Warning: Permanently added '10.128.0.155' (ED25519) to the list of known hosts. executing program [ 35.858670][ T4220] loop0: detected capacity change from 0 to 4096 [ 35.861670][ T4220] ======================================================= [ 35.861670][ T4220] WARNING: The mand mount option has been deprecated and [ 35.861670][ T4220] and is ignored by this kernel. Remove the mand [ 35.861670][ T4220] option from the mount to silence this warning. [ 35.861670][ T4220] ======================================================= [ 35.871336][ T4220] ntfs3: loop0: Different NTFS' sector size (4096) and media sector size (512) [ 35.884371][ T4220] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 35.897659][ T4220] [ 35.898246][ T4220] ============================================ [ 35.899625][ T4220] WARNING: possible recursive locking detected [ 35.901007][ T4220] 6.1.70-syzkaller #0 Not tainted [ 35.902210][ T4220] -------------------------------------------- [ 35.903653][ T4220] syz-executor976/4220 is trying to acquire lock: [ 35.905096][ T4220] ffff0000df619e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x26c/0x4d8 [ 35.907066][ T4220] [ 35.907066][ T4220] but task is already holding lock: [ 35.908747][ T4220] ffff0000df61e840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 35.910694][ T4220] [ 35.910694][ T4220] other info that might help us debug this: [ 35.912532][ T4220] Possible unsafe locking scenario: [ 35.912532][ T4220] [ 35.914289][ T4220] CPU0 [ 35.915039][ T4220] ---- [ 35.915795][ T4220] lock(&ni->ni_lock/4); [ 35.916796][ T4220] lock(&ni->ni_lock/4); [ 35.917843][ T4220] [ 35.917843][ T4220] *** DEADLOCK *** [ 35.917843][ T4220] [ 35.919703][ T4220] May be due to missing lock nesting notation [ 35.919703][ T4220] [ 35.921620][ T4220] 2 locks held by syz-executor976/4220: [ 35.922872][ T4220] #0: ffff0000df61eae0 (&type->i_mutex_dir_key#6){.+.+}-{3:3}, at: lookup_slow+0x50/0x84 [ 35.925203][ T4220] #1: ffff0000df61e840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 35.927398][ T4220] [ 35.927398][ T4220] stack backtrace: [ 35.928670][ T4220] CPU: 0 PID: 4220 Comm: syz-executor976 Not tainted 6.1.70-syzkaller #0 [ 35.930589][ T4220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 35.932860][ T4220] Call trace: [ 35.933640][ T4220] dump_backtrace+0x1c8/0x1f4 [ 35.934857][ T4220] show_stack+0x2c/0x3c [ 35.935866][ T4220] dump_stack_lvl+0x108/0x170 [ 35.936953][ T4220] dump_stack+0x1c/0x58 [ 35.937941][ T4220] __lock_acquire+0x6310/0x7680 [ 35.939086][ T4220] lock_acquire+0x26c/0x7cc [ 35.940146][ T4220] __mutex_lock_common+0x190/0x21a0 [ 35.941362][ T4220] mutex_lock_nested+0x38/0x44 [ 35.942499][ T4220] mi_read+0x26c/0x4d8 [ 35.943418][ T4220] ntfs_iget5+0x360/0x2bd4 [ 35.944452][ T4220] dir_search_u+0x298/0x324 [ 35.945496][ T4220] ntfs_lookup+0x108/0x1f8 [ 35.946540][ T4220] __lookup_slow+0x250/0x374 [ 35.947635][ T4220] lookup_slow+0x60/0x84 [ 35.948538][ T4220] walk_component+0x280/0x36c [ 35.949630][ T4220] path_lookupat+0x13c/0x3d0 [ 35.950681][ T4220] filename_lookup+0x1d4/0x4e0 [ 35.951833][ T4220] user_path_at_empty+0x5c/0x84 [ 35.953055][ T4220] path_getxattr+0xe8/0x388 [ 35.954154][ T4220] __arm64_sys_getxattr+0xa0/0xb8 [ 35.955314][ T4220] invoke_syscall+0x98/0x2c0 [ 35.956383][ T4220] el0_svc_common+0x138/0x258 [ 35.957429][ T4220] do_el0_svc+0x64/0x218 [ 35.958512][ T4220] el0_svc+0x58/0x168 [ 35.959393][ T4220] el0t_64_sync_handler+0x84/0xf0 [ 35.960583][ T4220] el0t_64_sync+0x18c/0x190