Warning: Permanently added '10.128.1.60' (ECDSA) to the list of known hosts. executing program [ 50.686545][ T3496] loop0: detected capacity change from 0 to 512 [ 50.709497][ T3496] EXT4-fs (loop0): mounted filesystem without journal. Opts: quota,nodelalloc,errors=remount-ro,grpid,. Quota mode: writeback. [ 50.722832][ T3496] ext4 filesystem being mounted at /root/file0 supports timestamps until 2038 (0x7fffffff) [ 50.752948][ T3496] [ 50.755316][ T3496] ====================================================== [ 50.762335][ T3496] WARNING: possible circular locking dependency detected [ 50.769348][ T3496] 5.15.113-syzkaller #0 Not tainted [ 50.774531][ T3496] ------------------------------------------------------ [ 50.781524][ T3496] syz-executor709/3496 is trying to acquire lock: [ 50.787913][ T3496] ffff88807508da80 (&ei->xattr_sem){++++}-{3:3}, at: ext4_xattr_set_handle+0x270/0x1560 [ 50.797666][ T3496] [ 50.797666][ T3496] but task is already holding lock: [ 50.805008][ T3496] ffff88807508dda8 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x1dd/0x420 [ 50.814561][ T3496] [ 50.814561][ T3496] which lock already depends on the new lock. [ 50.814561][ T3496] [ 50.824940][ T3496] [ 50.824940][ T3496] the existing dependency chain (in reverse order) is: [ 50.833933][ T3496] [ 50.833933][ T3496] -> #1 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}: [ 50.842171][ T3496] lock_acquire+0x1db/0x4f0 [ 50.847188][ T3496] down_write+0x97/0x170 [ 50.851935][ T3496] ext4_xattr_set_entry+0x33c5/0x3c00 [ 50.857896][ T3496] ext4_xattr_block_set+0xb10/0x3680 [ 50.863684][ T3496] ext4_xattr_set_handle+0xdac/0x1560 [ 50.869560][ T3496] ext4_xattr_set+0x231/0x3d0 [ 50.874740][ T3496] __vfs_setxattr+0x3e7/0x420 [ 50.879919][ T3496] __vfs_setxattr_noperm+0x12a/0x5e0 [ 50.885707][ T3496] vfs_setxattr+0x21d/0x420 [ 50.890713][ T3496] setxattr+0x27e/0x2e0 [ 50.895371][ T3496] path_setxattr+0x1bc/0x2a0 [ 50.900466][ T3496] __x64_sys_setxattr+0xb7/0xd0 [ 50.905841][ T3496] do_syscall_64+0x3d/0xb0 [ 50.910773][ T3496] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.917168][ T3496] [ 50.917168][ T3496] -> #0 (&ei->xattr_sem){++++}-{3:3}: [ 50.924705][ T3496] validate_chain+0x1646/0x58b0 [ 50.930079][ T3496] __lock_acquire+0x1295/0x1ff0 [ 50.935434][ T3496] lock_acquire+0x1db/0x4f0 [ 50.940439][ T3496] down_write+0x97/0x170 [ 50.945184][ T3496] ext4_xattr_set_handle+0x270/0x1560 [ 50.951056][ T3496] ext4_xattr_set+0x231/0x3d0 [ 50.956235][ T3496] __vfs_setxattr+0x3e7/0x420 [ 50.961414][ T3496] __vfs_setxattr_noperm+0x12a/0x5e0 [ 50.967293][ T3496] vfs_setxattr+0x21d/0x420 [ 50.972316][ T3496] setxattr+0x27e/0x2e0 [ 50.977066][ T3496] path_setxattr+0x1bc/0x2a0 [ 50.982164][ T3496] __x64_sys_setxattr+0xb7/0xd0 [ 50.987520][ T3496] do_syscall_64+0x3d/0xb0 [ 50.992445][ T3496] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.998851][ T3496] [ 50.998851][ T3496] other info that might help us debug this: [ 50.998851][ T3496] [ 51.009059][ T3496] Possible unsafe locking scenario: [ 51.009059][ T3496] [ 51.016489][ T3496] CPU0 CPU1 [ 51.021839][ T3496] ---- ---- [ 51.027184][ T3496] lock(&ea_inode->i_rwsem#9/1); [ 51.032202][ T3496] lock(&ei->xattr_sem); [ 51.039034][ T3496] lock(&ea_inode->i_rwsem#9/1); [ 51.046569][ T3496] lock(&ei->xattr_sem); [ 51.050884][ T3496] [ 51.050884][ T3496] *** DEADLOCK *** [ 51.050884][ T3496] [ 51.059007][ T3496] 2 locks held by syz-executor709/3496: [ 51.064534][ T3496] #0: ffff888078ebc460 (sb_writers#5){.+.