Warning: Permanently added '10.128.0.111' (ED25519) to the list of known hosts. executing program [ 34.354139][ T6094] loop0: detected capacity change from 0 to 4096 [ 34.356946][ T6094] ======================================================= [ 34.356946][ T6094] WARNING: The mand mount option has been deprecated and [ 34.356946][ T6094] and is ignored by this kernel. Remove the mand [ 34.356946][ T6094] option from the mount to silence this warning. [ 34.356946][ T6094] ======================================================= [ 34.365822][ T6094] ntfs3: loop0: Different NTFS sector size (4096) and media sector size (512). [ 34.376756][ T6094] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 34.385029][ T6094] [ 34.385558][ T6094] ============================================ [ 34.386834][ T6094] WARNING: possible recursive locking detected [ 34.388128][ T6094] 6.7.0-rc8-syzkaller-g0802e17d9aca #0 Not tainted [ 34.389532][ T6094] -------------------------------------------- [ 34.390828][ T6094] syz-executor428/6094 is trying to acquire lock: [ 34.392205][ T6094] ffff0000dbe81e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x26c/0x4d8 [ 34.394013][ T6094] [ 34.394013][ T6094] but task is already holding lock: [ 34.395594][ T6094] ffff0000dbe86840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 34.397483][ T6094] [ 34.397483][ T6094] other info that might help us debug this: [ 34.399147][ T6094] Possible unsafe locking scenario: [ 34.399147][ T6094] [ 34.400776][ T6094] CPU0 [ 34.401464][ T6094] ---- [ 34.402126][ T6094] lock(&ni->ni_lock/4); [ 34.403103][ T6094] lock(&ni->ni_lock/4); [ 34.404057][ T6094] [ 34.404057][ T6094] *** DEADLOCK *** [ 34.404057][ T6094] [ 34.405743][ T6094] May be due to missing lock nesting notation [ 34.405743][ T6094] [ 34.407480][ T6094] 2 locks held by syz-executor428/6094: [ 34.408636][ T6094] #0: ffff0000dbe86ae0 (&type->i_mutex_dir_key#6){.+.+}-{3:3}, at: lookup_slow+0x50/0x84 [ 34.410745][ T6094] #1: ffff0000dbe86840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 34.412674][ T6094] [ 34.412674][ T6094] stack backtrace: [ 34.413926][ T6094] CPU: 0 PID: 6094 Comm: syz-executor428 Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 [ 34.415915][ T6094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 34.417973][ T6094] Call trace: [ 34.418741][ T6094] dump_backtrace+0x1b8/0x1e4 [ 34.419762][ T6094] show_stack+0x2c/0x3c [ 34.420622][ T6094] dump_stack_lvl+0xd0/0x124 [ 34.421593][ T6094] dump_stack+0x1c/0x28 [ 34.422444][ T6094] print_deadlock_bug+0x4e4/0x660 [ 34.423524][ T6094] __lock_acquire+0x5fe4/0x763c [ 34.424493][ T6094] lock_acquire+0x23c/0x71c [ 34.425436][ T6094] __mutex_lock_common+0x190/0x21a0 [ 34.426516][ T6094] mutex_lock_nested+0x2c/0x38 [ 34.427534][ T6094] mi_read+0x26c/0x4d8 [ 34.428383][ T6094] ntfs_iget5+0x360/0x2bbc [ 34.429338][ T6094] dir_search_u+0x298/0x324 [ 34.430364][ T6094] ntfs_lookup+0x108/0x1f8 [ 34.431314][ T6094] __lookup_slow+0x250/0x374 [ 34.432423][ T6094] lookup_slow+0x60/0x84 [ 34.433326][ T6094] walk_component+0x280/0x36c [ 34.434384][ T6094] path_lookupat+0x13c/0x3d0 [ 34.435310][ T6094] filename_lookup+0x1d4/0x4e0 [ 34.436316][ T6094] user_path_at_empty+0x5c/0x84 [ 34.437328][ T6094] path_getxattr+0xe8/0x388 [ 34.438239][ T6094] __arm64_sys_getxattr+0xa0/0xb8 [ 34.439291][ T6094] invoke_syscall+0x98/0x2b8 [ 34.440222][ T6094] el0_svc_common+0x130/0x23c [ 34.441338][ T6094] do_el0_svc+0x48/0x58 [ 34.442224][ T6094] el0_svc+0x54/0x158 [ 34.443061][ T6094] el0t_64_sync_handler+0x84/0xfc [ 34.444195][ T6094] el0t_64_sync+0x190/0x194