./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3635940950 <...> Warning: Permanently added '10.128.0.122' (ECDSA) to the list of known hosts. execve("./syz-executor3635940950", ["./syz-executor3635940950"], 0x7ffedd929230 /* 10 vars */) = 0 brk(NULL) = 0x555555890000 brk(0x555555890c40) = 0x555555890c40 arch_prctl(ARCH_SET_FS, 0x555555890300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3635940950", 4096) = 28 brk(0x5555558b1c40) = 0x5555558b1c40 brk(0x5555558b2000) = 0x5555558b2000 mprotect(0x7f083185a000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f08293a0000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304 munmap(0x7f08293a0000, 4194304) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [ 76.320511][ T5000] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=5000 'syz-executor363' ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file0", 0777) = 0 [ 76.376065][ T5000] loop0: detected capacity change from 0 to 8192 [ 76.388830][ T5000] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 76.402155][ T5000] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 76.411884][ T5000] REISERFS (device loop0): using ordered data mode [ 76.418537][ T5000] reiserfs: using flush barriers [ 76.425144][ T5000] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 76.441709][ T5000] REISERFS (device loop0): checking transaction log (loop0) [ 76.451350][ T5000] REISERFS (device loop0): Using r5 hash to sort names mount("/dev/loop0", "./file0", "reiserfs", MS_DIRSYNC|MS_POSIXACL, "") = 0 openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 chdir("./file0") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 [ 76.466256][ T5000] REISERFS warning (device loop0): jdm-13090 reiserfs_new_inode: ACLs aren't enabled in the fs, but vfs thinks they are! [ 76.479582][ T5000] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 76.502059][ T5000] [ 76.504437][ T5000] ====================================================== [ 76.511468][ T5000] WARNING: possible circular locking dependency detected [ 76.518506][ T5000] 6.4.0-rc7-syzkaller-00072-gdad9774deaf1 #0 Not tainted [ 76.525547][ T5000] ------------------------------------------------------ [ 76.532584][ T5000] syz-executor363/5000 is trying to acquire lock: [ 76.539054][ T5000] ffff888078b58980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x136/0x610 [ 76.548969][ T5000] [ 76.548969][ T5000] but task is already holding lock: [ 76.556355][ T5000] ffff8880201c7090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0 [ 76.566058][ T5000] [ 76.566058][ T5000] which lock already depends on the new lock. [ 76.566058][ T5000] [ 76.576477][ T5000] [ 76.576477][ T5000] the existing dependency chain (in reverse order) is: [ 76.585514][ T5000] [ 76.585514][ T5000] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 76.592845][ T5000] lock_acquire+0x1e3/0x520 [ 76.597899][ T5000] __mutex_lock_common+0x1d8/0x2530 [ 76.603641][ T5000] mutex_lock_nested+0x1b/0x20 [ 76.608929][ T5000] reiserfs_write_lock+0x7a/0xd0 [ 76.614398][ T5000] reiserfs_mkdir+0x321/0x8f0 [ 76.619599][ T5000] open_xa_dir+0x2cd/0x610 [ 76.624568][ T5000] xattr_lookup+0x24/0x280 [ 76.629512][ T5000] reiserfs_xattr_set_handle+0xfc/0xdc0 [ 76.635589][ T5000] reiserfs_security_write+0x157/0x1d0 [ 76.641663][ T5000] reiserfs_new_inode+0x1631/0x1d40 [ 76.647390][ T5000] reiserfs_mkdir+0x5b0/0x8f0 [ 76.652591][ T5000] vfs_mkdir+0x29d/0x450 [ 76.657357][ T5000] do_mkdirat+0x264/0x520 [ 76.662297][ T5000] __x64_sys_mkdir+0x6e/0x80 [ 76.667411][ T5000] do_syscall_64+0x41/0xc0 [ 76.672348][ T5000] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 76.678770][ T5000] [ 76.678770][ T5000] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}: [ 76.687417][ T5000] validate_chain+0x166b/0x58f0 [ 76.692797][ T5000] __lock_acquire+0x1316/0x2070 [ 76.698201][ T5000] lock_acquire+0x1e3/0x520 [ 76.703230][ T5000] down_write_nested+0x3d/0x50 [ 76.708610][ T5000] open_xa_dir+0x136/0x610 [ 76.713561][ T5000] xattr_lookup+0x24/0x280 [ 76.718592][ T5000] reiserfs_xattr_get+0xfd/0x570 [ 76.724055][ T5000] __vfs_getxattr+0x436/0x470 [ 76.729262][ T5000] smk_fetch+0xb1/0x140 [ 76.733945][ T5000] smack_d_instantiate+0x6d9/0xb40 [ 76.739584][ T5000] security_d_instantiate+0x9b/0xf0 [ 76.745315][ T5000] d_instantiate_new+0x65/0x120 [ 76.750701][ T5000] reiserfs_mkdir+0x769/0x8f0 [ 76.755907][ T5000] vfs_mkdir+0x29d/0x450 [ 76.760674][ T5000] do_mkdirat+0x264/0x520 [ 76.765527][ T5000] __x64_sys_mkdir+0x6e/0x80 [ 