./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1584058518

<...>
Warning: Permanently added '10.128.1.159' (ECDSA) to the list of known hosts.
execve("./syz-executor1584058518", ["./syz-executor1584058518"], 0x7fff2fc0ba00 /* 10 vars */) = 0
brk(NULL)                               = 0x555556b8e000
brk(0x555556b8ec40)                     = 0x555556b8ec40
arch_prctl(ARCH_SET_FS, 0x555556b8e300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor1584058518", 4096) = 28
brk(0x555556bafc40)                     = 0x555556bafc40
brk(0x555556bb0000)                     = 0x555556bb0000
mprotect(0x7f3edb182000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
memfd_create("syzkaller", 0)            = 3
mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed2cc8000
write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304
munmap(0x7f3ed2cc8000, 4194304)         = 0
openat(AT_FDCWD, "/dev/loop0", O_RDWR)  = 4
[   54.380909][ T4995] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4995 'syz-executor158'
ioctl(4, LOOP_SET_FD, 3)                = 0
close(3)                                = 0
mkdir("./file0", 0777)                  = 0
[   54.422269][ T4995] loop0: detected capacity change from 0 to 8192
[   54.433520][ T4995] REISERFS warning:  read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025
[   54.446582][ T4995] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal
[   54.456349][ T4995] REISERFS (device loop0): using ordered data mode
[   54.463433][ T4995] reiserfs: using flush barriers
[   54.469733][ T4995] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30
[   54.486234][ T4995] REISERFS (device loop0): checking transaction log (loop0)
mount("/dev/loop0", "./file0", "reiserfs", MS_DIRSYNC, "") = 0
openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3
chdir("./file0")                        = 0
ioctl(4, LOOP_CLR_FD)                   = 0
close(4)                                = 0
[   54.528216][ T4995] REISERFS (device loop0): Using r5 hash to sort names
[   54.535997][ T4995] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage.
[   54.554177][ T4995] 
[   54.556547][ T4995] ======================================================
[   54.563568][ T4995] WARNING: possible circular locking dependency detected
[   54.570587][ T4995] 6.4.0-rc7-syzkaller-00041-ge660abd551f1 #0 Not tainted
[   54.577592][ T4995] ------------------------------------------------------
[   54.584595][ T4995] syz-executor158/4995 is trying to acquire lock:
[   54.590991][ T4995] ffff888077ae8980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x136/0x610
[   54.600849][ T4995] 
[   54.600849][ T4995] but task is already holding lock:
[   54.608290][ T4995] ffff8880146df090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   54.617934][ T4995] 
[   54.617934][ T4995] which lock already depends on the new lock.
[   54.617934][ T4995] 
[   54.628316][ T4995] 
[   54.628316][ T4995] the existing dependency chain (in reverse order) is:
[   54.637311][ T4995] 
[   54.637311][ T4995] -> #1 (&sbi->lock){+.+.}-{3:3}:
[   54.644510][ T4995]        lock_acquire+0x1e3/0x520
[   54.649528][ T4995]        __mutex_lock_common+0x1d8/0x2530
[   54.655242][ T4995]        mutex_lock_nested+0x1b/0x20
[   54.660528][ T4995]        reiserfs_write_lock+0x7a/0xd0
[   54.665974][ T4995]        reiserfs_mkdir+0x321/0x8f0
[   54.671164][ T4995]        open_xa_dir+0x2cd/0x610
[   54.676090][ T4995]        xattr_lookup+0x24/0x280
[   54.681018][ T4995]        reiserfs_xattr_set_handle+0xfc/0xdc0
[   54.688646][ T4995]        reiserfs_security_write+0x157/0x1d0
[   54.694618][ T4995]        reiserfs_new_inode+0x1631/0x1d40
