Warning: Permanently added '10.128.0.88' (ED25519) to the list of known hosts. executing program [ 33.329322][ T6100] loop0: detected capacity change from 0 to 4096 [ 33.332372][ T6100] ======================================================= [ 33.332372][ T6100] WARNING: The mand mount option has been deprecated and [ 33.332372][ T6100] and is ignored by this kernel. Remove the mand [ 33.332372][ T6100] option from the mount to silence this warning. [ 33.332372][ T6100] ======================================================= [ 33.341307][ T6100] ntfs3: loop0: Different NTFS sector size (4096) and media sector size (512). [ 33.352577][ T6100] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 33.364251][ T6100] [ 33.364867][ T6100] ============================================ [ 33.366182][ T6100] WARNING: possible recursive locking detected [ 33.367626][ T6100] 6.7.0-rc8-syzkaller-g0802e17d9aca #0 Not tainted [ 33.369063][ T6100] -------------------------------------------- [ 33.370378][ T6100] syz-executor419/6100 is trying to acquire lock: [ 33.371805][ T6100] ffff0000dcc91e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x26c/0x4d8 [ 33.373727][ T6100] [ 33.373727][ T6100] but task is already holding lock: [ 33.375380][ T6100] ffff0000dcc96840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 33.377405][ T6100] [ 33.377405][ T6100] other info that might help us debug this: [ 33.379310][ T6100] Possible unsafe locking scenario: [ 33.379310][ T6100] [ 33.380920][ T6100] CPU0 [ 33.381650][ T6100] ---- [ 33.382453][ T6100] lock(&ni->ni_lock/4); [ 33.383401][ T6100] lock(&ni->ni_lock/4); [ 33.384402][ T6100] [ 33.384402][ T6100] *** DEADLOCK *** [ 33.384402][ T6100] [ 33.386269][ T6100] May be due to missing lock nesting notation [ 33.386269][ T6100] [ 33.388118][ T6100] 2 locks held by syz-executor419/6100: [ 33.389400][ T6100] #0: ffff0000dcc96ae0 (&type->i_mutex_dir_key#6){.+.+}-{3:3}, at: lookup_slow+0x50/0x84 [ 33.391713][ T6100] #1: ffff0000dcc96840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf8/0x1f8 [ 33.393728][ T6100] [ 33.393728][ T6100] stack backtrace: [ 33.395053][ T6100] CPU: 1 PID: 6100 Comm: syz-executor419 Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 [ 33.397281][ T6100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 33.399535][ T6100] Call trace: [ 33.400326][ T6100] dump_backtrace+0x1b8/0x1e4 [ 33.401353][ T6100] show_stack+0x2c/0x3c [ 33.402332][ T6100] dump_stack_lvl+0xd0/0x124 [ 33.403395][ T6100] dump_stack+0x1c/0x28 [ 33.404287][ T6100] print_deadlock_bug+0x4e4/0x660 [ 33.405377][ T6100] __lock_acquire+0x5fe4/0x763c [ 33.406458][ T6100] lock_acquire+0x23c/0x71c [ 33.407465][ T6100] __mutex_lock_common+0x190/0x21a0 [ 33.408631][ T6100] mutex_lock_nested+0x2c/0x38 [ 33.409743][ T6100] mi_read+0x26c/0x4d8 [ 33.410672][ T6100] ntfs_iget5+0x360/0x2bbc [ 33.411663][ T6100] dir_search_u+0x298/0x324 [ 33.412695][ T6100] ntfs_lookup+0x108/0x1f8 [ 33.413766][ T6100] __lookup_slow+0x250/0x374 [ 33.414824][ T6100] lookup_slow+0x60/0x84 [ 33.415852][ T6100] walk_component+0x280/0x36c [ 33.416941][ T6100] path_lookupat+0x13c/0x3d0 [ 33.417974][ T6100] filename_lookup+0x1d4/0x4e0 [ 33.419003][ T6100] user_path_at_empty+0x5c/0x84 [ 33.420130][ T6100] path_getxattr+0xe8/0x388 [ 33.421201][ T6100] __arm64_sys_getxattr+0xa0/0xb8 [ 33.422372][ T6100] invoke_syscall+0x98/0x2b8 [ 33.423353][ T6100] el0_svc_common+0x130/0x23c [ 33.424428][ T6100] do_el0_svc+0x48/0x58 [ 33.425341][ T6100] el0_svc+0x54/0x158 [ 33.426290][ T6100] el0t_64_sync_handler+0x84/0xfc [ 33.427499][ T6100] el0t_64_sync+0x190/0x194