76.770643][ T5000] do_syscall_64+0x41/0xc0 [ 76.775580][ T5000] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 76.782000][ T5000] [ 76.782000][ T5000] other info that might help us debug this: [ 76.782000][ T5000] [ 76.792225][ T5000] Possible unsafe locking scenario: [ 76.792225][ T5000] [ 76.799673][ T5000] CPU0 CPU1 [ 76.805033][ T5000] ---- ---- [ 76.810396][ T5000] lock(&sbi->lock); [ 76.814382][ T5000] lock(&type->i_mutex_dir_key#6/3); [ 76.822291][ T5000] lock(&sbi->lock); [ 76.828794][ T5000] lock(&type->i_mutex_dir_key#6/3); [ 76.834186][ T5000] [ 76.834186][ T5000] *** DEADLOCK *** [ 76.834186][ T5000] [ 76.842330][ T5000] 3 locks held by syz-executor363/5000: [ 76.847959][ T5000] #0: ffff88807c6e4460 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 76.857123][ T5000] #1: ffff888078b582e0 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x260/0x530 [ 76.867763][ T5000] #2: ffff8880201c7090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0 [ 76.877789][ T5000] [ 76.877789][ T5000] stack backtrace: [ 76.883677][ T5000] CPU: 0 PID: 5000 Comm: syz-executor363 Not tainted 6.4.0-rc7-syzkaller-00072-gdad9774deaf1 #0 [ 76.894089][ T5000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 76.904236][ T5000] Call Trace: [ 76.907519][ T5000] [ 76.910455][ T5000] dump_stack_lvl+0x1e7/0x2d0 [ 76.915139][ T5000] ? nf_tcp_handle_invalid+0x650/0x650 [ 76.920610][ T5000] ? print_circular_bug+0x12b/0x1a0 [ 76.925825][ T5000] check_noncircular+0x2fe/0x3b0 [ 76.930780][ T5000] ? read_lock_is_recursive+0x20/0x20 [ 76.936164][ T5000] ? add_chain_block+0x850/0x850 [ 76.941115][ T5000] ? lockdep_lock+0x123/0x2b0 [ 76.945805][ T5000] ? check_path+0x40/0x40 [ 76.950148][ T5000] ? noop_count+0x30/0x30 [ 76.954485][ T5000] ? _find_first_zero_bit+0xd4/0x100 [ 76.959964][ T5000] validate_chain+0x166b/0x58f0 [ 76.964845][ T5000] ? stack_trace_save+0x1c0/0x1c0 [ 76.969901][ T5000] ? reacquire_held_locks+0x660/0x660 [ 76.975291][ T5000] ? look_up_lock_class+0x77/0x140 [ 76.980414][ T5000] ? register_lock_class+0x104/0x990 [ 76.985711][ T5000] ? __lock_acquire+0x1316/0x2070 [ 76.990747][ T5000] ? is_dynamic_key+0x1f0/0x1f0 [ 76.995615][ T5000] ? mark_lock+0x9a/0x340 [ 76.999956][ T5000] __lock_acquire+0x1316/0x2070 [ 77.004837][ T5000] lock_acquire+0x1e3/0x520 [ 77.009367][ T5000] ? open_xa_dir+0x136/0x610 [ 77.013983][ T5000] ? read_lock_is_recursive+0x20/0x20 [ 77.019454][ T5000] ? lockdep_hardirqs_on+0x98/0x140 [ 77.024663][ T5000] ? __might_sleep+0xc0/0xc0 [ 77.029270][ T5000] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 77.035173][ T5000] ? _raw_spin_unlock+0x40/0x40 [ 77.040041][ T5000] ? stack_trace_snprint+0xf0/0xf0 [ 77.045171][ T5000] down_write_nested+0x3d/0x50 [ 77.050033][ T5000] ? open_xa_dir+0x136/0x610 [ 77.054632][ T5000] open_xa_dir+0x136/0x610 [ 77.059082][ T5000] ? kasan_set_track+0x61/0x70 [ 77.063894][ T5000] ? kasan_set_track+0x4f/0x70 [ 77.068668][ T5000] ? security_d_instantiate+0x9b/0xf0 [ 77.074055][ T5000] ? listxattr_filler+0x500/0x500 [ 77.079176][ T5000] ? __x64_sys_mkdir+0x6e/0x80 [ 77.083955][ T5000] xattr_lookup+0x24/0x280 [ 77.088404][ T5000] reiserfs_xattr_get+0xfd/0x570 [ 77.093381][ T5000] ? security_get+0x6d/0xc0 [ 77.097907][ T5000] ? security_list+0x80/0x80 [ 77.102637][ T5000] __vfs_getxattr+0x436/0x470 [ 77.107333][ T5000] smk_fetch+0xb1/0x140 [ 77.111503][ T5000] smack_d_instantiate+0x6d9/0xb40 [ 77.116644][ T5000] ? smack_sem_semop+0x230/0x230 [ 77.121681][ T5000] ? __raw_spin_lock_init+0x45/0x100 [ 77.126987][ T5000] security_d_instantiate+0x9b/0xf0 [ 77.132200][ T5000] d_instantiate_new+0x65/0x120 [ 77.137060][ T5000] reiserfs_mkdir+0x769/0x8f0 [ 77.141750][ T5000] ? reiserfs_symlink+0x720/0x720 [ 77.146779][ T5000] ? from_kgid+0x1a7/0x730 [ 77.156089][ T5000] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 77.161119][ T5000] ? security_inode_mkdir+0xb8/0x100 [ 77.166425][ T5000] vfs_mkdir+0x29d/0x450 [ 77.170680][ T5000] do_mkdirat+0x264/0x520 [ 77.175022][ T5000] ? vfs_mkdir+0x450/0x450 [ 77.179446][ T5000] ? getname_flags+0x1f0/0x4e0 [ 77.184213][ T5000] __x64_sys_mkdir+0x6e/0x80 [ 77.188822][ T5000] do_syscall_64+0x41/0xc0 [ 77.193270][ T5000] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 77.199193][ T5000] RIP: 0033:0x7f08317ec819 [ 77.203619][ T5000] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 mkdir("./file0", 000) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 77.223230][ T5000] RSP: 002b:00007ffcb506db38 EFLAGS: 00000246 ORIG_RAX: 0