Warning: Permanently added '10.128.0.30' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 34.028658][ T5971] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=5971 'syz-executor262' [ 34.034598][ T5971] loop0: detected capacity change from 0 to 512 [ 34.060619][ T5971] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.069543][ T5971] [ 34.070028][ T5971] ====================================================== [ 34.071406][ T5971] WARNING: possible circular locking dependency detected [ 34.073003][ T5971] 6.4.0-rc3-syzkaller-geb0f1697d729 #0 Not tainted [ 34.074576][ T5971] ------------------------------------------------------ [ 34.076165][ T5971] syz-executor262/5971 is trying to acquire lock: [ 34.077610][ T5971] ffff0000dfa414c8 (&ei->xattr_sem){++++}-{3:3}, at: ext4_xattr_set_handle+0x1e0/0x12d8 [ 34.079788][ T5971] [ 34.079788][ T5971] but task is already holding lock: [ 34.081464][ T5971] ffff0000dfa41800 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 34.083675][ T5971] [ 34.083675][ T5971] which lock already depends on the new lock. [ 34.083675][ T5971] [ 34.086053][ T5971] [ 34.086053][ T5971] the existing dependency chain (in reverse order) is: [ 34.088087][ T5971] [ 34.088087][ T5971] -> #1 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}: [ 34.089950][ T5971] down_write+0x50/0xc0 [ 34.090928][ T5971] ext4_xattr_set_entry+0x2394/0x2c3c [ 34.092143][ T5971] ext4_xattr_block_set+0x8e0/0x2cc4 [ 34.093499][ T5971] ext4_xattr_set_handle+0xb2c/0x12d8 [ 34.094790][ T5971] ext4_xattr_set+0x1e0/0x354 [ 34.095962][ T5971] ext4_xattr_trusted_set+0x4c/0x64 [ 34.097156][ T5971] __vfs_setxattr+0x3d8/0x400 [ 34.098298][ T5971] __vfs_setxattr_noperm+0x110/0x528 [ 34.099624][ T5971] __vfs_setxattr_locked+0x1ec/0x218 [ 34.100854][ T5971] vfs_setxattr+0x1a8/0x344 [ 34.101974][ T5971] setxattr+0x208/0x29c [ 34.103020][ T5971] path_setxattr+0x17c/0x258 [ 34.104178][ T5971] __arm64_sys_setxattr+0xbc/0xd8 [ 34.105427][ T5971] invoke_syscall+0x98/0x2c0 [ 34.106593][ T5971] el0_svc_common+0x138/0x258 [ 34.107829][ T5971] do_el0_svc+0x64/0x198 [ 34.108856][ T5971] el0_svc+0x4c/0x15c [ 34.109829][ T5971] el0t_64_sync_handler+0x84/0xf0 [ 34.110978][ T5971] el0t_64_sync+0x190/0x194 [ 34.112149][ T5971] [ 34.112149][ T5971] -> #0 (&ei->xattr_sem){++++}-{3:3}: [ 34.113855][ T5971] __lock_acquire+0x3310/0x75f0 [ 34.115094][ T5971] lock_acquire+0x23c/0x71c [ 34.116121][ T5971] down_write+0x50/0xc0 [ 34.117140][ T5971] ext4_xattr_set_handle+0x1e0/0x12d8 [ 34.118456][ T5971] ext4_xattr_set+0x1e0/0x354 [ 34.119562][ T5971] ext4_xattr_user_set+0xd4/0xfc [ 34.120791][ T5971] __vfs_setxattr+0x3d8/0x400 [ 34.121971][ T5971] __vfs_setxattr_noperm+0x110/0x528 [ 34.123321][ T5971] __vfs_setxattr_locked+0x1ec/0x218 [ 34.124647][ T5971] vfs_setxattr+0x1a8/0x344 [ 34.125749][ T5971] setxattr+0x208/0x29c [ 34.126802][ T5971] path_setxattr+0x17c/0x258 [ 34.127840][ T5971] __arm64_sys_setxattr+0xbc/0xd8 [ 34.129017][ T5971] invoke_syscall+0x98/0x2c0 [ 34.130157][ T5971] el0_svc_common+0x138/0x258 [ 34.131275][ T5971] do_el0_svc+0x64/0x198 [ 34.132356][ T5971] el0_svc+0x4c/0x15c [ 34.133387][ T5971] el0t_64_sync_handler+0x84/0xf0 [ 34.134587][ T5971] el0t_64_sync+0x190/0x194 [ 34.135713][ T5971] [ 34.135713][ T5971] other info that might help us debug this: [ 34.135713][ T5971] [ 34.137890][ T5971] Possible unsafe locking scenario: [ 34.137890][ T5971] [ 34.139508][ T5971] CPU0 CPU1 [ 34.140750][ T5971] ---- ---- [ 34.141908][ T5971] lock(&ea_inode->i_rwsem#8/1); [ 34.142994][ T5971] lock(&ei->xattr_sem); [ 34.144558][ T5971] lock(&ea_inode->i_rwsem#8/1); [ 34.146228][ T5971] lock(&ei->xattr_sem); [ 34.147225][ T5971] [ 34.147225][ T5971] *** DEADLOCK *** [ 34.147225][ T5971] [ 34.148984][ T5971] 2 locks held by syz-executor262/5971: [ 34.150198][ T5971] #0: ffff0000c5df6460 (sb_writers#3){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 34.152128][ T5971] #1: ffff0000dfa41800 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 34.154383][ T5971] [ 34.154383][ T5971] stack backtrace: [ 34.155722][ T5971] CPU: 0 PID: 5971 Comm: syz-executor262 Not tainted 6.4.0-rc3-syzkaller-geb0f1697d729 #0 [ 34.158032][ T5971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 34.160290][ T5971] Call trace: [ 34.161000][ T5971] dump_backtrace+0x1b8/0x1e4 [ 34.161994][ T5971] show_stack+0x2c/0x44 [ 34.162930][ T5971] dump_stack_lvl+0xd0/0x124 [ 34.163970][ T5971] dump_stack+0x1c/0x28 [ 34.164912][ T5971] print_circular_bug+0x150/0x1b8 [ 34.166032][ T5971] check_noncircular+0x2cc/0x378 [ 34.167100][ T5971] __lock_acquire+0x3310/0x75f0 [ 34.168140][ T5971] lock_acquire+0x23c/0x71c [ 34.169167][ T5971] down_write+0x50/0xc0 [ 34.170128][ T5971] ext4_xattr_set_handle+0x1e0/0x12d8 [ 34.171338][ T5971] ext4_xattr_set+0x1e0/0x354 [ 34.172381][ T5971] ext4_xattr_user_set+0xd4/0xfc [ 34.173462][ T5971] __vfs_setxattr+0x3d8/0x400 [ 34.174500][ T5971] __vfs_setxattr_noperm+0x110/0x528 [ 34.175707][ T5971] __vfs_setxattr_locked+0x1ec/0x218 [ 34.176790][ T5971] vfs_setxattr+0x1a8/0x344 [ 34.177844][ T5971] setxattr+0x208/0x29c [ 34.178758][ T5971] path_setxattr+0x17c/0x258 [ 34.179772][ T5971] __arm64_sys_setxattr+0xbc/0xd8 [ 34.180920][ T5971] invoke_syscall+0x98/0x2c0 [ 34.181942][ T5971] el0_svc_common+0x138/0x258 [ 34.182966][ T5971] do_el0_svc+0x64/0x198 [ 34.183891][ T5971] el0_svc+0x4c/0x15c [ 34.184817][ T5971] el0t_64_sync_handler+0x84/0xf0 [ 34.185983][ T5971] el0t_64_sync+0x190/0x194