Warning: Permanently added '10.128.1.137' (ED25519) to the list of known hosts. executing program syzkaller login: [ 34.378103][ T4290] loop0: detected capacity change from 0 to 4096 [ 34.381623][ T4290] ======================================================= [ 34.381623][ T4290] WARNING: The mand mount option has been deprecated and [ 34.381623][ T4290] and is ignored by this kernel. Remove the mand [ 34.381623][ T4290] option from the mount to silence this warning. [ 34.381623][ T4290] ======================================================= [ 34.496995][ T4290] [ 34.497546][ T4290] ====================================================== [ 34.499083][ T4290] WARNING: possible circular locking dependency detected [ 34.500537][ T4290] 6.1.119-syzkaller #0 Not tainted [ 34.501559][ T4290] ------------------------------------------------------ [ 34.503088][ T4290] syz-executor211/4290 is trying to acquire lock: [ 34.504615][ T4290] ffff0000e17cf240 (&sb->s_type->i_mutex_key#17){+.+.}-{3:3}, at: ntfs_file_mmap+0x4b0/0x688 [ 34.506783][ T4290] [ 34.506783][ T4290] but task is already holding lock: [ 34.508406][ T4290] ffff0000d24c5b48 (&mm->mmap_lock){++++}-{3:3}, at: vm_mmap_pgoff+0x15c/0x2b4 [ 34.510237][ T4290] [ 34.510237][ T4290] which lock already depends on the new lock. [ 34.510237][ T4290] [ 34.512559][ T4290] [ 34.512559][ T4290] the existing dependency chain (in reverse order) is: [ 34.514462][ T4290] [ 34.514462][ T4290] -> #1 (&mm->mmap_lock){++++}-{3:3}: [ 34.516135][ T4290] __might_fault+0xc4/0x124 [ 34.517352][ T4290] fault_in_readable+0x188/0x5f0 [ 34.518545][ T4290] fault_in_iov_iter_readable+0x1a0/0x22c [ 34.519921][ T4290] generic_perform_write+0x1c8/0x55c [ 34.521189][ T4290] __generic_file_write_iter+0x168/0x388 [ 34.522576][ T4290] ntfs_file_write_iter+0x4d4/0x580 [ 34.523750][ T4290] do_iter_write+0x534/0x964 [ 34.524834][ T4290] do_pwritev+0x1ec/0x334 [ 34.525921][ T4290] __arm64_sys_pwritev2+0xd4/0x108 [ 34.527102][ T4290] invoke_syscall+0x98/0x2bc [ 34.528138][ T4290] el0_svc_common+0x138/0x258 [ 34.529342][ T4290] do_el0_svc+0x58/0x13c [ 34.530343][ T4290] el0_svc+0x58/0x168 [ 34.531418][ T4290] el0t_64_sync_handler+0x84/0xf0 [ 34.532636][ T4290] el0t_64_sync+0x18c/0x190 [ 34.533668][ T4290] [ 34.533668][ T4290] -> #0 (&sb->s_type->i_mutex_key#17){+.+.}-{3:3}: [ 34.535754][ T4290] __lock_acquire+0x3338/0x7680 [ 34.536902][ T4290] lock_acquire+0x26c/0x7cc [ 34.538078][ T4290] down_write+0x5c/0x88 [ 34.539054][ T4290] ntfs_file_mmap+0x4b0/0x688 [ 34.540085][ T4290] mmap_file+0x6c/0xc8 [ 34.541058][ T4290] mmap_region+0x128c/0x2208 [ 34.542241][ T4290] do_mmap+0x9ac/0x110c [ 34.543167][ T4290] vm_mmap_pgoff+0x1a4/0x2b4 [ 34.544311][ T4290] ksys_mmap_pgoff+0x3c8/0x5b0 [ 34.545398][ T4290] __arm64_sys_mmap+0xf8/0x110 [ 34.546598][ T4290] invoke_syscall+0x98/0x2bc [ 34.547716][ T4290] el0_svc_common+0x138/0x258 [ 34.548916][ T4290] do_el0_svc+0x58/0x13c [ 34.549931][ T4290] el0_svc+0x58/0x168 [ 34.550854][ T4290] el0t_64_sync_handler+0x84/0xf0 [ 34.551983][ T4290] el0t_64_sync+0x18c/0x190 [ 34.553057][ T4290] [ 34.553057][ T4290] other info that might help us debug this: [ 34.553057][ T4290] [ 34.555414][ T4290] Possible unsafe locking scenario: [ 34.555414][ T4290] [ 34.557045][ T4290] CPU0 CPU1 [ 34.558165][ T4290] ---- ---- [ 34.559286][ T4290] lock(&mm->mmap_lock); [ 34.560254][ T4290] lock(&sb->s_type->i_mutex_key#17); [ 34.562065][ T4290] lock(&mm->mmap_lock); [ 34.563567][ T4290] lock(&sb->s_type->i_mutex_key#17); [ 34.564733][ T4290] [ 34.564733][ T4290] *** DEADLOCK *** [ 34.564733][ T4290] [ 34.566509][ T4290] 1 lock held by syz-executor211/4290: [ 34.567687][ T4290] #0: ffff0000d24c5b48 (&mm->mmap_lock){++++}-{3:3}, at: vm_mmap_pgoff+0x15c/0x2b4 [ 34.569809][ T4290] [ 34.569809][ T4290] stack backtrace: [ 34.571075][ T4290] CPU: 1 PID: 4290 Comm: syz-executor211 Not tainted 6.1.119-syzkaller #0 [ 34.573030][ T4290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 34.575284][ T4290] Call trace: [ 34.575982][ T4290] dump_backtrace+0x1c8/0x1f4 [ 34.577020][ T4290] show_stack+0x2c/0x3c [ 34.577936][ T4290] dump_stack_lvl+0x108/0x170 [ 34.578959][ T4290] dump_stack+0x1c/0x58 [ 34.579852][ T4290] print_circular_bug+0x150/0x1b8 [ 34.581013][ T4290] check_noncircular+0x2cc/0x378 [ 34.582012][ T4290] __lock_acquire+0x3338/0x7680 [ 34.583021][ T4290] lock_acquire+0x26c/0x7cc [ 34.584056][ T4290] down_write+0x5c/0x88 [ 34.584991][ T4290] ntfs_file_mmap+0x4b0/0x688 [ 34.586075][ T4290] mmap_file+0x6c/0xc8 [ 34.586939][ T4290] mmap_region+0x128c/0x2208 [ 34.588002][ T4290] do_mmap+0x9ac/0x110c [ 34.588970][ T4290] vm_mmap_pgoff+0x1a4/0x2b4 [ 34.589944][ T4290] ksys_mmap_pgoff+0x3c8/0x5b0 [ 34.591061][ T4290] __arm64_sys_mmap+0xf8/0x110 [ 34.592062][ T4290] invoke_syscall+0x98/0x2bc [ 34.593081][ T4290] el0_svc_common+0x138/0x258 [ 34.594162][ T4290] do_el0_svc+0x58/0x13c [ 34.595075][ T4290] el0_svc+0x58/0x168 [ 34.595976][ T4290] el0t_64_sync_handler+0x84/0xf0 [ 34.596991][ T4290] el0t_64_sync+0x18c/0x190