loop5: detected capacity change from 0 to 4096 ntfs3: loop5: Different NTFS' sector size (1024) and media sector size (512) ================================== WARNING: Nested lock was not taken 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 Not tainted ---------------------------------- syz-executor.5/8187 is trying to lock: ffff0001123609d8 (&s->s_inode_list_lock){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:349 [inline] ffff0001123609d8 (&s->s_inode_list_lock){+.+.}-{2:2}, at: inode_sb_list_del fs/inode.c:503 [inline] ffff0001123609d8 (&s->s_inode_list_lock){+.+.}-{2:2}, at: evict+0x90/0x334 fs/inode.c:654 but this task is not holding: Unable to handle kernel paging request at virtual address 0000000100000017 Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000014fafe000 [0000000100000017] pgd=080000014fbec003, p4d=080000014fbec003, pud=0000000000000000 Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 8187 Comm: syz-executor.5 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : print_lock_nested_lock_not_held kernel/locking/lockdep.c:4885 [inline] pc : __lock_acquire+0x7cc/0x30a4 kernel/locking/lockdep.c:5044 lr : print_lock_nested_lock_not_held kernel/locking/lockdep.c:4884 [inline] lr : __lock_acquire+0x7c0/0x30a4 kernel/locking/lockdep.c:5044 sp : ffff800014bc38b0 x29: ffff800014bc3990 x28: 0000000000000001 x27: ffff80000d30c000 x26: ffff00010e1d8a38 x25: ffff00010e1d8a58 x24: 0000000000000002 x23: ffff00010e1d8a50 x22: ffff80000d32a753 x21: ffff80000d32a712 x20: 0000000000040067 x19: ffff00010e1d8000 x18: 0000000000000017 x17: 2b7463697665203a x16: 0000000000000002 x15: 0000000000000000 x14: 0000000000000000 x13: 205d373831385420 x12: 0000000000040000 x11: 00000000000292ef x10: ffff800012a25000 x9 : 6d14acbbbf47ba00 x8 : 00000000ffffffff x7 : 205b5d3132393131 x6 : ffff80000819545c x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000100000001 x0 : ffff80000cb55769 Call trace: print_lock_nested_lock_not_held kernel/locking/lockdep.c:4885 [inline] __lock_acquire+0x7cc/0x30a4 kernel/locking/lockdep.c:5044 lock_acquire+0x100/0x1f8 kernel/locking/lockdep.c:5666 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x54/0x6c kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:349 [inline] inode_sb_list_del fs/inode.c:503 [inline] evict+0x90/0x334 fs/inode.c:654 iput_final fs/inode.c:1748 [inline] iput+0x2c4/0x324 fs/inode.c:1774 ntfs_fill_super+0x1254/0x14a4 fs/ntfs3/super.c:1190 get_tree_bdev+0x1e8/0x2a0 fs/super.c:1323 ntfs_fs_get_tree+0x28/0x38 fs/ntfs3/super.c:1358 vfs_get_tree+0x40/0x140 fs/super.c:1530 do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040 path_mount+0x358/0x914 fs/namespace.c:3370 do_mount fs/namespace.c:3383 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount fs/namespace.c:3568 [inline] __arm64_sys_mount+0x2c4/0x3c4 fs/namespace.c:3568 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Code: 94f83ce7 f94002e8 f0024dc0 911da400 (f9400d01) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 94f83ce7 bl 0x3e0f39c 4: f94002e8 ldr x8, [x23] 8: f0024dc0 adrp x0, 0x49bb000 c: 911da400 add x0, x0, #0x769 * 10: f9400d01 ldr x1, [x8, #24] <-- trapping instruction