Warning: Permanently added '10.128.0.13' (ED25519) to the list of known hosts. executing program syzkaller login: [ 34.642524][ T4220] loop0: detected capacity change from 0 to 4096 [ 34.720419][ T4220] [ 34.721122][ T4220] ====================================================== [ 34.722876][ T4220] WARNING: possible circular locking dependency detected [ 34.724631][ T4220] 6.1.80-syzkaller #0 Not tainted [ 34.725864][ T4220] ------------------------------------------------------ [ 34.727705][ T4220] syz-executor393/4220 is trying to acquire lock: [ 34.729382][ T4220] ffff0000e20b77b0 (&ni->file.run_lock#3){++++}-{3:3}, at: attr_data_get_block+0x220/0x1bdc [ 34.732110][ T4220] [ 34.732110][ T4220] but task is already holding lock: [ 34.734010][ T4220] ffff0000ddffab48 (&mm->mmap_lock){++++}-{3:3}, at: vm_mmap_pgoff+0x15c/0x2b4 [ 34.736353][ T4220] [ 34.736353][ T4220] which lock already depends on the new lock. [ 34.736353][ T4220] [ 34.739027][ T4220] [ 34.739027][ T4220] the existing dependency chain (in reverse order) is: [ 34.741380][ T4220] [ 34.741380][ T4220] -> #1 (&mm->mmap_lock){++++}-{3:3}: [ 34.743312][ T4220] __might_fault+0xc4/0x124 [ 34.744588][ T4220] fiemap_fill_next_extent+0x1b4/0x424 [ 34.746168][ T4220] ni_fiemap+0x7dc/0xe10 [ 34.747389][ T4220] ntfs_fiemap+0x110/0x168 [ 34.748710][ T4220] do_vfs_ioctl+0x194c/0x26f8 [ 34.750113][ T4220] __arm64_sys_ioctl+0xe4/0x1c8 [ 34.751548][ T4220] invoke_syscall+0x98/0x2c0 [ 34.752856][ T4220] el0_svc_common+0x138/0x258 [ 34.754251][ T4220] do_el0_svc+0x64/0x218 [ 34.755470][ T4220] el0_svc+0x58/0x168 [ 34.756683][ T4220] el0t_64_sync_handler+0x84/0xf0 [ 34.758162][ T4220] el0t_64_sync+0x18c/0x190 [ 34.759479][ T4220] [ 34.759479][ T4220] -> #0 (&ni->file.run_lock#3){++++}-{3:3}: [ 34.761596][ T4220] __lock_acquire+0x3338/0x7680 [ 34.762949][ T4220] lock_acquire+0x26c/0x7cc [ 34.764217][ T4220] down_read+0x64/0x308 [ 34.765430][ T4220] attr_data_get_block+0x220/0x1bdc [ 34.766909][ T4220] ntfs_file_mmap+0x3a4/0x688 [ 34.768233][ T4220] mmap_region+0xdd0/0x1a98 [ 34.769540][ T4220] do_mmap+0xa00/0x1108 [ 34.770772][ T4220] vm_mmap_pgoff+0x1a4/0x2b4 [ 34.772120][ T4220] ksys_mmap_pgoff+0x3c8/0x5b0 [ 34.773536][ T4220] __arm64_sys_mmap+0xf8/0x110 [ 34.774918][ T4220] invoke_syscall+0x98/0x2c0 [ 34.776256][ T4220] el0_svc_common+0x138/0x258 [ 34.777650][ T4220] do_el0_svc+0x64/0x218 [ 34.778851][ T4220] el0_svc+0x58/0x168 [ 34.780015][ T4220] el0t_64_sync_handler+0x84/0xf0 [ 34.781452][ T4220] el0t_64_sync+0x18c/0x190 [ 34.782794][ T4220] [ 34.782794][ T4220] other info that might help us debug this: [ 34.782794][ T4220] [ 34.785424][ T4220] Possible unsafe locking scenario: [ 34.785424][ T4220] [ 34.787422][ T4220] CPU0 CPU1 [ 34.788785][ T4220] ---- ---- [ 34.790221][ T4220] lock(&mm->mmap_lock); [ 34.791364][ T4220] lock(&ni->file.run_lock#3); [ 34.793263][ T4220] lock(&mm->mmap_lock); [ 34.795039][ T4220] lock(&ni->file.run_lock#3); [ 34.796358][ T4220] [ 34.796358][ T4220] *** DEADLOCK *** [ 34.796358][ T4220] [ 34.798476][ T4220] 1 lock held by syz-executor393/4220: [ 34.799875][ T4220] #0: ffff0000ddffab48 (&mm->mmap_lock){++++}-{3:3}, at: vm_mmap_pgoff+0x15c/0x2b4 [ 34.802386][ T4220] [ 34.802386][ T4220] stack backtrace: [ 34.803967][ T4220] CPU: 0 PID: 4220 Comm: syz-executor393 Not tainted 6.1.80-syzkaller #0 [ 34.806210][ T4220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 34.808789][ T4220] Call trace: [ 34.809658][ T4220] dump_backtrace+0x1c8/0x1f4 [ 34.810851][ T4220] show_stack+0x2c/0x3c [ 34.812013][ T4220] dump_stack_lvl+0x108/0x170 [ 34.813392][ T4220] dump_stack+0x1c/0x58 [ 34.814616][ T4220] print_circular_bug+0x150/0x1b8 [ 34.815957][ T4220] check_noncircular+0x2cc/0x378 [ 34.817265][ T4220] __lock_acquire+0x3338/0x7680 [ 34.818571][ T4220] lock_acquire+0x26c/0x7cc [ 34.819743][ T4220] down_read+0x64/0x308 [ 34.820913][ T4220] attr_data_get_block+0x220/0x1bdc [ 34.822369][ T4220] ntfs_file_mmap+0x3a4/0x688 [ 34.823618][ T4220] mmap_region+0xdd0/0x1a98 [ 34.824845][ T4220] do_mmap+0xa00/0x1108 [ 34.826012][ T4220] vm_mmap_pgoff+0x1a4/0x2b4 [ 34.827242][ T4220] ksys_mmap_pgoff+0x3c8/0x5b0 [ 34.828529][ T4220] __arm64_sys_mmap+0xf8/0x110 [ 34.829869][ T4220] invoke_syscall+0x98/0x2c0 [ 34.831125][ T4220] el0_svc_common+0x138/0x258 [ 34.832354][ T4220] do_el0_svc+0x64/0x218 [ 34.833454][ T4220] el0_svc+0x58/0x168 [ 34.834465][ T4220] el0t_64_sync_handler+0x84/0xf0 [ 34.835862][ T4220] el0t_64_sync+0x18c/0x190