syzbot


BUG: unable to handle kernel paging request in ntfs_lock_new_page

Status: upstream: reported C repro on 2026/03/30 06:22
Reported-by: syzbot+7bb205a21743a78fdd7b@syzkaller.appspotmail.com
First crash: 2d09h, last: 2d08h
Bug presence (1)
Date Name Commit Repro Result
2026/03/30 upstream (ToT) 7aaa8047eafd C Failed due to an error; will retry later

Sample crash report:
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2b4 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140
 do_el0_svc+0x58/0x130 arch/arm64/kernel/syscall.c:204
 el0_svc+0x58/0x128 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Unable to handle kernel paging request at virtual address dfff800000000001
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
[dfff800000000001] address between user and kernel address ranges
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 4509 Comm: syz.0.17 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/26/2026
pstate: 02400005 (nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
pc : PageTail include/linux/page-flags.h:292 [inline]
pc : folio_flags include/linux/page-flags.h:319 [inline]
pc : folio_test_uptodate include/linux/page-flags.h:719 [inline]
pc : ntfs_lock_new_page+0x64/0x3e0 fs/ntfs3/frecord.c:2163
lr : ntfs_lock_new_page+0x40/0x3e0 fs/ntfs3/frecord.c:2156
sp : ffff800020f170b0
x29: ffff800020f170b0 x28: 0000000000000000 x27: 0000000000100cca
x26: 000000000000000f x25: 0000000000000001 x24: 0000000000000001
x23: dfff800000000000 x22: 0000000000000008 x21: 0000000000000011
x20: 0000000000100cca x19: 0000000000000000 x18: ffff800011b9bf60
x17: 0000000000000000 x16: ffff8000082d92bc x15: 0000000000000000
x14: 0000000000000001 x13: 1ffff00002a9820a x12: 0000000000ff0100
x11: ff008000086e669c x10: 0000000000000000 x9 : 619d07b79dd6fe00
x8 : 619d07b79dd6fe00 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff800020f16498 x4 : ffff800015304cc0 x3 : ffff80000aa4a168
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 PageTail include/linux/page-flags.h:292 [inline]
 folio_flags include/linux/page-flags.h:319 [inline]
 folio_test_uptodate include/linux/page-flags.h:719 [inline]
 ntfs_lock_new_page+0x64/0x3e0 fs/ntfs3/frecord.c:2163
 ni_readpage_cmpr+0x2b8/0x7b4 fs/ntfs3/frecord.c:2229
 ntfs_read_folio+0x14c/0x1c0 fs/ntfs3/inode.c:728
 filemap_read_folio+0x134/0x384 mm/filemap.c:2490
 filemap_create_folio mm/filemap.c:2619 [inline]
 filemap_get_pages mm/filemap.c:2672 [inline]
 filemap_read+0xcd4/0x2104 mm/filemap.c:2759
 generic_file_read_iter+0xf8/0x5c4 mm/filemap.c:2941
 ntfs_file_read_iter+0x184/0x1e0 fs/ntfs3/file.c:771
 call_read_iter include/linux/fs.h:2259 [inline]
 generic_file_splice_read+0x180/0x444 fs/splice.c:308
 do_splice_to fs/splice.c:803 [inline]
 splice_direct_to_actor+0x2ec/0x954 fs/splice.c:875
 do_splice_direct+0x168/0x25c fs/splice.c:1002
 do_sendfile+0x478/0xcc8 fs/read_write.c:1255
 __do_sys_sendfile64 fs/read_write.c:1323 [inline]
 __se_sys_sendfile64 fs/read_write.c:1309 [inline]
 __arm64_sys_sendfile64+0x134/0x36c fs/read_write.c:1309
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2b4 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140
 do_el0_svc+0x58/0x130 arch/arm64/kernel/syscall.c:204
 el0_svc+0x58/0x128 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Code: 91002276 d2d00017 d343fed8 f2fbfff7 (38776b08) 
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
   0:	91002276 	add	x22, x19, #0x8
   4:	d2d00017 	mov	x23, #0x800000000000        	// #140737488355328
   8:	d343fed8 	lsr	x24, x22, #3
   c:	f2fbfff7 	movk	x23, #0xdfff, lsl #48
* 10:	38776b08 	ldrb	w8, [x24, x23] <-- trapping instruction

Crashes (3):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/03/30 07:07 linux-6.1.y 1989cd3d56e2 b5ceaad2 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan-arm64 BUG: unable to handle kernel paging request in ntfs_lock_new_page
2026/03/30 06:47 linux-6.1.y 1989cd3d56e2 b5ceaad2 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan-arm64 BUG: unable to handle kernel paging request in ntfs_lock_new_page
2026/03/30 06:21 linux-6.1.y 1989cd3d56e2 b5ceaad2 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 BUG: unable to handle kernel paging request in ntfs_lock_new_page
* Struck through repros no longer work on HEAD.