./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3835103036

<...>
Warning: Permanently added '10.128.10.20' (ECDSA) to the list of known hosts.
execve("./syz-executor3835103036", ["./syz-executor3835103036"], 0x7ffc1ff35e90 /* 10 vars */) = 0
brk(NULL)                               = 0x55555747f000
brk(0x55555747fc40)                     = 0x55555747fc40
arch_prctl(ARCH_SET_FS, 0x55555747f300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor3835103036", 4096) = 28
brk(0x5555574a0c40)                     = 0x5555574a0c40
brk(0x5555574a1000)                     = 0x5555574a1000
mprotect(0x7f1ec7859000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
memfd_create("syzkaller", 0)            = 3
mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1ebf39f000
write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304
munmap(0x7f1ebf39f000, 4194304)         = 0
openat(AT_FDCWD, "/dev/loop0", O_RDWR)  = 4
[   57.874302][ T4996] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4996 'syz-executor383'
ioctl(4, LOOP_SET_FD, 3)                = 0
close(3)                                = 0
mkdir("./file0", 0777)                  = 0
[   57.918293][ T4996] loop0: detected capacity change from 0 to 8192
[   57.930348][ T4996] REISERFS warning:  read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025
[   57.943569][ T4996] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal
[   57.953105][ T4996] REISERFS (device loop0): using ordered data mode
[   57.959993][ T4996] reiserfs: using flush barriers
[   57.966250][ T4996] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30
[   57.982720][ T4996] REISERFS (device loop0): checking transaction log (loop0)
mount("/dev/loop0", "./file0", "reiserfs", MS_DIRSYNC, "") = 0
openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3
chdir("./file0")                        = 0
ioctl(4, LOOP_CLR_FD)                   = 0
close(4)                                = 0
[   58.026347][ T4996] REISERFS (device loop0): Using r5 hash to sort names
[   58.033980][ T4996] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage.
[   58.059205][ T4996] 
[   58.061573][ T4996] ======================================================
[   58.068623][ T4996] WARNING: possible circular locking dependency detected
[   58.075641][ T4996] 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 Not tainted
[   58.082742][ T4996] ------------------------------------------------------
[   58.089750][ T4996] syz-executor383/4996 is trying to acquire lock:
[   58.096150][ T4996] ffff888075a20980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x136/0x610
[   58.106002][ T4996] 
[   58.106002][ T4996] but task is already holding lock:
[   58.113449][ T4996] ffff8880152d2090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   58.123101][ T4996] 
[   58.123101][ T4996] which lock already depends on the new lock.
[   58.123101][ T4996] 
[   58.134176][ T4996] 
[   58.134176][ T4996] the existing dependency chain (in reverse order) is:
[   58.143169][ T4996] 
[   58.143169][ T4996] -> #1 (&sbi->lock){+.+.}-{3:3}:
[   58.150444][ T4996]        lock_acquire+0x1e3/0x520
[   58.155469][ T4996]        __mutex_lock_common+0x1d8/0x2530
[   58.161178][ T4996]        mutex_lock_nested+0x1b/0x20
[   58.166445][ T4996]        reiserfs_write_lock+0x7a/0xd0
[   58.171894][ T4996]        reiserfs_mkdir+0x321/0x8f0
[   58.177073][ T4996]        open_xa_dir+0x2cd/0x610
[   58.182077][ T4996]        xattr_lookup+0x24/0x280
[   58.186999][ T4996]        reiserfs_xattr_set_handle+0xfc/0xdc0
[   58.193140][ T4996]        reiserfs_security_write+0x157/0x1d0
[   58.199098][ T4996]        reiserfs_new_inode+0x1631/0x1d40
