[ 10.190870][ T2658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 10.193632][ T2658] eql: remember to turn off Van-Jacobson compression on your slave devices [ 10.236276][ T29] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 10.240683][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.35' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 33.438567][ T3073] loop0: detected capacity change from 0 to 2048 [ 33.441239][ T3073] EXT4-fs: Ignoring removed oldalloc option [ 33.443777][ T3073] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 33.459438][ T3073] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 33.464046][ T3073] [ 33.464649][ T3073] ====================================================== [ 33.466397][ T3073] WARNING: possible circular locking dependency detected [ 33.468192][ T3073] 6.1.0-rc8-syzkaller-33330-ga5541c0811a0 #0 Not tainted [ 33.470054][ T3073] ------------------------------------------------------ [ 33.471875][ T3073] syz-executor246/3073 is trying to acquire lock: [ 33.473509][ T3073] ffff0000cacbcd48 (&ei->xattr_sem){++++}-{3:3}, at: ext4_find_inline_entry+0x80/0x224 [ 33.476106][ T3073] [ 33.476106][ T3073] but task is already holding lock: [ 33.478020][ T3073] ffff0000cacbda10 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_unlink+0x78/0x300 [ 33.480375][ T3073] [ 33.480375][ T3073] which lock already depends on the new lock. [ 33.480375][ T3073] [ 33.483088][ T3073] [ 33.483088][ T3073] the existing dependency chain (in reverse order) is: [ 33.485400][ T3073] [ 33.485400][ T3073] -> #1 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}: [ 33.487562][ T3073] down_write+0x5c/0x88 [ 33.488797][ T3073] ext4_xattr_set_entry+0xde4/0xe28 [ 33.490234][ T3073] ext4_xattr_ibody_set+0x94/0x184 [ 33.491741][ T3073] ext4_xattr_set_handle+0x648/0x9a0 [ 33.493253][ T3073] ext4_xattr_set+0x100/0x1d0 [ 33.494585][ T3073] ext4_xattr_trusted_set+0x4c/0x64 [ 33.496083][ T3073] __vfs_setxattr+0x250/0x260 [ 33.497451][ T3073] __vfs_setxattr_noperm+0xcc/0x320 [ 33.498957][ T3073] __vfs_setxattr_locked+0x16c/0x194 [ 33.500452][ T3073] vfs_setxattr+0xf4/0x1f4 [ 33.501716][ T3073] path_setxattr+0x354/0x414 [ 33.503027][ T3073] __arm64_sys_lsetxattr+0x2c/0x40 [ 33.504460][ T3073] el0_svc_common+0x138/0x220 [ 33.505793][ T3073] do_el0_svc+0x48/0x140 [ 33.507060][ T3073] el0_svc+0x58/0x150 [ 33.508220][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 33.509668][ T3073] el0t_64_sync+0x190/0x194 [ 33.510979][ T3073] [ 33.510979][ T3073] -> #0 (&ei->xattr_sem){++++}-{3:3}: [ 33.512987][ T3073] __lock_acquire+0x1530/0x3084 [ 33.514398][ T3073] lock_acquire+0x100/0x1f8 [ 33.515686][ T3073] down_read+0x5c/0x78 [ 33.516886][ T3073] ext4_find_inline_entry+0x80/0x224 [ 33.518368][ T3073] __ext4_find_entry+0xe8/0xb4c [ 33.519752][ T3073] __ext4_unlink+0xa8/0x3e4 [ 33.521058][ T3073] ext4_unlink+0x150/0x200 [ 33.522348][ T3073] vfs_unlink+0x1dc/0x300 [ 33.523636][ T3073] do_unlinkat+0x200/0x3dc [ 33.524901][ T3073] __arm64_sys_unlinkat+0x7c/0xa8 [ 33.526332][ T3073] el0_svc_common+0x138/0x220 [ 33.527691][ T3073] do_el0_svc+0x48/0x140 [ 33.528906][ T3073] el0_svc+0x58/0x150 [ 33.530063][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 33.531503][ T3073] el0t_64_sync+0x190/0x194 [ 33.532810][ T3073] [ 33.532810][ T3073] other info that might help us debug this: [ 33.532810][ T3073] [ 33.535500][ T3073] Possible unsafe locking scenario: [ 33.535500][ T3073] [ 33.537374][ T3073] CPU0 CPU1 [ 33.538740][ T3073] ---- ---- [ 33.540130][ T3073] lock(&ea_inode->i_rwsem#8/1); [ 33.541406][ T3073] lock(&ei->xattr_sem); [ 33.543141][ T3073] lock(&ea_inode->i_rwsem#8/1); [ 33.545120][ T3073] lock(&ei->xattr_sem); [ 33.546223][ T3073] [ 33.546223][ T3073] *** DEADLOCK *** [ 33.546223][ T3073] [ 33.548282][ T3073] 3 locks held by syz-executor246/3073: [ 33.549706][ T3073] #0: ffff0000ca036460 (sb_writers#3){.+.+}-{0:0}, at: mnt_want_write+0x20/0x64 [ 33.552060][ T3073] #1: ffff0000cacbd080 (&type->i_mutex_dir_key#3/1){+.+.}-{3:3}, at: do_unlinkat+0xf0/0x3dc [ 33.554830][ T3073] #2: ffff0000cacbda10 (&ea_inode->i_rwsem#8/1){+.+.}-{3:3}, at: vfs_unlink+0x78/0x300 [ 33.557588][ T3073] [ 33.557588][ T3073] stack backtrace: [ 33.559158][ T3073] CPU: 1 PID: 3073 Comm: syz-executor246 Not tainted 6.1.0-rc8-syzkaller-33330-ga5541c0811a0 #0 [ 33.561952][ T3073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 33.564623][ T3073] Call trace: [ 33.565458][ T3073] dump_backtrace+0x1c4/0x1f0 [ 33.566705][ T3073] show_stack+0x2c/0x3c [ 33.567815][ T3073] dump_stack_lvl+0x104/0x16c [ 33.569045][ T3073] dump_stack+0x1c/0x58 [ 33.570147][ T3073] print_circular_bug+0x2c4/0x2c8 [ 33.571486][ T3073] check_noncircular+0x14c/0x154 [ 33.572797][ T3073] __lock_acquire+0x1530/0x3084 [ 33.574088][ T3073] lock_acquire+0x100/0x1f8 [ 33.575278][ T3073] down_read+0x5c/0x78 [ 33.576390][ T3073] ext4_find_inline_entry+0x80/0x224 [ 33.577796][ T3073] __ext4_find_entry+0xe8/0xb4c [ 33.579081][ T3073] __ext4_unlink+0xa8/0x3e4 [ 33.580306][ T3073] ext4_unlink+0x150/0x200 [ 33.581458][ T3073] vfs_unlink+0x1dc/0x300 [ 33.582598][ T3073] do_unlinkat+0x200/0x3dc [ 33.583775][ T3073] __arm64_sys_unlinkat+0x7c/0xa8 [ 33.585130][ T3073] el0_svc_common+0x138/0x220 [ 33.586384][ T3073] do_el0_svc+0x48/0x140 [ 33.587513][ T3073] el0_svc+0x58/0x150 [ 33.588591][ T3073] el0t_64_sync_handler+0x84/0xf0 [ 33.589916][ T3073] el0t_64_sync+0x190/0x194