loop5: detected capacity change from 0 to 4096 ntfs3: loop5: Different NTFS sector size (2048) and media sector size (512). ntfs3: loop5: Mark volume as dirty due to NTFS errors general protection fault, probably for non-canonical address 0xff1f1b1f1f1f1f22: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0xf8f8f8f8f8f8f910-0xf8f8f8f8f8f8f917] CPU: 1 PID: 10776 Comm: syz-executor.5 Not tainted 6.6.0-rc2-syzkaller-00337-gd90b0276af8f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 RIP: 0010:ntfs_write_bh+0x5b/0x6e0 fs/ntfs3/fsntfs.c:1402 Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 6e 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 1b 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 42 06 00 00 8b 43 18 89 44 24 48 48 8b 44 24 10 RSP: 0018:ffffc90156b9f420 EFLAGS: 00010216 RAX: dffffc0000000000 RBX: f8f8f8f8f8f8f8f8 RCX: 0000000000000000 RDX: 1f1f1f1f1f1f1f22 RSI: ffffffff82bf81b8 RDI: f8f8f8f8f8f8f910 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffff8880844b605c R13: ffff88803c5c8000 R14: ffff8880844b6230 R15: ffff8880844b6270 FS: 00007f9afc99a6c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f63d9dfe800 CR3: 00000000b2128000 CR4: 0000000000350ee0 Call Trace: mi_write+0xc0/0x1e0 fs/ntfs3/record.c:346 ni_write_inode+0x1025/0x2810 fs/ntfs3/frecord.c:3360 write_inode fs/fs-writeback.c:1456 [inline] __writeback_single_inode+0xa81/0xe70 fs/fs-writeback.c:1668 writeback_single_inode+0x2af/0x590 fs/fs-writeback.c:1724 sync_inode_metadata+0xa5/0xe0 fs/fs-writeback.c:2786 ntfs_set_state+0x3f0/0x6e0 fs/ntfs3/fsntfs.c:995 ntfs_iget5+0x918/0x3960 fs/ntfs3/inode.c:539 ntfs_fill_super+0x2951/0x4330 fs/ntfs3/super.c:1272 get_tree_bdev+0x3b5/0x650 fs/super.c:1577 vfs_get_tree+0x8c/0x370 fs/super.c:1750 do_new_mount fs/namespace.c:3335 [inline] path_mount+0x1492/0x1ed0 fs/namespace.c:3662 do_mount fs/namespace.c:3675 [inline] __do_sys_mount fs/namespace.c:3884 [inline] __se_sys_mount fs/namespace.c:3861 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:3861 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f9afbc7e1ea Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f9afc999ee8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f9afc999f80 RCX: 00007f9afbc7e1ea RDX: 0000000020000000 RSI: 0000000020000200 RDI: 00007f9afc999f40 RBP: 0000000020000000 R08: 00007f9afc999f80 R09: 0000000000810040 R10: 0000000000810040 R11: 0000000000000206 R12: 0000000020000200 R13: 00007f9afc999f40 R14: 000000000001f420 R15: 0000000020000040 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ntfs_write_bh+0x5b/0x6e0 fs/ntfs3/fsntfs.c:1402 Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 6e 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 1b 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 42 06 00 00 8b 43 18 89 44 24 48 48 8b 44 24 10 RSP: 0018:ffffc90156b9f420 EFLAGS: 00010216 RAX: dffffc0000000000 RBX: f8f8f8f8f8f8f8f8 RCX: 0000000000000000 RDX: 1f1f1f1f1f1f1f22 RSI: ffffffff82bf81b8 RDI: f8f8f8f8f8f8f910 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffff8880844b605c R13: ffff88803c5c8000 R14: ffff8880844b6230 R15: ffff8880844b6270 FS: 00007f9afc99a6c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2694d9d988 CR3: 00000000b2128000 CR4: 0000000000350ee0 ---------------- Code disassembly (best guess), 4 bytes skipped: 0: 48 c1 ea 03 shr $0x3,%rdx 4: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 8: 0f 85 6e 06 00 00 jne 0x67c e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 15: fc ff df 18: 48 8b 1b mov (%rbx),%rbx 1b: 48 8d 7b 18 lea 0x18(%rbx),%rdi 1f: 48 89 fa mov %rdi,%rdx 22: 48 c1 ea 03 shr $0x3,%rdx * 26: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2a: 0f 85 42 06 00 00 jne 0x672 30: 8b 43 18 mov 0x18(%rbx),%eax 33: 89 44 24 48 mov %eax,0x48(%rsp) 37: 48 8b 44 24 10 mov 0x10(%rsp),%rax