Warning: Permanently added '10.128.0.139' (ECDSA) to the list of known hosts. executing program [ 61.650767][ T3542] loop0: detected capacity change from 0 to 512 [ 61.710674][ T3542] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 61.719694][ T3542] ext4 filesystem being mounted at /root/file0 supports timestamps until 2038 (0x7fffffff) [ 61.744427][ T3542] [ 61.746808][ T3542] ====================================================== [ 61.753929][ T3542] WARNING: possible circular locking dependency detected [ 61.760956][ T3542] 6.1.31-syzkaller #0 Not tainted [ 61.765975][ T3542] ------------------------------------------------------ [ 61.772990][ T3542] syz-executor266/3542 is trying to acquire lock: [ 61.779584][ T3542] ffff888074415b10 (&ei->xattr_sem){++++}-{3:3}, at: ext4_xattr_set_handle+0x270/0x1560 [ 61.789369][ T3542] [ 61.789369][ T3542] but task is already holding lock: [ 61.796748][ T3542] ffff888074415e48 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_setxattr+0x1dd/0x420 [ 61.806347][ T3542] [ 61.806347][ T3542] which lock already depends on the new lock. [ 61.806347][ T3542] [ 61.816848][ T3542] [ 61.816848][ T3542] the existing dependency chain (in reverse order) is: [ 61.825867][ T3542] [ 61.825867][ T3542] -> #1 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}: [ 61.834240][ T3542] lock_acquire+0x1f8/0x5a0 [ 61.839276][ T3542] down_write+0x36/0x60 [ 61.843993][ T3542] ext4_xattr_set_entry+0x33c5/0x3c00 [ 61.849980][ T3542] ext4_xattr_block_set+0xb0e/0x3680 [ 61.855802][ T3542] ext4_xattr_set_handle+0xdac/0x1560 [ 61.861698][ T3542] ext4_xattr_set+0x231/0x3d0 [ 61.866912][ T3542] __vfs_setxattr+0x3e7/0x420 [ 61.872105][ T3542] __vfs_setxattr_noperm+0x12a/0x5e0 [ 61.877908][ T3542] vfs_setxattr+0x21d/0x420 [ 61.882929][ T3542] setxattr+0x250/0x2b0 [ 61.887605][ T3542] path_setxattr+0x1bc/0x2a0 [ 61.892713][ T3542] __x64_sys_setxattr+0xb7/0xd0 [ 61.898167][ T3542] do_syscall_64+0x3d/0xb0 [ 61.903103][ T3542] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.909515][ T3542] [ 61.909515][ T3542] -> #0 (&ei->xattr_sem){++++}-{3:3}: [ 61.917077][ T3542] validate_chain+0x1667/0x58e0 [ 61.922535][ T3542] __lock_acquire+0x125b/0x1f80 [ 61.927905][ T3542] lock_acquire+0x1f8/0x5a0 [ 61.932923][ T3542] down_write+0x36/0x60 [ 61.937602][ T3542] ext4_xattr_set_handle+0x270/0x1560 [ 61.943496][ T3542] ext4_xattr_set+0x231/0x3d0 [ 61.948694][ T3542] __vfs_setxattr+0x3e7/0x420 [ 61.953892][ T3542] __vfs_setxattr_noperm+0x12a/0x5e0 [ 61.959694][ T3542] vfs_setxattr+0x21d/0x420 [ 61.964715][ T3542] setxattr+0x250/0x2b0 [ 61.969389][ T3542] path_setxattr+0x1bc/0x2a0 [ 61.974499][ T3542] __x64_sys_setxattr+0xb7/0xd0 [ 61.979961][ T3542] do_syscall_64+0x3d/0xb0 [ 61.984900][ T3542] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.991316][ T3542] [ 61.991316][ T3542] other info that might help us debug this: [ 61.991316][ T3542] [ 62.001537][ T3542] Possible unsafe locking scenario: [ 62.001537][ T3542] [ 62.008982][ T3542] CPU0 CPU1 [ 62.014338][ T3542] ---- ---- [ 62.019696][ T3542] lock(&ea_inode->i_rwsem#8/1); [ 62.024738][ T3542] lock(&ei->xattr_sem); [ 62.031585][ T3542] lock(&ea_inode->i_rwsem#8/1); [ 62.039137][ T3542] lock(&ei->xattr_sem); [ 62.043462][ T3542] [ 62.043462][ T3542] *** DEADLOCK *** [ 62.043462][ T3542] [ 62.051596][ T3542] 2 locks held by syz-executor266/3542: [ 62.057134][ T3542] #0: ffff88807c3e0460 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write+0x3b/0x80 [ 62.066290][ T3542] #1: ffff888074415e48 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_setxattr+0x1dd/0x420 [ 62.076319][ T3542] [ 62.076319][ T3542] stack backtrace: [ 62.082200][ T3542] CPU: 0 PID: 3542 Comm: syz-executor266 Not tainted 6.1.31-syzkaller #0 [ 62.090609][ T3542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 62.100659][ T3542] Call Trace: [ 62.103941][ T3542] [ 62.106871][ T3542] dump_stack_lvl+0x1e3/0x2cb [ 62.111553][ T3542] ? nf_tcp_handle_invalid+0x642/0x642 [ 62.117022][ T3542] ? print_circular_bug+0x12b/0x1a0 [ 62.122224][ T3542] check_noncircular+0x2fa/0x3b0 [ 62.127168][ T3542] ? add_chain_block+0x850/0x850 [ 62.132109][ T3542] ? lockdep_lock+0x11f/0x2a0 [ 62.136802][ T3542] ? validate_chain+0x115/0x58e0 [ 62.141743][ T3542] ? _find_first_zero_bit+0xd0/0x100 [ 62.147038][ T3542] validate_chain+0x1667/0x58e0 [ 62.151893][ T3542] ? rcu_is_watching+0x11/0xb0 [ 62.156668][ T3542] ? unwind_next_frame+0x1a3f/0x2220 [ 62.161955][ T3542] ? reacquire_held_locks+0x660/0x660 [ 62.167333][ T3542] ? preempt_count_add+0x8f/0x180 [ 62.172366][ T3542] ? unwind_next_frame+0x1a3f/0x2220 [ 62.177654][ T3542] ? stack_trace_save+0x1c0/0x1c0 [ 62.182681][ T3542] ? look_up_lock_class+0x77/0x140 [ 62.187803][ T3542] ? register_lock_class+0x100/0x990 [ 62.193087][ T3542] ? kernel_text_address+0x9f/0xd0 [ 62.198209][ T3542] ? __kernel_text_address+0x9/0x40 [ 62.203413][ T3542] ? unwind_get_return_address+0x49/0x80 [ 62.209049][ T3542] ? is_dynamic_key+0x1f0/0x1f0 [ 62.213897][ T3542] ? arch_stack_walk+0xf3/0x140 [ 62.218756][ T3542] ? mark_lock+0x9a/0x340 [ 62.223090][ T3542] __lock_acquire+0x125b/0x1f80 [ 62.227952][ T3542] lock_acquire+0x1f8/0x5a0 [ 62.232453][ T3542] ? ext4_xattr_set_handle+0x270/0x1560 [ 62.238005][ T3542] ? read_lock_is_recursive+0x10/0x10 [ 62.243382][ T3542] ? __might_sleep+0xb0/0xb0 [ 62.247978][ T3542] ? validate_chain+0x13d1/0x58e0 [ 62.253020][ T3542] down_write+0x36/0x60 [ 62.257185][ T3542] ? ext4_xattr_set_handle+0x270/0x1560 [ 62.262735][ T3542] ext4_xattr_set_handle+0x270/0x1560 [ 62.268121][ T3542] ? ext4_xattr_set_entry+0x3c00/0x3c00 [ 62.273674][ T3542] ? dquot_initialize+0x20/0x20 [ 62.278622][ T3542] ? unwind_next_frame+0x1a3f/0x2220 [ 62.284003][ T3542] ? ext4_journal_check_start+0x179/0x240 [ 62.289732][ T3542] ? __ext4_journal_start_sb+0x1f1/0x410 [ 62.295375][ T3542] ext4_xattr_set+0x231/0x3d0 [ 62.300150][ T3542] ? ext4_xattr_set_credits+0x2a0/0x2a0 [ 62.305698][ T3542] ? posix_xattr_acl+0xa5/0xd0 [ 62.310642][ T3542] ? evm_protect_xattr+0x366/0xb10 [ 62.315840][ T3542] ? ext4_xattr_trusted_get+0x40/0x40 [ 62.321217][ T3542] __vfs_setxattr+0x3e7/0x420 [ 62.325902][ T3542] __vfs_setxattr_noperm+0x12a/0x5e0 [ 62.331190][ T3542] vfs_setxattr+0x21d/0x420 [ 62.335697][ T3542] ? xattr_permission+0x4f0/0x4f0 [ 62.340721][ T3542] ? __might_fault+0xb2/0x110 [ 62.345406][ T3542] setxattr+0x250/0x2b0 [ 62.349567][ T3542] ? path_setxattr+0x2a0/0x2a0 [ 62.354343][ T3542] ? __mnt_want_write+0x221/0x2a0 [ 62.359377][ T3542] path_setxattr+0x1bc/0x2a0 [ 62.363973][ T3542] ? simple_xattr_list_add+0xf0/0xf0 [ 62.369259][ T3542] ? syscall_enter_from_user_mode+0x2e/0x220 [ 62.375251][ T3542] __x64_sys_setxattr+0xb7/0xd0 [ 62.380108][ T3542] do_syscall_64+0x3d/0xb0 [ 62.384533][ T3542] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 62.390435][ T3542] RIP: 0033:0x7f5cba5788a9 [ 62.394849][ T3542] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 62.414464][ T3542] RSP: 002b:00007ffea881dbc8 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 62.422883][ T3542] RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 00007f5cba5788a9 [ 62.430872][ T3542] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000020000000 [ 62.438845][ T3542] RBP: 00007f5cba538140 R08: 0000000000000000 R09: 0000000000000000 [ 62.446833][ T3542] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5cba5381d0 [ 62.454804][ T3542] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 62.462780][ T3542]