Warning: Permanently added '10.128.0.162' (ED25519) to the list of known hosts. executing program syzkaller login: [ 39.111161][ T4290] loop0: detected capacity change from 0 to 8192 [ 39.116427][ T4290] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 39.119872][ T4290] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 39.123261][ T4290] REISERFS (device loop0): using ordered data mode [ 39.124923][ T4290] reiserfs: using flush barriers [ 39.126933][ T4290] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 67108894, max trans age 30 [ 39.131910][ T4290] REISERFS (device loop0): checking transaction log (loop0) [ 39.168150][ T4290] REISERFS (device loop0): Using tea hash to sort names [ 39.170573][ T4290] REISERFS warning (device loop0): vs-13060 reiserfs_update_sd_size: stat data of object [1 2 0x0 SD] (nlink == 4) not found (pos 2) [ 39.174939][ T4290] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 39.202682][ T4290] [ 39.203326][ T4290] ====================================================== [ 39.205109][ T4290] WARNING: possible circular locking dependency detected [ 39.207039][ T4290] 6.1.129-syzkaller #0 Not tainted [ 39.208479][ T4290] ------------------------------------------------------ [ 39.210385][ T4290] syz-executor288/4290 is trying to acquire lock: [ 39.212192][ T4290] ffff0000e16f0980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x11c/0x5d0 [ 39.214796][ T4290] [ 39.214796][ T4290] but task is already holding lock: [ 39.216735][ T4290] ffff0000d2a2a090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x68/0xd8 [ 39.219519][ T4290] [ 39.219519][ T4290] which lock already depends on the new lock. [ 39.219519][ T4290] [ 39.222285][ T4290] [ 39.222285][ T4290] the existing dependency chain (in reverse order) is: [ 39.224651][ T4290] [ 39.224651][ T4290] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 39.226545][ T4290] __mutex_lock_common+0x190/0x21a0 [ 39.228098][ T4290] mutex_lock_nested+0x38/0x44 [ 39.229590][ T4290] reiserfs_write_lock+0x7c/0xe8 [ 39.231010][ T4290] reiserfs_mkdir+0x280/0x77c [ 39.232404][ T4290] open_xa_dir+0x288/0x5d0 [ 39.233751][ T4290] xattr_lookup+0x3c/0x268 [ 39.235086][ T4290] reiserfs_xattr_set_handle+0xe4/0xe90 [ 39.236704][ T4290] reiserfs_xattr_set+0x398/0x4b0 [ 39.238205][ T4290] trusted_set+0x98/0xec [ 39.239746][ T4290] __vfs_setxattr+0x388/0x3a4 [ 39.241240][ T4290] __vfs_setxattr_noperm+0x110/0x528 [ 39.242873][ T4290] __vfs_setxattr_locked+0x1ec/0x218 [ 39.244509][ T4290] vfs_setxattr+0x1a8/0x344 [ 39.245813][ T4290] setxattr+0x230/0x294 [ 39.247017][ T4290] __arm64_sys_fsetxattr+0x1a8/0x224 [ 39.248609][ T4290] invoke_syscall+0x98/0x2bc [ 39.250029][ T4290] el0_svc_common+0x138/0x258 [ 39.251473][ T4290] do_el0_svc+0x58/0x13c [ 39.252810][ T4290] el0_svc+0x58/0x168 [ 39.254119][ T4290] el0t_64_sync_handler+0x84/0xf0 [ 39.255702][ T4290] el0t_64_sync+0x18c/0x190 [ 39.257145][ T4290] [ 39.257145][ T4290] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}: [ 39.259394][ T4290] __lock_acquire+0x3338/0x7680 [ 39.260827][ T4290] lock_acquire+0x26c/0x7cc [ 39.262192][ T4290] down_write_nested+0x64/0x94 [ 39.263585][ T4290] open_xa_dir+0x11c/0x5d0 [ 39.264888][ T4290] reiserfs_for_each_xattr+0x16c/0x8d8 [ 39.266546][ T4290] reiserfs_delete_xattrs+0x2c/0xa4 [ 39.268104][ T4290] reiserfs_evict_inode+0x1dc/0x3f0 [ 39.269690][ T4290] evict+0x418/0x894 [ 39.270863][ T4290] iput+0x7c0/0x8a4 [ 39.271883][ T4290] reiserfs_create+0x2d0/0x5a4 [ 39.273379][ T4290] path_openat+0xeac/0x2548 [ 39.274742][ T4290] do_filp_open+0x1bc/0x3cc [ 39.276133][ T4290] do_sys_openat2+0x128/0x3e0 [ 39.277530][ T4290] __arm64_sys_openat+0x1f0/0x240 [ 39.279023][ T4290] invoke_syscall+0x98/0x2bc [ 39.280476][ T4290] el0_svc_common+0x138/0x258 [ 39.281801][ T4290] do_el0_svc+0x58/0x13c [ 39.283071][ T4290] el0_svc+0x58/0x168 [ 39.284239][ T4290] el0t_64_sync_handler+0x84/0xf0 [ 39.285672][ T4290] el0t_64_sync+0x18c/0x190 [ 39.286973][ T4290] [ 39.286973][ T4290] other info that might help us debug this: [ 39.286973][ T4290] [ 39.289812][ T4290] Possible unsafe locking scenario: [ 39.289812][ T4290] [ 39.291852][ T4290] CPU0 CPU1 [ 39.293247][ T4290] ---- ---- [ 39.294744][ T4290] lock(&sbi->lock); [ 39.295819][ T4290] lock(&type->i_mutex_dir_key#6/3); [ 39.297924][ T4290] lock(&sbi->lock); [ 39.299716][ T4290] lock(&type->i_mutex_dir_key#6/3); [ 39.301146][ T4290] [ 39.301146][ T4290] *** DEADLOCK *** [ 39.301146][ T4290] [ 39.303332][ T4290] 3 locks held by syz-executor288/4290: [ 39.304840][ T4290] #0: ffff0000d97f2460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 39.307315][ T4290] #1: ffff0000e16f02e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5ec/0x2548 [ 39.310058][ T4290] #2: ffff0000d2a2a090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x68/0xd8 [ 39.312842][ T4290] [ 39.312842][ T4290] stack backtrace: [ 39.314439][ T4290] CPU: 0 PID: 4290 Comm: syz-executor288 Not tainted 6.1.129-syzkaller #0 [ 39.316652][ T4290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 39.319453][ T4290] Call trace: [ 39.320328][ T4290] dump_backtrace+0x1c8/0x1f4 [ 39.321650][ T4290] show_stack+0x2c/0x3c [ 39.322834][ T4290] dump_stack_lvl+0x108/0x170 [ 39.324169][ T4290] dump_stack+0x1c/0x58 [ 39.325244][ T4290] print_circular_bug+0x150/0x1b8 [ 39.326560][ T4290] check_noncircular+0x2cc/0x378 [ 39.327933][ T4290] __lock_acquire+0x3338/0x7680 [ 39.329263][ T4290] lock_acquire+0x26c/0x7cc [ 39.330516][ T4290] down_write_nested+0x64/0x94 [ 39.331785][ T4290] open_xa_dir+0x11c/0x5d0 [ 39.332958][ T4290] reiserfs_for_each_xattr+0x16c/0x8d8 [ 39.334433][ T4290] reiserfs_delete_xattrs+0x2c/0xa4 [ 39.335834][ T4290] reiserfs_evict_inode+0x1dc/0x3f0 [ 39.337273][ T4290] evict+0x418/0x894 [ 39.338257][ T4290] iput+0x7c0/0x8a4 [ 39.339307][ T4290] reiserfs_create+0x2d0/0x5a4 [ 39.340608][ T4290] path_openat+0xeac/0x2548 [ 39.341783][ T4290] do_filp_open+0x1bc/0x3cc [ 39.342949][ T4290] do_sys_openat2+0x128/0x3e0 [ 39.344128][ T4290] __arm64_sys_openat+0x1f0/0x240 [ 39.345457][ T4290] invoke_syscall+0x98/0x2bc [ 39.346611][ T4290] el0_svc_common+0x138/0x258 [ 39.347966][ T4290] do_el0_svc+0x58/0x13c [ 39.349084][ T4290] el0_svc+0x58/0x168 [ 39.350153][ T4290] el0t_64_sync_handler+0x84/0xf0 [ 39.351452][ T4290] el0t_64_sync+0x18c/0x190 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program