./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2021977834

<...>
DUID 00:04:e5:d7:6b:3e:19:ba:e5:eb:4b:9e:6a:98:ce:0b:a0:29
forked to background, child pid 4660
[   42.717803][ T4661] 8021q: adding VLAN 0 to HW filter on device bond0
[   42.749086][ T4661] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK

syzkaller
Warning: Permanently added '10.128.1.38' (ECDSA) to the list of known hosts.
execve("./syz-executor2021977834", ["./syz-executor2021977834"], 0x7fff34044900 /* 10 vars */) = 0
brk(NULL)                               = 0x55555704f000
brk(0x55555704fc40)                     = 0x55555704fc40
arch_prctl(ARCH_SET_FS, 0x55555704f300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor2021977834", 4096) = 28
brk(0x555557070c40)                     = 0x555557070c40
brk(0x555557071000)                     = 0x555557071000
mprotect(0x7f3b06623000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
memfd_create("syzkaller", 0)            = 3
mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3afe169000
write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304
munmap(0x7f3afe169000, 4194304)         = 0
openat(AT_FDCWD, "/dev/loop0", O_RDWR)  = 4
syzkaller login: [   71.163873][ T4999] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4999 'syz-executor202'
ioctl(4, LOOP_SET_FD, 3)                = 0
close(3)                                = 0
mkdir("./file0", 0777)                  = 0
[   71.217356][ T4999] loop0: detected capacity change from 0 to 8192
[   71.230415][ T4999] REISERFS warning:  read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025
[   71.243751][ T4999] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal
[   71.253520][ T4999] REISERFS (device loop0): using ordered data mode
[   71.260283][ T4999] reiserfs: using flush barriers
[   71.266337][ T4999] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30
[   71.283162][ T4999] REISERFS (device loop0): checking transaction log (loop0)
mount("/dev/loop0", "./file0", "reiserfs", MS_NOSUID, "") = 0
openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3
chdir("./file0")                        = 0
ioctl(4, LOOP_CLR_FD)                   = 0
close(4)                                = 0
[   71.334592][ T4999] REISERFS (device loop0): Using r5 hash to sort names
[   71.342683][ T4999] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage.
[   71.363150][ T4999] 
[   71.365622][ T4999] ======================================================
[   71.372668][ T4999] WARNING: possible circular locking dependency detected
[   71.379689][ T4999] 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 Not tainted
[   71.386708][ T4999] ------------------------------------------------------
[   71.393723][ T4999] syz-executor202/4999 is trying to acquire lock:
[   71.400235][ T4999] ffff888076240980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x136/0x610
[   71.410136][ T4999] 
[   71.410136][ T4999] but task is already holding lock:
[   71.417506][ T4999] ffff888014eee090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   71.427109][ T4999] 
[   71.427109][ T4999] which lock already depends on the new lock.
[   71.427109][ T4999] 
[   71.437532][ T4999] 
[   71.437532][ T4999] the existing dependency chain (in reverse order) is:
[   71.446560][ T4999] 
[   71.446560][ T4999] -> #1 (&sbi->lock){+.+.}-{3:3}:
[   71.453877][ T4999]        lock_acquire+0x1e3/0x520
[   71.458932][ T4999]        __mutex_lock_common+0x1d8/0x2530
[   71.464684][ T4999]        mutex_lock_nested+0x1b/0x20
[   71.469988][ T4999]        reiserfs_write_lock+0x7a/0xd0
[   71.475477][ T4999]        reiserfs_mkdir+0x321/0x8f0
[   71.480689][ T4999]        open_xa_dir+0x2cd/0x610
[   71.485637][ T4999]        xattr_lookup+0x24/0x280
