./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4219961109

<...>
Warning: Permanently added '10.128.0.222' (ECDSA) to the list of known hosts.
execve("./syz-executor4219961109", ["./syz-executor4219961109"], 0x7ffc7d401dc0 /* 10 vars */) = 0
brk(NULL)                               = 0x5555572d0000
brk(0x5555572d0c40)                     = 0x5555572d0c40
arch_prctl(ARCH_SET_FS, 0x5555572d0300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor4219961109", 4096) = 28
brk(0x5555572f1c40)                     = 0x5555572f1c40
brk(0x5555572f2000)                     = 0x5555572f2000
mprotect(0x7f262eb09000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
memfd_create("syzkaller", 0)            = 3
mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f262664f000
write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304
munmap(0x7f262664f000, 4194304)         = 0
openat(AT_FDCWD, "/dev/loop0", O_RDWR)  = 4
syzkaller login: [   66.327421][ T4995] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4995 'syz-executor421'
ioctl(4, LOOP_SET_FD, 3)                = 0
close(3)                                = 0
mkdir("./file0", 0777)                  = 0
[   66.380356][ T4995] loop0: detected capacity change from 0 to 8192
[   66.392603][ T4995] REISERFS warning:  read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025
[   66.405925][ T4995] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal
[   66.415615][ T4995] REISERFS (device loop0): using ordered data mode
[   66.422268][ T4995] reiserfs: using flush barriers
[   66.428474][ T4995] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30
[   66.445198][ T4995] REISERFS (device loop0): checking transaction log (loop0)
mount("/dev/loop0", "./file0", "reiserfs", 0, "") = 0
openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3
chdir("./file0")                        = 0
ioctl(4, LOOP_CLR_FD)                   = 0
close(4)                                = 0
[   66.501357][ T4995] REISERFS (device loop0): Using r5 hash to sort names
[   66.509345][ T4995] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage.
[   66.537281][ T4995] 
[   66.539687][ T4995] ======================================================
[   66.546734][ T4995] WARNING: possible circular locking dependency detected
[   66.553780][ T4995] 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 Not tainted
[   66.560820][ T4995] ------------------------------------------------------
[   66.567837][ T4995] syz-executor421/4995 is trying to acquire lock:
[   66.574244][ T4995] ffff888077038980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x136/0x610
[   66.584122][ T4995] 
[   66.584122][ T4995] but task is already holding lock:
[   66.591477][ T4995] ffff8880152a7090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   66.601051][ T4995] 
[   66.601051][ T4995] which lock already depends on the new lock.
[   66.601051][ T4995] 
[   66.611443][ T4995] 
[   66.611443][ T4995] the existing dependency chain (in reverse order) is:
[   66.620442][ T4995] 
[   66.620442][ T4995] -> #1 (&sbi->lock){+.+.}-{3:3}:
[   66.627651][ T4995]        lock_acquire+0x1e3/0x520
[   66.632678][ T4995]        __mutex_lock_common+0x1d8/0x2530
[   66.638491][ T4995]        mutex_lock_nested+0x1b/0x20
[   66.643782][ T4995]        reiserfs_write_lock+0x7a/0xd0
[   66.649238][ T4995]        reiserfs_mkdir+0x321/0x8f0
[   66.654440][ T4995]        open_xa_dir+0x2cd/0x610
[   66.659376][ T4995]        xattr_lookup+0x24/0x280
[   66.664743][ T4995]        reiserfs_xattr_set_handle+0xfc/0xdc0
[   66.670807][ T4995]        reiserfs_security_write+0x157/0x1d0
