./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3926293878 <...> DUID 00:04:fb:87:82:62:74:5a:87:37:86:23:e7:72:30:e3:bc:00 no interfaces have a carrier [ 29.330878][ T4663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.341288][ T4663] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.67' (ECDSA) to the list of known hosts. execve("./syz-executor3926293878", ["./syz-executor3926293878"], 0x7fff0bd17540 /* 10 vars */) = 0 brk(NULL) = 0x555555ebb000 brk(0x555555ebbc40) = 0x555555ebbc40 arch_prctl(ARCH_SET_FS, 0x555555ebb300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3926293878", 4096) = 28 brk(0x555555edcc40) = 0x555555edcc40 brk(0x555555edd000) = 0x555555edd000 mprotect(0x7f9452d97000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f944a8dd000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 4194304) = 4194304 munmap(0x7f944a8dd000, 4194304) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 syzkaller login: [ 54.232423][ T4993] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=4993 'syz-executor392' ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file0", 0777) = 0 [ 54.279037][ T4993] loop0: detected capacity change from 0 to 8192 [ 54.290651][ T4993] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 54.303975][ T4993] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 54.313218][ T4993] REISERFS (device loop0): using ordered data mode [ 54.320353][ T4993] reiserfs: using flush barriers [ 54.326442][ T4993] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 54.342865][ T4993] REISERFS (device loop0): checking transaction log (loop0) mount("/dev/loop0", "./file0", "reiserfs", MS_NOEXEC|MS_I_VERSION, "") = 0 openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 chdir("./file0") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 [ 54.382613][ T4993] REISERFS (device loop0): Using r5 hash to sort names [ 54.390192][ T4993] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 54.408526][ T4993] [ 54.410875][ T4993] ====================================================== [ 54.417892][ T4993] WARNING: possible circular locking dependency detected [ 54.424908][ T4993] 6.4.0-rc7-syzkaller-00019-g99ec1ed7c2ed #0 Not tainted [ 54.431921][ T4993] ------------------------------------------------------ [ 54.438917][ T4993] syz-executor392/4993 is trying to acquire lock: [ 54.445301][ T4993] ffff888074de0980 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}, at: open_xa_dir+0x136/0x610 [ 54.455125][ T4993] [ 54.455125][ T4993] but task is already holding lock: [ 54.462459][ T4993] ffff88801726d090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0 [ 54.471999][ T4993] [ 54.471999][ T4993] which lock already depends on the new lock. [ 54.471999][ T4993] [ 54.482376][ T4993] [ 54.482376][ T4993] the existing dependency chain (in reverse order) is: [ 54.491375][ T4993] [ 54.491375][ T4993] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 54.498573][ T4993] lock_acquire+0x1e3/0x520 [ 54.503584][ T4993] __mutex_lock_common+0x1d8/0x2530 [ 54.509291][ T4993] mutex_lock_nested+0x1b/0x20 [ 54.514560][ T4993] reiserfs_write_lock+0x7a/0xd0 [ 54.520001][ T4993] reiserfs_mkdir+0x321/0x8f0 [ 54.525185][ T4993] open_xa_dir+0x2cd/0x610 [ 54.530101][ T4993] xattr_lookup+0x24/0x280 [ 54.535018][ T4993] reiserfs_xattr_set_handle+0xfc/0xdc0 [ 54.541062][ T4993] reiserfs_security_write+0x157/0x1d0 [ 54.547022][ T4993] reiserfs_new_inode+0x1631/0x1d40 [ 54.552718][ T4993] reiserfs_mknod+0x3e5/0x6a0 [ 54.557893][ T4993] vfs_mknod+0x308/0x350 [ 54.562639][ T4993] do_mknodat+0x432/0x6e0 [ 54.567473][ T4993] __x64_sys_mknod+0x8e/0xa0 [ 54.572561][ T4993] do_syscall_64+0x41/0xc0 [ 54.577480][ T4993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 54.583874][ T4993] [ 54.583874][ T4993] -> #0 (&type->i_mutex_dir_key#6/3){+.+.}-{3:3}: [ 54.592480][ T4993] validate_chain+0x166b/0x58f0 [ 54.597834][ T4993] __lock_acquire+0x1316/0x2070 [ 54.603185][ T4993] lock_acquire+0x1e3/0x520 [ 54.608186][ T4993] down_write_nested+0x3d/0x50 [ 54.613449][ T4993] open_xa_dir+0x136/0x610 [ 54.618365][ T4993] xattr_lookup+0x24/0x280 [ 54.623281][ T4993] reiserfs_xattr_get+0xfd/0x570 [ 54.628719][ T4993] __vfs_getxattr+0x436/0x470 [ 54.633905][ T4993] smk_fetch+0xb1/0x140 [ 54.638574][ T4993] smack_d_instantiate+0x6d9/0xb40 [ 54.644185][ T4993] security_d_instantiate+0x9b/0xf0 [ 54.649899][ T4993] d_instantiate_new+0x65/0x120 [ 54.655275][ T4993] reiserfs_mknod+0x571/0x6a0 [ 54.660455][ T4993] vfs_mknod+0x308/0x350 [ 54.665207][ T4993] do_mknodat+0x432/0x6e0 [ 54.670043][ T4993] __x64_sys_mknod+0x8e/0xa0 [ 54.675138][ T4993] do_syscall_64+0x41/0xc0 [ 54.680060][ T4993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 54.686457][ T4993] [ 54.686457][ T4993] other info that might help us debug this: [ 54.686457][ T4993] [ 54.696665][ T4993] Possible unsafe locking scenario: [ 54.696665][ T4993] [ 54.704092][ T4993] CPU0 CPU1 [ 54.709432][ T4993] ---- ---- [ 54.714772][ T4993] lock(&sbi->lock); [ 54.718769][ T4993] lock(&type->i_mutex_dir_key#6/3); [ 54.726661][ T4993] lock(&sbi->lock); [ 54.733143][ T4993] lock(&type->i_mutex_dir_key#6/3); [ 54.738504][ T4993] [ 54.738504][ T4993] *** DEADLOCK *** [ 54.738504][ T4993] [ 54.746627][ T4993] 3 locks held by syz-executor392/4993: [ 54.752146][ T4993] #0: ffff88802a908460 (sb_writers#9){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 54.761261][ T4993] #1: ffff888074de02e0 (&type->i_mutex_dir_key#6/1){+.+.}-{3:3}, at: filename_create+0x260/0x530 [ 54.771852][ T4993] #2: ffff88801726d090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x5f/0xd0 [ 54.781841][ T4993] [ 54.781841][ T4993] stack backtrace: [ 54.787711][ T4993] CPU: 0 PID: 4993 Comm: syz-executor392 Not tainted 6.4.0-rc7-syzkaller-00019-g99ec1ed7c2ed #0 [ 54.798101][ T4993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 54.808138][ T4993] Call Trace: [ 54.811398][ T4993] [ 54.814313][ T4993] dump_stack_lvl+0x1e7/0x2d0 [ 54.818987][ T4993] ? nf_tcp_handle_invalid+0x650/0x650 [ 54.824426][ T4993] ? print_circular_bug+0x12b/0x1a0 [ 54.829610][ T4993] check_noncircular+0x2fe/0x3b0 [ 54.834540][ T4993] ? read_lock_is_recursive+0x20/0x20 [ 54.839890][ T4993] ? add_chain_block+0x850/0x850 [ 54.844810][ T4993] ? lockdep_lock+0x123/0x2b0 [ 54.849468][ T4993] ? check_path+0x40/0x40 [ 54.853779][ T4993] ? noop_count+0x30/0x30 [ 54.858175][ T4993] ? _find_first_zero_bit+0xd4/0x100 [ 54.863440][ T4993] validate_chain+0x166b/0x58f0 [ 54.868271][ T4993] ? stack_trace_save+0x1c0/0x1c0 [ 54.873280][ T4993] ? reacquire_held_locks+0x660/0x660 [ 54.878648][ T4993] ? look_up_lock_class+0x77/0x140 [ 54.883745][ T4993] ? register_lock_class+0x104/0x990 [ 54.889011][ T4993] ? __lock_acquire+0x1316/0x2070 [ 54.894016][ T4993] ? is_dynamic_key+0x1f0/0x1f0 [ 54.898845][ T4993] ? mark_lock+0x9a/0x340 [ 54.903154][ T4993] __lock_acquire+0x1316/0x2070 [ 54.907989][ T4993] lock_acquire+0x1e3/0x520 [ 54.912472][ T4993] ? open_xa_dir+0x136/0x610 [ 54.917052][ T4993] ? read_lock_is_recursive+0x20/0x20 [ 54.922406][ T4993] ? lockdep_hardirqs_on+0x98/0x140 [ 54.927585][ T4993] ? __might_sleep+0xc0/0xc0 [ 54.932154][ T4993] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 54.938025][ T4993] ? _raw_spin_unlock+0x40/0x40 [ 54.942853][ T4993] ? stack_trace_snprint+0xf0/0xf0 [ 54.947945][ T4993] down_write_nested+0x3d/0x50 [ 54.952687][ T4993] ? open_xa_dir+0x136/0x610 [ 54.957261][ T4993] open_xa_dir+0x136/0x610 [ 54.961657][ T4993] ? kasan_set_track+0x61/0x70 [ 54.966398][ T4993] ? kasan_set_track+0x4f/0x70 [ 54.971141][ T4993] ? security_d_instantiate+0x9b/0xf0 [ 54.976498][ T4993] ? listxattr_filler+0x500/0x500 [ 54.981499][ T4993] ? __x64_sys_mknod+0x8e/0xa0 [ 54.986249][ T4993] xattr_lookup+0x24/0x280 [ 54.990643][ T4993] reiserfs_xattr_get+0xfd/0x570 [ 54.995560][ T4993] ? security_get+0x6d/0xc0 [ 55.000047][ T4993] ? security_list+0x80/0x80 [ 55.004624][ T4993] __vfs_getxattr+0x436/0x470 [ 55.009284][ T4993] smk_fetch+0xb1/0x140 [ 55.013420][ T4993] smack_d_instantiate+0x6d9/0xb40 [ 55.018515][ T4993] ? smack_sem_semop+0x230/0x230 [ 55.023438][ T4993] security_d_instantiate+0x9b/0xf0 [ 55.028626][ T4993] d_instantiate_new+0x65/0x120 [ 55.033454][ T4993] reiserfs_mknod+0x571/0x6a0 [ 55.038122][ T4993] ? reiserfs_rmdir+0x7e0/0x7e0 [ 55.042957][ T4993] ? generic_permission+0x1df/0x550 [ 55.048137][ T4993] ? security_inode_mknod+0xca/0x110 [ 55.053405][ T4993] vfs_mknod+0x308/0x350 [ 55.057633][ T4993] do_mknodat+0x432/0x6e0 [ 55.061945][ T4993] ? do_o_path+0x230/0x230 [ 55.066345][ T4993] ? getname_flags+0x1f0/0x4e0 [ 55.071085][ T4993] __x64_sys_mknod+0x8e/0xa0 [ 55.075654][ T4993] do_syscall_64+0x41/0xc0 [ 55.080050][ T4993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 55.085923][ T4993] RIP: 0033:0x7f9452d29779 [ 55.090314][ T4993] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 55.109903][ T4993] RSP: 002b:00007ffd2afa0568 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 55.118385][ T4993] RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 00007f9452d29779 [ 55.126336][ T4993] RDX: 0000000000000700 RSI: 0000000000001500 RDI: 0000000020000340 mknod("./file0", S_IFIFO|S_ISGID|0400) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 55.134284][ T4993]