loop0: detected capacity change from 0 to 4096 ntfs: volume version 3.1. ------------[ cut here ]------------ kernel BUG at fs/ntfs/dir.c:86! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6513 Comm: syz-executor.0 Not tainted 6.3.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ntfs_lookup_inode_by_name+0x265c/0x2824 fs/ntfs/dir.c:86 lr : ntfs_lookup_inode_by_name+0x265c/0x2824 fs/ntfs/dir.c:86 sp : ffff80001e277570 x29: ffff80001e277640 x28: ffff80001e2776c0 x27: 1fffe0001b6cb846 x26: ffff0000db65c220 x25: 1ffff00003c4eed4 x24: ffff0000db65c000 x23: ffff0000da20a000 x22: dfff800000000000 x21: ffff0000e01d4200 x20: ffff0000db65c230 x19: 0000000000000000 x18: 1fffe0003689b7b6 x17: ffff800015b3d000 x16: ffff80000826640c x15: ffff800008ac8b24 x14: ffff800008ac58a0 x13: ffff800008ac8b24 x12: 0000000000000001 x11: ff80800009613178 x10: 0000000000000000 x9 : ffff800009613178 x8 : ffff0000c4a4d1c0 x7 : ffff800008063484 x6 : ffff800009653a00 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff80001e2776c0 x2 : 000000000000000c x1 : 0000000000000000 x0 : 0000000000004000 Call trace: ntfs_lookup_inode_by_name+0x265c/0x2824 fs/ntfs/dir.c:86 check_windows_hibernation_status+0xe4/0x630 fs/ntfs/super.c:1282 load_system_files+0x3494/0x4734 fs/ntfs/super.c:1997 ntfs_fill_super+0x14e0/0x2314 fs/ntfs/super.c:2900 mount_bdev+0x26c/0x368 fs/super.c:1371 ntfs_mount+0x44/0x58 fs/ntfs/super.c:3057 legacy_get_tree+0xd4/0x16c fs/fs_context.c:610 vfs_get_tree+0x90/0x274 fs/super.c:1501 do_new_mount+0x25c/0x8c8 fs/namespace.c:3042 path_mount+0x590/0xe20 fs/namespace.c:3372 do_mount fs/namespace.c:3385 [inline] __do_sys_mount fs/namespace.c:3594 [inline] __se_sys_mount fs/namespace.c:3571 [inline] __arm64_sys_mount+0x45c/0x594 fs/namespace.c:3571 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 Code: 97cd5dc0 f85a83a0 17fffe9c 97bbad01 (d4210000) ---[ end trace 0000000000000000 ]---