====================================================== WARNING: possible circular locking dependency detected 6.12.0-rc6-syzkaller-00077-g2e1b3cc9d7f7 #0 Not tainted ------------------------------------------------------ syz.4.445/10107 is trying to acquire lock: ffff88805c67a5b8 (&ni->ni_lock#3/5){+.+.}-{3:3}, at: ni_lock fs/ntfs3/ntfs_fs.h:1109 [inline] ffff88805c67a5b8 (&ni->ni_lock#3/5){+.+.}-{3:3}, at: ntfs_read_folio+0x193/0x210 fs/ntfs3/inode.c:733 but task is already holding lock: ffff88805c67a9f0 (mapping.invalidate_lock#5){.+.+}-{3:3}, at: filemap_invalidate_lock_shared include/linux/fs.h:870 [inline] ffff88805c67a9f0 (mapping.invalidate_lock#5){.+.+}-{3:3}, at: filemap_fault+0xd54/0x1950 mm/filemap.c:3350 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (mapping.invalidate_lock#5){.+.+}-{3:3}: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 down_read+0xb1/0xa40 kernel/locking/rwsem.c:1524 filemap_invalidate_lock_shared include/linux/fs.h:870 [inline] filemap_fault+0x6e8/0x1950 mm/filemap.c:3331 __do_fault+0x135/0x460 mm/memory.c:4882 do_read_fault mm/memory.c:5297 [inline] do_fault mm/memory.c:5431 [inline] do_pte_missing mm/memory.c:3965 [inline] handle_pte_fault+0x2d1c/0x6820 mm/memory.c:5766 __handle_mm_fault mm/memory.c:5909 [inline] handle_mm_fault+0x1053/0x1ad0 mm/memory.c:6077 do_user_addr_fault arch/x86/mm/fault.c:1389 [inline] handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x2b9/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 rep_movs_alternative+0x4a/0x70 arch/x86/lib/copy_user_64.S:65 copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline] raw_copy_from_user arch/x86/include/asm/uaccess_64.h:141 [inline] _inline_copy_from_user include/linux/uaccess.h:178 [inline] _copy_from_user+0x7f/0xc0 lib/usercopy.c:18 copy_from_user include/linux/uaccess.h:212 [inline] copy_mount_options fs/namespace.c:3716 [inline] __do_sys_mount fs/namespace.c:4052 [inline] __se_sys_mount+0x17d/0x3c0 fs/namespace.c:4034 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> #1 (&mm->mmap_lock){++++}-{3:3}: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __might_fault+0xc6/0x120 mm/memory.c:6716 _inline_copy_to_user include/linux/uaccess.h:192 [inline] _copy_to_user+0x2c/0xb0 lib/usercopy.c:26 copy_to_user include/linux/uaccess.h:225 [inline] ni_fiemap+0x57c/0x18c0 fs/ntfs3/frecord.c:2139 ntfs_fiemap+0x132/0x180 fs/ntfs3/file.c:1352 ioctl_fiemap fs/ioctl.c:220 [inline] do_vfs_ioctl+0x1bf8/0x2e40 fs/ioctl.c:841 __do_sys_ioctl fs/ioctl.c:905 [inline] __se_sys_ioctl+0x81/0x170 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> #0 (&ni->ni_lock#3/5){+.+.}-{3:3}: check_prev_add kernel/locking/lockdep.c:3161 [inline] check_prevs_add kernel/locking/lockdep.c:3280 [inline] validate_chain+0x18ef/0x5920 kernel/locking/lockdep.c:3904 __lock_acquire+0x1384/0x2050 kernel/locking/lockdep.c:5202 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __mutex_lock_common kernel/locking/mutex.c:608 [inline] __mutex_lock+0x136/0xd70 kernel/locking/mutex.c:752 ni_lock fs/ntfs3/ntfs_fs.h:1109 [inline] ntfs_read_folio+0x193/0x210 fs/ntfs3/inode.c:733 filemap_read_folio+0x14b/0x630 mm/filemap.c:2367 filemap_fault+0x115b/0x1950 mm/filemap.c:3435 __do_fault+0x135/0x460 mm/memory.c:4882 do_read_fault mm/memory.c:5297 [inline] do_fault mm/memory.c:5431 [inline] do_pte_missing mm/memory.c:3965 [inline] handle_pte_fault+0x2d1c/0x6820 mm/memory.c:5766 __handle_mm_fault mm/memory.c:5909 [inline] handle_mm_fault+0x1053/0x1ad0 mm/memory.c:6077 do_user_addr_fault arch/x86/mm/fault.c:1389 [inline] handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x2b9/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 strncpy_from_user+0xb0/0x260 lib/strncpy_from_user.c:127 getname_flags+0xf1/0x540 fs/namei.c:150 do_sys_openat2+0xd2/0x1d0 fs/open.c:1409 do_sys_open fs/open.c:1430 [inline] __do_sys_openat fs/open.c:1446 [inline] __se_sys_openat fs/open.c:1441 [inline] __x64_sys_openat+0x247/0x2a0 fs/open.c:1441 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f other info that might help us debug this: Chain exists of: &ni->ni_lock #3/5 --> &mm->mmap_lock --> mapping.invalidate_lock#5 Possible unsafe locking scenario: CPU0 CPU1 ---- ---- rlock(mapping.invalidate_lock#5); lock(&mm->mmap_lock); lock(mapping.invalidate_lock#5); lock(&ni->ni_lock#3/5); *** DEADLOCK *** 1 lock held by syz.4.445/10107: #0: ffff88805c67a9f0 (mapping.invalidate_lock#5){.