Warning: Permanently added '10.128.0.185' (ED25519) to the list of known hosts. executing program [ 36.742306][ T4222] loop0: detected capacity change from 0 to 4096 [ 36.747643][ T4222] ntfs3: loop0: Different NTFS' sector size (2048) and media sector size (512) [ 36.756427][ T4222] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 36.771658][ T4222] [ 36.772231][ T4222] ============================================ [ 36.773621][ T4222] WARNING: possible recursive locking detected [ 36.775035][ T4222] 6.1.74-syzkaller #0 Not tainted [ 36.776240][ T4222] -------------------------------------------- [ 36.777604][ T4222] syz-executor176/4222 is trying to acquire lock: [ 36.779025][ T4222] ffff0000e2421e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x26c/0x4d8 [ 36.780899][ T4222] [ 36.780899][ T4222] but task is already holding lock: [ 36.782650][ T4222] ffff0000e2426840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 36.784684][ T4222] [ 36.784684][ T4222] other info that might help us debug this: [ 36.786517][ T4222] Possible unsafe locking scenario: [ 36.786517][ T4222] [ 36.788210][ T4222] CPU0 [ 36.788923][ T4222] ---- [ 36.789633][ T4222] lock(&ni->ni_lock/4); [ 36.790709][ T4222] lock(&ni->ni_lock/4); [ 36.791680][ T4222] [ 36.791680][ T4222] *** DEADLOCK *** [ 36.791680][ T4222] [ 36.793589][ T4222] May be due to missing lock nesting notation [ 36.793589][ T4222] [ 36.795517][ T4222] 3 locks held by syz-executor176/4222: [ 36.796881][ T4222] #0: ffff0000ddcae460 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 36.798946][ T4222] #1: ffff0000e2426ae0 (&type->i_mutex_dir_key#6){++++}-{3:3}, at: path_openat+0x5ec/0x2548 [ 36.801256][ T4222] #2: ffff0000e2426840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 36.803452][ T4222] [ 36.803452][ T4222] stack backtrace: [ 36.804822][ T4222] CPU: 0 PID: 4222 Comm: syz-executor176 Not tainted 6.1.74-syzkaller #0 [ 36.806826][ T4222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 36.809121][ T4222] Call trace: [ 36.809851][ T4222] dump_backtrace+0x1c8/0x1f4 [ 36.810913][ T4222] show_stack+0x2c/0x3c [ 36.811872][ T4222] dump_stack_lvl+0x108/0x170 [ 36.812950][ T4222] dump_stack+0x1c/0x58 [ 36.813884][ T4222] __lock_acquire+0x6310/0x7680 [ 36.814943][ T4222] lock_acquire+0x26c/0x7cc [ 36.815984][ T4222] __mutex_lock_common+0x190/0x21a0 [ 36.817228][ T4222] mutex_lock_nested+0x38/0x44 [ 36.818297][ T4222] mi_read+0x26c/0x4d8 [ 36.819305][ T4222] ntfs_iget5+0x360/0x2bd4 [ 36.820430][ T4222] dir_search_u+0x298/0x324 [ 36.821415][ T4222] ntfs_lookup+0x108/0x1f8 [ 36.822473][ T4222] path_openat+0xd3c/0x2548 [ 36.823550][ T4222] do_filp_open+0x1bc/0x3cc [ 36.824634][ T4222] do_sys_openat2+0x128/0x3d8 [ 36.825716][ T4222] __arm64_sys_openat+0x1f0/0x240 [ 36.826820][ T4222] invoke_syscall+0x98/0x2c0 [ 36.827908][ T4222] el0_svc_common+0x138/0x258 [ 36.828977][ T4222] do_el0_svc+0x64/0x218 [ 36.829937][ T4222] el0_svc+0x58/0x168 [ 36.830855][ T4222] el0t_64_sync_handler+0x84/0xf0 [ 36.832007][ T4222] el0t_64_sync+0x18c/0x190