Warning: Permanently added '10.128.0.216' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 52.296238][ T3967] loop0: detected capacity change from 0 to 512 [ 52.316884][ T3967] EXT4-fs (loop0): mounted filesystem without journal. Opts: quota,nodelalloc,errors=remount-ro,grpid,. Quota mode: writeback. [ 52.336210][ T3967] [ 52.336714][ T3967] ====================================================== [ 52.338143][ T3967] WARNING: possible circular locking dependency detected [ 52.339553][ T3967] 5.15.110-syzkaller #0 Not tainted [ 52.340678][ T3967] ------------------------------------------------------ [ 52.342131][ T3967] syz-executor904/3967 is trying to acquire lock: [ 52.343447][ T3967] ffff0000df840ac0 (&ei->xattr_sem){++++}-{3:3}, at: ext4_xattr_set_handle+0x1e0/0x12d8 [ 52.345457][ T3967] [ 52.345457][ T3967] but task is already holding lock: [ 52.346998][ T3967] ffff0000df840de8 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 52.349026][ T3967] [ 52.349026][ T3967] which lock already depends on the new lock. [ 52.349026][ T3967] [ 52.351145][ T3967] [ 52.351145][ T3967] the existing dependency chain (in reverse order) is: [ 52.352985][ T3967] [ 52.352985][ T3967] -> #1 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}: [ 52.354728][ T3967] down_write+0x110/0x260 [ 52.355761][ T3967] ext4_xattr_set_entry+0x23a8/0x2c38 [ 52.356996][ T3967] ext4_xattr_block_set+0x8f0/0x2d7c [ 52.358174][ T3967] ext4_xattr_set_handle+0xb04/0x12d8 [ 52.359370][ T3967] ext4_xattr_set+0x1dc/0x350 [ 52.360457][ T3967] ext4_xattr_trusted_set+0x4c/0x64 [ 52.361699][ T3967] __vfs_setxattr+0x388/0x3a4 [ 52.362778][ T3967] __vfs_setxattr_noperm+0x110/0x528 [ 52.363971][ T3967] __vfs_setxattr_locked+0x1ec/0x218 [ 52.365195][ T3967] vfs_setxattr+0x1a8/0x344 [ 52.366271][ T3967] setxattr+0x250/0x2b4 [ 52.367241][ T3967] path_setxattr+0x17c/0x258 [ 52.368281][ T3967] __arm64_sys_setxattr+0xbc/0xd8 [ 52.369440][ T3967] invoke_syscall+0x98/0x2b8 [ 52.370483][ T3967] el0_svc_common+0x138/0x258 [ 52.371597][ T3967] do_el0_svc+0x58/0x14c [ 52.372598][ T3967] el0_svc+0x7c/0x1f0 [ 52.373522][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 52.374689][ T3967] el0t_64_sync+0x1a0/0x1a4 [ 52.375702][ T3967] [ 52.375702][ T3967] -> #0 (&ei->xattr_sem){++++}-{3:3}: [ 52.377316][ T3967] __lock_acquire+0x32cc/0x7620 [ 52.378441][ T3967] lock_acquire+0x240/0x77c [ 52.379527][ T3967] down_write+0x110/0x260 [ 52.380527][ T3967] ext4_xattr_set_handle+0x1e0/0x12d8 [ 52.381748][ T3967] ext4_xattr_set+0x1dc/0x350 [ 52.382976][ T3967] ext4_xattr_trusted_set+0x4c/0x64 [ 52.384175][ T3967] __vfs_setxattr+0x388/0x3a4 [ 52.385285][ T3967] __vfs_setxattr_noperm+0x110/0x528 [ 52.386462][ T3967] __vfs_setxattr_locked+0x1ec/0x218 [ 52.387671][ T3967] vfs_setxattr+0x1a8/0x344 [ 52.388720][ T3967] setxattr+0x250/0x2b4 [ 52.389686][ T3967] path_setxattr+0x17c/0x258 [ 52.390763][ T3967] __arm64_sys_setxattr+0xbc/0xd8 [ 52.391913][ T3967] invoke_syscall+0x98/0x2b8 [ 52.392980][ T3967] el0_svc_common+0x138/0x258 [ 52.394107][ T3967] do_el0_svc+0x58/0x14c [ 52.395105][ T3967] el0_svc+0x7c/0x1f0 [ 52.396079][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 52.397236][ T3967] el0t_64_sync+0x1a0/0x1a4 [ 52.398305][ T3967] [ 52.398305][ T3967] other info that might help us debug this: [ 52.398305][ T3967] [ 52.400489][ T3967] Possible unsafe locking scenario: [ 52.400489][ T3967] [ 52.402077][ T3967] CPU0 CPU1 [ 52.403189][ T3967] ---- ---- [ 52.404303][ T3967] lock(&ea_inode->i_rwsem#9/1); [ 52.405362][ T3967] lock(&ei->xattr_sem); [ 52.406813][ T3967] lock(&ea_inode->i_rwsem#9/1); [ 52.408436][ T3967] lock(&ei->xattr_sem); [ 52.409344][ T3967] [ 52.409344][ T3967] *** DEADLOCK *** [ 52.409344][ T3967] [ 52.411095][ T3967] 2 locks held by syz-executor904/3967: [ 52.412301][ T3967] #0: ffff0000c9cb2460 (sb_writers#3){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 52.414299][ T3967] #1: ffff0000df840de8 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 52.416438][ T3967] [ 52.416438][ T3967] stack backtrace: [ 52.417658][ T3967] CPU: 1 PID: 3967 Comm: syz-executor904 Not tainted 5.15.110-syzkaller #0 [ 52.419450][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 52.421604][ T3967] Call trace: [ 52.422273][ T3967] dump_backtrace+0x0/0x530 [ 52.423238][ T3967] show_stack+0x2c/0x3c [ 52.424120][ T3967] dump_stack_lvl+0x108/0x170 [ 52.425141][ T3967] dump_stack+0x1c/0x58 [ 52.425992][ T3967] print_circular_bug+0x150/0x1b8 [ 52.427038][ T3967] check_noncircular+0x2cc/0x378 [ 52.428123][ T3967] __lock_acquire+0x32cc/0x7620 [ 52.429164][ T3967] lock_acquire+0x240/0x77c [ 52.430138][ T3967] down_write+0x110/0x260 [ 52.431110][ T3967] ext4_xattr_set_handle+0x1e0/0x12d8 [ 52.432259][ T3967] ext4_xattr_set+0x1dc/0x350 [ 52.433252][ T3967] ext4_xattr_trusted_set+0x4c/0x64 [ 52.434352][ T3967] __vfs_setxattr+0x388/0x3a4 [ 52.435327][ T3967] __vfs_setxattr_noperm+0x110/0x528 [ 52.436407][ T3967] __vfs_setxattr_locked+0x1ec/0x218 [ 52.437569][ T3967] vfs_setxattr+0x1a8/0x344 [ 52.438549][ T3967] setxattr+0x250/0x2b4 [ 52.439413][ T3967] path_setxattr+0x17c/0x258 [ 52.440397][ T3967] __arm64_sys_setxattr+0xbc/0xd8 [ 52.441465][ T3967] invoke_syscall+0x98/0x2b8 [ 52.442432][ T3967] el0_svc_common+0x138/0x258 [ 52.443400][ T3967] do_el0_svc+0x58/0x14c [ 52.444304][ T3967] el0_svc+0x7c/0x1f0 [ 52.445169][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 52.446235][ T3967] el0t_64_sync+0x1a0/0x1a4