[   66.676790][ T4995]        reiserfs_new_inode+0x1631/0x1d40
[   66.682548][ T4995]        reiserfs_create+0x3e7/0x6e0
[   66.687830][ T4995]        path_openat+0x13df/0x3170
[   66.692938][ T4995]        do_filp_open+0x234/0x490
[   66.698736][ T4995]        do_sys_openat2+0x13f/0x500
[   66.703942][ T4995]        __x64_sys_creat+0x123/0x160
[   66.709241][ T4995]        do_syscall_64+0x41/0xc0
[   66.714189][ T4995]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   66.720613][ T4995] 
[   66.720613][ T4995] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}:
[   66.729239][ T4995]        validate_chain+0x166b/0x58f0
[   66.734629][ T4995]        __lock_acquire+0x1316/0x2070
[   66.740022][ T4995]        lock_acquire+0x1e3/0x520
[   66.745324][ T4995]        down_write_nested+0x3d/0x50
[   66.750636][ T4995]        open_xa_dir+0x136/0x610
[   66.755673][ T4995]        xattr_lookup+0x24/0x280
[   66.760613][ T4995]        reiserfs_xattr_get+0xfd/0x570
[   66.766078][ T4995]        __vfs_getxattr+0x436/0x470
[   66.771295][ T4995]        smk_fetch+0xb1/0x140
[   66.775973][ T4995]        smack_d_instantiate+0x6d9/0xb40
[   66.781606][ T4995]        security_d_instantiate+0x9b/0xf0
[   66.787340][ T4995]        d_instantiate_new+0x65/0x120
[   66.792710][ T4995]        reiserfs_create+0x5cf/0x6e0
[   66.797990][ T4995]        path_openat+0x13df/0x3170
[   66.803096][ T4995]        do_filp_open+0x234/0x490
[   66.808115][ T4995]        do_sys_openat2+0x13f/0x500
[   66.813332][ T4995]        __x64_sys_creat+0x123/0x160
[   66.818632][ T4995]        do_syscall_64+0x41/0xc0
[   66.823570][ T4995]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   66.829984][ T4995] 
[   66.829984][ T4995] other info that might help us debug this:
[   66.829984][ T4995] 
[   66.840206][ T4995]  Possible unsafe locking scenario:
[   66.840206][ T4995] 
[   66.847650][ T4995]        CPU0                    CPU1
[   66.853097][ T4995]        ----                    ----
[   66.858451][ T4995]   lock(&sbi->lock);
[   66.862431][ T4995]                                lock(&type->i_mutex_dir_key#6/3);
[   66.870416][ T4995]                                lock(&sbi->lock);
[   66.876917][ T4995]   lock(&type->i_mutex_dir_key#6/3);
[   66.882397][ T4995] 
[   66.882397][ T4995]  *** DEADLOCK ***
[   66.882397][ T4995] 
[   66.890551][ T4995] 3 locks held by syz-executor421/4995:
[   66.896099][ T4995]  #0: ffff88807cd76460 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90
[   66.905262][ T4995]  #1: ffff8880770382e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x7ba/0x3170
[   66.915458][ T4995]  #2: ffff8880152a7090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   66.925473][ T4995] 
[   66.925473][ T4995] stack backtrace:
[   66.931439][ T4995] CPU: 0 PID: 4995 Comm: syz-executor421 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0
[   66.941840][ T4995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
[   66.951887][ T4995] Call Trace:
[   66.955162][ T4995]  <TASK>
[   66.958086][ T4995]  dump_stack_lvl+0x1e7/0x2d0
[   66.962848][ T4995]  ? nf_tcp_handle_invalid+0x650/0x650
[   66.968334][ T4995]  ? print_circular_bug+0x12b/0x1a0
[   66.973550][ T4995]  check_noncircular+0x2fe/0x3b0
[   66.978580][ T4995]  ? read_lock_is_recursive+0x20/0x20
[   66.983956][ T4995]  ? add_chain_block+0x850/0x850
[   66.988922][ T4995]  ? lockdep_lock+0x123/0x2b0
[   66.993615][ T4995]  ? check_path+0x40/0x40
[   66.997957][ T4995]  ? noop_count+0x30/0x30
[   67.002291][ T4995]  ? _find_first_zero_bit+0xd4/0x100
[   67.007840][ T4995]  validate_chain+0x166b/0x58f0
[   67.012700][ T4995]  ? stack_trace_save+0x1c0/0x1c0
