[   15.543219][ T3893] 8021q: adding VLAN 0 to HW filter on device bond0
[   15.548123][ T3893] eql: remember to turn off Van-Jacobson compression on your slave devices
[   15.593333][   T39] gvnic 0000:00:00.0 enp0s0: Device link is up.
[   15.598916][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready
Starting sshd: OK

syzkaller
Warning: Permanently added '10.128.0.198' (ECDSA) to the list of known hosts.
executing program
syzkaller login: [   37.000940][ T4223] loop0: detected capacity change from 0 to 4096
[   37.005471][ T4223] ntfs3: loop0: Different NTFS' sector size (4096) and media sector size (512)
[   37.027986][ T4223] 
[   37.028569][ T4223] ============================================
[   37.029827][ T4223] WARNING: possible recursive locking detected
[   37.031133][ T4223] 6.1.27-syzkaller #0 Not tainted
[   37.032292][ T4223] --------------------------------------------
[   37.033549][ T4223] syz-executor107/4223 is trying to acquire lock:
[   37.034951][ T4223] ffff0000df9f1e80 (&ni->ni_lock/4){+.+.}-{3:3}, at: mi_read+0x278/0x488
[   37.036723][ T4223] 
[   37.036723][ T4223] but task is already holding lock:
[   37.038479][ T4223] ffff0000df9f6840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf4/0x1a4
[   37.040443][ T4223] 
[   37.040443][ T4223] other info that might help us debug this:
[   37.042082][ T4223]  Possible unsafe locking scenario:
[   37.042082][ T4223] 
[   37.043782][ T4223]        CPU0
[   37.044506][ T4223]        ----
[   37.045225][ T4223]   lock(&ni->ni_lock/4);
[   37.046147][ T4223]   lock(&ni->ni_lock/4);
[   37.047074][ T4223] 
[   37.047074][ T4223]  *** DEADLOCK ***
[   37.047074][ T4223] 
[   37.048790][ T4223]  May be due to missing lock nesting notation
[   37.048790][ T4223] 
[   37.050594][ T4223] 2 locks held by syz-executor107/4223:
[   37.051798][ T4223]  #0: ffff0000df9f6ae0 (&type->i_mutex_dir_key#6){++++}-{3:3}, at: lookup_slow+0x50/0x84
[   37.053951][ T4223]  #1: ffff0000df9f6840 (&ni->ni_lock/4){+.+.}-{3:3}, at: ntfs_lookup+0xf4/0x1a4
[   37.055895][ T4223] 
[   37.055895][ T4223] stack backtrace:
[   37.057216][ T4223] CPU: 0 PID: 4223 Comm: syz-executor107 Not tainted 6.1.27-syzkaller #0
[   37.058927][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023
[   37.061084][ T4223] Call trace:
[   37.061816][ T4223]  dump_backtrace+0x1c8/0x1f4
[   37.062879][ T4223]  show_stack+0x2c/0x3c
[   37.063760][ T4223]  dump_stack_lvl+0x108/0x170
[   37.064740][ T4223]  dump_stack+0x1c/0x5c
[   37.065632][ T4223]  __lock_acquire+0x6310/0x764c
[   37.066723][ T4223]  lock_acquire+0x26c/0x7cc
[   37.067756][ T4223]  __mutex_lock_common+0x190/0x21a0
[   37.068834][ T4223]  mutex_lock_nested+0x38/0x44
[   37.069845][ T4223]  mi_read+0x278/0x488
[   37.070709][ T4223]  ntfs_iget5+0x34c/0x2b38
[   37.071628][ T4223]  dir_search_u+0x298/0x324
[   37.072604][ T4223]  ntfs_lookup+0x104/0x1a4
[   37.073512][ T4223]  __lookup_slow+0x250/0x374
[   37.074509][ T4223]  lookup_slow+0x60/0x84
[   37.075386][ T4223]  walk_component+0x280/0x36c
[   37.076393][ T4223]  path_lookupat+0x13c/0x3d0
[   37.077404][ T4223]  filename_lookup+0x1d4/0x4e0
[   37.078500][ T4223]  user_path_at_empty+0x5c/0x1a4
[   37.079616][ T4223]  path_setxattr+0xbc/0x258
[   37.080579][ T4223]  __arm64_sys_setxattr+0xbc/0xd8
[   37.081660][ T4223]  invoke_syscall+0x98/0x2c0
[   37.082645][ T4223]  el0_svc_common+0x138/0x258
[   37.083729][ T4223]  do_el0_svc+0x64/0x218
[   37.084686][ T4223]  el0_svc+0x58/0x168
[   37.085543][ T4223]  el0t_64_sync_handler+0x84/0xf0
[   37.086627][ T4223]  el0t_64_sync+0x18c/0x190