[ 9.237144][ T2616] 8021q: adding VLAN 0 to HW filter on device bond0 [ 9.240499][ T2616] eql: remember to turn off Van-Jacobson compression on your slave devices [ 9.271041][ T986] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 9.280951][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.34' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 29.428516][ T3030] loop0: detected capacity change from 0 to 4096 [ 29.432063][ T3030] ntfs3: loop0: Different NTFS' sector size (1024) and media sector size (512) [ 29.448893][ T3030] [ 29.449450][ T3030] ============================================ [ 29.450870][ T3030] WARNING: possible recursive locking detected [ 29.452339][ T3030] 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 Not tainted [ 29.454033][ T3030] -------------------------------------------- [ 29.455423][ T3030] syz-executor243/3030 is trying to acquire lock: [ 29.456916][ T3030] ffff0000caa09ca0 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x140/0x274 [ 29.458950][ T3030] [ 29.458950][ T3030] but task is already holding lock: [ 29.460720][ T3030] ffff0000caa0d3e0 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0x84/0xe8 [ 29.462781][ T3030] [ 29.462781][ T3030] other info that might help us debug this: [ 29.464730][ T3030] Possible unsafe locking scenario: [ 29.464730][ T3030] [ 29.466565][ T3030] CPU0 [ 29.467351][ T3030] ---- [ 29.468124][ T3030] lock(&ni->ni_lock/4); [ 29.469190][ T3030] lock(&ni->ni_lock/4); [ 29.470210][ T3030] [ 29.470210][ T3030] *** DEADLOCK *** [ 29.470210][ T3030] [ 29.472128][ T3030] May be due to missing lock nesting notation [ 29.472128][ T3030] [ 29.474191][ T3030] 2 locks held by syz-executor243/3030: [ 29.475461][ T3030] #0: ffff0000caa0d680 (&type->i_mutex_dir_key#6){++++}-{3:3}, at: lookup_slow+0x34/0x68 [ 29.477639][ T3030] #1: ffff0000caa0d3e0 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0x84/0xe8 [ 29.479902][ T3030] [ 29.479902][ T3030] stack backtrace: [ 29.481261][ T3030] CPU: 1 PID: 3030 Comm: syz-executor243 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 [ 29.483736][ T3030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 29.486211][ T3030] Call trace: [ 29.486997][ T3030] dump_backtrace+0x1c4/0x1f0 [ 29.488143][ T3030] show_stack+0x2c/0x54 [ 29.489132][ T3030] dump_stack_lvl+0x104/0x16c [ 29.490230][ T3030] dump_stack+0x1c/0x58 [ 29.491248][ T3030] __lock_acquire+0x808/0x30a4 [ 29.492408][ T3030] lock_acquire+0x100/0x1f8 [ 29.493468][ T3030] __mutex_lock_common+0xd4/0xca8 [ 29.494718][ T3030] mutex_lock_nested+0x38/0x44 [ 29.495871][ T3030] mi_read+0x140/0x274 [ 29.496893][ T3030] ntfs_iget5+0x15c/0x138c [ 29.497821][ T3030] dir_search_u+0x18c/0x1e0 [ 29.498884][ T3030] ntfs_lookup+0x94/0xe8 [ 29.499898][ T3030] __lookup_slow+0x14c/0x204 [ 29.500988][ T3030] lookup_slow+0x44/0x68 [ 29.502000][ T3030] walk_component+0x178/0x1b0 [ 29.503159][ T3030] path_lookupat+0xc4/0x208 [ 29.504208][ T3030] filename_lookup+0xf8/0x264 [ 29.505331][ T3030] user_path_at_empty+0x5c/0x114 [ 29.506461][ T3030] __arm64_sys_open_tree+0x130/0x4a4 [ 29.507708][ T3030] el0_svc_common+0x138/0x220 [ 29.508825][ T3030] do_el0_svc+0x48/0x164 [ 29.509866][ T3030] el0_svc+0x58/0x150 [ 29.510817][ T3030] el0t_64_sync_handler+0x84/0xf0 [ 29.512047][ T3030] el0t_64_sync+0x18c/0x190