======================================================
WARNING: possible circular locking dependency detected
syzkaller #0 Tainted: G             L     
------------------------------------------------------
kworker/u10:14/12189 is trying to acquire lock:
ffff888173a00938 (jbd2_handle){++++}-{0:0}, at: wait_transaction_locked+0x1a9/0x280

but task is already holding lock:
ffff888173a02c18 (&sbi->s_writepages_rwsem){++++}-{0:0}, at: ext4_writepages+0x205/0x3b0

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #2 (&sbi->s_writepages_rwsem){++++}-{0:0}:
       percpu_down_read_internal+0x48/0x1c0
       ext4_writepages+0x205/0x3b0
       do_writepages+0x32e/0x550
       __writeback_single_inode+0x133/0x10e0
       writeback_single_inode+0x4ac/0xdc0
       write_inode_now+0x1c2/0x290
       iput+0x8c1/0xe80
       ext4_xattr_block_set+0x2359/0x2ad0
       ext4_expand_extra_isize_ea+0x12cf/0x1ea0
       __ext4_expand_extra_isize+0x30d/0x400
       __ext4_mark_inode_dirty+0x45c/0x710
       ext4_evict_inode+0x986/0x10e0
       evict+0x61e/0xb10
       ext4_orphan_cleanup+0xc38/0x1470
       ext4_fill_super+0x5a19/0x6330
       get_tree_bdev_flags+0x431/0x4f0
       vfs_get_tree+0x92/0x2a0
       do_new_mount+0x341/0xd30
       __se_sys_mount+0x31d/0x420
       do_syscall_64+0x15f/0xf80
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> #1 (&ei->xattr_sem){++++}-{4:4}:
       down_read+0x47/0x2e0
       ext4_setattr+0x884/0x1d60
       notify_change+0xc1a/0xf40
       chown_common+0x466/0x6b0
       do_fchownat+0x14c/0x250
       __x64_sys_chown+0x82/0xa0
       do_syscall_64+0x15f/0xf80
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> #0 (jbd2_handle){++++}-{0:0}:
       __lock_acquire+0x15a5/0x2cf0
       lock_acquire+0x106/0x350
       wait_transaction_locked+0x1c2/0x280
       start_this_handle+0x7dc/0x2290
       jbd2__journal_start+0x2c0/0x5c0
       __ext4_journal_start_sb+0x203/0x5d0
       ext4_do_writepages+0xf76/0x4670
       ext4_writepages+0x241/0x3b0
       do_writepages+0x32e/0x550
       __writeback_single_inode+0x133/0x10e0
       writeback_sb_inodes+0x979/0x19d0
       __writeback_inodes_wb+0x111/0x240
       wb_writeback+0x459/0xb00
       wb_workfn+0xb12/0xf10
       process_scheduled_works+0xb5d/0x1860
       worker_thread+0xa53/0xfc0
       kthread+0x388/0x470
       ret_from_fork+0x514/0xb70
       ret_from_fork_asm+0x1a/0x30

other info that might help us debug this:

Chain exists of:
  jbd2_handle --> &ei->xattr_sem --> &sbi->s_writepages_rwsem

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  rlock(&sbi->s_writepages_rwsem);
                               lock(&ei->xattr_sem);
                               lock(&sbi->s_writepages_rwsem);
  lock(jbd2_handle);

 *** DEADLOCK ***

4 locks held by kworker/u10:14/12189:
 #0: ffff8881626df940 ((wq_completion)writeback){+.+.}-{0:0}, at: process_scheduled_works+0xa35/0x1860
 #1: ffffc90006677c40 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_scheduled_works+0xa70/0x1860
 #2: ffff888173aa40d8 (&type->s_umount_key#32){++++}-{4:4}, at: super_trylock_shared+0x20/0xf0
 #3: ffff888173a02c18 (&sbi->s_writepages_rwsem){++++}-{0:0}, at: ext4_writepages+0x205/0x3b0

stack backtrace:
CPU: 1 UID: 0 PID: 12189 Comm: kworker/u10:14 Tainted: G             L      syzkaller #0 PREEMPT(full) 
Tainted: [L]=SOFTLOCKUP
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Workqueue: writeback wb_workfn (flush-8:0)
Call Trace:
 <TASK>
 dump_stack_lvl+0xe8/0x150
 print_circular_bug+0x2e1/0x300
 check_noncircular+0x12e/0x150
 __lock_acquire+0x15a5/0x2cf0
 lock_acquire+0x106/0x350
 wait_transaction_locked+0x1c2/0x280
 start_this_handle+0x7dc/0x2290
 jbd2__journal_start+0x2c0/0x5c0
 __ext4_journal_start_sb+0x203/0x5d0
 ext4_do_writepages+0xf76/0x4670
 ext4_writepages+0x241/0x3b0
 do_writepages+0x32e/0x550
 __writeback_single_inode+0x133/0x10e0
 writeback_sb_inodes+0x979/0x19d0
 __writeback_inodes_wb+0x111/0x240
 wb_writeback+0x459/0xb00
 wb_workfn+0xb12/0xf10
 process_scheduled_works+0xb5d/0x1860
 worker_thread+0xa53/0xfc0
 kthread+0x388/0x470
 ret_from_fork+0x514/0xb70
 ret_from_fork_asm+0x1a/0x30
 </TASK>
