loop0: detected capacity change from 0 to 264192 ntfs3: loop0: Different NTFS' sector size (2048) and media sector size (512) ntfs3: loop0: Mark volume as dirty due to NTFS errors ntfs3: loop0: Failed to load $Extend. ================================================================== BUG: KASAN: use-after-free in hdr_find_e.isra.0+0x527/0x590 fs/ntfs3/index.c:689 Read of size 2 at addr ffff888098c3651f by task syz-executor129/3611 CPU: 1 PID: 3611 Comm: syz-executor129 Not tainted 6.0.0-syzkaller-09589-g55be6084c8e0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:317 [inline] print_report.cold+0x2ba/0x719 mm/kasan/report.c:433 kasan_report+0xb1/0x1e0 mm/kasan/report.c:495 hdr_find_e.isra.0+0x527/0x590 fs/ntfs3/index.c:689 indx_find+0x25a/0x980 fs/ntfs3/index.c:1068 dir_search_u+0x232/0x3f0 fs/ntfs3/dir.c:254 ntfs_lookup+0x174/0x1e0 fs/ntfs3/namei.c:83 __lookup_slow+0x24c/0x460 fs/namei.c:1685 lookup_slow fs/namei.c:1702 [inline] walk_component+0x33f/0x5a0 fs/namei.c:1993 lookup_last fs/namei.c:2450 [inline] path_lookupat+0x1ba/0x840 fs/namei.c:2474 filename_lookup+0x1ce/0x590 fs/namei.c:2503 vfs_statx+0x14c/0x430 fs/stat.c:229 vfs_fstatat+0x8c/0xb0 fs/stat.c:267 __do_sys_newfstatat+0x94/0x120 fs/stat.c:437 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f07f3295599 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe3d7c28d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000106 RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 00007f07f3295599 RDX: 0000000000000000 RSI: 0000000020000380 RDI: ffffffffffffff9c RBP: 00007f07f3254ad0 R08: 00007ffe3d7c27c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07f3254b60 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 The buggy address belongs to the physical page: page:ffffea0002630d80 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x98c36 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 ffffea0002630d88 ffffea0002630d88 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffff888098c36400: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888098c36480: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff888098c36500: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888098c36580: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888098c36600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================