Warning: Permanently added '10.128.1.68' (ED25519) to the list of known hosts. executing program syzkaller login: [ 35.659655][ T4222] loop0: detected capacity change from 0 to 4096 [ 35.662964][ T4222] ======================================================= [ 35.662964][ T4222] WARNING: The mand mount option has been deprecated and [ 35.662964][ T4222] and is ignored by this kernel. Remove the mand [ 35.662964][ T4222] option from the mount to silence this warning. [ 35.662964][ T4222] ======================================================= [ 35.672564][ T4222] ntfs3: loop0: Different NTFS' sector size (4096) and media sector size (512) [ 35.687054][ T4222] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 35.693399][ T4222] [ 35.693982][ T4222] ============================================ [ 35.695334][ T4222] WARNING: possible recursive locking detected [ 35.696593][ T4222] 6.1.89-syzkaller #0 Not tainted [ 35.697789][ T4222] -------------------------------------------- [ 35.699294][ T4222] syz-executor232/4222 is trying to acquire lock: [ 35.700719][ T4222] ffff0000df101e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x26c/0x4d8 [ 35.702881][ T4222] [ 35.702881][ T4222] but task is already holding lock: [ 35.704470][ T4222] ffff0000df106840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 35.706348][ T4222] [ 35.706348][ T4222] other info that might help us debug this: [ 35.708230][ T4222] Possible unsafe locking scenario: [ 35.708230][ T4222] [ 35.709792][ T4222] CPU0 [ 35.710530][ T4222] ---- [ 35.711238][ T4222] lock(&ni->ni_lock/4); [ 35.712252][ T4222] lock(&ni->ni_lock/4); [ 35.713270][ T4222] [ 35.713270][ T4222] *** DEADLOCK *** [ 35.713270][ T4222] [ 35.715128][ T4222] May be due to missing lock nesting notation [ 35.715128][ T4222] [ 35.717058][ T4222] 2 locks held by syz-executor232/4222: [ 35.718377][ T4222] #0: ffff0000df106ae0 (&type->i_mutex_dir_key#6){.+.+}-{3:3}, at: lookup_slow+0x50/0x84 [ 35.720726][ T4222] #1: ffff0000df106840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 35.722826][ T4222] [ 35.722826][ T4222] stack backtrace: [ 35.724206][ T4222] CPU: 0 PID: 4222 Comm: syz-executor232 Not tainted 6.1.89-syzkaller #0 [ 35.726163][ T4222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 35.728386][ T4222] Call trace: [ 35.729192][ T4222] dump_backtrace+0x1c8/0x1f4 [ 35.730166][ T4222] show_stack+0x2c/0x3c [ 35.731143][ T4222] dump_stack_lvl+0x108/0x170 [ 35.732242][ T4222] dump_stack+0x1c/0x5c [ 35.733193][ T4222] __lock_acquire+0x6310/0x7680 [ 35.734237][ T4222] lock_acquire+0x26c/0x7cc [ 35.735204][ T4222] __mutex_lock_common+0x190/0x21a0 [ 35.736349][ T4222] mutex_lock_nested+0x38/0x44 [ 35.737399][ T4222] mi_read+0x26c/0x4d8 [ 35.738337][ T4222] ntfs_iget5+0x360/0x2be8 [ 35.739333][ T4222] dir_search_u+0x298/0x324 [ 35.740347][ T4222] ntfs_lookup+0x108/0x1f8 [ 35.741315][ T4222] __lookup_slow+0x250/0x374 [ 35.742431][ T4222] lookup_slow+0x60/0x84 [ 35.743376][ T4222] walk_component+0x280/0x36c [ 35.744465][ T4222] path_lookupat+0x13c/0x3d0 [ 35.745492][ T4222] filename_lookup+0x1d4/0x4e0 [ 35.746608][ T4222] user_path_at_empty+0x5c/0x84 [ 35.747660][ T4222] path_getxattr+0xe8/0x388 [ 35.748631][ T4222] __arm64_sys_getxattr+0xa0/0xb8 [ 35.749758][ T4222] invoke_syscall+0x98/0x2c0 [ 35.750798][ T4222] el0_svc_common+0x138/0x258 [ 35.751862][ T4222] do_el0_svc+0x64/0x218 [ 35.752836][ T4222] el0_svc+0x58/0x168 [ 35.753679][ T4222] el0t_64_sync_handler+0x84/0xf0 [ 35.754813][ T4222] el0t_64_sync+0x18c/0x190