./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor398812425

<...>
Warning: Permanently added '10.128.1.184' (ECDSA) to the list of known hosts.
execve("./syz-executor398812425", ["./syz-executor398812425"], 0x7ffd44542140 /* 10 vars */) = 0
brk(NULL)                               = 0x5555561ef000
brk(0x5555561efc40)                     = 0x5555561efc40
arch_prctl(ARCH_SET_FS, 0x5555561ef300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor398812425", 4096) = 27
brk(0x555556210c40)                     = 0x555556210c40
brk(0x555556211000)                     = 0x555556211000
mprotect(0x7fcfe04bf000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
memfd_create("syzkaller", 0)            = 3
mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fcfd8005000
write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304
munmap(0x7fcfd8005000, 4194304)         = 0
openat(AT_FDCWD, "/dev/loop0", O_RDWR)  = 4
[   70.264297][ T4993] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4993 'syz-executor398'
ioctl(4, LOOP_SET_FD, 3)                = 0
close(3)                                = 0
mkdir("./file0", 0777)                  = 0
[   70.308109][ T4993] loop0: detected capacity change from 0 to 8192
[   70.319372][ T4993] REISERFS warning:  read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025
[   70.332921][ T4993] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal
[   70.342362][ T4993] REISERFS (device loop0): using ordered data mode
[   70.348847][ T4993] reiserfs: using flush barriers
[   70.354938][ T4993] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30
[   70.371584][ T4993] REISERFS (device loop0): checking transaction log (loop0)
mount("/dev/loop0", "./file0", "reiserfs", MS_NOEXEC|MS_I_VERSION, "") = 0
openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3
chdir("./file0")                        = 0
ioctl(4, LOOP_CLR_FD)                   = 0
close(4)                                = 0
[   70.412766][ T4993] REISERFS (device loop0): Using r5 hash to sort names
[   70.420382][ T4993] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage.
[   70.447789][ T4993] 
[   70.450182][ T4993] ======================================================
[   70.457197][ T4993] WARNING: possible circular locking dependency detected
[   70.464195][ T4993] 6.4.0-rc7-syzkaller-00194-g8a28a0b6f1a1 #0 Not tainted
[   70.471191][ T4993] ------------------------------------------------------
[   70.478182][ T4993] syz-executor398/4993 is trying to acquire lock:
[   70.484579][ T4993] ffff888078ac8980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x136/0x610
[   70.494413][ T4993] 
[   70.494413][ T4993] but task is already holding lock:
[   70.501762][ T4993] ffff8880162fa090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   70.511310][ T4993] 
[   70.511310][ T4993] which lock already depends on the new lock.
[   70.511310][ T4993] 
[   70.521689][ T4993] 
[   70.521689][ T4993] the existing dependency chain (in reverse order) is:
[   70.530679][ T4993] 
[   70.530679][ T4993] -> #1 (&sbi->lock){+.+.}-{3:3}:
[   70.537872][ T4993]        lock_acquire+0x1e3/0x520
[   70.542878][ T4993]        __mutex_lock_common+0x1d8/0x2530
[   70.548580][ T4993]        mutex_lock_nested+0x1b/0x20
[   70.553841][ T4993]        reiserfs_write_lock+0x7a/0xd0
[   70.559277][ T4993]        reiserfs_mkdir+0x321/0x8f0
[   70.564453][ T4993]        open_xa_dir+0x2cd/0x610
[   70.569369][ T4993]        xattr_lookup+0x24/0x280
[   70.574288][ T4993]        reiserfs_xattr_set_handle+0xfc/0xdc0
[   70.580331][ T4993]        reiserfs_security_write+0x157/0x1d0
[   70.586287][ T4993]        reiserfs_new_inode+0x1631/0x1d40
