Warning: Permanently added '10.128.0.150' (ED25519) to the list of known hosts. executing program [ 45.154866][ T4019] loop0: detected capacity change from 0 to 4096 [ 45.256652][ T4019] ntfs: (device loop0): check_mft_mirror(): Incomplete multi sector transfer detected in mft mirror record 0. [ 45.259874][ T4019] ntfs: (device loop0): load_system_files(): $MFTMirr does not match $MFT. Mounting read-only. Run ntfsfix and/or chkdsk. [ 45.264177][ T4019] ntfs: (device loop0): ntfs_read_locked_inode(): First extent of $DATA attribute has non zero lowest_vcn. [ 45.267057][ T4019] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -5. Marking corrupt inode 0xa as bad. Run chkdsk. [ 45.270496][ T4019] ntfs: (device loop0): load_and_init_upcase(): Failed to load $UpCase from the volume. Using default. [ 45.275584][ T4019] ntfs: volume version 3.1. [ 45.279580][ T4019] ntfs: (device loop0): ntfs_check_logfile(): Did not find any restart pages in $LogFile and it was not empty. [ 45.283015][ T4019] ntfs: (device loop0): load_system_files(): Failed to load $LogFile. Will not be able to remount read-write. Mount in Windows. [ 45.287477][ T4019] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Index entry out of bounds in directory inode 0x5. [ 45.290253][ T4019] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys. [ 45.293202][ T4019] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk. [ 45.299283][ T4019] ================================================================== [ 45.301547][ T4019] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xb60/0x2748 [ 45.303368][ T4019] Read of size 1 at addr ffff0000cb7da671 by task syz-executor316/4019 [ 45.305471][ T4019] [ 45.306067][ T4019] CPU: 1 PID: 4019 Comm: syz-executor316 Not tainted 5.15.178-syzkaller #0 [ 45.308391][ T4019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 45.310937][ T4019] Call trace: [ 45.311823][ T4019] dump_backtrace+0x0/0x530 [ 45.312868][ T4019] show_stack+0x2c/0x3c [ 45.313892][ T4019] dump_stack_lvl+0x108/0x170 [ 45.315110][ T4019] print_address_description+0x7c/0x3f0 [ 45.316565][ T4019] kasan_report+0x174/0x1e4 [ 45.317801][ T4019] __asan_report_load1_noabort+0x44/0x50 [ 45.319214][ T4019] ntfs_readdir+0xb60/0x2748 [ 45.320311][ T4019] iterate_dir+0x1f4/0x4ec [ 45.321515][ T4019] __arm64_sys_getdents64+0x1c4/0x4c4 [ 45.323090][ T4019] invoke_syscall+0x98/0x2b8 [ 45.324321][ T4019] el0_svc_common+0x138/0x258 [ 45.325544][ T4019] do_el0_svc+0x58/0x14c [ 45.326625][ T4019] el0_svc+0x7c/0x1f0 [ 45.327747][ T4019] el0t_64_sync_handler+0x84/0xe4 [ 45.329008][ T4019] el0t_64_sync+0x1a0/0x1a4 [ 45.330182][ T4019] [ 45.330726][ T4019] Allocated by task 4019: [ 45.331761][ T4019] ____kasan_kmalloc+0xbc/0xfc [ 45.333023][ T4019] __kasan_kmalloc+0x10/0x1c [ 45.334162][ T4019] __kmalloc+0x29c/0x4c8 [ 45.335206][ T4019] ntfs_readdir+0x66c/0x2748 [ 45.336429][ T4019] iterate_dir+0x1f4/0x4ec [ 45.337577][ T4019] __arm64_sys_getdents64+0x1c4/0x4c4 [ 45.339015][ T4019] invoke_syscall+0x98/0x2b8 [ 45.340208][ T4019] el0_svc_common+0x138/0x258 [ 45.341307][ T4019] do_el0_svc+0x58/0x14c [ 45.342340][ T4019] el0_svc+0x7c/0x1f0 [ 45.343345][ T4019] el0t_64_sync_handler+0x84/0xe4 [ 45.344517][ T4019] el0t_64_sync+0x1a0/0x1a4 [ 45.345573][ T4019] [ 45.346193][ T4019] The buggy address belongs to the object at ffff0000cb7da600 [ 45.346193][ T4019] which belongs to the cache kmalloc-128 of size 128 [ 45.349608][ T4019] The buggy address is located 113 bytes inside of [ 45.349608][ T4019] 128-byte region [ffff0000cb7da600, ffff0000cb7da680) [ 45.352965][ T4019] The buggy address belongs to the page: [ 45.354292][ T4019] page:000000007169ab58 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10b7da [ 45.356824][ T4019] flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff) [ 45.358657][ T4019] raw: 05ffc00000000200 0000000000000000 0000000600000001 ffff0000c0002300 [ 45.360761][ T4019] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 45.362913][ T4019] page dumped because: kasan: bad access detected [ 45.364557][ T4019] [ 45.365097][ T4019] Memory state around the buggy address: [ 45.366519][ T4019] ffff0000cb7da500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.368565][ T4019] ffff0000cb7da580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.370629][ T4019] >ffff0000cb7da600: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 45.372650][ T4019] ^ [ 45.374553][ T4019] ffff0000cb7da680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.376618][ T4019] ffff0000cb7da700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.378711][ T4019] ================================================================== [ 45.380791][ T4019] Disabling lock debugging due to kernel taint