./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor792357000 <...> Warning: Permanently added '10.128.0.162' (ECDSA) to the list of known hosts. execve("./syz-executor792357000", ["./syz-executor792357000"], 0x7ffdd0c438e0 /* 10 vars */) = 0 brk(NULL) = 0x555555cd6000 brk(0x555555cd6c40) = 0x555555cd6c40 arch_prctl(ARCH_SET_FS, 0x555555cd6300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor792357000", 4096) = 27 brk(0x555555cf7c40) = 0x555555cf7c40 brk(0x555555cf8000) = 0x555555cf8000 mprotect(0x7f25eb968000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f25e34ae000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304 munmap(0x7f25e34ae000, 4194304) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [ 66.639261][ T4993] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4993 'syz-executor792' ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file1", 0777) = 0 [ 66.691042][ T4993] loop0: detected capacity change from 0 to 8192 [ 66.704442][ T4993] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 66.717647][ T4993] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 66.727031][ T4993] REISERFS (device loop0): using ordered data mode [ 66.733539][ T4993] reiserfs: using flush barriers [ 66.740023][ T4993] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 66.756617][ T4993] REISERFS (device loop0): checking transaction log (loop0) mount("/dev/loop0", "./file1", "reiserfs", 0, "") = 0 openat(AT_FDCWD, "./file1", O_RDONLY|O_DIRECTORY) = 3 chdir("./file1") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 [ 66.819939][ T4993] REISERFS (device loop0): Using r5 hash to sort names [ 66.827951][ T4993] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 66.848308][ T4993] [ 66.850704][ T4993] ====================================================== [ 66.857745][ T4993] WARNING: possible circular locking dependency detected [ 66.864792][ T4993] 6.4.0-rc5-syzkaller-00002-gf8dba31b0a82 #0 Not tainted [ 66.871840][ T4993] ------------------------------------------------------ [ 66.878877][ T4993] syz-executor792/4993 is trying to acquire lock: [ 66.885284][ T4993] ffff888046398980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x136/0x610 [ 66.895154][ T4993] [ 66.895154][ T4993] but task is already holding lock: [ 66.902509][ T4993] ffff888014ec3090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0 [ 66.912123][ T4993] [ 66.912123][ T4993] which lock already depends on the new lock. [ 66.912123][ T4993] [ 66.922525][ T4993] [ 66.922525][ T4993] the existing dependency chain (in reverse order) is: [ 66.931533][ T4993] [ 66.931533][ T4993] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 66.938740][ T4993] lock_acquire+0x1e3/0x520 [ 66.943768][ T4993] __mutex_lock_common+0x1d8/0x2530 [ 66.949499][ T4993] mutex_lock_nested+0x1b/0x20 [ 66.954789][ T4993] reiserfs_write_lock+0x7a/0xd0 [ 66.960267][ T4993] reiserfs_mkdir+0x321/0x8f0 [ 66.965478][ T4993] open_xa_dir+0x2cd/0x610 [ 66.970422][ T4993] xattr_lookup+0x24/0x280 [ 66.975365][ T4993] reiserfs_xattr_set_handle+0xfc/0xdc0 [ 66.981437][ T4993] reiserfs_security_write+0x157/0x1d0 [ 66.987420][ T4993] reiserfs_new_inode+0x1631/0x1d40 [ 66.993143][ T4993] reiserfs_mkdir+0x5b0/0x8f0 [ 66.998354][ T4993] vfs_mkdir+0x29d/0x450 [ 67.003133][ T4993] do_mkdirat+0x264/0x520 [ 67.008035][ T4993] __x64_sys_mkdir+0x6e/0x80 [ 67.013161][ T4993] do_syscall_64+0x41/0xc0 [ 67.018106][ T4993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.024628][ T4993] [ 67.024628][ T4993] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}: [ 67.033294][ T4993] validate_chain+0x166b/0x58f0 [ 67.038680][ T4993] __lock_acquire+0x1316/0x2070 [ 67.044059][ T4993] lock_acquire+0x1e3/0x520 [ 67.049086][ T4993] down_write_nested+0x3d/0x50 [ 67.054370][ T4993] open_xa_dir+0x136/0x610 [ 67.059309][ T4993] xattr_lookup+0x24/0x280 [ 67.064271][ T4993] reiserfs_xattr_get+0xfd/0x570 [ 67.069731][ T4993] __vfs_getxattr+0x436/0x470 [ 67.074930][ T4993] smk_fetch+0xb1/0x140 [ 67.079608][ T4993] smack_d_instantiate+0x6d9/0xb40 [ 67.085251][ T4993] security_d_instantiate+0x9b/0xf0 [ 67.090981][ T4993] d_instantiate_new+0x65/0x120 [ 67.096354][ T4993] reiserfs_mkdir+0x769/0x8f0 [ 67.101551][ T4993] vfs_mkdir+0x29d/0x450 [ 67.106312][ T4993] do_mkdirat+0x264/0x520 [ 67.111162][ T4993] __x64_sys_mkdir+0x6e/0x80 [ 67.116275][ T4993] do_syscall_64+0x41/0xc0 [ 67.121214][ T4993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.127627][ T4993] [ 67.127627][ T4993] other info that might help us debug this: [ 67.127627][ T4993] [ 67.137848][ T4993] Possible unsafe locking scenario: [ 67.137848][ T4993] [ 67.145288][ T4993] CPU0 CPU1 [ 67.150644][ T4993] ---- ---- [ 67.156016][ T4993] lock(&sbi->lock); [ 67.160015][ T4993] lock(&type->i_mutex_dir_key#6/3); [ 67.167919][ T4993] lock(&sbi->lock); [ 67.174414][ T4993] lock(&type->i_mutex_dir_key#6/3); [ 67.179794][ T4993] [ 67.179794][ T4993] *** DEADLOCK *** [ 67.179794][ T4993] [ 67.187930][ T4993] 3 locks held by syz-executor792/4993: [ 67.193591][ T4993] #0: ffff88807a3f4460 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 67.202737][ T4993] #1: ffff8880463982e0 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x260/0x530 [ 67.213370][ T4993] #2: ffff888014ec3090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0 [ 67.223387][ T4993] [ 67.223387][ T4993] stack backtrace: [ 67.229268][ T4993] CPU: 1 PID: 4993 Comm: syz-executor792 Not tainted 6.4.0-rc5-syzkaller-00002-gf8dba31b0a82 #0 [ 67.239671][ T4993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 67.249721][ T4993] Call Trace: [ 67.252995][ T4993] [ 67.255921][ T4993] dump_stack_lvl+0x1e7/0x2d0 [ 67.260607][ T4993] ? nf_tcp_handle_invalid+0x650/0x650 [ 67.266076][ T4993] ? print_circular_bug+0x12b/0x1a0 [ 67.271279][ T4993] check_noncircular+0x2fe/0x3b0 [ 67.276223][ T4993] ? add_chain_block+0x850/0x850 [ 67.281165][ T4993] ? lockdep_lock+0x123/0x2b0 [ 67.285845][ T4993] ? reacquire_held_locks+0x660/0x660 [ 67.291220][ T4993] ? _find_first_zero_bit+0xd4/0x100 [ 67.296506][ T4993] validate_chain+0x166b/0x58f0 [ 67.301369][ T4993] ? reacquire_held_locks+0x660/0x660 [ 67.306768][ T4993] ? look_up_lock_class+0x77/0x140 [ 67.311884][ T4993] ? register_lock_class+0x104/0x990 [ 67.317181][ T4993] ? is_dynamic_key+0x1f0/0x1f0 [ 67.322040][ T4993] ? mark_lock+0x9a/0x340 [ 67.326386][ T4993] __lock_acquire+0x1316/0x2070 [ 67.331246][ T4993] lock_acquire+0x1e3/0x520 [ 67.335751][ T4993] ? open_xa_dir+0x136/0x610 [ 67.340347][ T4993] ? read_lock_is_recursive+0x20/0x20 [ 67.345722][ T4993] ? free_unref_page_commit+0x20c/0x540 [ 67.351268][ T4993] ? __might_sleep+0xc0/0xc0 [ 67.355863][ T4993] ? free_unref_page+0x1a3/0x3f0 [ 67.360806][ T4993] down_write_nested+0x3d/0x50 [ 67.365570][ T4993] ? open_xa_dir+0x136/0x610 [ 67.370249][ T4993] open_xa_dir+0x136/0x610 [ 67.374685][ T4993] ? kasan_set_track+0x61/0x70 [ 67.379449][ T4993] ? kasan_set_track+0x4f/0x70 [ 67.384236][ T4993] ? security_d_instantiate+0x9b/0xf0 [ 67.389629][ T4993] ? listxattr_filler+0x500/0x500 [ 67.394664][ T4993] ? __x64_sys_mkdir+0x6e/0x80 [ 67.399445][ T4993] xattr_lookup+0x24/0x280 [ 67.403891][ T4993] reiserfs_xattr_get+0xfd/0x570 [ 67.408838][ T4993] ? security_get+0x6d/0xc0 [ 67.413344][ T4993] ? security_list+0x80/0x80 [ 67.417934][ T4993] __vfs_getxattr+0x436/0x470 [ 67.422619][ T4993] smk_fetch+0xb1/0x140 [ 67.426781][ T4993] smack_d_instantiate+0x6d9/0xb40 [ 67.431996][ T4993] ? smack_sem_semop+0x230/0x230 [ 67.436961][ T4993] ? __raw_spin_lock_init+0x45/0x100 [ 67.442280][ T4993] security_d_instantiate+0x9b/0xf0 [ 67.447484][ T4993] d_instantiate_new+0x65/0x120 [ 67.452356][ T4993] reiserfs_mkdir+0x769/0x8f0 [ 67.457059][ T4993] ? reiserfs_symlink+0x720/0x720 [ 67.462082][ T4993] ? from_kgid+0x1a7/0x730 [ 67.466511][ T4993] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 67.471534][ T4993] ? security_inode_mkdir+0xb8/0x100 [ 67.476823][ T4993] vfs_mkdir+0x29d/0x450 [ 67.481068][ T4993] do_mkdirat+0x264/0x520 [ 67.485395][ T4993] ? vfs_mkdir+0x450/0x450 [ 67.489810][ T4993] ? getname_flags+0x1f0/0x4e0 [ 67.494621][ T4993] __x64_sys_mkdir+0x6e/0x80 [ 67.499233][ T4993] do_syscall_64+0x41/0xc0 [ 67.503711][ T4993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.509616][ T4993] RIP: 0033:0x7f25eb8fa789 [ 67.514032][ T4993] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 67.533653][ T4993] RSP: 002b:00007fff09b75668 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 67.542083][ T4993] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f25eb8fa789 [ 67.550083][ T4993] RDX: 00007f25eb8b8e03 RSI: 0000000000000000 RDI: 0000000020000580 [ 67.558061][ T4993] RBP: 00007f25eb8ba020 R08: 00000000000010fc R09: 0000000000000000 mkdir("./bus", 000) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 67.566046][ T4993] R10: 00007fff09b75530 R11: 0000000000000246 R12: 00007f25eb8b