[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.126' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 34.420623] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 34.431991] [ 34.433629] ====================================================== [ 34.439934] WARNING: possible circular locking dependency detected [ 34.446242] 4.19.211-syzkaller #0 Not tainted [ 34.450724] ------------------------------------------------------ [ 34.457145] syz-executor363/8086 is trying to acquire lock: [ 34.462831] 00000000bec9b65b (&ei->xattr_sem){++++}, at: ext4_xattr_get+0x141/0x9c0 [ 34.470613] [ 34.470613] but task is already holding lock: [ 34.476561] 00000000bfbe5d25 (&ea_inode->i_rwsem#10/1){+.+.}, at: chown_common+0x2d0/0x550 [ 34.484953] [ 34.484953] which lock already depends on the new lock. [ 34.484953] [ 34.493245] [ 34.493245] the existing dependency chain (in reverse order) is: [ 34.500839] [ 34.500839] -> #1 (&ea_inode->i_rwsem#10/1){+.+.}: [ 34.507233] ext4_xattr_set_entry+0x2a10/0x3750 [ 34.512398] ext4_xattr_ibody_set+0x81/0x2a0 [ 34.517303] ext4_xattr_set_handle+0x60b/0x1030 [ 34.522466] ext4_xattr_set+0x135/0x2a0 [ 34.526934] __vfs_setxattr+0x10e/0x170 [ 34.531403] __vfs_setxattr_noperm+0x11a/0x420 [ 34.536479] __vfs_setxattr_locked+0x176/0x250 [ 34.541556] vfs_setxattr+0xe5/0x270 [ 34.545764] setxattr+0x23d/0x330 [ 34.549712] path_setxattr+0x170/0x190 [ 34.554094] __x64_sys_setxattr+0xc0/0x160 [ 34.558828] do_syscall_64+0xf9/0x620 [ 34.563128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.568814] [ 34.568814] -> #0 (&ei->xattr_sem){++++}: [ 34.574423] down_read+0x36/0x80 [ 34.578287] ext4_xattr_get+0x141/0x9c0 [ 34.582763] __vfs_getxattr+0xd9/0x140 [ 34.587151] cap_inode_need_killpriv+0x3c/0x60 [ 34.592231] security_inode_need_killpriv+0x40/0x90 [ 34.597748] notify_change+0xa15/0xfc0 [ 34.602129] chown_common+0x4a9/0x550 [ 34.606425] do_fchownat+0x126/0x1e0 [ 34.610634] __x64_sys_fchownat+0xba/0x150 [ 34.615365] do_syscall_64+0xf9/0x620 [ 34.619663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.625344] [ 34.625344] other info that might help us debug this: [ 34.625344] [ 34.633460] Possible unsafe locking scenario: [ 34.633460] [ 34.639488] CPU0 CPU1 [ 34.644126] ---- ---- [ 34.648767] lock(&ea_inode->i_rwsem#10/1); [ 34.653152] lock(&ei->xattr_sem); [ 34.659273] lock(&ea_inode->i_rwsem#10/1); [ 34.666171] lock(&ei->xattr_sem); [ 34.669770] [ 34.669770] *** DEADLOCK *** [ 34.669770] [ 34.675806] 2 locks held by syz-executor363/8086: [ 34.680624] #0: 000000005b443f8c (sb_writers#3){.+.+}, at: mnt_want_write+0x3a/0xb0 [ 34.688490] #1: 00000000bfbe5d25 (&ea_inode->i_rwsem#10/1){+.+.}, at: chown_common+0x2d0/0x550 [ 34.697311] [ 34.697311] stack backtrace: [ 34.701783] CPU: 0 PID: 8086 Comm: syz-executor363 Not tainted 4.19.211-syzkaller #0 [ 34.709635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.718963] Call Trace: [ 34.721531] dump_stack+0x1fc/0x2ef [ 34.725141] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 34.730919] __lock_acquire+0x30c9/0x3ff0 [ 34.735047] ? mark_held_locks+0xf0/0xf0 [ 34.739085] ? __kasan_slab_free+0x186/0x1f0 [ 34.743469] lock_acquire+0x170/0x3c0 [ 34.747244] ? ext4_xattr_get+0x141/0x9c0 [ 34.751369] down_read+0x36/0x80 [ 34.754715] ? ext4_xattr_get+0x141/0x9c0 [ 34.758838] ext4_xattr_get+0x141/0x9c0 [ 34.762791] ? ext4_xattr_ibody_get+0x5a0/0x5a0 [ 34.767436] ? xattr_resolve_name+0x26e/0x3d0 [ 34.771910] ? ext4_xattr_security_set+0x40/0x40 [ 34.776641] __vfs_getxattr+0xd9/0x140 [ 34.780502] ? __vfs_setxattr+0x170/0x170 [ 34.784629] ? current_time+0x13c/0x1c0 [ 34.788579] ? igrab+0xb0/0xb0 [ 34.791748] cap_inode_need_killpriv+0x3c/0x60 [ 34.797020] security_inode_need_killpriv+0x40/0x90 [ 34.802014] notify_change+0xa15/0xfc0 [ 34.805877] chown_common+0x4a9/0x550 [ 34.809657] ? chmod_common+0x3f0/0x3f0 [ 34.813614] ? check_preemption_disabled+0x41/0x280 [ 34.818607] ? preempt_count_add+0xaf/0x190 [ 34.822911] ? __mnt_want_write+0x22c/0x2c0 [ 34.827208] do_fchownat+0x126/0x1e0 [ 34.830900] ? __ia32_sys_chmod+0x80/0x80 [ 34.835028] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 34.840366] __x64_sys_fchownat+0xba/0x150 [ 34.844580] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 34.849141] do_syscall_64+0xf9/0x620 [ 34.852920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.858088] RIP: 0033:0x7f2ddf6f4109 [ 34.861781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 34.880663] RSP: 002b:00007fffe9617d98 EFLAGS: 00000246 ORIG_RAX: 0000000000000104 [ 34.888347] RAX: ffffffffffffffda RBX: 2f30656c69662f2e RCX: 00007f2ddf6f4109 [ 34.895617] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000005 [ 34.902863] RBP: 00007f2ddf6b39a0 R08: 0000000000001000 R09: 0000000000000000 [ 34.910113] R10: 000000000000ee01 R11: 0000000000000246 R12: 00007f2ddf6b3a30 [ 34.917363] R13: 0000000000000000 R14: 0000000000000000 R15: