Warning: Permanently added '10.128.10.16' (ECDSA) to the list of known hosts. executing program [ 35.666447][ T4216] loop0: detected capacity change from 0 to 512 [ 35.682415][ T4216] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 35.691725][ T4216] [ 35.692327][ T4216] ====================================================== [ 35.693933][ T4216] WARNING: possible circular locking dependency detected [ 35.695518][ T4216] 6.1.31-syzkaller #0 Not tainted [ 35.696772][ T4216] ------------------------------------------------------ [ 35.698404][ T4216] syz-executor173/4216 is trying to acquire lock: [ 35.699829][ T4216] ffff0000df5cd108 (&ei->xattr_sem){++++}-{3:3}, at: ext4_xattr_set_handle+0x1e0/0x1294 [ 35.702194][ T4216] [ 35.702194][ T4216] but task is already holding lock: [ 35.703974][ T4216] ffff0000df5cd440 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 35.706393][ T4216] [ 35.706393][ T4216] which lock already depends on the new lock. [ 35.706393][ T4216] [ 35.708960][ T4216] [ 35.708960][ T4216] the existing dependency chain (in reverse order) is: [ 35.711109][ T4216] [ 35.711109][ T4216] -> #1 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}: [ 35.713133][ T4216] down_write+0x5c/0x88 [ 35.714326][ T4216] ext4_xattr_set_entry+0x2394/0x2bfc [ 35.715913][ T4216] ext4_xattr_block_set+0x8e0/0x2cc4 [ 35.717383][ T4216] ext4_xattr_set_handle+0xae8/0x1294 [ 35.718793][ T4216] ext4_xattr_set+0x1dc/0x350 [ 35.720070][ T4216] ext4_xattr_trusted_set+0x4c/0x64 [ 35.721417][ T4216] __vfs_setxattr+0x388/0x3a4 [ 35.722652][ T4216] __vfs_setxattr_noperm+0x110/0x528 [ 35.724085][ T4216] __vfs_setxattr_locked+0x1ec/0x218 [ 35.725608][ T4216] vfs_setxattr+0x1a8/0x344 [ 35.726835][ T4216] setxattr+0x230/0x294 [ 35.728023][ T4216] path_setxattr+0x17c/0x258 [ 35.729234][ T4216] __arm64_sys_setxattr+0xbc/0xd8 [ 35.730515][ T4216] invoke_syscall+0x98/0x2c0 [ 35.731827][ T4216] el0_svc_common+0x138/0x258 [ 35.733063][ T4216] do_el0_svc+0x64/0x218 [ 35.734210][ T4216] el0_svc+0x58/0x168 [ 35.735282][ T4216] el0t_64_sync_handler+0x84/0xf0 [ 35.736662][ T4216] el0t_64_sync+0x18c/0x190 [ 35.737859][ T4216] [ 35.737859][ T4216] -> #0 (&ei->xattr_sem){++++}-{3:3}: [ 35.739757][ T4216] __lock_acquire+0x3338/0x764c [ 35.741017][ T4216] lock_acquire+0x26c/0x7cc [ 35.742254][ T4216] down_write+0x5c/0x88 [ 35.743418][ T4216] ext4_xattr_set_handle+0x1e0/0x1294 [ 35.744855][ T4216] ext4_xattr_set+0x1dc/0x350 [ 35.746164][ T4216] ext4_xattr_user_set+0xd4/0xfc [ 35.747527][ T4216] __vfs_setxattr+0x388/0x3a4 [ 35.748845][ T4216] __vfs_setxattr_noperm+0x110/0x528 [ 35.750277][ T4216] __vfs_setxattr_locked+0x1ec/0x218 [ 35.751861][ T4216] vfs_setxattr+0x1a8/0x344 [ 35.753190][ T4216] setxattr+0x230/0x294 [ 35.754380][ T4216] path_setxattr+0x17c/0x258 [ 35.755700][ T4216] __arm64_sys_setxattr+0xbc/0xd8 [ 35.757122][ T4216] invoke_syscall+0x98/0x2c0 [ 35.758326][ T4216] el0_svc_common+0x138/0x258 [ 35.759565][ T4216] do_el0_svc+0x64/0x218 [ 35.760730][ T4216] el0_svc+0x58/0x168 [ 35.761850][ T4216] el0t_64_sync_handler+0x84/0xf0 [ 35.763243][ T4216] el0t_64_sync+0x18c/0x190 [ 35.764490][ T4216] [ 35.764490][ T4216] other info that might help us debug this: [ 35.764490][ T4216] [ 35.767079][ T4216] Possible unsafe locking scenario: [ 35.767079][ T4216] [ 35.768868][ T4216] CPU0 CPU1 [ 35.770243][ T4216] ---- ---- [ 35.771641][ T4216] lock(&ea_inode->i_rwsem#9/1); [ 35.772844][ T4216] lock(&ei->xattr_sem); [ 35.774494][ T4216] lock(&ea_inode->i_rwsem#9/1); [ 35.776303][ T4216] lock(&ei->xattr_sem); [ 35.777382][ T4216] [ 35.777382][ T4216] *** DEADLOCK *** [ 35.777382][ T4216] [ 35.779347][ T4216] 2 locks held by syz-executor173/4216: [ 35.780737][ T4216] #0: ffff0000db4fc460 (sb_writers#3){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 35.783015][ T4216] #1: ffff0000df5cd440 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 35.785420][ T4216] [ 35.785420][ T4216] stack backtrace: [ 35.786924][ T4216] CPU: 1 PID: 4216 Comm: syz-executor173 Not tainted 6.1.31-syzkaller #0 [ 35.789002][ T4216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 35.791489][ T4216] Call trace: [ 35.792274][ T4216] dump_backtrace+0x1c8/0x1f4 [ 35.793436][ T4216] show_stack+0x2c/0x3c [ 35.794421][ T4216] dump_stack_lvl+0x108/0x170 [ 35.795598][ T4216] dump_stack+0x1c/0x58 [ 35.796583][ T4216] print_circular_bug+0x150/0x1b8 [ 35.797856][ T4216] check_noncircular+0x2cc/0x378 [ 35.799059][ T4216] __lock_acquire+0x3338/0x764c [ 35.800272][ T4216] lock_acquire+0x26c/0x7cc [ 35.801344][ T4216] down_write+0x5c/0x88 [ 35.802348][ T4216] ext4_xattr_set_handle+0x1e0/0x1294 [ 35.803622][ T4216] ext4_xattr_set+0x1dc/0x350 [ 35.804760][ T4216] ext4_xattr_user_set+0xd4/0xfc [ 35.805868][ T4216] __vfs_setxattr+0x388/0x3a4 [ 35.807025][ T4216] __vfs_setxattr_noperm+0x110/0x528 [ 35.808397][ T4216] __vfs_setxattr_locked+0x1ec/0x218 [ 35.809648][ T4216] vfs_setxattr+0x1a8/0x344 [ 35.810633][ T4216] setxattr+0x230/0x294 [ 35.811570][ T4216] path_setxattr+0x17c/0x258 [ 35.812639][ T4216] __arm64_sys_setxattr+0xbc/0xd8 [ 35.813862][ T4216] invoke_syscall+0x98/0x2c0 [ 35.814884][ T4216] el0_svc_common+0x138/0x258 [ 35.816077][ T4216] do_el0_svc+0x64/0x218 [ 35.817113][ T4216] el0_svc+0x58/0x168 [ 35.818018][ T4216] el0t_64_sync_handler+0x84/0xf0 [ 35.819295][ T4216] el0t_64_sync+0x18c/0x190