[ 15.232146][ T5644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 15.237258][ T5644] eql: remember to turn off Van-Jacobson compression on your slave devices [ 15.288004][ T40] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 15.293612][ T5555] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.144' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 34.516035][ T5974] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=5974 'syz-executor214' [ 34.557270][ T5974] loop0: detected capacity change from 0 to 8192 [ 34.589445][ T5974] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 34.592717][ T5974] REISERFS (device loop0): found reiserfs format "3.5" with non-standard journal [ 34.594910][ T5974] REISERFS (device loop0): using ordered data mode [ 34.596461][ T5974] reiserfs: using flush barriers [ 34.598383][ T5974] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 34.602603][ T5974] REISERFS (device loop0): checking transaction log (loop0) [ 34.606134][ T5974] REISERFS (device loop0): Using r5 hash to sort names [ 34.609681][ T5974] reiserfs: enabling write barrier flush mode [ 34.615377][ T5974] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 34.618259][ T5974] [ 34.618882][ T5974] ====================================================== [ 34.620414][ T5974] WARNING: possible circular locking dependency detected [ 34.622106][ T5974] 6.4.0-rc2-syzkaller-gf1fcbaa18b28 #0 Not tainted [ 34.623710][ T5974] ------------------------------------------------------ [ 34.625422][ T5974] syz-executor214/5974 is trying to acquire lock: [ 34.626950][ T5974] ffff0000dd7b9090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock+0x7c/0xe8 [ 34.629241][ T5974] [ 34.629241][ T5974] but task is already holding lock: [ 34.630990][ T5974] ffff0000df3b02e0 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: do_unlinkat+0x2d0/0x830 [ 34.633397][ T5974] [ 34.633397][ T5974] which lock already depends on the new lock. [ 34.633397][ T5974] [ 34.635896][ T5974] [ 34.635896][ T5974] the existing dependency chain (in reverse order) is: [ 34.637971][ T5974] [ 34.637971][ T5974] -> #2 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}: [ 34.640068][ T5974] down_write_nested+0x58/0xcc [ 34.641365][ T5974] do_unlinkat+0x2d0/0x830 [ 34.642573][ T5974] __arm64_sys_unlinkat+0xcc/0xfc [ 34.643897][ T5974] invoke_syscall+0x98/0x2c0 [ 34.645157][ T5974] el0_svc_common+0x138/0x258 [ 34.646482][ T5974] do_el0_svc+0x64/0x198 [ 34.647647][ T5974] el0_svc+0x4c/0x15c [ 34.648788][ T5974] el0t_64_sync_handler+0x84/0xf0 [ 34.650174][ T5974] el0t_64_sync+0x190/0x194 [ 34.651393][ T5974] [ 34.651393][ T5974] -> #1 (sb_writers#8){.+.+}-{0:0}: [ 34.653334][ T5974] sb_start_write+0x60/0x2ec [ 34.654641][ T5974] mnt_want_write_file+0x64/0x1e8 [ 34.656030][ T5974] reiserfs_ioctl+0x184/0x454 [ 34.657305][ T5974] __arm64_sys_ioctl+0x14c/0x1c8 [ 34.658743][ T5974] invoke_syscall+0x98/0x2c0 [ 34.660013][ T5974] el0_svc_common+0x138/0x258 [ 34.661257][ T5974] do_el0_svc+0x64/0x198 [ 34.662363][ T5974] el0_svc+0x4c/0x15c [ 34.663445][ T5974] el0t_64_sync_handler+0x84/0xf0 [ 34.664873][ T5974] el0t_64_sync+0x190/0x194 [ 34.666273][ T5974] [ 34.666273][ T5974] -> #0 (&sbi->lock){+.