Warning: Permanently added '10.128.10.37' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 43.825245][ T3962] loop0: detected capacity change from 0 to 512 [ 43.840337][ T3962] EXT4-fs (loop0): mounted filesystem without journal. Opts: quota,nodelalloc,errors=remount-ro,grpid,. Quota mode: writeback. [ 43.861227][ T3962] [ 43.861836][ T3962] ====================================================== [ 43.863530][ T3962] WARNING: possible circular locking dependency detected [ 43.865299][ T3962] 5.15.114-syzkaller #0 Not tainted [ 43.866595][ T3962] ------------------------------------------------------ [ 43.868372][ T3962] syz-executor135/3962 is trying to acquire lock: [ 43.869951][ T3962] ffff0000dd20c690 (&ei->xattr_sem){++++}-{3:3}, at: ext4_xattr_set_handle+0x1e0/0x12d8 [ 43.872423][ T3962] [ 43.872423][ T3962] but task is already holding lock: [ 43.874245][ T3962] ffff0000dd20c9b8 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 43.876598][ T3962] [ 43.876598][ T3962] which lock already depends on the new lock. [ 43.876598][ T3962] [ 43.879108][ T3962] [ 43.879108][ T3962] the existing dependency chain (in reverse order) is: [ 43.881412][ T3962] [ 43.881412][ T3962] -> #1 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}: [ 43.883458][ T3962] down_write+0x110/0x260 [ 43.884636][ T3962] ext4_xattr_set_entry+0x23a8/0x2c38 [ 43.886110][ T3962] ext4_xattr_block_set+0x8f0/0x2d7c [ 43.887569][ T3962] ext4_xattr_set_handle+0xb04/0x12d8 [ 43.889006][ T3962] ext4_xattr_set+0x1dc/0x350 [ 43.890338][ T3962] ext4_xattr_trusted_set+0x4c/0x64 [ 43.891761][ T3962] __vfs_setxattr+0x388/0x3a4 [ 43.893075][ T3962] __vfs_setxattr_noperm+0x110/0x528 [ 43.894465][ T3962] __vfs_setxattr_locked+0x1ec/0x218 [ 43.895914][ T3962] vfs_setxattr+0x1a8/0x344 [ 43.897154][ T3962] setxattr+0x250/0x2b4 [ 43.898400][ T3962] path_setxattr+0x17c/0x258 [ 43.899682][ T3962] __arm64_sys_setxattr+0xbc/0xd8 [ 43.901099][ T3962] invoke_syscall+0x98/0x2b8 [ 43.902417][ T3962] el0_svc_common+0x138/0x258 [ 43.903693][ T3962] do_el0_svc+0x58/0x14c [ 43.904883][ T3962] el0_svc+0x7c/0x1f0 [ 43.906020][ T3962] el0t_64_sync_handler+0x84/0xe4 [ 43.907427][ T3962] el0t_64_sync+0x1a0/0x1a4 [ 43.908609][ T3962] [ 43.908609][ T3962] -> #0 (&ei->xattr_sem){++++}-{3:3}: [ 43.910436][ T3962] __lock_acquire+0x32cc/0x7620 [ 43.911811][ T3962] lock_acquire+0x240/0x77c [ 43.913100][ T3962] down_write+0x110/0x260 [ 43.914350][ T3962] ext4_xattr_set_handle+0x1e0/0x12d8 [ 43.915759][ T3962] ext4_xattr_set+0x1dc/0x350 [ 43.917082][ T3962] ext4_xattr_user_set+0xd4/0xfc [ 43.918444][ T3962] __vfs_setxattr+0x388/0x3a4 [ 43.919771][ T3962] __vfs_setxattr_noperm+0x110/0x528 [ 43.921233][ T3962] __vfs_setxattr_locked+0x1ec/0x218 [ 43.922631][ T3962] vfs_setxattr+0x1a8/0x344 [ 43.923865][ T3962] setxattr+0x250/0x2b4 [ 43.925026][ T3962] path_setxattr+0x17c/0x258 [ 43.926295][ T3962] __arm64_sys_setxattr+0xbc/0xd8 [ 43.927713][ T3962] invoke_syscall+0x98/0x2b8 [ 43.928996][ T3962] el0_svc_common+0x138/0x258 [ 43.930290][ T3962] do_el0_svc+0x58/0x14c [ 43.931511][ T3962] el0_svc+0x7c/0x1f0 [ 43.932670][ T3962] el0t_64_sync_handler+0x84/0xe4 [ 43.934072][ T3962] el0t_64_sync+0x1a0/0x1a4 [ 43.935286][ T3962] [ 43.935286][ T3962] other info that might help us debug this: [ 43.935286][ T3962] [ 43.937861][ T3962] Possible unsafe locking scenario: [ 43.937861][ T3962] [ 43.939792][ T3962] CPU0 CPU1 [ 43.941158][ T3962] ---- ---- [ 43.942519][ T3962] lock(&ea_inode->i_rwsem#9/1); [ 43.943727][ T3962] lock(&ei->xattr_sem); [ 43.945430][ T3962] lock(&ea_inode->i_rwsem#9/1); [ 43.947381][ T3962] lock(&ei->xattr_sem); [ 43.948451][ T3962] [ 43.948451][ T3962] *** DEADLOCK *** [ 43.948451][ T3962] [ 43.950466][ T3962] 2 locks held by syz-executor135/3962: [ 43.951811][ T3962] #0: ffff0000c1504460 (sb_writers#3){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 43.954154][ T3962] #1: ffff0000dd20c9b8 (&ea_inode->i_rwsem#9/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 43.956681][ T3962] [ 43.956681][ T3962] stack backtrace: [ 43.958192][ T3962] CPU: 0 PID: 3962 Comm: syz-executor135 Not tainted 5.15.114-syzkaller #0 [ 43.960290][ T3962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 43.962780][ T3962] Call trace: [ 43.963575][ T3962] dump_backtrace+0x0/0x530 [ 43.964698][ T3962] show_stack+0x2c/0x3c [ 43.965738][ T3962] dump_stack_lvl+0x108/0x170 [ 43.966891][ T3962] dump_stack+0x1c/0x58 [ 43.967943][ T3962] print_circular_bug+0x150/0x1b8 [ 43.969234][ T3962] check_noncircular+0x2cc/0x378 [ 43.970431][ T3962] __lock_acquire+0x32cc/0x7620 [ 43.971625][ T3962] lock_acquire+0x240/0x77c [ 43.972717][ T3962] down_write+0x110/0x260 [ 43.973848][ T3962] ext4_xattr_set_handle+0x1e0/0x12d8 [ 43.975179][ T3962] ext4_xattr_set+0x1dc/0x350 [ 43.976344][ T3962] ext4_xattr_user_set+0xd4/0xfc [ 43.977611][ T3962] __vfs_setxattr+0x388/0x3a4 [ 43.978786][ T3962] __vfs_setxattr_noperm+0x110/0x528 [ 43.980135][ T3962] __vfs_setxattr_locked+0x1ec/0x218 [ 43.981528][ T3962] vfs_setxattr+0x1a8/0x344 [ 43.982673][ T3962] setxattr+0x250/0x2b4 [ 43.983682][ T3962] path_setxattr+0x17c/0x258 [ 43.984841][ T3962] __arm64_sys_setxattr+0xbc/0xd8 [ 43.986133][ T3962] invoke_syscall+0x98/0x2b8 [ 43.987287][ T3962] el0_svc_common+0x138/0x258 [ 43.988461][ T3962] do_el0_svc+0x58/0x14c [ 43.989497][ T3962] el0_svc+0x7c/0x1f0 [ 43.990501][ T3962] el0t_64_sync_handler+0x84/0xe4 [ 43.991786][ T3962] el0t_64_sync+0x1a0/0x1a4