loop0: detected capacity change from 0 to 190 ================================================================== BUG: KASAN: use-after-free in ntfs_read_folio+0x6d4/0x200c fs/ntfs/aops.c:489 Read of size 1 at addr ffff0000e3d9917f by task syz-executor.0/6347 CPU: 1 PID: 6347 Comm: syz-executor.0 Not tainted 6.3.0-syzkaller-13164-g78b421b6a7c6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:351 [inline] print_report+0x174/0x514 mm/kasan/report.c:462 kasan_report+0xd4/0x130 mm/kasan/report.c:572 kasan_check_range+0x264/0x2a4 mm/kasan/generic.c:187 __asan_memcpy+0x3c/0x84 mm/kasan/shadow.c:105 ntfs_read_folio+0x6d4/0x200c fs/ntfs/aops.c:489 filemap_read_folio+0x14c/0x39c mm/filemap.c:2421 do_read_cache_folio+0x114/0x548 mm/filemap.c:3680 do_read_cache_page mm/filemap.c:3746 [inline] read_cache_page+0x6c/0x170 mm/filemap.c:3755 read_mapping_page include/linux/pagemap.h:772 [inline] ntfs_map_page fs/ntfs/aops.h:75 [inline] load_and_init_attrdef fs/ntfs/super.c:1617 [inline] load_system_files+0x1e34/0x4734 fs/ntfs/super.c:1825 ntfs_fill_super+0x14e0/0x2314 fs/ntfs/super.c:2900 mount_bdev+0x26c/0x368 fs/super.c:1380 ntfs_mount+0x44/0x58 fs/ntfs/super.c:3057 legacy_get_tree+0xd4/0x16c fs/fs_context.c:610 vfs_get_tree+0x90/0x274 fs/super.c:1510 do_new_mount+0x25c/0x8c8 fs/namespace.c:3039 path_mount+0x590/0xe04 fs/namespace.c:3369 do_mount fs/namespace.c:3382 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount fs/namespace.c:3568 [inline] __arm64_sys_mount+0x45c/0x594 fs/namespace.c:3568 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193 el0_svc+0x4c/0x15c arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 The buggy address belongs to the physical page: page:00000000e184df1f refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x123d99 memcg:ffff0000c0542000 anon flags: 0x5ffc000000a0024(uptodate|active|mappedtodisk|swapbacked|node=0|zone=2|lastcpupid=0x7ff) page_type: 0x0() raw: 05ffe000000a0014 fffffc00038fbfc8 fffffc00038fc248 ffff0000d2be8661 raw: 0000000000000026 0000000000000000 0000000100000000 ffff0000c0542000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000e3d99000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff0000e3d99080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff0000e3d99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff0000e3d99180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff0000e3d99200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== ntfs: volume version 3.1.