Warning: Permanently added '10.128.0.164' (ED25519) to the list of known hosts.
executing program
[ 59.874990][ T4168] loop0: detected capacity change from 0 to 4096
[ 59.915923][ T4168] ntfs: (device loop0): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1.
[ 59.942979][ T4168] ntfs: volume version 3.1.
[ 59.951130][ T4168] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup.
[ 59.961466][ T4168] ntfs: (device loop0): load_and_init_usnjrnl(): Failed to find inode number for $UsnJrnl.
[ 59.971812][ T4168] ntfs: (device loop0): load_system_files(): Failed to load $UsnJrnl. Mounting read-only. Run chkdsk.
[ 59.993015][ T4167] ntfs: (device loop0): ntfs_ucstonls(): Unicode name contains characters that cannot be converted to character set maccenteuro. You might want to try to use the mount option nls=utf8.
[ 60.011878][ T4167] ntfs: (device loop0): ntfs_filldir(): Skipping unrepresentable inode 0x4.
[ 60.026690][ T4167] ==================================================================
[ 60.034946][ T4167] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xdda/0x3550
[ 60.042546][ T4167] Read of size 1 at addr ffff8881464bd999 by task syz-executor353/4167
[ 60.050803][ T4167]
[ 60.053159][ T4167] CPU: 0 PID: 4167 Comm: syz-executor353 Not tainted 5.15.183-syzkaller #0
[ 60.061760][ T4167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[ 60.071851][ T4167] Call Trace:
[ 60.075154][ T4167]
[ 60.078105][ T4167] dump_stack_lvl+0x168/0x230
[ 60.082826][ T4167] ? show_regs_print_info+0x20/0x20
[ 60.088044][ T4167] ? load_image+0x3b0/0x3b0
[ 60.092573][ T4167] ? _raw_spin_lock_irqsave+0xb0/0xf0
[ 60.097955][ T4167] print_address_description+0x60/0x2d0
[ 60.103584][ T4167] ? ntfs_readdir+0xdda/0x3550
[ 60.108339][ T4167] kasan_report+0xdf/0x130
[ 60.112845][ T4167] ? ntfs_readdir+0xdda/0x3550
[ 60.117602][ T4167] ntfs_readdir+0xdda/0x3550
[ 60.122222][ T4167] ? __might_sleep+0xf0/0xf0
[ 60.126828][ T4167] ? preempt_count_add+0x8d/0x190
[ 60.131850][ T4167] ? rwsem_write_trylock+0x12f/0x1b0
[ 60.137250][ T4167] ? clear_nonspinnable+0x60/0x60
[ 60.142266][ T4167] ? ntfs_unmap_page+0x200/0x200
[ 60.147202][ T4167] iterate_dir+0x218/0x560
[ 60.151617][ T4167] __se_sys_getdents64+0xe5/0x260
[ 60.156636][ T4167] ? __x64_sys_getdents64+0x80/0x80
[ 60.161825][ T4167] ? filldir+0x720/0x720
[ 60.166060][ T4167] ? vtime_user_exit+0x2dc/0x400
[ 60.171000][ T4167] ? lockdep_hardirqs_on+0x94/0x140
[ 60.176196][ T4167] do_syscall_64+0x4c/0xa0
[ 60.180607][ T4167] ? clear_bhb_loop+0x15/0x70
[ 60.185273][ T4167] ? clear_bhb_loop+0x15/0x70
[ 60.189950][ T4167] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 60.195850][ T4167] RIP: 0033:0x7f75d77b4ee3
[ 60.200257][ T4167] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 a2 48 fb ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8
[ 60.219942][ T4167] RSP: 002b:00007ffe7ddeeab8 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9
[ 60.228476][ T4167] RAX: ffffffffffffffda RBX: 0000555589c80770 RCX: 00007f75d77b4ee3
[ 60.236448][ T4167] RDX: 0000000000008000 RSI: 0000555589c80770 RDI: 0000000000000005
[ 60.244416][ T4167] RBP: 0000555589c80744 R08: 0000000000000000 R09: 0000000000000000
[ 60.252383][ T4167] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffb8
[ 60.260346][ T4167] R13: 0000000000000016 R14: 0000555589c80740 R15: 431bde82d7b634db
[ 60.268330][ T4167]
[ 60.271345][ T4167]
[ 60.273656][ T4167] Allocated by task 4167:
[ 60.277967][ T4167] __kasan_kmalloc+0xb5/0xf0
[ 60.282550][ T4167] ntfs_readdir+0x798/0x3550
[ 60.287154][ T4167] iterate_dir+0x218/0x560
[ 60.291571][ T4167] __se_sys_getdents64+0xe5/0x260
[ 60.296582][ T4167] do_syscall_64+0x4c/0xa0
[ 60.300987][ T4167] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 60.306898][ T4167]
[ 60.309213][ T4167] The buggy address belongs to the object at ffff8881464bd800
[ 60.309213][ T4167] which belongs to the cache kmalloc-512 of size 512
[ 60.323256][ T4167] The buggy address is located 409 bytes inside of
[ 60.323256][ T4167] 512-byte region [ffff8881464bd800, ffff8881464bda00)
[ 60.336520][ T4167] The buggy address belongs to the page:
[ 60.342169][ T4167] page:ffffea0005192f00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8881464be400 pfn:0x1464bc
[ 60.353907][ T4167] head:ffffea0005192f00 order:2 compound_mapcount:0 compound_pincount:0
[ 60.362232][ T4167] flags: 0x57ff00000010200(slab|head|node=1|zone=2|lastcpupid=0x7ff)
