[ 15.543219][ T3893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 15.548123][ T3893] eql: remember to turn off Van-Jacobson compression on your slave devices [ 15.593333][ T39] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 15.598916][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.198' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 37.000940][ T4223] loop0: detected capacity change from 0 to 4096 [ 37.005471][ T4223] ntfs3: loop0: Different NTFS' sector size (4096) and media sector size (512) [ 37.027986][ T4223] [ 37.028569][ T4223] ============================================ [ 37.029827][ T4223] WARNING: possible recursive locking detected [ 37.031133][ T4223] 6.1.27-syzkaller #0 Not tainted [ 37.032292][ T4223] -------------------------------------------- [ 37.033549][ T4223] syz-executor107/4223 is trying to acquire lock: [ 37.034951][ T4223] ffff0000df9f1e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x278/0x488 [ 37.036723][ T4223] [ 37.036723][ T4223] but task is already holding lock: [ 37.038479][ T4223] ffff0000df9f6840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf4/0x1a4 [ 37.040443][ T4223] [ 37.040443][ T4223] other info that might help us debug this: [ 37.042082][ T4223] Possible unsafe locking scenario: [ 37.042082][ T4223] [ 37.043782][ T4223] CPU0 [ 37.044506][ T4223] ---- [ 37.045225][ T4223] lock(&ni->ni_lock/4); [ 37.046147][ T4223] lock(&ni->ni_lock/4); [ 37.047074][ T4223] [ 37.047074][ T4223] *** DEADLOCK *** [ 37.047074][ T4223] [ 37.048790][ T4223] May be due to missing lock nesting notation [ 37.048790][ T4223] [ 37.050594][ T4223] 2 locks held by syz-executor107/4223: [ 37.051798][ T4223] #0: ffff0000df9f6ae0 (&type->i_mutex_dir_key#6){++++}-{3:3}, at: lookup_slow+0x50/0x84 [ 37.053951][ T4223] #1: ffff0000df9f6840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf4/0x1a4 [ 37.055895][ T4223] [ 37.055895][ T4223] stack backtrace: [ 37.057216][ T4223] CPU: 0 PID: 4223 Comm: syz-executor107 Not tainted 6.1.27-syzkaller #0 [ 37.058927][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 37.061084][ T4223] Call trace: [ 37.061816][ T4223] dump_backtrace+0x1c8/0x1f4 [ 37.062879][ T4223] show_stack+0x2c/0x3c [ 37.063760][ T4223] dump_stack_lvl+0x108/0x170 [ 37.064740][ T4223] dump_stack+0x1c/0x5c [ 37.065632][ T4223] __lock_acquire+0x6310/0x764c [ 37.066723][ T4223] lock_acquire+0x26c/0x7cc [ 37.067756][ T4223] __mutex_lock_common+0x190/0x21a0 [ 37.068834][ T4223] mutex_lock_nested+0x38/0x44 [ 37.069845][ T4223] mi_read+0x278/0x488 [ 37.070709][ T4223] ntfs_iget5+0x34c/0x2b38 [ 37.071628][ T4223] dir_search_u+0x298/0x324 [ 37.072604][ T4223] ntfs_lookup+0x104/0x1a4 [ 37.073512][ T4223] __lookup_slow+0x250/0x374 [ 37.074509][ T4223] lookup_slow+0x60/0x84 [ 37.075386][ T4223] walk_component+0x280/0x36c [ 37.076393][ T4223] path_lookupat+0x13c/0x3d0 [ 37.077404][ T4223] filename_lookup+0x1d4/0x4e0 [ 37.078500][ T4223] user_path_at_empty+0x5c/0x1a4 [ 37.079616][ T4223] path_setxattr+0xbc/0x258 [ 37.080579][ T4223] __arm64_sys_setxattr+0xbc/0xd8 [ 37.081660][ T4223] invoke_syscall+0x98/0x2c0 [ 37.082645][ T4223] el0_svc_common+0x138/0x258 [ 37.083729][ T4223] do_el0_svc+0x64/0x218 [ 37.084686][ T4223] el0_svc+0x58/0x168 [ 37.085543][ T4223] el0t_64_sync_handler+0x84/0xf0 [ 37.086627][ T4223] el0t_64_sync+0x18c/0x190