[   54.700374][ T4995]        reiserfs_create+0x3e7/0x6e0
[   54.705651][ T4995]        path_openat+0x13df/0x3170
[   54.710753][ T4995]        do_filp_open+0x234/0x490
[   54.715770][ T4995]        do_sys_openat2+0x13f/0x500
[   54.720958][ T4995]        __x64_sys_open+0x225/0x270
[   54.726143][ T4995]        do_syscall_64+0x41/0xc0
[   54.731076][ T4995]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   54.737478][ T4995] 
[   54.737478][ T4995] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}:
[   54.746077][ T4995]        validate_chain+0x166b/0x58f0
[   54.751440][ T4995]        __lock_acquire+0x1316/0x2070
[   54.756799][ T4995]        lock_acquire+0x1e3/0x520
[   54.761813][ T4995]        down_write_nested+0x3d/0x50
[   54.767094][ T4995]        open_xa_dir+0x136/0x610
[   54.774014][ T4995]        xattr_lookup+0x24/0x280
[   54.778940][ T4995]        reiserfs_xattr_get+0xfd/0x570
[   54.784386][ T4995]        __vfs_getxattr+0x436/0x470
[   54.789579][ T4995]        smk_fetch+0xb1/0x140
[   54.794244][ T4995]        smack_d_instantiate+0x6d9/0xb40
[   54.799864][ T4995]        security_d_instantiate+0x9b/0xf0
[   54.805588][ T4995]        d_instantiate_new+0x65/0x120
[   54.810946][ T4995]        reiserfs_create+0x5cf/0x6e0
[   54.816303][ T4995]        path_openat+0x13df/0x3170
[   54.821403][ T4995]        do_filp_open+0x234/0x490
[   54.826417][ T4995]        do_sys_openat2+0x13f/0x500
[   54.831603][ T4995]        __x64_sys_open+0x225/0x270
[   54.836789][ T4995]        do_syscall_64+0x41/0xc0
[   54.841747][ T4995]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   54.848151][ T4995] 
[   54.848151][ T4995] other info that might help us debug this:
[   54.848151][ T4995] 
[   54.858362][ T4995]  Possible unsafe locking scenario:
[   54.858362][ T4995] 
[   54.865801][ T4995]        CPU0                    CPU1
[   54.871149][ T4995]        ----                    ----
[   54.876508][ T4995]   lock(&sbi->lock);
[   54.880477][ T4995]                                lock(&type->i_mutex_dir_key#6/3);
[   54.888365][ T4995]                                lock(&sbi->lock);
[   54.894947][ T4995]   lock(&type->i_mutex_dir_key#6/3);
[   54.900324][ T4995] 
[   54.900324][ T4995]  *** DEADLOCK ***
[   54.900324][ T4995] 
[   54.908448][ T4995] 3 locks held by syz-executor158/4995:
[   54.913988][ T4995]  #0: ffff88807c5a8460 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90
[   54.923116][ T4995]  #1: ffff888077ae82e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x7ba/0x3170
[   54.933290][ T4995]  #2: ffff8880146df090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0
[   54.943282][ T4995] 
[   54.943282][ T4995] stack backtrace:
[   54.949155][ T4995] CPU: 1 PID: 4995 Comm: syz-executor158 Not tainted 6.4.0-rc7-syzkaller-00041-ge660abd551f1 #0
[   54.959550][ T4995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
[   54.969677][ T4995] Call Trace:
[   54.973033][ T4995]  <TASK>
[   54.975953][ T4995]  dump_stack_lvl+0x1e7/0x2d0
[   54.980621][ T4995]  ? nf_tcp_handle_invalid+0x650/0x650
[   54.986080][ T4995]  ? print_circular_bug+0x12b/0x1a0
[   54.991271][ T4995]  check_noncircular+0x2fe/0x3b0
[   54.996198][ T4995]  ? read_lock_is_recursive+0x20/0x20
[   55.001561][ T4995]  ? add_chain_block+0x850/0x850
[   55.006489][ T4995]  ? lockdep_lock+0x123/0x2b0
[   55.011156][ T4995]  ? check_path+0x40/0x40
[   55.015493][ T4995]  ? noop_count+0x30/0x30
[   55.019811][ T4995]  ? _find_first_zero_bit+0xd4/0x100
[   55.025086][ T4995]  validate_chain+0x166b/0x58f0
[   55.029939][ T4995]  ? stack_trace_save+0x1c0/0x1c0
[   55.034966][ T4995]  ? reacquire_held_locks+0x660/0x660
[   55.040333][ T4995]  ? look_up_lock_class+0x77/0x140
