./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4034919835 <...> Warning: Permanently added '10.128.0.251' (ED25519) to the list of known hosts. execve("./syz-executor4034919835", ["./syz-executor4034919835"], 0x7ffd96861860 /* 10 vars */) = 0 brk(NULL) = 0x555556146000 brk(0x555556146d00) = 0x555556146d00 arch_prctl(ARCH_SET_FS, 0x555556146380) = 0 set_tid_address(0x555556146650) = 5055 set_robust_list(0x555556146660, 24) = 0 rseq(0x555556146ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor4034919835", 4096) = 28 getrandom("\xbb\xf4\x91\xe6\xab\x52\xed\x6f", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555556146d00 brk(0x555556167d00) = 0x555556167d00 brk(0x555556168000) = 0x555556168000 mprotect(0x7fc88735c000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fc87eeab000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304 munmap(0x7fc87eeab000, 138412032) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file0", 0777) = 0 [ 55.093022][ T5055] loop0: detected capacity change from 0 to 8192 [ 55.115151][ T5055] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 55.128327][ T5055] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 55.137925][ T5055] REISERFS (device loop0): using ordered data mode [ 55.144589][ T5055] reiserfs: using flush barriers [ 55.154270][ T5055] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 55.170771][ T5055] REISERFS (device loop0): checking transaction log (loop0) [ 55.180553][ T5055] REISERFS (device loop0): Using tea hash to sort names mount("/dev/loop0", "./file0", "reiserfs", 0, "") = 0 openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 [ 55.188382][ T5055] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. ioctl(3, FS_IOC_SETVERSION, 0) = -1 EFAULT (Bad address) [ 55.245357][ T5055] [ 55.247725][ T5055] ====================================================== [ 55.254744][ T5055] WARNING: possible circular locking dependency detected [ 55.261754][ T5055] 6.7.0-rc7-syzkaller-00016-gf5837722ffec #0 Not tainted [ 55.268765][ T5055] ------------------------------------------------------ [ 55.275768][ T5055] syz-executor403/5055 is trying to acquire lock: [ 55.282167][ T5055] ffff8880775782e0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}, at: vfs_setxattr+0x1e1/0x420 [ 55.291921][ T5055] [ 55.291921][ T5055] but task is already holding lock: [ 55.299358][ T5055] ffff88801de20418 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 55.308152][ T5055] [ 55.308152][ T5055] which lock already depends on the new lock. [ 55.308152][ T5055] [ 55.318538][ T5055] [ 55.318538][ T5055] the existing dependency chain (in reverse order) is: [ 55.327575][ T5055] [ 55.327575][ T5055] -> #2 (sb_writers#9){.+.+}-{0:0}: [ 55.334964][ T5055] lock_acquire+0x1e3/0x530 [ 55.339979][ T5055] sb_start_write+0x4d/0x1c0 [ 55.345072][ T5055] mnt_want_write_file+0x61/0x200 [ 55.350598][ T5055] reiserfs_ioctl+0x178/0x2f0 [ 55.355777][ T5055] __se_sys_ioctl+0xf8/0x170 [ 55.360909][ T5055] do_syscall_64+0x45/0x110 [ 55.366311][ T5055] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 55.372717][ T5055] [ 55.372717][ T5055] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 55.379905][ T5055] lock_acquire+0x1e3/0x530 [ 55.384915][ T5055] __mutex_lock+0x136/0xd60 [ 55.389924][ T5055] reiserfs_write_lock+0x7a/0xd0 [ 55.395366][ T5055] reiserfs_lookup+0x162/0x580 [ 55.400632][ T5055] __lookup_slow+0x282/0x3e0 [ 55.405842][ T5055] lookup_one_len+0x188/0x2c0 [ 55.411020][ T5055] reiserfs_lookup_privroot+0x89/0x180 [ 55.417006][ T5055] reiserfs_fill_super+0x21c1/0x2620 [ 55.422811][ T5055] mount_bdev+0x237/0x300 [ 55.427665][ T5055] legacy_get_tree+0xef/0x190 [ 55.432849][ T5055] vfs_get_tree+0x8c/0x2a0 [ 55.437777][ T5055] do_new_mount+0x28f/0xae0 [ 55.442778][ T5055] __se_sys_mount+0x2d9/0x3c0 [ 55.447952][ T5055] do_syscall_64+0x45/0x110 [ 55.452956][ T5055] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 55.459453][ T5055] [ 55.459453][ T5055] -> #0 (&type->i_mutex_dir_key#6){+.+.