[   70.591987][ T4993]        reiserfs_create+0x3e7/0x6e0
[   70.597253][ T4993]        path_openat+0x13df/0x3170
[   70.602342][ T4993]        do_filp_open+0x234/0x490
[   70.607341][ T4993]        do_sys_openat2+0x13f/0x500
[   70.612519][ T4993]        __x64_sys_open+0x225/0x270
[   70.617696][ T4993]        do_syscall_64+0x41/0xc0
[   70.622610][ T4993]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   70.629002][ T4993] 
[   70.629002][ T4993] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}:
[   70.637583][ T4993]        validate_chain+0x166b/0x58f0
[   70.642937][ T4993]        __lock_acquire+0x1316/0x2070
[   70.648285][ T4993]        lock_acquire+0x1e3/0x520
[   70.653285][ T4993]        down_write_nested+0x3d/0x50
[   70.658546][ T4993]        open_xa_dir+0x136/0x610
[   70.663460][ T4993]        xattr_lookup+0x24/0x280
[   70.668382][ T4993]        reiserfs_xattr_get+0xfd/0x570
[   70.673818][ T4993]        __vfs_getxattr+0x436/0x470
[   70.679080][ T4993]        smk_fetch+0xb1/0x140
[   70.683738][ T4993]        smack_d_instantiate+0x6d9/0xb40
[   70.689348][ T4993]        security_d_instantiate+0x9b/0xf0
[   70.695053][ T4993]        d_instantiate_new+0x65/0x120
[   70.700437][ T4993]        reiserfs_create+0x5cf/0x6e0
[   70.705703][ T4993]        path_openat+0x13df/0x3170
[   70.710790][ T4993]        do_filp_open+0x234/0x490
[   70.715791][ T4993]        do_sys_openat2+0x13f/0x500
[   70.720966][ T4993]        __x64_sys_open+0x225/0x270
[   70.726140][ T4993]        do_syscall_64+0x41/0xc0
[   70.731056][ T4993]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   70.737448][ T4993] 
[   70.737448][ T4993] other info that might help us debug this:
[   70.737448][ T4993] 
[   70.747654][ T4993]  Possible unsafe locking scenario:
[   70.747654][ T4993] 
[   70.755078][ T4993]        CPU0                    CPU1
[   70.760421][ T4993]        ----                    ----
[   70.765765][ T4993]   lock(&sbi->lock);
[   70.769723][ T4993]                                lock(&type->i_mutex_dir_key#6/3);
[   70.777599][ T4993]                                lock(&sbi->lock);
[   70.784077][ T4993]   lock(&type->i_mutex_dir_key#6/3);
[   70.789434][ T4993] 
[   70.789434][ T4993]  *** DEADLOCK ***
[   70.789434][ T4993] 
[   70.797555][ T4993] 3 locks held by syz-executor398/4993:
[   70.803075][ T4993]  #0: ffff8880791de460 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90
[   70.812186][ T4993]  #1: ffff888078ac82e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x7ba/0x3170
[   70.822341][ T4993]  #2: ffff8880162fa090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   70.832317][ T4993] 
[   70.832317][ T4993] stack backtrace:
[   70.838181][ T4993] CPU: 0 PID: 4993 Comm: syz-executor398 Not tainted 6.4.0-rc7-syzkaller-00194-g8a28a0b6f1a1 #0
[   70.848563][ T4993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
[   70.858596][ T4993] Call Trace:
[   70.861859][ T4993]  <TASK>
[   70.864770][ T4993]  dump_stack_lvl+0x1e7/0x2d0
[   70.869425][ T4993]  ? nf_tcp_handle_invalid+0x650/0x650
[   70.874862][ T4993]  ? print_circular_bug+0x12b/0x1a0
[   70.880051][ T4993]  check_noncircular+0x2fe/0x3b0
[   70.884971][ T4993]  ? read_lock_is_recursive+0x20/0x20
[   70.890320][ T4993]  ? add_chain_block+0x850/0x850
[   70.895327][ T4993]  ? lockdep_lock+0x123/0x2b0
[   70.899982][ T4993]  ? check_path+0x40/0x40
[   70.904292][ T4993]  ? noop_count+0x30/0x30
[   70.908602][ T4993]  ? _find_first_zero_bit+0xd4/0x100
[   70.913863][ T4993]  validate_chain+0x166b/0x58f0
[   70.918694][ T4993]  ? stack_trace_save+0x1c0/0x1c0
[   70.923705][ T4993]  ? reacquire_held_locks+0x660/0x660
