Warning: Permanently added '10.128.0.22' (ED25519) to the list of known hosts. executing program [ 38.381953][ T4290] loop0: detected capacity change from 0 to 4096 [ 38.387289][ T4290] ntfs: (device loop0): check_mft_mirror(): Incomplete multi sector transfer detected in mft mirror record 0. [ 38.389813][ T4290] ntfs: (device loop0): load_system_files(): $MFTMirr does not match $MFT. Mounting read-only. Run ntfsfix and/or chkdsk. [ 38.394065][ T4290] ntfs: (device loop0): ntfs_read_locked_inode(): First extent of $DATA attribute has non zero lowest_vcn. [ 38.396629][ T4290] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -5. Marking corrupt inode 0xa as bad. Run chkdsk. [ 38.399647][ T4290] ntfs: (device loop0): load_and_init_upcase(): Failed to load $UpCase from the volume. Using default. [ 38.403220][ T4290] ntfs: volume version 3.1. [ 38.405640][ T4290] ntfs: (device loop0): ntfs_check_logfile(): Did not find any restart pages in $LogFile and it was not empty. [ 38.408182][ T4290] ntfs: (device loop0): load_system_files(): Failed to load $LogFile. Will not be able to remount read-write. Mount in Windows. [ 38.411772][ T4290] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Index entry out of bounds in directory inode 0x5. [ 38.413991][ T4290] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys. [ 38.416263][ T4290] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk. [ 38.421267][ T4290] ================================================================== [ 38.422964][ T4290] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xb00/0x2be8 [ 38.424716][ T4290] Read of size 1 at addr ffff0000d081e271 by task syz-executor580/4290 [ 38.426526][ T4290] [ 38.427009][ T4290] CPU: 0 PID: 4290 Comm: syz-executor580 Tainted: G W 6.1.122-syzkaller #0 [ 38.429086][ T4290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 38.431305][ T4290] Call trace: [ 38.431975][ T4290] dump_backtrace+0x1c8/0x1f4 [ 38.433028][ T4290] show_stack+0x2c/0x3c [ 38.433939][ T4290] dump_stack_lvl+0x108/0x170 [ 38.434929][ T4290] print_report+0x174/0x4c0 [ 38.435970][ T4290] kasan_report+0xd4/0x130 [ 38.436861][ T4290] __asan_report_load1_noabort+0x2c/0x38 [ 38.438094][ T4290] ntfs_readdir+0xb00/0x2be8 [ 38.439137][ T4290] iterate_dir+0x1f4/0x4ec [ 38.440131][ T4290] __arm64_sys_getdents64+0x1c4/0x4a0 [ 38.441281][ T4290] invoke_syscall+0x98/0x2bc [ 38.442303][ T4290] el0_svc_common+0x138/0x258 [ 38.443333][ T4290] do_el0_svc+0x58/0x13c [ 38.444288][ T4290] el0_svc+0x58/0x168 [ 38.445258][ T4290] el0t_64_sync_handler+0x84/0xf0 [ 38.446254][ T4290] el0t_64_sync+0x18c/0x190 [ 38.447229][ T4290] [ 38.447701][ T4290] Allocated by task 4290: [ 38.448636][ T4290] kasan_set_track+0x4c/0x80 [ 38.449634][ T4290] kasan_save_alloc_info+0x24/0x30 [ 38.450744][ T4290] __kasan_kmalloc+0xac/0xc4 [ 38.451744][ T4290] __kmalloc+0xd8/0x1c4 [ 38.452652][ T4290] ntfs_readdir+0x65c/0x2be8 [ 38.453645][ T4290] iterate_dir+0x1f4/0x4ec [ 38.454619][ T4290] __arm64_sys_getdents64+0x1c4/0x4a0 [ 38.455871][ T4290] invoke_syscall+0x98/0x2bc [ 38.456915][ T4290] el0_svc_common+0x138/0x258 [ 38.457982][ T4290] do_el0_svc+0x58/0x13c [ 38.458973][ T4290] el0_svc+0x58/0x168 [ 38.459862][ T4290] el0t_64_sync_handler+0x84/0xf0 [ 38.460910][ T4290] el0t_64_sync+0x18c/0x190 [ 38.461926][ T4290] [ 38.462479][ T4290] The buggy address belongs to the object at ffff0000d081e200 [ 38.462479][ T4290] which belongs to the cache kmalloc-128 of size 128 [ 38.465527][ T4290] The buggy address is located 113 bytes inside of [ 38.465527][ T4290] 128-byte region [ffff0000d081e200, ffff0000d081e280) [ 38.468235][ T4290] [ 38.468768][ T4290] The buggy address belongs to the physical page: [ 38.470095][ T4290] page:000000000fadc672 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11081e [ 38.472263][ T4290] flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff) [ 38.474057][ T4290] raw: 05ffc00000000200 dead000000000100 dead000000000122 ffff0000c0002300 [ 38.475986][ T4290] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 38.477892][ T4290] page dumped because: kasan: bad access detected [ 38.479294][ T4290] [ 38.479838][ T4290] Memory state around the buggy address: [ 38.481131][ T4290] ffff0000d081e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.482756][ T4290] ffff0000d081e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.484395][ T4290] >ffff0000d081e200: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 38.486052][ T4290] ^ [ 38.487860][ T4290] ffff0000d081e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.489669][ T4290] ffff0000d081e300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.491470][ T4290] ================================================================== [ 38.493623][ T4290] Disabling lock debugging due to kernel taint