[   71.490584][ T4999]        reiserfs_xattr_set_handle+0xfc/0xdc0
[   71.496664][ T4999]        reiserfs_security_write+0x157/0x1d0
[   71.502658][ T4999]        reiserfs_new_inode+0x1631/0x1d40
[   71.508391][ T4999]        reiserfs_create+0x3e7/0x6e0
[   71.513695][ T4999]        path_openat+0x13df/0x3170
[   71.518822][ T4999]        do_filp_open+0x234/0x490
[   71.523857][ T4999]        do_sys_openat2+0x13f/0x500
[   71.529072][ T4999]        __x64_sys_openat+0x247/0x290
[   71.534476][ T4999]        do_syscall_64+0x41/0xc0
[   71.539465][ T4999]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   71.545903][ T4999] 
[   71.545903][ T4999] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}:
[   71.554532][ T4999]        validate_chain+0x166b/0x58f0
[   71.559925][ T4999]        __lock_acquire+0x1316/0x2070
[   71.565333][ T4999]        lock_acquire+0x1e3/0x520
[   71.570379][ T4999]        down_write_nested+0x3d/0x50
[   71.575678][ T4999]        open_xa_dir+0x136/0x610
[   71.580627][ T4999]        xattr_lookup+0x24/0x280
[   71.585584][ T4999]        reiserfs_xattr_get+0xfd/0x570
[   71.591055][ T4999]        __vfs_getxattr+0x436/0x470
[   71.596359][ T4999]        smk_fetch+0xb1/0x140
[   71.601167][ T4999]        smack_d_instantiate+0x6d9/0xb40
[   71.606823][ T4999]        security_d_instantiate+0x9b/0xf0
[   71.612562][ T4999]        d_instantiate_new+0x65/0x120
[   71.617955][ T4999]        reiserfs_create+0x5cf/0x6e0
[   71.623274][ T4999]        path_openat+0x13df/0x3170
[   71.628411][ T4999]        do_filp_open+0x234/0x490
[   71.633447][ T4999]        do_sys_openat2+0x13f/0x500
[   71.638658][ T4999]        __x64_sys_openat+0x247/0x290
[   71.644039][ T4999]        do_syscall_64+0x41/0xc0
[   71.648985][ T4999]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   71.655411][ T4999] 
[   71.655411][ T4999] other info that might help us debug this:
[   71.655411][ T4999] 
[   71.665671][ T4999]  Possible unsafe locking scenario:
[   71.665671][ T4999] 
[   71.673129][ T4999]        CPU0                    CPU1
[   71.678494][ T4999]        ----                    ----
[   71.683862][ T4999]   lock(&sbi->lock);
[   71.687856][ T4999]                                lock(&type->i_mutex_dir_key#6/3);
[   71.695772][ T4999]                                lock(&sbi->lock);
[   71.702279][ T4999]   lock(&type->i_mutex_dir_key#6/3);
[   71.707671][ T4999] 
[   71.707671][ T4999]  *** DEADLOCK ***
[   71.707671][ T4999] 
[   71.715813][ T4999] 3 locks held by syz-executor202/4999:
[   71.721364][ T4999]  #0: ffff88807c7e6460 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90
[   71.730549][ T4999]  #1: ffff8880762402e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x7ba/0x3170
[   71.740770][ T4999]  #2: ffff888014eee090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   71.751416][ T4999] 
[   71.751416][ T4999] stack backtrace:
[   71.757405][ T4999] CPU: 0 PID: 4999 Comm: syz-executor202 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0
[   71.767838][ T4999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
[   71.777914][ T4999] Call Trace:
[   71.781216][ T4999]  <TASK>
[   71.784181][ T4999]  dump_stack_lvl+0x1e7/0x2d0
[   71.788903][ T4999]  ? nf_tcp_handle_invalid+0x650/0x650
[   71.794395][ T4999]  ? print_circular_bug+0x12b/0x1a0
[   71.799616][ T4999]  check_noncircular+0x2fe/0x3b0
[   71.804658][ T4999]  ? read_lock_is_recursive+0x20/0x20
[   71.810046][ T4999]  ? add_chain_block+0x850/0x850
[   71.815005][ T4999]  ? lockdep_lock+0x123/0x2b0
[   71.819702][ T4999]  ? check_path+0x40/0x40
[   71.824051][ T4999]  ? noop_count+0x30/0x30
[   71.828394][ T4999]  ? _find_first_zero_bit+0xd4/0x100
[   71.833689][ T4999]  validate_chain+0x166b/0x58f0
[   71.838555][ T4999]  ? stack_trace_save+0x1c0/0x1c0