[   70.929057][ T4993]  ? look_up_lock_class+0x77/0x140
[   70.934149][ T4993]  ? register_lock_class+0x104/0x990
[   70.939413][ T4993]  ? __lock_acquire+0x1316/0x2070
[   70.944416][ T4993]  ? is_dynamic_key+0x1f0/0x1f0
[   70.949253][ T4993]  ? mark_lock+0x9a/0x340
[   70.953567][ T4993]  __lock_acquire+0x1316/0x2070
[   70.958400][ T4993]  lock_acquire+0x1e3/0x520
[   70.962883][ T4993]  ? open_xa_dir+0x136/0x610
[   70.967460][ T4993]  ? read_lock_is_recursive+0x20/0x20
[   70.972811][ T4993]  ? lockdep_hardirqs_on+0x98/0x140
[   70.977990][ T4993]  ? __might_sleep+0xc0/0xc0
[   70.982565][ T4993]  ? _raw_spin_unlock_irqrestore+0xdd/0x140
[   70.988439][ T4993]  ? _raw_spin_unlock+0x40/0x40
[   70.993268][ T4993]  ? stack_trace_snprint+0xf0/0xf0
[   70.998365][ T4993]  down_write_nested+0x3d/0x50
[   71.003107][ T4993]  ? open_xa_dir+0x136/0x610
[   71.007679][ T4993]  open_xa_dir+0x136/0x610
[   71.012075][ T4993]  ? kasan_set_track+0x61/0x70
[   71.016819][ T4993]  ? kasan_set_track+0x4f/0x70
[   71.021561][ T4993]  ? security_d_instantiate+0x9b/0xf0
[   71.026914][ T4993]  ? listxattr_filler+0x500/0x500
[   71.031934][ T4993]  ? do_sys_openat2+0x13f/0x500
[   71.036940][ T4993]  ? __static_call_text_end+0x52188/0x52188
[   71.042817][ T4993]  xattr_lookup+0x24/0x280
[   71.047216][ T4993]  reiserfs_xattr_get+0xfd/0x570
[   71.052135][ T4993]  ? security_get+0x6d/0xc0
[   71.057139][ T4993]  ? security_list+0x80/0x80
[   71.061708][ T4993]  __vfs_getxattr+0x436/0x470
[   71.066370][ T4993]  smk_fetch+0xb1/0x140
[   71.070591][ T4993]  smack_d_instantiate+0x6d9/0xb40
[   71.075683][ T4993]  ? smack_sem_semop+0x230/0x230
[   71.080603][ T4993]  security_d_instantiate+0x9b/0xf0
[   71.085785][ T4993]  d_instantiate_new+0x65/0x120
[   71.090614][ T4993]  reiserfs_create+0x5cf/0x6e0
[   71.095361][ T4993]  ? reiserfs_lookup+0x580/0x580
[   71.100281][ T4993]  ? bpf_lsm_inode_create+0x9/0x10
[   71.105371][ T4993]  ? security_inode_create+0xb8/0x100
[   71.110732][ T4993]  ? reiserfs_lookup+0x580/0x580
[   71.115649][ T4993]  path_openat+0x13df/0x3170
[   71.120222][ T4993]  ? do_filp_open+0x490/0x490
[   71.124879][ T4993]  do_filp_open+0x234/0x490
[   71.129359][ T4993]  ? vfs_tmpfile+0x4a0/0x4a0
[   71.133932][ T4993]  ? _raw_spin_unlock+0x28/0x40
[   71.138763][ T4993]  ? alloc_fd+0x59c/0x640
[   71.143076][ T4993]  do_sys_openat2+0x13f/0x500
[   71.147734][ T4993]  ? print_irqtrace_events+0x220/0x220
[   71.153174][ T4993]  ? do_sys_open+0x230/0x230
[   71.157742][ T4993]  ? lockdep_hardirqs_on+0x98/0x140
[   71.162922][ T4993]  ? _raw_spin_unlock_irq+0x2e/0x50
[   71.168094][ T4993]  ? ptrace_notify+0x278/0x380
[   71.172836][ T4993]  __x64_sys_open+0x225/0x270
[   71.177493][ T4993]  ? do_sys_openat2+0x500/0x500
[   71.182323][ T4993]  ? syscall_enter_from_user_mode+0x32/0x230
[   71.188285][ T4993]  ? syscall_enter_from_user_mode+0x8c/0x230
[   71.194248][ T4993]  do_syscall_64+0x41/0xc0
[   71.198641][ T4993]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   71.204516][ T4993] RIP: 0033:0x7fcfe0451789
[   71.208925][ T4993] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[   71.228522][ T4993] RSP: 002b:00007ffef3c055f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[   71.236920][ T4993] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcfe0451789
[   71.244872][ T4993] RDX: 0000000000000000 RSI: 0000000000149042 RDI: 00000000200001c0
[   71.252823][ T4993] RBP: 00007fcfe0411020 R08: 00000000000010ee R09: 0000000000000000
open("./bus", O_RDWR|O_CREAT|O_SYNC|O_LARGEFILE|O_NOATIME, 000) = 4
exit_group(0)                           = ?
+++ exited with 0 +++
[   71.260772][ T4993] R10: 00007ffef3c054c0 R11: 0000000000000246 R1