./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2282874197 <...> DUID 00:04:9f:e8:07:f9:ba:36:1f:d4:05:68:5a:d1:6a:7f:90:cd forked to background, child pid 4659 [ 30.024451][ T4660] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.037497][ T4660] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.10.59' (ECDSA) to the list of known hosts. execve("./syz-executor2282874197", ["./syz-executor2282874197"], 0x7ffc17695cb0 /* 10 vars */) = 0 brk(NULL) = 0x555555c32000 brk(0x555555c32c40) = 0x555555c32c40 arch_prctl(ARCH_SET_FS, 0x555555c32300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor2282874197", 4096) = 28 brk(0x555555c53c40) = 0x555555c53c40 brk(0x555555c54000) = 0x555555c54000 mprotect(0x7fb71934c000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fb710e92000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304 munmap(0x7fb710e92000, 4194304) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 syzkaller login: [ 56.352318][ T4990] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4990 'syz-executor228' ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file0", 0777) = 0 [ 56.394414][ T4990] loop0: detected capacity change from 0 to 8192 [ 56.403841][ T4990] ======================================================= [ 56.403841][ T4990] WARNING: The mand mount option has been deprecated and [ 56.403841][ T4990] and is ignored by this kernel. Remove the mand [ 56.403841][ T4990] option from the mount to silence this warning. [ 56.403841][ T4990] ======================================================= [ 56.441075][ T4990] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 56.454263][ T4990] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 56.463592][ T4990] REISERFS (device loop0): using ordered data mode [ 56.470078][ T4990] reiserfs: using flush barriers [ 56.476153][ T4990] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 56.492585][ T4990] REISERFS (device loop0): checking transaction log (loop0) mount("/dev/loop0", "./file0", "reiserfs", MS_NOSUID|MS_MANDLOCK|MS_NODIRATIME|MS_LAZYTIME, "") = 0 openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 chdir("./file0") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 [ 56.533548][ T4990] REISERFS (device loop0): Using r5 hash to sort names [ 56.541331][ T4990] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 56.557661][ T4990] [ 56.560016][ T4990] ====================================================== [ 56.567380][ T4990] WARNING: possible circular locking dependency detected [ 56.574403][ T4990] 6.4.0-rc5-syzkaller-00305-g022ce8862dff #0 Not tainted [ 56.581427][ T4990] ------------------------------------------------------ [ 56.588431][ T4990] syz-executor228/4990 is trying to acquire lock: [ 56.594826][ T4990] ffff8880752a8980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x136/0x610 [ 56.604757][ T4990] [ 56.604757][ T4990] but task is already holding lock: [ 56.612095][ T4990] ffff888147a79090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0 [ 56.621644][ T4990] [ 56.621644][ T4990] which lock already depends on the new lock. [ 56.621644][ T4990] [ 56.632033][ T4990] [ 56.632033][ T4990] the existing dependency chain (in reverse order) is: [ 56.641030][ T4990] [ 56.641030][ T4990] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 56.648228][ T4990] lock_acquire+0x1e3/0x520 [ 56.653244][ T4990] __mutex_lock_common+0x1d8/0x2530 [ 56.658957][ T4990] mutex_lock_nested+0x1b/0x20 [ 56.664245][ T4990] reiserfs_write_lock+0x7a/0xd0 [ 56.669698][ T4990] reiserfs_mkdir+0x321/0x8f0 [ 56.674884][ T4990] open_xa_dir+0x2cd/0x610 [ 56.679811][ T4990] xattr_lookup+0x24/0x280 [ 56.684737][ T4990] reiserfs_xattr_set_handle+0xfc/0xdc0 [ 56.690789][ T4990] reiserfs_security_write+0x157/0x1d0 [ 56.696853][ T4990] reiserfs_new_inode+0x1631/0x1d40 [ 56.702559][ T4990] reiserfs_create+0x3e7/0x6e0 [ 56.707835][ T4990] path_openat+0x13df/0x3170 [ 56.712933][ T4990] do_filp_open+0x234/0x490 [ 56.717942][ T4990] do_sys_openat2+0x13f/0x500 [ 56.723130][ T4990] __x64_sys_open+0x225/0x270 [ 56.728315][ T4990] do_syscall_64+0x41/0xc0 [ 56.733240][ T4990] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 56.739644][ T4990] [ 56.739644][ T4990] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}: [ 56.748240][ T4990] validate_chain+0x166b/0x58f0 [ 56.753601][ T4990] __lock_acquire+0x1316/0x2070 [ 56.758961][ T4990] lock_acquire+0x1e3/0x520 [ 56.763976][ T4990] down_write_nested+0x3d/0x50 [ 56.769255][ T4990] open_xa_dir+0x136/0x610 [ 56.774184][ T4990] xattr_lookup+0x24/0x280 [ 56.779109][ T4990] reiserfs_xattr_get+0xfd/0x570 [ 56.784553][ T4990] __vfs_getxattr+0x436/0x470 [ 56.789738][ T4990] smk_fetch+0xb1/0x140 [ 56.794406][ T4990] smack_d_instantiate+0x6d9/0xb40 [ 56.800027][ T4990] security_d_instantiate+0x9b/0xf0 [ 56.805738][ T4990] d_instantiate_new+0x65/0x120 [ 56.811099][ T4990] reiserfs_create+0x5cf/0x6e0 [ 56.816369][ T4990] path_openat+0x13df/0x3170 [ 56.821466][ T4990] do_filp_open+0x234/0x490 [ 56.826475][ T4990] do_sys_openat2+0x13f/0x500 [ 56.831662][ T4990] __x64_sys_open+0x225/0x270 [ 56.836848][ T4990] do_syscall_64+0x41/0xc0 [ 56.841768][ T4990] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 56.848171][ T4990] [ 56.848171][ T4990] other info that might help us debug this: [ 56.848171][ T4990] [ 56.858386][ T4990] Possible unsafe locking scenario: [ 56.858386][ T4990] [ 56.865828][ T4990] CPU0 CPU1 [ 56.871179][ T4990] ---- ---- [ 56.876527][ T4990] lock(&sbi->lock); [ 56.880502][ T4990] lock(&type->i_mutex_dir_key#6/3); [ 56.888386][ T4990] lock(&sbi->lock); [ 56.894877][ T4990] lock(&type->i_mutex_dir_key#6/3); [ 56.900244][ T4990] [ 56.900244][ T4990] *** DEADLOCK *** [ 56.900244][ T4990] [ 56.908369][ T4990] 3 locks held by syz-executor228/4990: [ 56.913896][ T4990] #0: ffff88807cdc0460 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 56.923029][ T4990] #1: ffff8880752a82e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: path_openat+0x7ba/0x3170 [ 56.933196][ T4990] #2: ffff888147a79090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0 [ 56.943188][ T4990] [ 56.943188][ T4990] stack backtrace: [ 56.949061][ T4990] CPU: 0 PID: 4990 Comm: syz-executor228 Not tainted 6.4.0-rc5-syzkaller-00305-g022ce8862dff #0 [ 56.959455][ T4990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 56.969495][ T4990] Call Trace: [ 56.972762][ T4990] [ 56.975681][ T4990] dump_stack_lvl+0x1e7/0x2d0 [ 56.980348][ T4990] ? nf_tcp_handle_invalid+0x650/0x650 [ 56.985801][ T4990] ? print_circular_bug+0x12b/0x1a0 [ 56.990992][ T4990] check_noncircular+0x2fe/0x3b0 [ 56.995920][ T4990] ? read_lock_is_recursive+0x20/0x20 [ 57.001283][ T4990] ? add_chain_block+0x850/0x850 [ 57.006212][ T4990] ? lockdep_lock+0x123/0x2b0 [ 57.010879][ T4990] ? check_path+0x40/0x40 [ 57.015200][ T4990] ? noop_count+0x30/0x30 [ 57.019517][ T4990] ? _find_first_zero_bit+0xd4/0x100 [ 57.024799][ T4990] validate_chain+0x166b/0x58f0 [ 57.029643][ T4990] ? stack_trace_save+0x1c0/0x1c0 [ 57.034663][ T4990] ? reacquire_held_locks+0x660/0x660 [ 57.040029][ T4990] ? look_up_lock_class+0x77/0x140 [ 57.045128][ T4990] ? register_lock_class+0x104/0x990 [ 57.050403][ T4990] ? __lock_acquire+0x1316/0x2070 [ 57.055417][ T4990] ? is_dynamic_key+0x1f0/0x1f0 [ 57.060257][ T4990] ? mark_lock+0x9a/0x340 [ 57.064583][ T4990] __lock_acquire+0x1316/0x2070 [ 57.069429][ T4990] lock_acquire+0x1e3/0x520 [ 57.073925][ T4990] ? open_xa_dir+0x136/0x610 [ 57.078508][ T4990] ? read_lock_is_recursive+0x20/0x20 [ 57.083872][ T4990] ? lockdep_hardirqs_on+0x98/0x140 [ 57.089061][ T4990] ? __might_sleep+0xc0/0xc0 [ 57.093642][ T4990] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 57.099527][ T4990] ? _raw_spin_unlock+0x40/0x40 [ 57.104367][ T4990] ? stack_trace_snprint+0xf0/0xf0 [ 57.109646][ T4990] down_write_nested+0x3d/0x50 [ 57.114397][ T4990] ? open_xa_dir+0x136/0x610 [ 57.118989][ T4990] open_xa_dir+0x136/0x610 [ 57.123396][ T4990] ? kasan_set_track+0x61/0x70 [ 57.128147][ T4990] ? kasan_set_track+0x4f/0x70 [ 57.132900][ T4990] ? security_d_instantiate+0x9b/0xf0 [ 57.138263][ T4990] ? listxattr_filler+0x500/0x500 [ 57.143282][ T4990] ? do_sys_openat2+0x13f/0x500 [ 57.148123][ T4990] ? __static_call_text_end+0x5cfa8/0x5cfa8 [ 57.154011][ T4990] xattr_lookup+0x24/0x280 [ 57.158421][ T4990] reiserfs_xattr_get+0xfd/0x570 [ 57.163352][ T4990] ? security_get+0x6d/0xc0 [ 57.167850][ T4990] ? security_list+0x80/0x80 [ 57.172427][ T4990] __vfs_getxattr+0x436/0x470 [ 57.177100][ T4990] smk_fetch+0xb1/0x140 [ 57.181245][ T4990] smack_d_instantiate+0x6d9/0xb40 [ 57.186436][ T4990] ? smack_sem_semop+0x230/0x230 [ 57.191372][ T4990] security_d_instantiate+0x9b/0xf0 [ 57.196565][ T4990] d_instantiate_new+0x65/0x120 [ 57.201404][ T4990] reiserfs_create+0x5cf/0x6e0 [ 57.206160][ T4990] ? reiserfs_lookup+0x580/0x580 [ 57.211090][ T4990] ? bpf_lsm_inode_create+0x9/0x10 [ 57.216186][ T4990] ? security_inode_create+0xb8/0x100 [ 57.221548][ T4990] ? reiserfs_lookup+0x580/0x580 [ 57.226474][ T4990] path_openat+0x13df/0x3170 [ 57.231060][ T4990] ? do_filp_open+0x490/0x490 [ 57.235737][ T4990] do_filp_open+0x234/0x490 [ 57.240232][ T4990] ? vfs_tmpfile+0x4a0/0x4a0 [ 57.244820][ T4990] ? _raw_spin_unlock+0x28/0x40 [ 57.249655][ T4990] ? alloc_fd+0x59c/0x640 [ 57.253979][ T4990] do_sys_openat2+0x13f/0x500 [ 57.258691][ T4990] ? print_irqtrace_events+0x220/0x220 [ 57.264143][ T4990] ? do_sys_open+0x230/0x230 [ 57.268723][ T4990] ? lockdep_hardirqs_on+0x98/0x140 [ 57.273914][ T4990] ? _raw_spin_unlock_irq+0x2e/0x50 [ 57.279103][ T4990] ? ptrace_notify+0x278/0x380 [ 57.283869][ T4990] __x64_sys_open+0x225/0x270 [ 57.288544][ T4990] ? do_sys_openat2+0x500/0x500 [ 57.293471][ T4990] ? syscall_enter_from_user_mode+0x32/0x230 [ 57.299440][ T4990] ? syscall_enter_from_user_mode+0x8c/0x230 [ 57.305410][ T4990] do_syscall_64+0x41/0xc0 [ 57.309815][ T4990] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.315700][ T4990] RIP: 0033:0x7fb7192de789 [ 57.320110][ T4990] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 57.339794][ T4990] RSP: 002b:00007ffc132b04e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 57.348195][ T4990] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb7192de789 [ 57.356159][ T4990] RDX: 0000000000000000 RSI: 000000000014937e RDI: 0000000020000180 [ 57.364117][ T4990] RBP: 00007fb71929e020 R08: 00000000000010e6 R09: 0000000000000000 [ 57.372073][ T4990] R10: 00007ffc132b03b0 R11: 0000000000000246 R12: 00007fb71929e0b0 open("./bus", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_SYNC|O_LARGEFILE|O_NOATIME|0x3c, 000) = 4 exit_group(0) = ? +++ exited with 0 +++ [ 57.380028][ T4990] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000