[   71.843603][ T4999]  ? reacquire_held_locks+0x660/0x660
[   71.849000][ T4999]  ? look_up_lock_class+0x77/0x140
[   71.854125][ T4999]  ? register_lock_class+0x104/0x990
[   71.859428][ T4999]  ? __lock_acquire+0x1316/0x2070
[   71.864467][ T4999]  ? is_dynamic_key+0x1f0/0x1f0
[   71.869333][ T4999]  ? mark_lock+0x9a/0x340
[   71.873678][ T4999]  __lock_acquire+0x1316/0x2070
[   71.878553][ T4999]  lock_acquire+0x1e3/0x520
[   71.883069][ T4999]  ? open_xa_dir+0x136/0x610
[   71.887678][ T4999]  ? read_lock_is_recursive+0x20/0x20
[   71.893067][ T4999]  ? lockdep_hardirqs_on+0x98/0x140
[   71.898284][ T4999]  ? __might_sleep+0xc0/0xc0
[   71.902891][ T4999]  ? _raw_spin_unlock_irqrestore+0xdd/0x140
[   71.908800][ T4999]  ? _raw_spin_unlock+0x40/0x40
[   71.913666][ T4999]  ? stack_trace_snprint+0xf0/0xf0
[   71.918801][ T4999]  down_write_nested+0x3d/0x50
[   71.923579][ T4999]  ? open_xa_dir+0x136/0x610
[   71.928181][ T4999]  open_xa_dir+0x136/0x610
[   71.932608][ T4999]  ? kasan_set_track+0x61/0x70
[   71.937378][ T4999]  ? kasan_set_track+0x4f/0x70
[   71.942155][ T4999]  ? security_d_instantiate+0x9b/0xf0
[   71.947544][ T4999]  ? listxattr_filler+0x500/0x500
[   71.952578][ T4999]  ? do_sys_openat2+0x13f/0x500
[   71.957527][ T4999]  ? __static_call_text_end+0x5cfa8/0x5cfa8
[   71.963435][ T4999]  xattr_lookup+0x24/0x280
[   71.967867][ T4999]  reiserfs_xattr_get+0xfd/0x570
[   71.972819][ T4999]  ? security_get+0x6d/0xc0
[   71.977341][ T4999]  ? security_list+0x80/0x80
[   71.981949][ T4999]  __vfs_getxattr+0x436/0x470
[   71.986660][ T4999]  smk_fetch+0xb1/0x140
[   71.990837][ T4999]  smack_d_instantiate+0x6d9/0xb40
[   71.995974][ T4999]  ? smack_sem_semop+0x230/0x230
[   72.000934][ T4999]  security_d_instantiate+0x9b/0xf0
[   72.006158][ T4999]  d_instantiate_new+0x65/0x120
[   72.011020][ T4999]  reiserfs_create+0x5cf/0x6e0
[   72.015798][ T4999]  ? reiserfs_lookup+0x580/0x580
[   72.020751][ T4999]  ? bpf_lsm_inode_create+0x9/0x10
[   72.025871][ T4999]  ? security_inode_create+0xb8/0x100
[   72.031257][ T4999]  ? reiserfs_lookup+0x580/0x580
[   72.036205][ T4999]  path_openat+0x13df/0x3170
[   72.040819][ T4999]  ? do_filp_open+0x490/0x490
[   72.045518][ T4999]  do_filp_open+0x234/0x490
[   72.050031][ T4999]  ? vfs_tmpfile+0x4a0/0x4a0
[   72.054639][ T4999]  ? _raw_spin_unlock+0x28/0x40
[   72.059509][ T4999]  ? alloc_fd+0x59c/0x640
[   72.063863][ T4999]  do_sys_openat2+0x13f/0x500
[   72.068555][ T4999]  ? print_irqtrace_events+0x220/0x220
[   72.074030][ T4999]  ? do_sys_open+0x230/0x230
[   72.078647][ T4999]  ? lockdep_hardirqs_on+0x98/0x140
[   72.083863][ T4999]  ? _raw_spin_unlock_irq+0x2e/0x50
[   72.089072][ T4999]  ? ptrace_notify+0x278/0x380
[   72.093860][ T4999]  __x64_sys_openat+0x247/0x290
[   72.098730][ T4999]  ? __ia32_sys_open+0x270/0x270
[   72.103683][ T4999]  ? syscall_enter_from_user_mode+0x32/0x230
[   72.109680][ T4999]  ? syscall_enter_from_user_mode+0x8c/0x230
[   72.115674][ T4999]  do_syscall_64+0x41/0xc0
[   72.120105][ T4999]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   72.126016][ T4999] RIP: 0033:0x7f3b065b57e9
[   72.130443][ T4999] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[   72.150061][ T4999] RSP: 002b:00007ffd7dda0328 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[   72.158493][ T4999] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3b065b57e9
[   72.166470][ T4999] RDX: 000000000000275a RSI: 00000000200001c0 RDI: 00000000ffffff9c
[   72.174449][ T4999] RBP: 00007f3b06575080 R08: 00000000000010e6 R09: 0000000000000000
openat(AT_FDCWD, "cgroup.controllers", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 4
exit_group(0)                           = ?
+++ exited with 0 +++
[   72.182436][ T4999] R10: 0000000000000000 R11: 0000000000000246 R12