+.}-{3:3}: [ 34.668045][ T5974] __lock_acquire+0x3310/0x75f0 [ 34.669388][ T5974] lock_acquire+0x23c/0x71c [ 34.670613][ T5974] __mutex_lock_common+0x190/0x21a0 [ 34.672212][ T5974] mutex_lock_nested+0x2c/0x38 [ 34.673426][ T5974] reiserfs_write_lock+0x7c/0xe8 [ 34.674810][ T5974] reiserfs_lookup+0x128/0x45c [ 34.676154][ T5974] lookup_one_qstr_excl+0x108/0x230 [ 34.677604][ T5974] do_unlinkat+0x2f0/0x830 [ 34.678777][ T5974] __arm64_sys_unlinkat+0xcc/0xfc [ 34.680212][ T5974] invoke_syscall+0x98/0x2c0 [ 34.681516][ T5974] el0_svc_common+0x138/0x258 [ 34.682902][ T5974] do_el0_svc+0x64/0x198 [ 34.684108][ T5974] el0_svc+0x4c/0x15c [ 34.685171][ T5974] el0t_64_sync_handler+0x84/0xf0 [ 34.686588][ T5974] el0t_64_sync+0x190/0x194 [ 34.687822][ T5974] [ 34.687822][ T5974] other info that might help us debug this: [ 34.687822][ T5974] [ 34.690389][ T5974] Chain exists of: [ 34.690389][ T5974] &sbi->lock --> sb_writers#8 --> &type->i_mutex_dir_key#6/1 [ 34.690389][ T5974] [ 34.693720][ T5974] Possible unsafe locking scenario: [ 34.693720][ T5974] [ 34.695595][ T5974] CPU0 CPU1 [ 34.696980][ T5974] ---- ---- [ 34.698323][ T5974] lock(&type->i_mutex_dir_key#6/1); [ 34.699702][ T5974] lock(sb_writers#8); [ 34.701336][ T5974] lock(&type->i_mutex_dir_key#6/1); [ 34.703270][ T5974] lock(&sbi->lock); [ 34.704278][ T5974] [ 34.704278][ T5974] *** DEADLOCK *** [ 34.704278][ T5974] [ 34.706185][ T5974] 2 locks held by syz-executor214/5974: [ 34.707494][ T5974] #0: ffff0000c6d22460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 34.709786][ T5974] #1: ffff0000df3b02e0 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: do_unlinkat+0x2d0/0x830 [ 34.712351][ T5974] [ 34.712351][ T5974] stack backtrace: [ 34.713797][ T5974] CPU: 1 PID: 5974 Comm: syz-executor214 Not tainted 6.4.0-rc2-syzkaller-gf1fcbaa18b28 #0 [ 34.716156][ T5974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 34.718548][ T5974] Call trace: [ 34.719264][ T5974] dump_backtrace+0x1b8/0x1e4 [ 34.720424][ T5974] show_stack+0x2c/0x44 [ 34.721374][ T5974] dump_stack_lvl+0xd0/0x124 [ 34.722641][ T5974] dump_stack+0x1c/0x28 [ 34.723636][ T5974] print_circular_bug+0x150/0x1b8 [ 34.724870][ T5974] check_noncircular+0x2cc/0x378 [ 34.726125][ T5974] __lock_acquire+0x3310/0x75f0 [ 34.727426][ T5974] lock_acquire+0x23c/0x71c [ 34.728487][ T5974] __mutex_lock_common+0x190/0x21a0 [ 34.729766][ T5974] mutex_lock_nested+0x2c/0x38 [ 34.730927][ T5974] reiserfs_write_lock+0x7c/0xe8 [ 34.732153][ T5974] reiserfs_lookup+0x128/0x45c [ 34.733336][ T5974] lookup_one_qstr_excl+0x108/0x230 [ 34.734715][ T5974] do_unlinkat+0x2f0/0x830 [ 34.735880][ T5974] __arm64_sys_unlinkat+0xcc/0xfc [ 34.737133][ T5974] invoke_syscall+0x98/0x2c0 [ 34.738309][ T5974] el0_svc_common+0x138/0x258 [ 34.739470][ T5974] do_el0_svc+0x64/0x198 [ 34.740422][ T5974] el0_svc+0x4c/0x15c [ 34.741390][ T5974] el0t_64_sync_handler+0x84/0xf0 [ 34.742610][ T5974] el0t_64_sync+0x190/0x194