[   55.045437][ T4995]  ? register_lock_class+0x104/0x990
[   55.050712][ T4995]  ? __lock_acquire+0x1316/0x2070
[   55.055725][ T4995]  ? is_dynamic_key+0x1f0/0x1f0
[   55.060565][ T4995]  ? mark_lock+0x9a/0x340
[   55.064892][ T4995]  __lock_acquire+0x1316/0x2070
[   55.069763][ T4995]  lock_acquire+0x1e3/0x520
[   55.074271][ T4995]  ? open_xa_dir+0x136/0x610
[   55.078860][ T4995]  ? read_lock_is_recursive+0x20/0x20
[   55.084241][ T4995]  ? lockdep_hardirqs_on+0x98/0x140
[   55.089435][ T4995]  ? __might_sleep+0xc0/0xc0
[   55.094018][ T4995]  ? _raw_spin_unlock_irqrestore+0xdd/0x140
[   55.099906][ T4995]  ? _raw_spin_unlock+0x40/0x40
[   55.104747][ T4995]  ? stack_trace_snprint+0xf0/0xf0
[   55.109852][ T4995]  down_write_nested+0x3d/0x50
[   55.114603][ T4995]  ? open_xa_dir+0x136/0x610
[   55.119182][ T4995]  open_xa_dir+0x136/0x610
[   55.123588][ T4995]  ? kasan_set_track+0x61/0x70
[   55.128512][ T4995]  ? kasan_set_track+0x4f/0x70
[   55.133274][ T4995]  ? security_d_instantiate+0x9b/0xf0
[   55.138643][ T4995]  ? listxattr_filler+0x500/0x500
[   55.143658][ T4995]  ? do_sys_openat2+0x13f/0x500
[   55.148600][ T4995]  ? __static_call_text_end+0x59188/0x59188
[   55.154486][ T4995]  xattr_lookup+0x24/0x280
[   55.158912][ T4995]  reiserfs_xattr_get+0xfd/0x570
[   55.163842][ T4995]  ? security_get+0x6d/0xc0
[   55.168348][ T4995]  ? security_list+0x80/0x80
[   55.172930][ T4995]  __vfs_getxattr+0x436/0x470
[   55.177609][ T4995]  smk_fetch+0xb1/0x140
[   55.181772][ T4995]  smack_d_instantiate+0x6d9/0xb40
[   55.186891][ T4995]  ? smack_sem_semop+0x230/0x230
[   55.191828][ T4995]  security_d_instantiate+0x9b/0xf0
[   55.197021][ T4995]  d_instantiate_new+0x65/0x120
[   55.201861][ T4995]  reiserfs_create+0x5cf/0x6e0
[   55.206614][ T4995]  ? reiserfs_lookup+0x580/0x580
[   55.211545][ T4995]  ? bpf_lsm_inode_create+0x9/0x10
[   55.216642][ T4995]  ? security_inode_create+0xb8/0x100
[   55.222782][ T4995]  ? reiserfs_lookup+0x580/0x580
[   55.227706][ T4995]  path_openat+0x13df/0x3170
[   55.232297][ T4995]  ? do_filp_open+0x490/0x490
[   55.236972][ T4995]  do_filp_open+0x234/0x490
[   55.241464][ T4995]  ? vfs_tmpfile+0x4a0/0x4a0
[   55.246045][ T4995]  ? _raw_spin_unlock+0x28/0x40
[   55.250882][ T4995]  ? alloc_fd+0x59c/0x640
[   55.255203][ T4995]  do_sys_openat2+0x13f/0x500
[   55.259878][ T4995]  ? print_irqtrace_events+0x220/0x220
[   55.265329][ T4995]  ? do_sys_open+0x230/0x230
[   55.269909][ T4995]  ? lockdep_hardirqs_on+0x98/0x140
[   55.275095][ T4995]  ? _raw_spin_unlock_irq+0x2e/0x50
[   55.280285][ T4995]  ? ptrace_notify+0x278/0x380
[   55.285040][ T4995]  __x64_sys_open+0x225/0x270
[   55.289722][ T4995]  ? do_sys_openat2+0x500/0x500
[   55.294570][ T4995]  ? syscall_enter_from_user_mode+0x32/0x230
[   55.300542][ T4995]  ? syscall_enter_from_user_mode+0x8c/0x230
[   55.306511][ T4995]  do_syscall_64+0x41/0xc0
[   55.310916][ T4995]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   55.316795][ T4995] RIP: 0033:0x7f3edb114789
[   55.321196][ T4995] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[   55.340793][ T4995] RSP: 002b:00007fff5885eaa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[   55.349193][ T4995] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3edb114789
[   55.357151][ T4995] RDX: 0000000000000000 RSI: 0000000000143042 RDI: 0000000020002000
[   55.365109][ T4995] RBP: 00007f3edb0d4020 R08: 00000000000010e6 R09: 0000000000000000
[   55.373069][ T4995] R10: 00007fff5885e970 R11: 0000000000000246 R12: 00007f3edb0d40b0
open("./bus", O_RDWR|O_CREAT|O_SYNC|O_NOATIME|FASYNC, 000) = 4
exit_group(0)                           = ?
+++ exited with 0 +++
[   55.38102