loop0: detected capacity change from 0 to 8192 ntfs3: loop0: Different NTFS sector size (4096) and media sector size (512). INFO: trying to register non-static key. The code is fine but needs lockdep annotation, or maybe you didn't initialize this object before use? turning off the locking correctness validator. CPU: 1 UID: 0 PID: 6225 Comm: syz.0.152 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 assign_lock_key+0x238/0x270 kernel/locking/lockdep.c:975 register_lock_class+0x1cf/0x980 kernel/locking/lockdep.c:1288 __lock_acquire+0xf0/0x2040 kernel/locking/lockdep.c:5019 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5759 down_write_nested+0xa2/0x220 kernel/locking/rwsem.c:1695 mark_as_free_ex+0x3e/0x390 fs/ntfs3/fsntfs.c:2484 run_unpack+0x7f3/0xda0 fs/ntfs3/run.c:1019 run_unpack_ex+0x14b/0x7f0 fs/ntfs3/run.c:1060 ni_delete_all+0x2d9/0x9a0 fs/ntfs3/frecord.c:1610 ni_clear+0x28e/0x4b0 fs/ntfs3/frecord.c:106 evict+0x534/0x950 fs/inode.c:704 ntfs_loadlog_and_replay+0x2e8/0x4f0 fs/ntfs3/fsntfs.c:326 ntfs_fill_super+0x2c38/0x4730 fs/ntfs3/super.c:1280 get_tree_bdev+0x3f9/0x570 fs/super.c:1635 vfs_get_tree+0x92/0x2b0 fs/super.c:1800 do_new_mount+0x2be/0xb40 fs/namespace.c:3472 do_mount fs/namespace.c:3812 [inline] __do_sys_mount fs/namespace.c:4020 [inline] __se_sys_mount+0x2d6/0x3c0 fs/namespace.c:3997 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f81cdd7b65a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f81ceaa3e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f81ceaa3ef0 RCX: 00007f81cdd7b65a RDX: 0000000020020b80 RSI: 0000000020020bc0 RDI: 00007f81ceaa3eb0 RBP: 0000000020020b80 R08: 00007f81ceaa3ef0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020020bc0 R13: 00007f81ceaa3eb0 R14: 0000000000020b89 R15: 0000000020020c00 Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] CPU: 0 UID: 0 PID: 6225 Comm: syz.0.152 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:wnd_is_used+0x58/0x520 fs/ntfs3/bitmap.c:928 Code: 48 c1 e8 03 80 3c 18 00 74 08 4c 89 ff e8 d0 18 13 ff 49 8b 1f 48 8d 6b 14 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 7b 04 00 00 0f b6 6d 00 4c 8d 75 03 bf 3d RSP: 0018:ffffc90002def288 EFLAGS: 00010213 RAX: 0000000000000002 RBX: 0000000000000000 RCX: dffffc0000000000 RDX: ffffc9001ca86000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: 0000000000000014 R08: ffff88803403020f R09: 1ffff11006806041 R10: dffffc0000000000 R11: ffffed1006806042 R12: 0000000000000003 R13: 0000000000000002 R14: 0000000000000002 R15: ffff8880340301f8 FS: 00007f81ceaa46c0(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffedb88bf78 CR3: 000000003036c000 CR4: 0000000000350ef0 Call Trace: mark_as_free_ex+0x53/0x390 fs/ntfs3/fsntfs.c:2485 run_unpack+0x7f3/0xda0 fs/ntfs3/run.c:1019 run_unpack_ex+0x14b/0x7f0 fs/ntfs3/run.c:1060 ni_delete_all+0x2d9/0x9a0 fs/ntfs3/frecord.c:1610 ni_clear+0x28e/0x4b0 fs/ntfs3/frecord.c:106 evict+0x534/0x950 fs/inode.c:704 ntfs_loadlog_and_replay+0x2e8/0x4f0 fs/ntfs3/fsntfs.c:326 ntfs_fill_super+0x2c38/0x4730 fs/ntfs3/super.c:1280 get_tree_bdev+0x3f9/0x570 fs/super.c:1635 vfs_get_tree+0x92/0x2b0 fs/super.c:1800 do_new_mount+0x2be/0xb40 fs/namespace.c:3472 do_mount fs/namespace.c:3812 [inline] __do_sys_mount fs/namespace.c:4020 [inline] __se_sys_mount+0x2d6/0x3c0 fs/namespace.c:3997 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f81cdd7b65a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f81ceaa3e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f81ceaa3ef0 RCX: 00007f81cdd7b65a RDX: 0000000020020b80 RSI: 0000000020020bc0 RDI: 00007f81ceaa3eb0 RBP: 0000000020020b80 R08: 00007f81ceaa3ef0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020020bc0 R13: 00007f81ceaa3eb0 R14: 0000000000020b89 R15: 0000000020020c00 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:wnd_is_used+0x58/0x520 fs/ntfs3/bitmap.c:928 Code: 48 c1 e8 03 80 3c 18 00 74 08 4c 89 ff e8 d0 18 13 ff 49 8b 1f 48 8d 6b 14 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 7b 04 00 00 0f b6 6d 00 4c 8d 75 03 bf 3d RSP: 0018:ffffc90002def288 EFLAGS: 00010213 RAX: 0000000000000002 RBX: 0000000000000000 RCX: dffffc0000000000 RDX: ffffc9001ca86000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: 0000000000000014 R08: ffff88803403020f R09: 1ffff11006806041 R10: dffffc0000000000 R11: ffffed1006806042 R12: 0000000000000003 R13: 0000000000000002 R14: 0000000000000002 R15: ffff8880340301f8 FS: 00007f81ceaa46c0(0000) GS:ffff8880b8900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055913c4e39c8 CR3: 000000003036c000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 48 c1 e8 03 shr $0x3,%rax 4: 80 3c 18 00 cmpb $0x0,(%rax,%rbx,1) 8: 74 08 je 0x12 a: 4c 89 ff mov %r15,%rdi d: e8 d0 18 13 ff call 0xff1318e2 12: 49 8b 1f mov (%r15),%rbx 15: 48 8d 6b 14 lea 0x14(%rbx),%rbp 19: 48 89 e8 mov %rbp,%rax 1c: 48 c1 e8 03 shr $0x3,%rax 20: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 27: fc ff df * 2a: 0f b6 04 08 movzbl (%rax,%rcx,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 0f 85 7b 04 00 00 jne 0x4b1 36: 0f b6 6d 00 movzbl 0x0(%rbp),%ebp 3a: 4c 8d 75 03 lea 0x3(%rbp),%r14 3e: bf .byte 0xbf 3f: 3d .byte 0x3d