Warning: Permanently added '10.128.0.12' (ED25519) to the list of known hosts. executing program [ 41.963729][ T3959] loop0: detected capacity change from 0 to 4096 [ 42.002555][ T3959] ======================================================= [ 42.002555][ T3959] WARNING: The mand mount option has been deprecated and [ 42.002555][ T3959] and is ignored by this kernel. Remove the mand [ 42.002555][ T3959] option from the mount to silence this warning. [ 42.002555][ T3959] ======================================================= [ 42.042149][ T3959] ntfs3: loop0: Different NTFS' sector size (4096) and media sector size (512) [ 42.056382][ T3959] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 42.066166][ T3959] [ 42.066754][ T3959] ============================================ [ 42.068132][ T3959] WARNING: possible recursive locking detected [ 42.069584][ T3959] 5.15.153-syzkaller #0 Not tainted [ 42.070789][ T3959] -------------------------------------------- [ 42.072160][ T3959] syz-executor166/3959 is trying to acquire lock: [ 42.073531][ T3959] ffff0000df471e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x26c/0x4d8 [ 42.075420][ T3959] [ 42.075420][ T3959] but task is already holding lock: [ 42.077080][ T3959] ffff0000df476840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 42.079063][ T3959] [ 42.079063][ T3959] other info that might help us debug this: [ 42.080895][ T3959] Possible unsafe locking scenario: [ 42.080895][ T3959] [ 42.082469][ T3959] CPU0 [ 42.083145][ T3959] ---- [ 42.083860][ T3959] lock(&ni->ni_lock/4); [ 42.084844][ T3959] lock(&ni->ni_lock/4); [ 42.085800][ T3959] [ 42.085800][ T3959] *** DEADLOCK *** [ 42.085800][ T3959] [ 42.087588][ T3959] May be due to missing lock nesting notation [ 42.087588][ T3959] [ 42.089376][ T3959] 2 locks held by syz-executor166/3959: [ 42.090637][ T3959] #0: ffff0000df476ae0 (&type->i_mutex_dir_key#6){++++}-{3:3}, at: lookup_slow+0x50/0x84 [ 42.092852][ T3959] #1: ffff0000df476840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 42.094876][ T3959] [ 42.094876][ T3959] stack backtrace: [ 42.096145][ T3959] CPU: 0 PID: 3959 Comm: syz-executor166 Not tainted 5.15.153-syzkaller #0 [ 42.098040][ T3959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 42.100274][ T3959] Call trace: [ 42.101018][ T3959] dump_backtrace+0x0/0x530 [ 42.102042][ T3959] show_stack+0x2c/0x3c [ 42.102991][ T3959] dump_stack_lvl+0x108/0x170 [ 42.104038][ T3959] dump_stack+0x1c/0x58 [ 42.104973][ T3959] __lock_acquire+0x62bc/0x7638 [ 42.106007][ T3959] lock_acquire+0x240/0x77c [ 42.106977][ T3959] __mutex_lock_common+0x194/0x2154 [ 42.108098][ T3959] mutex_lock_nested+0xa4/0xf8 [ 42.109184][ T3959] mi_read+0x26c/0x4d8 [ 42.110011][ T3959] ntfs_iget5+0x358/0x2be0 [ 42.110944][ T3959] dir_search_u+0x298/0x324 [ 42.111922][ T3959] ntfs_lookup+0x108/0x1f8 [ 42.112843][ T3959] __lookup_slow+0x250/0x388 [ 42.113791][ T3959] lookup_slow+0x60/0x84 [ 42.114725][ T3959] walk_component+0x394/0x4cc [ 42.115723][ T3959] path_lookupat+0x13c/0x3d0 [ 42.116689][ T3959] filename_lookup+0x1c4/0x4c8 [ 42.117698][ T3959] user_path_at_empty+0x5c/0x1a4 [ 42.118826][ T3959] vfs_statx+0xf8/0x378 [ 42.119746][ T3959] __arm64_sys_newfstatat+0x110/0x194 [ 42.120947][ T3959] invoke_syscall+0x98/0x2b8 [ 42.121906][ T3959] el0_svc_common+0x138/0x258 [ 42.122902][ T3959] do_el0_svc+0x58/0x14c [ 42.123865][ T3959] el0_svc+0x7c/0x1f0 [ 42.124700][ T3959] el0t_64_sync_handler+0x84/0xe4 [ 42.125786][ T3959] el0t_64_sync+0x1a0/0x1a4