511]  ? __might_fault+0x8f/0x110
[   62.429513][ T3511]  reiserfs_ioctl+0x11d/0x340
[   62.434196][ T3511]  ? __se_sys_ioctl+0xe6/0x160
[   62.439048][ T3511]  ? reiserfs_unpack+0x610/0x610
[   62.444095][ T3511]  __se_sys_ioctl+0xf1/0x160
[   62.448691][ T3511]  do_syscall_64+0x3d/0xb0
[   62.453128][ T3511]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   62.459033][ T3511] RIP: 0033:0x7ff6b3b91689
[   62.463451][ T3511] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   62.483059][ T3511] RSP: 002b:00007ffeaaa746d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
executing program
[   62.491494][ T3511] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6b3b91689
[   62.499645][ T3511] RDX: 0000000020000000 RSI: 0000000080087601 RDI: 0000000000000006
[   62.507712][ T3511] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[   62.515682][ T3511] R10: 00e68eb686f904ed R11: 0000000000000246 R12: 00007ffeaaa747e0
[   62.523664][ T3511] R13: 00007ffeaaa748c0 R14: 431bde82d7b634db R15: 00007ff6b3bd301d
[   62.531649][ T3511]  </TASK>
[   62.601551][   T27] audit: type=1800 audit(1692806026.118:5): pid=3514 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   62.622400][   T27] audit: type=1800 audit(1692806026.118:6): pid=3514 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   62.643480][   T27] audit: type=1800 audit(1692806026.118:7): pid=3514 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
executing program
[   62.996947][   T27] audit: type=1800 audit(1692806026.518:8): pid=3515 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   63.017943][   T27] audit: type=1800 audit(1692806026.518:9): pid=3515 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   63.090709][   T27] audit: type=1800 audit(1692806026.608:10): pid=3515 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
executing program
[   63.482669][   T27] audit: type=1800 audit(1692806026.998:11): pid=3516 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   66.653364][   T27] kauditd_printk_skb: 20 callbacks suppressed
[   66.653377][   T27] audit: type=1800 audit(1692806030.168:32): pid=3523 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   66.681057][   T27] audit: type=1800 audit(1692806030.168:33): pid=3523 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   66.754461][   T27] audit: type=1800 audit(1692806030.268:34): pid=3523 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
executing program
[   67.136852][   T27] audit: type=1800 audit(1692806030.658:35): pid=3524 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   67.157673][   T27] audit: type=1800 audit(1692806030.658:36): pid=3524 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   67.236817][   T27] audit: type=1800 audit(1692806030.758:37): pid=3524 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
executing program
[   67.629146][   T27] audit: type=1800 audit(1692806031.148:38): pid=3525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   67.650089][   T27] audit: type=1800 audit(1692806031.148:39): pid=3525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   67.724281][   T27] audit: type=1800 audit(1692806031.238:40): pid=3525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
executing program
[   68.107923][   T27] audit: type=1800 audit(1692806031.628:41): pid=3526 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   71.747131][   T27] kauditd_printk_skb: 23 callbacks suppressed
[   71.747143][   T27] audit: type=1800 audit(1692806035.268:65): pid=3534 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   71.774888][   T27] audit: type=1800 audit(1692806035.268:66): pid=3534 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0
[   71.852643][   T27] audit: type=1800 audit(1692806035.368:67): pid=3534 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor305" name="bus" dev="sda1" ino=1927 res=0 errno=0