ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. ntfs: volume version 3.1. ntfs: volume version 3.1. ================================================================== ntfs: volume version 3.1. BUG: KASAN: use-after-free in ntfs_read_locked_inode+0x4429/0x52a0 fs/ntfs/inode.c:644 Read of size 8 at addr ffff8881b7c182e8 by task syz-executor/4417 CPU: 0 PID: 4417 Comm: syz-executor Not tainted 5.3.0-rc2+ #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x115/0x167 lib/dump_stack.c:113 print_address_description+0x6f/0x2fe mm/kasan/report.c:351 __kasan_report.cold.7+0x1b/0x3f mm/kasan/report.c:482 ntfs: volume version 3.1. kasan_report+0x12/0x17 mm/kasan/common.c:612 __asan_report_load_n_noabort+0xf/0x20 mm/kasan/generic_report.c:142 ntfs_read_locked_inode+0x4429/0x52a0 fs/ntfs/inode.c:644 ntfs_iget+0xe6/0x120 fs/ntfs/inode.c:176 load_and_init_quota fs/ntfs/super.c:1392 [inline] load_system_files+0x55fa/0x6530 fs/ntfs/super.c:2103 ntfs_fill_super+0x12ad/0x2d50 fs/ntfs/super.c:2894 mount_bdev+0x27b/0x340 fs/super.c:1283 ntfs_mount+0x10/0x20 fs/ntfs/super.c:3051 legacy_get_tree+0x103/0x1f0 fs/fs_context.c:661 vfs_get_tree+0x8b/0x360 fs/super.c:1413 do_new_mount fs/namespace.c:2791 [inline] do_mount+0x584/0x1b40 fs/namespace.c:3111 ksys_mount+0xba/0xe0 fs/namespace.c:3320 __do_sys_mount fs/namespace.c:3334 [inline] __se_sys_mount fs/namespace.c:3331 [inline] __x64_sys_mount+0xb9/0x150 fs/namespace.c:3331 do_syscall_64+0xd6/0x550 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457e5a Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 RSP: 002b:00007f1e1651fbb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000457e5a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1e1651fc00 RBP: 000000000000005a R08: 0000000020077a00 R09: 0000000020000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 R13: 000000000000066c R14: 00000000006fcac0 R15: 0000000000000000 The buggy address belongs to the page: page:ffffea0006df0600 refcount:1 mapcount:1 mapping:ffff8881ce078dd9 index:0x178c anon flags: 0x2fffc0000080034(uptodate|lru|active|swapbacked) raw: 02fffc0000080034 ffffea000708ffc8 ffffea0006dc6088 ffff8881ce078dd9 raw: 000000000000178c 0000000000000000 0000000100000000 ffff8881da262c80 page dumped because: kasan: bad access detected page->mem_cgroup:ffff8881da262c80 Memory state around the buggy address: ffff8881b7c18180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881b7c18200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8881b7c18280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff8881b7c18300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881b7c18380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================