}-{3:3}: [ 55.467861][ T5055] validate_chain+0x1909/0x5ab0 [ 55.473211][ T5055] __lock_acquire+0x1345/0x1fd0 [ 55.478559][ T5055] lock_acquire+0x1e3/0x530 [ 55.483563][ T5055] down_write+0x3a/0x50 [ 55.488216][ T5055] vfs_setxattr+0x1e1/0x420 [ 55.493481][ T5055] setxattr+0x25d/0x2f0 [ 55.498137][ T5055] path_setxattr+0x1c0/0x2a0 [ 55.503231][ T5055] __x64_sys_setxattr+0xbb/0xd0 [ 55.508585][ T5055] do_syscall_64+0x45/0x110 [ 55.513607][ T5055] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 55.520008][ T5055] [ 55.520008][ T5055] other info that might help us debug this: [ 55.520008][ T5055] [ 55.530213][ T5055] Chain exists of: [ 55.530213][ T5055] &type->i_mutex_dir_key#6 --> &sbi->lock --> sb_writers#9 [ 55.530213][ T5055] [ 55.543315][ T5055] Possible unsafe locking scenario: [ 55.543315][ T5055] [ 55.550752][ T5055] CPU0 CPU1 [ 55.556094][ T5055] ---- ---- [ 55.561448][ T5055] rlock(sb_writers#9); [ 55.565679][ T5055] lock(&sbi->lock); [ 55.572163][ T5055] lock(sb_writers#9); [ 55.578819][ T5055] lock(&type->i_mutex_dir_key#6); [ 55.584001][ T5055] [ 55.584001][ T5055] *** DEADLOCK *** [ 55.584001][ T5055] [ 55.592122][ T5055] 1 lock held by syz-executor403/5055: [ 55.597562][ T5055] #0: ffff88801de20418 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 55.606686][ T5055] [ 55.606686][ T5055] stack backtrace: [ 55.612550][ T5055] CPU: 0 PID: 5055 Comm: syz-executor403 Not tainted 6.7.0-rc7-syzkaller-00016-gf5837722ffec #0 [ 55.622957][ T5055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 55.633014][ T5055] Call Trace: [ 55.636278][ T5055] [ 55.639189][ T5055] dump_stack_lvl+0x1e7/0x2d0 [ 55.643853][ T5055] ? nf_tcp_handle_invalid+0x650/0x650 [ 55.649396][ T5055] ? print_circular_bug+0x12b/0x1a0 [ 55.654590][ T5055] check_noncircular+0x366/0x490 [ 55.659554][ T5055] ? noop_count+0x30/0x30 [ 55.663962][ T5055] ? print_deadlock_bug+0x610/0x610 [ 55.669167][ T5055] ? lockdep_lock+0x123/0x2b0 [ 55.673848][ T5055] ? check_noncircular+0x259/0x490 [ 55.679055][ T5055] ? _find_first_zero_bit+0xd4/0x100 [ 55.684325][ T5055] validate_chain+0x1909/0x5ab0 [ 55.689163][ T5055] ? validate_chain+0x15c6/0x5ab0 [ 55.694170][ T5055] ? reacquire_held_locks+0x690/0x690 [ 55.699534][ T5055] ? reacquire_held_locks+0x690/0x690 [ 55.704900][ T5055] ? lockdep_unlock+0x169/0x300 [ 55.709752][ T5055] ? lockdep_lock+0x2b0/0x2b0 [ 55.714409][ T5055] ? lockdep_unlock+0x169/0x300 [ 55.719321][ T5055] ? lockdep_lock+0x2b0/0x2b0 [ 55.723978][ T5055] ? mark_lock+0x9a/0x350 [ 55.728287][ T5055] __lock_acquire+0x1345/0x1fd0 [ 55.733150][ T5055] lock_acquire+0x1e3/0x530 [ 55.737723][ T5055] ? vfs_setxattr+0x1e1/0x420 [ 55.742487][ T5055] ? read_lock_is_recursive+0x20/0x20 [ 55.747882][ T5055] ? __might_sleep+0xe0/0xe0 [ 55.752462][ T5055] down_write+0x3a/0x50 [ 55.756605][ T5055] ? vfs_setxattr+0x1e1/0x420 [ 55.761286][ T5055] vfs_setxattr+0x1e1/0x420 [ 55.765776][ T5055] ? xattr_permission+0x430/0x430 [ 55.770794][ T5055] ? __check_object_size+0x8e/0xa00 [ 55.775993][ T5055] ? __might_fault+0xc1/0x120 [ 55.780671][ T5055] ? strncpy_from_user+0x1a5/0x2e0 [ 55.785783][ T5055] setxattr+0x25d/0x2f0 [ 55.789929][ T5055] ? path_setxattr+0x2a0/0x2a0 [ 55.794689][ T5055] ? mnt_get_write_access+0x226/0x2a0 [ 55.800049][ T5055] path_setxattr+0x1c0/0x2a0 [ 55.804626][ T5055] ? simple_xattrs_free+0x170/0x170 [ 55.809812][ T5055] ? syscall_enter_from_user_mode+0xa4/0x2d0 [ 55.815773][ T5055] __x64_sys_setxattr+0xbb/0xd0 [ 55.820608][ T5055] do_syscall_64+0x45/0x110 [ 55.825116][ T5055] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 55.831011][ T5055] RIP: 0033:0x7fc8872e8609 [ 55.835432][ T5055] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 55.855032][ T5055] RSP: 002b:00007ffd42cfbb68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 55.863433][ T5055] RAX: ffffffffffffffda RBX: 00007ffd42cfbd38 RCX: 00007fc8872e8609 [ 55.871389][ T5055] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000080 [ 55.879339][ T5055] RBP: 00007fc88735c610 R08: 0000000000000001 R09: 00007ffd42cfbd38 [ 55.887288][ T5055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 setxattr("./file0", "user.incfs.size", NULL, 0, XATTR_CREATE) = -1 EOPNOTSUPP (Operation not supported) exit_group(0) = ? +++ exited with 0 +++ [ 55.895236][ T5055] R13: 00007