[   67.017750][ T4995]  ? reacquire_held_locks+0x660/0x660
[   67.023128][ T4995]  ? look_up_lock_class+0x77/0x140
[   67.028243][ T4995]  ? register_lock_class+0x104/0x990
[   67.033528][ T4995]  ? __lock_acquire+0x1316/0x2070
[   67.039086][ T4995]  ? is_dynamic_key+0x1f0/0x1f0
[   67.043938][ T4995]  ? mark_lock+0x9a/0x340
[   67.048268][ T4995]  __lock_acquire+0x1316/0x2070
[   67.053127][ T4995]  lock_acquire+0x1e3/0x520
[   67.057642][ T4995]  ? open_xa_dir+0x136/0x610
[   67.062236][ T4995]  ? read_lock_is_recursive+0x20/0x20
[   67.067608][ T4995]  ? lockdep_hardirqs_on+0x98/0x140
[   67.072805][ T4995]  ? __might_sleep+0xc0/0xc0
[   67.077400][ T4995]  ? _raw_spin_unlock_irqrestore+0xdd/0x140
[   67.083308][ T4995]  ? _raw_spin_unlock+0x40/0x40
[   67.088158][ T4995]  ? stack_trace_snprint+0xf0/0xf0
[   67.093280][ T4995]  down_write_nested+0x3d/0x50
[   67.098064][ T4995]  ? open_xa_dir+0x136/0x610
[   67.102654][ T4995]  open_xa_dir+0x136/0x610
[   67.107071][ T4995]  ? kasan_set_track+0x61/0x70
[   67.111831][ T4995]  ? kasan_set_track+0x4f/0x70
[   67.116681][ T4995]  ? security_d_instantiate+0x9b/0xf0
[   67.122060][ T4995]  ? listxattr_filler+0x500/0x500
[   67.127081][ T4995]  ? do_sys_openat2+0x13f/0x500
[   67.131934][ T4995]  ? __static_call_text_end+0x5cfa8/0x5cfa8
[   67.137831][ T4995]  xattr_lookup+0x24/0x280
[   67.142348][ T4995]  reiserfs_xattr_get+0xfd/0x570
[   67.147291][ T4995]  ? security_get+0x6d/0xc0
[   67.151797][ T4995]  ? security_list+0x80/0x80
[   67.156386][ T4995]  __vfs_getxattr+0x436/0x470
[   67.161074][ T4995]  smk_fetch+0xb1/0x140
[   67.165236][ T4995]  smack_d_instantiate+0x6d9/0xb40
[   67.170357][ T4995]  ? smack_sem_semop+0x230/0x230
[   67.175301][ T4995]  security_d_instantiate+0x9b/0xf0
[   67.180505][ T4995]  d_instantiate_new+0x65/0x120
[   67.185364][ T4995]  reiserfs_create+0x5cf/0x6e0
[   67.190132][ T4995]  ? reiserfs_lookup+0x580/0x580
[   67.195074][ T4995]  ? bpf_lsm_inode_create+0x9/0x10
[   67.202787][ T4995]  ? security_inode_create+0xb8/0x100
[   67.208171][ T4995]  ? reiserfs_lookup+0x580/0x580
[   67.213119][ T4995]  path_openat+0x13df/0x3170
[   67.217731][ T4995]  ? do_filp_open+0x490/0x490
[   67.222418][ T4995]  do_filp_open+0x234/0x490
[   67.226929][ T4995]  ? vfs_tmpfile+0x4a0/0x4a0
[   67.231527][ T4995]  ? _raw_spin_unlock+0x28/0x40
[   67.236378][ T4995]  ? alloc_fd+0x59c/0x640
[   67.240717][ T4995]  do_sys_openat2+0x13f/0x500
[   67.245395][ T4995]  ? do_sys_open+0x230/0x230
[   67.249994][ T4995]  ? _raw_spin_unlock_irq+0x2e/0x50
[   67.255190][ T4995]  ? ptrace_notify+0x278/0x380
[   67.259959][ T4995]  __x64_sys_creat+0x123/0x160
[   67.264813][ T4995]  ? __x64_compat_sys_openat+0x290/0x290
[   67.270456][ T4995]  ? syscall_enter_from_user_mode+0x32/0x230
[   67.276439][ T4995]  ? syscall_enter_from_user_mode+0x8c/0x230
[   67.282423][ T4995]  do_syscall_64+0x41/0xc0
[   67.286843][ T4995]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   67.292915][ T4995] RIP: 0033:0x7f262ea9b789
[   67.297325][ T4995] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[   67.316932][ T4995] RSP: 002b:00007ffd15e33208 EFLAGS: 00000246 ORIG_RAX: 0000000000000055
[   67.325345][ T4995] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f262ea9b789
[   67.333314][ T4995] RDX: 00007f262ea59e03 RSI: 0000000000000000 RDI: 0000000020000300
[   67.341282][ T4995] RBP: 00007f262ea5b020 R08: 00000000000010e6 R09: 0000000000000000
creat("./bus", 000)                     = 4
exit_group(0)                           = ?
+++ exited with 0 +++
[   67.349250][ T4995] R10: 00007ffd15e330d0 R11: 0000000000000246 R