Warning: Permanently added '10.128.0.71' (ECDSA) to the list of known hosts. executing program [ 44.007654][ T5925] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=5925 'syz-executor392' [ 44.013416][ T5925] loop0: detected capacity change from 0 to 512 [ 44.036479][ T5925] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 44.044814][ T5925] [ 44.045332][ T5925] ====================================================== [ 44.046849][ T5925] WARNING: possible circular locking dependency detected [ 44.048361][ T5925] 6.3.0-rc7-syzkaller-g14f8db1c0f9a #0 Not tainted [ 44.049730][ T5925] ------------------------------------------------------ [ 44.051254][ T5925] syz-executor392/5925 is trying to acquire lock: [ 44.052613][ T5925] ffff0000e0dbb2f0 (&ei->xattr_sem){++++}-{3:3}, at: ext4_xattr_set_handle+0x1e0/0x12d8 [ 44.054750][ T5925] [ 44.054750][ T5925] but task is already holding lock: [ 44.056271][ T5925] ffff0000e0dbb628 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 44.058403][ T5925] [ 44.058403][ T5925] which lock already depends on the new lock. [ 44.058403][ T5925] [ 44.060710][ T5925] [ 44.060710][ T5925] the existing dependency chain (in reverse order) is: [ 44.062590][ T5925] [ 44.062590][ T5925] -> #1 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}: [ 44.064370][ T5925] down_write+0x50/0xc0 [ 44.065320][ T5925] ext4_xattr_set_entry+0x2394/0x2c3c [ 44.066568][ T5925] ext4_xattr_block_set+0x8e0/0x2cc4 [ 44.067797][ T5925] ext4_xattr_set_handle+0xb2c/0x12d8 [ 44.069141][ T5925] ext4_xattr_set+0x1e0/0x354 [ 44.070294][ T5925] ext4_xattr_trusted_set+0x4c/0x64 [ 44.071551][ T5925] __vfs_setxattr+0x3d8/0x400 [ 44.072641][ T5925] __vfs_setxattr_noperm+0x110/0x528 [ 44.073945][ T5925] __vfs_setxattr_locked+0x1ec/0x218 [ 44.075174][ T5925] vfs_setxattr+0x1a8/0x344 [ 44.076275][ T5925] setxattr+0x208/0x29c [ 44.077285][ T5925] path_setxattr+0x17c/0x258 [ 44.078378][ T5925] __arm64_sys_setxattr+0xbc/0xd8 [ 44.079530][ T5925] invoke_syscall+0x98/0x2c0 [ 44.080623][ T5925] el0_svc_common+0x138/0x258 [ 44.081758][ T5925] do_el0_svc+0x64/0x198 [ 44.082789][ T5925] el0_svc+0x4c/0x15c [ 44.083725][ T5925] el0t_64_sync_handler+0x84/0xf0 [ 44.084874][ T5925] el0t_64_sync+0x190/0x194 [ 44.085940][ T5925] [ 44.085940][ T5925] -> #0 (&ei->xattr_sem){++++}-{3:3}: [ 44.087562][ T5925] __lock_acquire+0x3338/0x764c [ 44.088750][ T5925] lock_acquire+0x238/0x718 [ 44.089825][ T5925] down_write+0x50/0xc0 [ 44.090791][ T5925] ext4_xattr_set_handle+0x1e0/0x12d8 [ 44.092092][ T5925] ext4_xattr_set+0x1e0/0x354 [ 44.093191][ T5925] ext4_xattr_trusted_set+0x4c/0x64 [ 44.094385][ T5925] __vfs_setxattr+0x3d8/0x400 [ 44.095554][ T5925] __vfs_setxattr_noperm+0x110/0x528 [ 44.096831][ T5925] __vfs_setxattr_locked+0x1ec/0x218 [ 44.098139][ T5925] vfs_setxattr+0x1a8/0x344 [ 44.099284][ T5925] setxattr+0x208/0x29c [ 44.100357][ T5925] path_setxattr+0x17c/0x258 [ 44.101421][ T5925] __arm64_sys_setxattr+0xbc/0xd8 [ 44.102635][ T5925] invoke_syscall+0x98/0x2c0 [ 44.103785][ T5925] el0_svc_common+0x138/0x258 [ 44.104936][ T5925] do_el0_svc+0x64/0x198 [ 44.105973][ T5925] el0_svc+0x4c/0x15c [ 44.106908][ T5925] el0t_64_sync_handler+0x84/0xf0 [ 44.108124][ T5925] el0t_64_sync+0x190/0x194 [ 44.109263][ T5925] [ 44.109263][ T5925] other info that might help us debug this: [ 44.109263][ T5925] [ 44.111530][ T5925] Possible unsafe locking scenario: [ 44.111530][ T5925] [ 44.113069][ T5925] CPU0 CPU1 [ 44.114225][ T5925] ---- ---- [ 44.115440][ T5925] lock(&ea_inode->i_rwsem#8/1); [ 44.116559][ T5925] lock(&ei->xattr_sem); [ 44.117950][ T5925] lock(&ea_inode->i_rwsem#8/1); [ 44.119600][ T5925] lock(&ei->xattr_sem); [ 44.120567][ T5925] [ 44.120567][ T5925] *** DEADLOCK *** [ 44.120567][ T5925] [ 44.122337][ T5925] 2 locks held by syz-executor392/5925: [ 44.123549][ T5925] #0: ffff0000d80e6460 (sb_writers#3){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 44.125538][ T5925] #1: ffff0000e0dbb628 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_setxattr+0x17c/0x344 [ 44.127715][ T5925] [ 44.127715][ T5925] stack backtrace: [ 44.128979][ T5925] CPU: 1 PID: 5925 Comm: syz-executor392 Not tainted 6.3.0-rc7-syzkaller-g14f8db1c0f9a #0 [ 44.131069][ T5925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 44.133227][ T5925] Call trace: [ 44.133928][ T5925] dump_backtrace+0x1b8/0x1e4 [ 44.135005][ T5925] show_stack+0x2c/0x44 [ 44.135870][ T5925] dump_stack_lvl+0xd0/0x124 [ 44.136873][ T5925] dump_stack+0x1c/0x28 [ 44.137740][ T5925] print_circular_bug+0x150/0x1b8 [ 44.138836][ T5925] check_noncircular+0x2cc/0x378 [ 44.139885][ T5925] __lock_acquire+0x3338/0x764c [ 44.140944][ T5925] lock_acquire+0x238/0x718 [ 44.141974][ T5925] down_write+0x50/0xc0 [ 44.142824][ T5925] ext4_xattr_set_handle+0x1e0/0x12d8 [ 44.144002][ T5925] ext4_xattr_set+0x1e0/0x354 [ 44.145044][ T5925] ext4_xattr_trusted_set+0x4c/0x64 [ 44.146102][ T5925] __vfs_setxattr+0x3d8/0x400 [ 44.147169][ T5925] __vfs_setxattr_noperm+0x110/0x528 [ 44.148263][ T5925] __vfs_setxattr_locked+0x1ec/0x218 [ 44.149468][ T5925] vfs_setxattr+0x1a8/0x344 [ 44.150487][ T5925] setxattr+0x208/0x29c [ 44.151420][ T5925] path_setxattr+0x17c/0x258 [ 44.152387][ T5925] __arm64_sys_setxattr+0xbc/0xd8 [ 44.153544][ T5925] invoke_syscall+0x98/0x2c0 [ 44.154588][ T5925] el0_svc_common+0x138/0x258 [ 44.155532][ T5925] do_el0_svc+0x64/0x198 [ 44.156463][ T5925] el0_svc+0x4c/0x15c [ 44.157347][ T5925] el0t_64_sync_handler+0x84/0xf0 [ 44.158411][ T5925] el0t_64_sync+0x190/0x194