Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp1460968rwr; Fri, 5 May 2023 14:42:51 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4jfgs/XzlANZStrTph516hwWHktdukQsXMmjYRvN85uwbaHcpPQo5NCKRZMAlSOUPDcdNR X-Received: by 2002:a17:903:32c5:b0:1aa:e5cd:647a with SMTP id i5-20020a17090332c500b001aae5cd647amr3783529plr.23.1683322971336; Fri, 05 May 2023 14:42:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683322971; cv=none; d=google.com; s=arc-20160816; b=wUIoAxDGlF9ywLr3xz20gtBPAZkd2OBQNypgJgQeDa7rNOsmprxDFo3Ew7X8Msljs8 +pQ4Rlc4G4oyeoEx/SG2dLJB1CISY3kqToJjK1egJeizc0il94U9i+vHrT+fxI/tm3TT 51i3XHvhILeXycZ/1kvAlxxg7cgFm9WNdiaO+n13CpKkDH7Q/c5W/DsTKRX94zoPqKXz T+TwB2P+LpSxo5bvmlZBQ8fQi8y8WsIZtThggnsDjViwZU5WHBWYwGANXjFDjnB67Cge QjCcjpbCANQWR/GJn7dSDk8qg6FPveK7F9q7na3QEbz1CZBdS5tWBtIxQ8h4bFnSnNuM Z+Hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=V0JfIlTqaeXlyEjv8OL6VI/Norerpq4Zpq5DUaY96vQ=; b=e3wlwCImdNhQOXG/UsTtlyYjAmUJrIalyHOjzC4dINfGWbYIzjHwLP8tyRg5YnhIic Si2NyMlhnIIoIxNwJa+Fo2NYLD2t4dHu/PxM3gBI4glA+A7/c1tEGn7b4hPosfnZMRP4 Uve7/laN5+91bGtvtFosibIDwhZotx4j9to0TlMQ93yxS6Qhe3sska72QDfCD1wKEXUj o6qHdOJ8gAQHyb16tihUiXn1GbHEtI9TTtifWWqXrq2vIuO+banmDdF0bZ5FOWp5rdCA /pP4YNP5ugwhLV4mRXCCGGuMarjL7RtvzP4v1P9Eu5SM9doI+sWjjBjiZVU4wtW4wEFl JZKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore.com header.s=google header.b="HFIJtI/k"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=paul-moore.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v22-20020a17090331d600b001ab0993941bsi2323745ple.311.2023.05.05.14.42.37; Fri, 05 May 2023 14:42:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore.com header.s=google header.b="HFIJtI/k"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=paul-moore.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233564AbjEEVgi (ORCPT + 99 others); Fri, 5 May 2023 17:36:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36798 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233558AbjEEVgh (ORCPT ); Fri, 5 May 2023 17:36:37 -0400 Received: from mail-yb1-xb2f.google.com (mail-yb1-xb2f.google.com [IPv6:2607:f8b0:4864:20::b2f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 25B2AE46 for ; Fri, 5 May 2023 14:36:36 -0700 (PDT) Received: by mail-yb1-xb2f.google.com with SMTP id 3f1490d57ef6-b99efd7c335so3056095276.0 for ; Fri, 05 May 2023 14:36:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore.com; s=google; t=1683322595; x=1685914595; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=V0JfIlTqaeXlyEjv8OL6VI/Norerpq4Zpq5DUaY96vQ=; b=HFIJtI/kpmdLq8nRaDpAzU/Clt1/UJxLL8jrzJIQ3nN3zf4fqNv+ZtaSmm9nZ9WSxL Fsdmz6Yg244MrJudDafdQdsz6UxENZYEXFzrOoHjOR1sy7cP5A+nj6c8BeRafdgdzmKW EXxDU+bc0GuwPIFHgZLrSGRMNZGd68ZC038in7IflWIaQ4+gF9uANMqT/6PCnj4G7msL Kp2821yv0nosKv0gQkf2+0iNHig/foynW4QCkBRYd1xWQZdSnHzLEuAnSGn0FWzJ2/pw JhUAS6Nd8jaQw0XJpJHlYYBttFdbB9ggrTzlZlYeFD/4Fdu7rWzcXyK1NwEpIMGB8CWy CKWQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683322595; x=1685914595; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=V0JfIlTqaeXlyEjv8OL6VI/Norerpq4Zpq5DUaY96vQ=; b=dukOYuILkqbEbIQaePYxPaur1GF48f1NPrnp1G55gN/JuCV9wJphikG3XsXqBoXg7m GoxY7M+0KmAvsU6sXMy1bI38ozCNU1zQ6d00yzuKbNcJPYtm/HTPTZbyK78hJxz0WwiI stB5JNg62dO4mS7T/Gc2nTSyOLEPHnyt2VQfTWrsvHkF2EhTGK+6ofc/HSFn3Y0umlS5 FbXwPWDuYtzdUxdmCcZucKc5fJM1PLOXP5tqw/oQRQatPWoO0MEXZ1ktuZPmb/Oaw8Yb fCpP45LL63ZQGHYhOU8qTRoFbQ3QtXZXgawYxNJc8ZIcl7uzyQF5qM52yRF5BTiPaOL8 z6dQ== X-Gm-Message-State: AC+VfDwaS59avw4wxP1hnm9h/HexUObVPqcHkOqUYfuGXrCwx1JEgUtL agKLuVsAOuYEdT2rAfRLmy6DaeiV3oxjnEB0Guea X-Received: by 2002:a05:6902:702:b0:b9e:5aad:edda with SMTP id k2-20020a056902070200b00b9e5aadeddamr3593877ybt.4.1683322595278; Fri, 05 May 2023 14:36:35 -0700 (PDT) MIME-Version: 1.0 References: <0000000000007bedb605f119ed9f@google.com> <00000000000000964605faf87416@google.com> In-Reply-To: <00000000000000964605faf87416@google.com> From: Paul Moore Date: Fri, 5 May 2023 17:36:24 -0400 Message-ID: Subject: Re: [syzbot] [reiserfs?] possible deadlock in open_xa_dir To: syzbot Cc: hdanton@sina.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, reiserfs-devel@vger.kernel.org, roberto.sassu@huawei.com, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=0.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SORTED_RECIPS,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 5, 2023 at 4:51=E2=80=AFPM syzbot wrote: > > syzbot has bisected this issue to: > > commit d82dcd9e21b77d338dc4875f3d4111f0db314a7c > Author: Roberto Sassu > Date: Fri Mar 31 12:32:18 2023 +0000 > > reiserfs: Add security prefix to xattr name in reiserfs_security_writ= e() > > bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=3D1440318228= 0000 > start commit: 3c4aa4434377 Merge tag 'ceph-for-6.4-rc1' of https://gith= u.. > git tree: upstream > final oops: https://syzkaller.appspot.com/x/report.txt?x=3D1640318228= 0000 > console output: https://syzkaller.appspot.com/x/log.txt?x=3D1240318228000= 0 > kernel config: https://syzkaller.appspot.com/x/.config?x=3D73a06f6ef2d5b= 492 > dashboard link: https://syzkaller.appspot.com/bug?extid=3D8fb64a61fdd96b5= 0f3b8 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=3D12442414280= 000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=3D176a731828000= 0 > > Reported-by: syzbot+8fb64a61fdd96b50f3b8@syzkaller.appspotmail.com > Fixes: d82dcd9e21b7 ("reiserfs: Add security prefix to xattr name in reis= erfs_security_write()") > > For information about bisection process see: https://goo.gl/tpsmEJ#bisect= ion I don't think Roberto's patch identified above is the actual root cause of this problem as reiserfs_xattr_set_handle() is called in reiserfs_security_write() both before and after the patch. However, due to some bad logic in reiserfs_security_write() which Roberto corrected, I'm thinking that it is possible this code is being exercised for the first time and syzbot is starting to trigger a locking issue in the reiserfs code ... ? --=20 paul-moore.com