Warning: Permanently added '10.128.0.55' (ECDSA) to the list of known hosts. executing program [ 37.137635][ T4218] loop0: detected capacity change from 0 to 512 [ 37.158593][ T4218] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 37.167556][ T4218] [ 37.168072][ T4218] ====================================================== [ 37.169558][ T4218] WARNING: possible circular locking dependency detected [ 37.171021][ T4218] 6.1.27-syzkaller #0 Not tainted [ 37.172085][ T4218] ------------------------------------------------------ [ 37.173583][ T4218] syz-executor166/4218 is trying to acquire lock: [ 37.175038][ T4218] ffff0000e24a00c8 (&ei->xattr_sem){++++}-{3:3}, at: ext4_xattr_set_handle+0x1e0/0x1294 [ 37.177047][ T4218] [ 37.177047][ T4218] but task is already holding lock: [ 37.178613][ T4218] ffff0000e24a0400 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 37.180741][ T4218] [ 37.180741][ T4218] which lock already depends on the new lock. [ 37.180741][ T4218] [ 37.182921][ T4218] [ 37.182921][ T4218] the existing dependency chain (in reverse order) is: [ 37.184779][ T4218] [ 37.184779][ T4218] -> #1 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}: [ 37.186582][ T4218] down_write+0x5c/0x88 [ 37.187570][ T4218] ext4_xattr_set_entry+0x2394/0x2bfc [ 37.188900][ T4218] ext4_xattr_block_set+0x8e0/0x2cc4 [ 37.190150][ T4218] ext4_xattr_set_handle+0xae8/0x1294 [ 37.191420][ T4218] ext4_xattr_set+0x1dc/0x350 [ 37.192533][ T4218] ext4_xattr_trusted_set+0x4c/0x64 [ 37.193851][ T4218] __vfs_setxattr+0x388/0x3a4 [ 37.194920][ T4218] __vfs_setxattr_noperm+0x110/0x528 [ 37.196218][ T4218] __vfs_setxattr_locked+0x1ec/0x218 [ 37.197491][ T4218] vfs_setxattr+0x1a8/0x344 [ 37.198566][ T4218] setxattr+0x230/0x294 [ 37.199606][ T4218] path_setxattr+0x17c/0x258 [ 37.200719][ T4218] __arm64_sys_setxattr+0xbc/0xd8 [ 37.201871][ T4218] invoke_syscall+0x98/0x2c0 [ 37.202956][ T4218] el0_svc_common+0x138/0x258 [ 37.204049][ T4218] do_el0_svc+0x64/0x218 [ 37.205070][ T4218] el0_svc+0x58/0x168 [ 37.206016][ T4218] el0t_64_sync_handler+0x84/0xf0 [ 37.207309][ T4218] el0t_64_sync+0x18c/0x190 [ 37.208355][ T4218] [ 37.208355][ T4218] -> #0 (&ei->xattr_sem){++++}-{3:3}: [ 37.209936][ T4218] __lock_acquire+0x3338/0x764c [ 37.211081][ T4218] lock_acquire+0x26c/0x7cc [ 37.212102][ T4218] down_write+0x5c/0x88 [ 37.213050][ T4218] ext4_xattr_set_handle+0x1e0/0x1294 [ 37.214295][ T4218] ext4_xattr_set+0x1dc/0x350 [ 37.215446][ T4218] ext4_xattr_trusted_set+0x4c/0x64 [ 37.216711][ T4218] __vfs_setxattr+0x388/0x3a4 [ 37.217817][ T4218] __vfs_setxattr_noperm+0x110/0x528 [ 37.219084][ T4218] __vfs_setxattr_locked+0x1ec/0x218 [ 37.220277][ T4218] vfs_setxattr+0x1a8/0x344 [ 37.221342][ T4218] setxattr+0x230/0x294 [ 37.222331][ T4218] path_setxattr+0x17c/0x258 [ 37.223358][ T4218] __arm64_sys_setxattr+0xbc/0xd8 [ 37.224504][ T4218] invoke_syscall+0x98/0x2c0 [ 37.225645][ T4218] el0_svc_common+0x138/0x258 [ 37.226737][ T4218] do_el0_svc+0x64/0x218 [ 37.227774][ T4218] el0_svc+0x58/0x168 [ 37.228757][ T4218] el0t_64_sync_handler+0x84/0xf0 [ 37.229995][ T4218] el0t_64_sync+0x18c/0x190 [ 37.231085][ T4218] [ 37.231085][ T4218] other info that might help us debug this: [ 37.231085][ T4218] [ 37.233356][ T4218] Possible unsafe locking scenario: [ 37.233356][ T4218] [ 37.234893][ T4218] CPU0 CPU1 [ 37.236080][ T4218] ---- ---- [ 37.237295][ T4218] lock(&ea_inode->i_rwsem#9/1); [ 37.238408][ T4218] lock(&ei->xattr_sem); [ 37.239917][ T4218] lock(&ea_inode->i_rwsem#9/1); [ 37.241603][ T4218] lock(&ei->xattr_sem); [ 37.242615][ T4218] [ 37.242615][ T4218] *** DEADLOCK *** [ 37.242615][ T4218] [ 37.244413][ T4218] 2 locks held by syz-executor166/4218: [ 37.245590][ T4218] #0: ffff0000d7d42460 (sb_writers#3){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 37.247584][ T4218] #1: ffff0000e24a0400 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 37.249718][ T4218] [ 37.249718][ T4218] stack backtrace: [ 37.250925][ T4218] CPU: 0 PID: 4218 Comm: syz-executor166 Not tainted 6.1.27-syzkaller #0 [ 37.252790][ T4218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 37.254862][ T4218] Call trace: [ 37.255574][ T4218] dump_backtrace+0x1c8/0x1f4 [ 37.256632][ T4218] show_stack+0x2c/0x3c [ 37.257549][ T4218] dump_stack_lvl+0x108/0x170 [ 37.258537][ T4218] dump_stack+0x1c/0x5c [ 37.259362][ T4218] print_circular_bug+0x150/0x1b8 [ 37.260420][ T4218] check_noncircular+0x2cc/0x378 [ 37.261514][ T4218] __lock_acquire+0x3338/0x764c [ 37.262457][ T4218] lock_acquire+0x26c/0x7cc [ 37.263423][ T4218] down_write+0x5c/0x88 [ 37.264289][ T4218] ext4_xattr_set_handle+0x1e0/0x1294 [ 37.265357][ T4218] ext4_xattr_set+0x1dc/0x350 [ 37.266379][ T4218] ext4_xattr_trusted_set+0x4c/0x64 [ 37.267466][ T4218] __vfs_setxattr+0x388/0x3a4 [ 37.268500][ T4218] __vfs_setxattr_noperm+0x110/0x528 [ 37.269614][ T4218] __vfs_setxattr_locked+0x1ec/0x218 [ 37.270712][ T4218] vfs_setxattr+0x1a8/0x344 [ 37.271648][ T4218] setxattr+0x230/0x294 [ 37.272556][ T4218] path_setxattr+0x17c/0x258 [ 37.273618][ T4218] __arm64_sys_setxattr+0xbc/0xd8 [ 37.274728][ T4218] invoke_syscall+0x98/0x2c0 [ 37.275764][ T4218] el0_svc_common+0x138/0x258 [ 37.276819][ T4218] do_el0_svc+0x64/0x218 [ 37.277715][ T4218] el0_svc+0x58/0x168 [ 37.278559][ T4218] el0t_64_sync_handler+0x84/0xf0 [ 37.279631][ T4218] el0t_64_sync+0x18c/0x190