[ 60.370309][ T4167] raw: 057ff00000010200 ffffea000531ba00 0000000400000004 ffff888016841c80
[ 60.378898][ T4167] raw: ffff8881464be400 000000008010000a 00000001ffffffff 0000000000000000
[ 60.387480][ T4167] page dumped because: kasan: bad access detected
[ 60.393896][ T4167] page_owner tracks the page as allocated
[ 60.399598][ T4167] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, ts 4518881629, free_ts 0
[ 60.417481][ T4167] get_page_from_freelist+0x1b77/0x1c60
[ 60.423030][ T4167] __alloc_pages+0x1e1/0x470
[ 60.427632][ T4167] alloc_page_interleave+0x24/0x1e0
[ 60.432911][ T4167] new_slab+0xc0/0x4b0
[ 60.436976][ T4167] ___slab_alloc+0x81e/0xdf0
[ 60.441575][ T4167] kmem_cache_alloc_trace+0x1a5/0x2a0
[ 60.446950][ T4167] simd_skcipher_create_compat+0xab/0x770
[ 60.452678][ T4167] simd_register_skciphers_compat+0x1aa/0x350
[ 60.458747][ T4167] cast5_init+0xa7/0x100
[ 60.462995][ T4167] do_one_initcall+0x1ee/0x680
[ 60.467755][ T4167] do_initcall_level+0x137/0x1f0
[ 60.472689][ T4167] do_initcalls+0x4b/0x90
[ 60.477012][ T4167] kernel_init_freeable+0x3ce/0x560
[ 60.482236][ T4167] kernel_init+0x19/0x1b0
[ 60.486556][ T4167] ret_from_fork+0x1f/0x30
[ 60.491145][ T4167] page_owner free stack trace missing
[ 60.496507][ T4167]
[ 60.498823][ T4167] Memory state around the buggy address:
[ 60.504442][ T4167] ffff8881464bd880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 60.512503][ T4167] ffff8881464bd900: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc
[ 60.520555][ T4167] >ffff8881464bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 60.528606][ T4167] ^
[ 60.533447][ T4167] ffff8881464bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 60.541494][ T4167] ffff8881464bda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 60.549538][ T4167] ==================================================================
[ 60.557686][ T4167] Disabling lock debugging due to kernel taint
[ 60.564497][ T4167] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 60.571717][ T4167] CPU: 1 PID: 4167 Comm: syz-executor353 Tainted: G B 5.15.183-syzkaller #0
[ 60.581698][ T4167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[ 60.591747][ T4167] Call Trace:
[ 60.595041][ T4167]
[ 60.597957][ T4167] dump_stack_lvl+0x168/0x230
[ 60.602627][ T4167] ? show_regs_print_info+0x20/0x20
[ 60.607899][ T4167] ? load_image+0x3b0/0x3b0
[ 60.612396][ T4167] panic+0x2c9/0x7f0
[ 60.616459][ T4167] ? bpf_jit_dump+0xd0/0xd0
[ 60.621067][ T4167] ? _raw_spin_unlock_irqrestore+0xf6/0x100
[ 60.626959][ T4167] ? _raw_spin_unlock+0x40/0x40
[ 60.631819][ T4167] ? ntfs_readdir+0xdda/0x3550
[ 60.636585][ T4167] check_panic_on_warn+0x80/0xa0
[ 60.641529][ T4167] ? ntfs_readdir+0xdda/0x3550
[ 60.646286][ T4167] end_report+0x6d/0xf0
[ 60.650438][ T4167] kasan_report+0x102/0x130
[ 60.654933][ T4167] ? ntfs_readdir+0xdda/0x3550
[ 60.659703][ T4167] ntfs_readdir+0xdda/0x3550
[ 60.664314][ T4167] ? __might_sleep+0xf0/0xf0
[ 60.668913][ T4167] ? preempt_count_add+0x8d/0x190
[ 60.673931][ T4167] ? rwsem_write_trylock+0x12f/0x1b0
[ 60.679258][ T4167] ? clear_nonspinnable+0x60/0x60
[ 60.684313][ T4167] ? ntfs_unmap_page+0x200/0x200
[ 60.689259][ T4167] iterate_dir+0x218/0x560
[ 60.693672][ T4167] __se_sys_getdents64+0xe5/0x260
[ 60.698690][ T4167] ? __x64_sys_getdents64+0x80/0x80
[ 60.703880][ T4167] ? filldir+0x720/0x720
[ 60.708112][ T4167] ? vtime_user_exit+0x2dc/0x400
[ 60.713039][ T4167] ? lockdep_hardirqs_on+0x94/0x140
[ 60.718263][ T4167] do_syscall_64+0x4c/0xa0
[ 60.722668][ T4167] ? clear_bhb_loop+0x15/0x70
[ 60.727351][ T4167] ? clear_bhb_loop+0x15/0x70
[ 60.732041][ T4167] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 60.737936][ T4167] RIP: 0033:0x7f75d77b4ee3
[ 60.742347][ T4167] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 a2 48 fb ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8
[ 60.761938][ T4167] RSP: 002b:00007ffe7ddeeab8 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9
[ 60.770341][ T4167] RAX: ffffffffffffffda RBX: 0000555589c80770 RCX: 00007f75d77b4ee3
[ 60.778311][ T4167] RDX: 0000000000008000 RSI: 0000555589c80770 RDI: 0000000000000005
[ 60.786367][ T4167] RBP: 0000555589c80744 R08: 0000000000000000 R09: 0000000000000000
[ 60.794327][ T4167] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffb8
[ 60.802295][ T4167] R13: 0000000000000016 R14: 0000555589c80740 R15: 431bde82d7b634db
[ 60.810263][ T4167]
[ 60.813499][ T4167] Kernel Offset: disabled
[ 60.817839][ T4167] Rebooting in 86400 seconds..