[   58.204886][ T4996]        reiserfs_create+0x3e7/0x6e0
[   58.210198][ T4996]        path_openat+0x13df/0x3170
[   58.215297][ T4996]        do_filp_open+0x234/0x490
[   58.220298][ T4996]        do_sys_openat2+0x13f/0x500
[   58.225479][ T4996]        __x64_sys_openat+0x247/0x290
[   58.230831][ T4996]        do_syscall_64+0x41/0xc0
[   58.235745][ T4996]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   58.242140][ T4996] 
[   58.242140][ T4996] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}:
[   58.250721][ T4996]        validate_chain+0x166b/0x58f0
[   58.256087][ T4996]        __lock_acquire+0x1316/0x2070
[   58.261611][ T4996]        lock_acquire+0x1e3/0x520
[   58.266618][ T4996]        down_write_nested+0x3d/0x50
[   58.271883][ T4996]        open_xa_dir+0x136/0x610
[   58.276802][ T4996]        xattr_lookup+0x24/0x280
[   58.281722][ T4996]        reiserfs_xattr_get+0xfd/0x570
[   58.287166][ T4996]        __vfs_getxattr+0x436/0x470
[   58.292375][ T4996]        smk_fetch+0xb1/0x140
[   58.297046][ T4996]        smack_d_instantiate+0x6d9/0xb40
[   58.302661][ T4996]        security_d_instantiate+0x9b/0xf0
[   58.308366][ T4996]        d_instantiate_new+0x65/0x120
[   58.313722][ T4996]        reiserfs_create+0x5cf/0x6e0
[   58.318993][ T4996]        path_openat+0x13df/0x3170
[   58.324088][ T4996]        do_filp_open+0x234/0x490
[   58.329527][ T4996]        do_sys_openat2+0x13f/0x500
[   58.334724][ T4996]        __x64_sys_openat+0x247/0x290
[   58.340080][ T4996]        do_syscall_64+0x41/0xc0
[   58.345602][ T4996]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   58.351996][ T4996] 
[   58.351996][ T4996] other info that might help us debug this:
[   58.351996][ T4996] 
[   58.362202][ T4996]  Possible unsafe locking scenario:
[   58.362202][ T4996] 
[   58.369630][ T4996]        CPU0                    CPU1
[   58.374971][ T4996]        ----                    ----
[   58.380313][ T4996]   lock(&sbi->lock);
[   58.384274][ T4996]                                lock(&type->i_mutex_dir_key#6/3);
[   58.392151][ T4996]                                lock(&sbi->lock);
[   58.398631][ T4996]   lock(&type->i_mutex_dir_key#6/3);
[   58.404342][ T4996] 
[   58.404342][ T4996]  *** DEADLOCK ***
[   58.404342][ T4996] 
[   58.412746][ T4996] 3 locks held by syz-executor383/4996:
[   58.418440][ T4996]  #0: ffff88802c524460 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90
[   58.427556][ T4996]  #1: ffff888075a202e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x7ba/0x3170
[   58.437713][ T4996]  #2: ffff8880152d2090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   58.447694][ T4996] 
[   58.447694][ T4996] stack backtrace:
[   58.453559][ T4996] CPU: 1 PID: 4996 Comm: syz-executor383 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0
[   58.463943][ T4996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
[   58.473975][ T4996] Call Trace:
[   58.477240][ T4996]  <TASK>
[   58.480153][ T4996]  dump_stack_lvl+0x1e7/0x2d0
[   58.484813][ T4996]  ? nf_tcp_handle_invalid+0x650/0x650
[   58.490252][ T4996]  ? print_circular_bug+0x12b/0x1a0
[   58.495434][ T4996]  check_noncircular+0x2fe/0x3b0
[   58.500354][ T4996]  ? read_lock_is_recursive+0x20/0x20
[   58.505709][ T4996]  ? add_chain_block+0x850/0x850
[   58.510627][ T4996]  ? lockdep_lock+0x123/0x2b0
[   58.515286][ T4996]  ? check_path+0x40/0x40
[   58.519595][ T4996]  ? noop_count+0x30/0x30
[   58.523900][ T4996]  ? _find_first_zero_bit+0xd4/0x100
[   58.529163][ T4996]  validate_chain+0x166b/0x58f0
[   58.533993][ T4996]  ? stack_trace_save+0x1c0/0x1c0
[   58.539010][ T4996]  ? reacquire_held_locks+0x660/0x660