+.+}-{3:3}, at: filemap_invalidate_lock_shared include/linux/fs.h:870 [inline] #0: ffff88805c67a9f0 (mapping.invalidate_lock#5){.+.+}-{3:3}, at: filemap_fault+0xd54/0x1950 mm/filemap.c:3350 stack backtrace: CPU: 0 UID: 0 PID: 10107 Comm: syz.4.445 Not tainted 6.12.0-rc6-syzkaller-00077-g2e1b3cc9d7f7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_circular_bug+0x13a/0x1b0 kernel/locking/lockdep.c:2074 check_noncircular+0x36a/0x4a0 kernel/locking/lockdep.c:2206 check_prev_add kernel/locking/lockdep.c:3161 [inline] check_prevs_add kernel/locking/lockdep.c:3280 [inline] validate_chain+0x18ef/0x5920 kernel/locking/lockdep.c:3904 __lock_acquire+0x1384/0x2050 kernel/locking/lockdep.c:5202 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __mutex_lock_common kernel/locking/mutex.c:608 [inline] __mutex_lock+0x136/0xd70 kernel/locking/mutex.c:752 ni_lock fs/ntfs3/ntfs_fs.h:1109 [inline] ntfs_read_folio+0x193/0x210 fs/ntfs3/inode.c:733 filemap_read_folio+0x14b/0x630 mm/filemap.c:2367 filemap_fault+0x115b/0x1950 mm/filemap.c:3435 __do_fault+0x135/0x460 mm/memory.c:4882 do_read_fault mm/memory.c:5297 [inline] do_fault mm/memory.c:5431 [inline] do_pte_missing mm/memory.c:3965 [inline] handle_pte_fault+0x2d1c/0x6820 mm/memory.c:5766 __handle_mm_fault mm/memory.c:5909 [inline] handle_mm_fault+0x1053/0x1ad0 mm/memory.c:6077 do_user_addr_fault arch/x86/mm/fault.c:1389 [inline] handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x2b9/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:do_strncpy_from_user lib/strncpy_from_user.c:41 [inline] RIP: 0010:strncpy_from_user+0xb0/0x260 lib/strncpy_from_user.c:127 Code: bf 07 00 00 00 4c 89 fe e8 fd 2e a8 fc 49 83 ff 07 0f 86 8b 00 00 00 4c 89 3c 24 49 c7 c5 f8 ff ff ff 45 31 e4 48 8b 44 24 08 <4e> 8b 3c 20 48 b8 ff fe fe fe fe fe fe fe 49 8d 2c 07 4c 89 fb 48 RSP: 0018:ffffc90002f2fcb0 EFLAGS: 00050246 RAX: 0000000020002440 RBX: 0000000020002440 RCX: ffff88802ffe5a00 RDX: 0000000000000000 RSI: 0000000000000fe0 RDI: 0000000000000007 RBP: ffff88802271b320 R08: ffffffff84ecafe3 R09: 1ffffffff2037b8d R10: dffffc0000000000 R11: fffffbfff2037b8e R12: 0000000000000000 R13: fffffffffffffff8 R14: ffff88802271b320 R15: 0000000000000fe0 getname_flags+0xf1/0x540 fs/namei.c:150 do_sys_openat2+0xd2/0x1d0 fs/open.c:1409 do_sys_open fs/open.c:1430 [inline] __do_sys_openat fs/open.c:1446 [inline] __se_sys_openat fs/open.c:1441 [inline] __x64_sys_openat+0x247/0x2a0 fs/open.c:1441 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1ba297e719 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ba3831038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f1ba2b35f80 RCX: 00007f1ba297e719 RDX: 0000000000101803 RSI: 0000000020002440 RDI: ffffffffffffff9c RBP: 00007f1ba29f139e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f1ba2b35f80 R15: 00007ffc318e2858 ---------------- Code disassembly (best guess): 0: bf 07 00 00 00 mov $0x7,%edi 5: 4c 89 fe mov %r15,%rsi 8: e8 fd 2e a8 fc call 0xfca82f0a d: 49 83 ff 07 cmp $0x7,%r15 11: 0f 86 8b 00 00 00 jbe 0xa2 17: 4c 89 3c 24 mov %r15,(%rsp) 1b: 49 c7 c5 f8 ff ff ff mov $0xfffffffffffffff8,%r13 22: 45 31 e4 xor %r12d,%r12d 25: 48 8b 44 24 08 mov 0x8(%rsp),%rax * 2a: 4e 8b 3c 20 mov (%rax,%r12,1),%r15 <-- trapping instruction 2e: 48 b8 ff fe fe fe fe movabs $0xfefefefefefefeff,%rax 35: fe fe fe 38: 49 8d 2c 07 lea (%r15,%rax,1),%rbp 3c: 4c 89 fb mov %r15,%rbx 3f: 48 rex.W