Warning: Permanently added '10.128.1.80' (ED25519) to the list of known hosts. executing program [ 34.340820][ T4220] loop0: detected capacity change from 0 to 4096 [ 34.345514][ T4220] ntfs3: loop0: Different NTFS' sector size (2048) and media sector size (512) [ 34.353960][ T4220] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 34.370154][ T4220] [ 34.370738][ T4220] ============================================ [ 34.372268][ T4220] WARNING: possible recursive locking detected [ 34.373854][ T4220] 6.1.53-syzkaller #0 Not tainted [ 34.375161][ T4220] -------------------------------------------- [ 34.376682][ T4220] syz-executor291/4220 is trying to acquire lock: [ 34.378386][ T4220] ffff0000e24a9e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x26c/0x4d8 [ 34.380492][ T4220] [ 34.380492][ T4220] but task is already holding lock: [ 34.382286][ T4220] ffff0000e24ae840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 34.384516][ T4220] [ 34.384516][ T4220] other info that might help us debug this: [ 34.386659][ T4220] Possible unsafe locking scenario: [ 34.386659][ T4220] [ 34.388557][ T4220] CPU0 [ 34.389400][ T4220] ---- [ 34.390267][ T4220] lock(&ni->ni_lock/4); [ 34.391432][ T4220] lock(&ni->ni_lock/4); [ 34.392488][ T4220] [ 34.392488][ T4220] *** DEADLOCK *** [ 34.392488][ T4220] [ 34.394494][ T4220] May be due to missing lock nesting notation [ 34.394494][ T4220] [ 34.396744][ T4220] 3 locks held by syz-executor291/4220: [ 34.398209][ T4220] #0: ffff0000d87a0460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 34.400648][ T4220] #1: ffff0000e24aeae0 (&type->i_mutex_dir_key#6){++++}-{3:3}, at: path_openat+0x5ec/0x2548 [ 34.403274][ T4220] #2: ffff0000e24ae840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 34.405661][ T4220] [ 34.405661][ T4220] stack backtrace: [ 34.407219][ T4220] CPU: 0 PID: 4220 Comm: syz-executor291 Not tainted 6.1.53-syzkaller #0 [ 34.409482][ T4220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 34.411984][ T4220] Call trace: [ 34.412848][ T4220] dump_backtrace+0x1c8/0x1f4 [ 34.413981][ T4220] show_stack+0x2c/0x3c [ 34.415002][ T4220] dump_stack_lvl+0x108/0x170 [ 34.416274][ T4220] dump_stack+0x1c/0x5c [ 34.417375][ T4220] __lock_acquire+0x6310/0x764c [ 34.418647][ T4220] lock_acquire+0x26c/0x7cc [ 34.419817][ T4220] __mutex_lock_common+0x190/0x21a0 [ 34.421117][ T4220] mutex_lock_nested+0x38/0x44 [ 34.422338][ T4220] mi_read+0x26c/0x4d8 [ 34.423373][ T4220] ntfs_iget5+0x360/0x2bd4 [ 34.424518][ T4220] dir_search_u+0x298/0x324 [ 34.425606][ T4220] ntfs_lookup+0x108/0x1f8 [ 34.426691][ T4220] path_openat+0xd3c/0x2548 [ 34.427804][ T4220] do_filp_open+0x1bc/0x3cc [ 34.429020][ T4220] do_sys_openat2+0x128/0x3d8 [ 34.430190][ T4220] __arm64_sys_openat+0x1f0/0x240 [ 34.431543][ T4220] invoke_syscall+0x98/0x2c0 [ 34.432665][ T4220] el0_svc_common+0x138/0x258 [ 34.433880][ T4220] do_el0_svc+0x64/0x218 [ 34.434932][ T4220] el0_svc+0x58/0x168 [ 34.435919][ T4220] el0t_64_sync_handler+0x84/0xf0 [ 34.437200][ T4220] el0t_64_sync+0x18c/0x190