[   58.544394][ T4996]  ? look_up_lock_class+0x77/0x140
[   58.549509][ T4996]  ? register_lock_class+0x104/0x990
[   58.554779][ T4996]  ? __lock_acquire+0x1316/0x2070
[   58.559789][ T4996]  ? is_dynamic_key+0x1f0/0x1f0
[   58.564624][ T4996]  ? mark_lock+0x9a/0x340
[   58.568939][ T4996]  __lock_acquire+0x1316/0x2070
[   58.573774][ T4996]  lock_acquire+0x1e3/0x520
[   58.578259][ T4996]  ? open_xa_dir+0x136/0x610
[   58.582830][ T4996]  ? read_lock_is_recursive+0x20/0x20
[   58.588185][ T4996]  ? lockdep_hardirqs_on+0x98/0x140
[   58.593365][ T4996]  ? __might_sleep+0xc0/0xc0
[   58.597937][ T4996]  ? _raw_spin_unlock_irqrestore+0xdd/0x140
[   58.603812][ T4996]  ? _raw_spin_unlock+0x40/0x40
[   58.608656][ T4996]  ? stack_trace_snprint+0xf0/0xf0
[   58.613776][ T4996]  down_write_nested+0x3d/0x50
[   58.618536][ T4996]  ? open_xa_dir+0x136/0x610
[   58.623111][ T4996]  open_xa_dir+0x136/0x610
[   58.627508][ T4996]  ? kasan_set_track+0x61/0x70
[   58.632254][ T4996]  ? kasan_set_track+0x4f/0x70
[   58.637000][ T4996]  ? security_d_instantiate+0x9b/0xf0
[   58.642355][ T4996]  ? listxattr_filler+0x500/0x500
[   58.647361][ T4996]  ? do_sys_openat2+0x13f/0x500
[   58.652220][ T4996]  ? __static_call_text_end+0x5cfa8/0x5cfa8
[   58.658125][ T4996]  xattr_lookup+0x24/0x280
[   58.662542][ T4996]  reiserfs_xattr_get+0xfd/0x570
[   58.667471][ T4996]  ? security_get+0x6d/0xc0
[   58.672060][ T4996]  ? security_list+0x80/0x80
[   58.676720][ T4996]  __vfs_getxattr+0x436/0x470
[   58.681402][ T4996]  smk_fetch+0xb1/0x140
[   58.685630][ T4996]  smack_d_instantiate+0x6d9/0xb40
[   58.690729][ T4996]  ? smack_sem_semop+0x230/0x230
[   58.695741][ T4996]  security_d_instantiate+0x9b/0xf0
[   58.700923][ T4996]  d_instantiate_new+0x65/0x120
[   58.705846][ T4996]  reiserfs_create+0x5cf/0x6e0
[   58.710597][ T4996]  ? reiserfs_lookup+0x580/0x580
[   58.715720][ T4996]  ? bpf_lsm_inode_create+0x9/0x10
[   58.721032][ T4996]  ? security_inode_create+0xb8/0x100
[   58.726384][ T4996]  ? reiserfs_lookup+0x580/0x580
[   58.731315][ T4996]  path_openat+0x13df/0x3170
[   58.735891][ T4996]  ? do_filp_open+0x490/0x490
[   58.740549][ T4996]  do_filp_open+0x234/0x490
[   58.745031][ T4996]  ? vfs_tmpfile+0x4a0/0x4a0
[   58.749614][ T4996]  ? _raw_spin_unlock+0x28/0x40
[   58.754476][ T4996]  ? alloc_fd+0x59c/0x640
[   58.759073][ T4996]  do_sys_openat2+0x13f/0x500
[   58.763734][ T4996]  ? print_irqtrace_events+0x220/0x220
[   58.769187][ T4996]  ? do_sys_open+0x230/0x230
[   58.773844][ T4996]  ? lockdep_hardirqs_on+0x98/0x140
[   58.779028][ T4996]  ? _raw_spin_unlock_irq+0x2e/0x50
[   58.784205][ T4996]  ? ptrace_notify+0x278/0x380
[   58.788971][ T4996]  __x64_sys_openat+0x247/0x290
[   58.793805][ T4996]  ? __ia32_sys_open+0x270/0x270
[   58.798723][ T4996]  ? syscall_enter_from_user_mode+0x32/0x230
[   58.804689][ T4996]  ? syscall_enter_from_user_mode+0x8c/0x230
[   58.810657][ T4996]  do_syscall_64+0x41/0xc0
[   58.815058][ T4996]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   58.820933][ T4996] RIP: 0033:0x7f1ec77eb789
[   58.825330][ T4996] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[   58.845000][ T4996] RSP: 002b:00007ffdad4e6358 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[   58.853392][ T4996] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1ec77eb789
[   58.861436][ T4996] RDX: 0000000000101042 RSI: 0000000020000000 RDI: 00000000ffffff9c
[   58.869483][ T4996] RBP: 00007f1ec77ab020 R08: 00000000000010fb R09: 0000000000000000
openat(AT_FDCWD, ".log", O_RDWR|O_CREAT|O_SYNC, 000) = 4
exit_group(0)                           = ?
+++ exited with 0 +++
[   58.877435][ T4996] R10: 000