loop4: detected capacity change from 0 to 4096 ================================================================== BUG: KASAN: use-after-free in ntfs_attr_find+0x5a0/0x9d0 fs/ntfs/attrib.c:609 Read of size 2 at addr ffff0001586500a6 by task syz-executor.4/21152 CPU: 1 PID: 21152 Comm: syz-executor.4 Not tainted 6.4.0-rc5-syzkaller-gd8b213732169 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:351 [inline] print_report+0x174/0x514 mm/kasan/report.c:462 kasan_report+0xd4/0x130 mm/kasan/report.c:572 __asan_report_load_n_noabort+0x1c/0x28 mm/kasan/report_generic.c:391 ntfs_attr_find+0x5a0/0x9d0 fs/ntfs/attrib.c:609 ntfs_attr_lookup+0x3dc/0x1cd8 ntfs_read_locked_inode+0xb08/0x38e0 fs/ntfs/inode.c:999 ntfs_read_inode_mount+0xbb0/0x2044 fs/ntfs/inode.c:2098 ntfs_fill_super+0x13b4/0x2314 fs/ntfs/super.c:2863 mount_bdev+0x274/0x370 fs/super.c:1380 ntfs_mount+0x44/0x58 fs/ntfs/super.c:3057 legacy_get_tree+0xd4/0x16c fs/fs_context.c:610 vfs_get_tree+0x90/0x274 fs/super.c:1510 do_new_mount+0x25c/0x8c4 fs/namespace.c:3039 path_mount+0x590/0xe04 fs/namespace.c:3369 do_mount fs/namespace.c:3382 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount fs/namespace.c:3568 [inline] __arm64_sys_mount+0x45c/0x594 fs/namespace.c:3568 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x244 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:191 el0_svc+0x4c/0x160 arch/arm64/kernel/entry-common.c:647 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:665 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 The buggy address belongs to the physical page: page:0000000052a7f2a1 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x1 pfn:0x198650 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) page_type: 0xffffff7f(buddy) raw: 05ffc00000000000 fffffc0005617408 fffffc0005618808 0000000000000000 raw: 0000000000000001 0000000000000004 00000000ffffff7f 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff00015864ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff000158650000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff000158650080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff000158650100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff000158650180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. ntfs: (device loop4): ntfs_read_locked_inode(): Failed to lookup $DATA attribute. ntfs: (device loop4): ntfs_read_locked_inode(): Failed with error code -5. Marking corrupt inode 0x0 as bad. Run chkdsk. ntfs: (device loop4): ntfs_read_inode_mount(): ntfs_read_inode() of $MFT failed. BUG or corrupt $MFT. Run chkdsk and if no errors are found, please report you saw this message to linux-ntfs-dev@lists.sourceforge.net