+}-{0:0}, at: mnt_want_write+0x3b/0x80 [ 51.073659][ T3496] #1: ffff88807508dda8 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x1dd/0x420 [ 51.083655][ T3496] [ 51.083655][ T3496] stack backtrace: [ 51.089524][ T3496] CPU: 1 PID: 3496 Comm: syz-executor709 Not tainted 5.15.113-syzkaller #0 [ 51.098100][ T3496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 51.108317][ T3496] Call Trace: [ 51.111593][ T3496] [ 51.114614][ T3496] dump_stack_lvl+0x1e3/0x2cb [ 51.119288][ T3496] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 51.124917][ T3496] ? print_circular_bug+0x12b/0x1a0 [ 51.130191][ T3496] check_noncircular+0x2f8/0x3b0 [ 51.135117][ T3496] ? add_chain_block+0x850/0x850 [ 51.140042][ T3496] ? lockdep_lock+0x11f/0x2a0 [ 51.144710][ T3496] validate_chain+0x1646/0x58b0 [ 51.149553][ T3496] ? __lock_acquire+0x1ff0/0x1ff0 [ 51.154669][ T3496] ? reacquire_held_locks+0x660/0x660 [ 51.160045][ T3496] ? unwind_next_frame+0x1437/0x1fa0 [ 51.165319][ T3496] ? deref_stack_reg+0xbe/0x110 [ 51.170279][ T3496] ? stack_trace_save+0x1c0/0x1c0 [ 51.175323][ T3496] ? look_up_lock_class+0x77/0x120 [ 51.180419][ T3496] ? register_lock_class+0x100/0x9a0 [ 51.185687][ T3496] ? __kernel_text_address+0x94/0x100 [ 51.191044][ T3496] ? unwind_get_return_address+0x49/0x80 [ 51.196657][ T3496] ? is_dynamic_key+0x1f0/0x1f0 [ 51.201492][ T3496] ? arch_stack_walk+0xf3/0x140 [ 51.206326][ T3496] ? mark_lock+0x98/0x340 [ 51.210653][ T3496] __lock_acquire+0x1295/0x1ff0 [ 51.215505][ T3496] lock_acquire+0x1db/0x4f0 [ 51.220009][ T3496] ? ext4_xattr_set_handle+0x270/0x1560 [ 51.225548][ T3496] ? read_lock_is_recursive+0x10/0x10 [ 51.230910][ T3496] ? __might_sleep+0xc0/0xc0 [ 51.235576][ T3496] ? validate_chain+0x13b7/0x58b0 [ 51.240785][ T3496] down_write+0x97/0x170 [ 51.245031][ T3496] ? ext4_xattr_set_handle+0x270/0x1560 [ 51.250571][ T3496] ? down_read_killable+0x350/0x350 [ 51.255759][ T3496] ext4_xattr_set_handle+0x270/0x1560 [ 51.261127][ T3496] ? ext4_xattr_set_entry+0x3c00/0x3c00 [ 51.266664][ T3496] ? dquot_initialize+0x20/0x20 [ 51.271504][ T3496] ? __lock_acquire+0x1295/0x1ff0 [ 51.276518][ T3496] ? ext4_journal_check_start+0x17b/0x240 [ 51.282227][ T3496] ? __ext4_journal_start_sb+0x1cb/0x370 [ 51.287849][ T3496] ext4_xattr_set+0x231/0x3d0 [ 51.292558][ T3496] ? ext4_xattr_set_credits+0x2a0/0x2a0 [ 51.298186][ T3496] ? posix_xattr_acl+0xa5/0xd0 [ 51.302940][ T3496] ? evm_protect_xattr+0x33b/0xa70 [ 51.308040][ T3496] ? ext4_xattr_trusted_get+0x40/0x40 [ 51.313398][ T3496] __vfs_setxattr+0x3e7/0x420 [ 51.318063][ T3496] __vfs_setxattr_noperm+0x12a/0x5e0 [ 51.323336][ T3496] vfs_setxattr+0x21d/0x420 [ 51.327826][ T3496] ? xattr_permission+0x4f0/0x4f0 [ 51.332854][ T3496] ? __might_fault+0xb4/0x110 [ 51.337549][ T3496] ? strncpy_from_user+0x209/0x370 [ 51.342658][ T3496] setxattr+0x27e/0x2e0 [ 51.346799][ T3496] ? path_setxattr+0x2a0/0x2a0 [ 51.351550][ T3496] ? preempt_count_add+0x8f/0x180 [ 51.356561][ T3496] ? __mnt_want_write+0x1e6/0x260 [ 51.361574][ T3496] path_setxattr+0x1bc/0x2a0 [ 51.366150][ T3496] ? simple_xattr_list_add+0xf0/0xf0 [ 51.371426][ T3496] ? syscall_enter_from_user_mode+0x2e/0x230 [ 51.377393][ T3496] __x64_sys_setxattr+0xb7/0xd0 [ 51.382231][ T3496] do_syscall_64+0x3d/0xb0 [ 51.386628][ T3496] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.392508][ T3496] RIP: 0033:0x7fbbb18268a9 [ 51.396920][ T3496] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 51.416519][ T3496] RSP: 002b:00007ffdd3d09ff8 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 51.424930][ T3496] RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 00007fbbb18268a9 [ 51.432898][ T3496] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000020000000 [ 51.440948][ T3496] RBP: 00007fbbb17e6140 R08: 0000000000000000 R09: 0000000000000000 [ 51.448913][ T3496] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbb