Warning: Permanently added '10.128.0.2' (ED25519) to the list of known hosts. executing program [ 62.127705][ T6094] loop0: detected capacity change from 0 to 4096 [ 62.130717][ T6094] ======================================================= [ 62.130717][ T6094] WARNING: The mand mount option has been deprecated and [ 62.130717][ T6094] and is ignored by this kernel. Remove the mand [ 62.130717][ T6094] option from the mount to silence this warning. [ 62.130717][ T6094] ======================================================= [ 62.140293][ T6094] ntfs3: loop0: Different NTFS sector size (4096) and media sector size (512). [ 62.151849][ T6094] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 62.162173][ T6094] [ 62.162745][ T6094] ============================================ [ 62.164220][ T6094] WARNING: possible recursive locking detected [ 62.165679][ T6094] 6.7.0-rc8-syzkaller-g0802e17d9aca #0 Not tainted [ 62.167163][ T6094] -------------------------------------------- [ 62.168464][ T6094] syz-executor416/6094 is trying to acquire lock: [ 62.169844][ T6094] ffff0000dc3f9e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x26c/0x4d8 [ 62.171879][ T6094] [ 62.171879][ T6094] but task is already holding lock: [ 62.173667][ T6094] ffff0000dc3fe840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 62.175807][ T6094] [ 62.175807][ T6094] other info that might help us debug this: [ 62.177620][ T6094] Possible unsafe locking scenario: [ 62.177620][ T6094] [ 62.179476][ T6094] CPU0 [ 62.180236][ T6094] ---- [ 62.181000][ T6094] lock(&ni->ni_lock/4); [ 62.182095][ T6094] lock(&ni->ni_lock/4); [ 62.183163][ T6094] [ 62.183163][ T6094] *** DEADLOCK *** [ 62.183163][ T6094] [ 62.184966][ T6094] May be due to missing lock nesting notation [ 62.184966][ T6094] [ 62.186906][ T6094] 2 locks held by syz-executor416/6094: [ 62.188317][ T6094] #0: ffff0000dc3feae0 (&type->i_mutex_dir_key#6){.+.+}-{3:3}, at: lookup_slow+0x50/0x84 [ 62.190796][ T6094] #1: ffff0000dc3fe840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 62.193076][ T6094] [ 62.193076][ T6094] stack backtrace: [ 62.194493][ T6094] CPU: 1 PID: 6094 Comm: syz-executor416 Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 [ 62.196954][ T6094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 62.199279][ T6094] Call trace: [ 62.200061][ T6094] dump_backtrace+0x1b8/0x1e4 [ 62.201198][ T6094] show_stack+0x2c/0x3c [ 62.202166][ T6094] dump_stack_lvl+0xd0/0x124 [ 62.203317][ T6094] dump_stack+0x1c/0x28 [ 62.204342][ T6094] print_deadlock_bug+0x4e4/0x660 [ 62.205588][ T6094] __lock_acquire+0x5fe4/0x763c [ 62.206865][ T6094] lock_acquire+0x23c/0x71c [ 62.207897][ T6094] __mutex_lock_common+0x190/0x21a0 [ 62.209160][ T6094] mutex_lock_nested+0x2c/0x38 [ 62.210298][ T6094] mi_read+0x26c/0x4d8 [ 62.211229][ T6094] ntfs_iget5+0x360/0x2bbc [ 62.212298][ T6094] dir_search_u+0x298/0x324 [ 62.213507][ T6094] ntfs_lookup+0x108/0x1f8 [ 62.214600][ T6094] __lookup_slow+0x250/0x374 [ 62.215753][ T6094] lookup_slow+0x60/0x84 [ 62.216762][ T6094] walk_component+0x280/0x36c [ 62.217837][ T6094] path_lookupat+0x13c/0x3d0 [ 62.218925][ T6094] filename_lookup+0x1d4/0x4e0 [ 62.220022][ T6094] user_path_at_empty+0x5c/0x84 [ 62.221242][ T6094] path_getxattr+0xe8/0x388 [ 62.222329][ T6094] __arm64_sys_getxattr+0xa0/0xb8 [ 62.223544][ T6094] invoke_syscall+0x98/0x2b8 [ 62.224637][ T6094] el0_svc_common+0x130/0x23c [ 62.225728][ T6094] do_el0_svc+0x48/0x58 [ 62.226689][ T6094] el0_svc+0x54/0x158 [ 62.227661][ T6094] el0t_64_sync_handler+0x84/0xfc [ 62.228888][ T6094] el0t_64_sync+0x190/0x194