Warning: Permanently added '10.128.1.29' (ED25519) to the list of known hosts. executing program [ 35.173037][ T6008] syz-executor191[6008]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 35.214771][ T6008] loop0: detected capacity change from 0 to 8192 [ 35.219551][ T6008] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 35.222424][ T6008] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 35.224609][ T6008] REISERFS (device loop0): using ordered data mode [ 35.226019][ T6008] reiserfs: using flush barriers [ 35.228070][ T6008] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 35.232097][ T6008] REISERFS (device loop0): checking transaction log (loop0) [ 35.266569][ T6008] REISERFS (device loop0): Using r5 hash to sort names [ 35.268906][ T6008] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 35.274427][ T6008] [ 35.274977][ T6008] ====================================================== [ 35.276519][ T6008] WARNING: possible circular locking dependency detected [ 35.278141][ T6008] 6.6.0-rc5-syzkaller-g249eb8f39efb #0 Not tainted [ 35.279673][ T6008] ------------------------------------------------------ [ 35.281420][ T6008] syz-executor191/6008 is trying to acquire lock: [ 35.283070][ T6008] ffff0000dc548980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x11c/0x578 [ 35.285461][ T6008] [ 35.285461][ T6008] but task is already holding lock: [ 35.287223][ T6008] ffff0000db390090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x68/0xd8 [ 35.289529][ T6008] [ 35.289529][ T6008] which lock already depends on the new lock. [ 35.289529][ T6008] [ 35.291864][ T6008] [ 35.291864][ T6008] the existing dependency chain (in reverse order) is: [ 35.293981][ T6008] [ 35.293981][ T6008] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 35.295533][ T6008] __mutex_lock_common+0x190/0x21a0 [ 35.296887][ T6008] mutex_lock_nested+0x2c/0x38 [ 35.298159][ T6008] reiserfs_write_lock+0x7c/0xe8 [ 35.299498][ T6008] reiserfs_mkdir+0x280/0x77c [ 35.300830][ T6008] open_xa_dir+0x288/0x578 [ 35.301979][ T6008] xattr_lookup+0x3c/0x268 [ 35.303174][ T6008] reiserfs_xattr_set_handle+0xe0/0xe94 [ 35.304632][ T6008] reiserfs_security_write+0x13c/0x1d0 [ 35.306049][ T6008] reiserfs_new_inode+0x10f0/0x16f8 [ 35.307428][ T6008] reiserfs_create+0x33c/0x5a4 [ 35.308682][ T6008] path_openat+0xf80/0x27f8 [ 35.309879][ T6008] do_filp_open+0x1bc/0x3cc [ 35.310985][ T6008] do_sys_openat2+0x124/0x1b8 [ 35.312271][ T6008] __arm64_sys_openat+0x1f0/0x240 [ 35.313527][ T6008] invoke_syscall+0x98/0x2b8 [ 35.314832][ T6008] el0_svc_common+0x130/0x23c [ 35.316165][ T6008] do_el0_svc+0x48/0x58 [ 35.317250][ T6008] el0_svc+0x58/0x16c [ 35.318402][ T6008] el0t_64_sync_handler+0x84/0xfc [ 35.319731][ T6008] el0t_64_sync+0x190/0x194 [ 35.320939][ T6008] [ 35.320939][ T6008] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}: [ 35.323024][ T6008] __lock_acquire+0x3370/0x75e8 [ 35.324269][ T6008] lock_acquire+0x23c/0x71c [ 35.325488][ T6008] down_write_nested+0x58/0xcc [ 35.326765][ T6008] open_xa_dir+0x11c/0x578 [ 35.327973][ T6008] xattr_lookup+0x3c/0x268 [ 35.329193][ T6008] reiserfs_xattr_get+0xf0/0x96c [ 35.330472][ T6008] security_get+0x94/0xd0 [ 35.331578][ T6008] __vfs_getxattr+0x394/0x3c0 [ 35.332711][ T6008] smk_fetch+0xc8/0x150 [ 35.333865][ T6008] smack_d_instantiate+0x594/0x880 [ 35.335242][ T6008] security_d_instantiate+0x98/0xf0 [ 35.336617][ T6008] d_instantiate_new+0x64/0x120 [ 35.337942][ T6008] reiserfs_create+0x520/0x5a4 [ 35.339277][ T6008] path_openat+0xf80/0x27f8 [ 35.340485][ T6008] do_filp_open+0x1bc/0x3cc [ 35.341684][ T6008] do_sys_openat2+0x124/0x1b8 [ 35.342945][ T6008] __arm64_sys_openat+0x1f0/0x240 [ 35.344260][ T6008] invoke_syscall+0x98/0x2b8 [ 35.345564][ T6008] el0_svc_common+0x130/0x23c [ 35.346801][ T6008] do_el0_svc+0x48/0x58 [ 35.347917][ T6008] el0_svc+0x58/0x16c [ 35.349080][ T6008] el0t_64_sync_handler+0x84/0xfc [ 35.350423][ T6008] el0t_64_sync+0x190/0x194 [ 35.351646][ T6008] [ 35.351646][ T6008] other info that might help us debug this: [ 35.351646][ T6008] [ 35.354102][ T6008] Possible unsafe locking scenario: [ 35.354102][ T6008] [ 35.355961][ T6008] CPU0 CPU1 [ 35.357263][ T6008] ---- ---- [ 35.358539][ T6008] lock(&sbi->lock); [ 35.359476][ T6008] lock(&type->i_mutex_dir_key#6/3); [ 35.361319][ T6008] lock(&sbi->lock); [ 35.362833][ T6008] lock(&type->i_mutex_dir_key#6/3); [ 35.364170][ T6008] [ 35.364170][ T6008] *** DEADLOCK *** [ 35.364170][ T6008] [ 35.366144][ T6008] 3 locks held by syz-executor191/6008: [ 35.367533][ T6008] #0: ffff0000d4b40410 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 35.369842][ T6008] #1: ffff0000dc5482e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x5f0/0x27f8 [ 35.372297][ T6008] #2: ffff0000db390090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x68/0xd8 [ 35.374622][ T6008] [ 35.374622][ T6008] stack backtrace: [ 35.376069][ T6008] CPU: 1 PID: 6008 Comm: syz-executor191 Not tainted 6.6.0-rc5-syzkaller-g249eb8f39efb #0 [ 35.378413][ T6008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 35.380976][ T6008] Call trace: [ 35.381806][ T6008] dump_backtrace+0x1b8/0x1e4 [ 35.382847][ T6008] show_stack+0x2c/0x44 [ 35.383848][ T6008] dump_stack_lvl+0xd0/0x124 [ 35.385071][ T6008] dump_stack+0x1c/0x28 [ 35.386055][ T6008] print_circular_bug+0x150/0x1b8 [ 35.387257][ T6008] check_noncircular+0x310/0x404 [ 35.388528][ T6008] __lock_acquire+0x3370/0x75e8 [ 35.389635][ T6008] lock_acquire+0x23c/0x71c [ 35.390649][ T6008] down_write_nested+0x58/0xcc [ 35.391804][ T6008] open_xa_dir+0x11c/0x578 [ 35.392952][ T6008] xattr_lookup+0x3c/0x268 [ 35.394008][ T6008] reiserfs_xattr_get+0xf0/0x96c [ 35.395141][ T6008] security_get+0x94/0xd0 [ 35.396220][ T6008] __vfs_getxattr+0x394/0x3c0 [ 35.397296][ T6008] smk_fetch+0xc8/0x150 [ 35.398277][ T6008] smack_d_instantiate+0x594/0x880 [ 35.399384][ T6008] security_d_instantiate+0x98/0xf0 [ 35.400617][ T6008] d_instantiate_new+0x64/0x120 [ 35.401782][ T6008] reiserfs_create+0x520/0x5a4 [ 35.402911][ T6008] path_openat+0xf80/0x27f8 [ 35.403972][ T6008] do_filp_open+0x1bc/0x3cc [ 35.405025][ T6008] do_sys_openat2+0x124/0x1b8 [ 35.406147][ T6008] __arm64_sys_openat+0x1f0/0x240 [ 35.407432][ T6008] invoke_syscall+0x98/0x2b8 [ 35.408521][ T6008] el0_svc_common+0x130/0x23c [ 35.409641][ T6008] do_el0_svc+0x48/0x58 [ 35.410656][ T6008] el0_svc+0x58/0x16c [ 35.411646][ T6008] el0t_64_sync_handler+0x84/0xfc [ 35.412840][ T6008] el0t_64_sync+0x190/0x194