Warning: Permanently added '10.128.1.147' (ED25519) to the list of known hosts. executing program [ 35.711665][ T4229] loop0: detected capacity change from 0 to 4096 [ 35.714943][ T4229] ======================================================= [ 35.714943][ T4229] WARNING: The mand mount option has been deprecated and [ 35.714943][ T4229] and is ignored by this kernel. Remove the mand [ 35.714943][ T4229] option from the mount to silence this warning. [ 35.714943][ T4229] ======================================================= [ 35.725632][ T4229] ntfs3: loop0: Different NTFS' sector size (4096) and media sector size (512) [ 35.749541][ T4229] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 35.756940][ T4229] [ 35.757571][ T4229] ============================================ [ 35.759025][ T4229] WARNING: possible recursive locking detected [ 35.760428][ T4229] 6.1.75-syzkaller #0 Not tainted [ 35.761640][ T4229] -------------------------------------------- [ 35.763070][ T4229] syz-executor230/4229 is trying to acquire lock: [ 35.764537][ T4229] ffff0000e2041720 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x26c/0x4d8 [ 35.766441][ T4229] [ 35.766441][ T4229] but task is already holding lock: [ 35.768149][ T4229] ffff0000e207a5e0 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 35.770207][ T4229] [ 35.770207][ T4229] other info that might help us debug this: [ 35.772028][ T4229] Possible unsafe locking scenario: [ 35.772028][ T4229] [ 35.773759][ T4229] CPU0 [ 35.774533][ T4229] ---- [ 35.775306][ T4229] lock(&ni->ni_lock/4); [ 35.776305][ T4229] lock(&ni->ni_lock/4); [ 35.777350][ T4229] [ 35.777350][ T4229] *** DEADLOCK *** [ 35.777350][ T4229] [ 35.779233][ T4229] May be due to missing lock nesting notation [ 35.779233][ T4229] [ 35.781052][ T4229] 2 locks held by syz-executor230/4229: [ 35.782426][ T4229] #0: ffff0000e207a880 (&type->i_mutex_dir_key#6){++++}-{3:3}, at: lookup_slow+0x50/0x84 [ 35.784830][ T4229] #1: ffff0000e207a5e0 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 35.787002][ T4229] [ 35.787002][ T4229] stack backtrace: [ 35.788373][ T4229] CPU: 1 PID: 4229 Comm: syz-executor230 Not tainted 6.1.75-syzkaller #0 [ 35.790338][ T4229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 35.792728][ T4229] Call trace: [ 35.793494][ T4229] dump_backtrace+0x1c8/0x1f4 [ 35.794564][ T4229] show_stack+0x2c/0x3c [ 35.795658][ T4229] dump_stack_lvl+0x108/0x170 [ 35.796773][ T4229] dump_stack+0x1c/0x58 [ 35.797749][ T4229] __lock_acquire+0x6310/0x7680 [ 35.798867][ T4229] lock_acquire+0x26c/0x7cc [ 35.799989][ T4229] __mutex_lock_common+0x190/0x21a0 [ 35.801238][ T4229] mutex_lock_nested+0x38/0x44 [ 35.802353][ T4229] mi_read+0x26c/0x4d8 [ 35.803363][ T4229] ntfs_iget5+0x360/0x2bd4 [ 35.804372][ T4229] dir_search_u+0x298/0x324 [ 35.805454][ T4229] ntfs_lookup+0x108/0x1f8 [ 35.806535][ T4229] __lookup_slow+0x250/0x374 [ 35.807692][ T4229] lookup_slow+0x60/0x84 [ 35.808711][ T4229] walk_component+0x280/0x36c [ 35.809869][ T4229] path_lookupat+0x13c/0x3d0 [ 35.810929][ T4229] filename_lookup+0x1d4/0x4e0 [ 35.812143][ T4229] vfs_statx+0xf8/0x420 [ 35.813080][ T4229] __arm64_sys_newfstatat+0x134/0x1c0 [ 35.814295][ T4229] invoke_syscall+0x98/0x2c0 [ 35.815381][ T4229] el0_svc_common+0x138/0x258 [ 35.816462][ T4229] do_el0_svc+0x64/0x218 [ 35.817477][ T4229] el0_svc+0x58/0x168 [ 35.818498][ T4229] el0t_64_sync_handler+0x84/0xf0 [ 35.819659][ T4229] el0t_64_sync+0x18c/0x190