Warning: Permanently added '10.128.0.164' (ED25519) to the list of known hosts. executing program [ 59.874990][ T4168] loop0: detected capacity change from 0 to 4096 [ 59.915923][ T4168] ntfs: (device loop0): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 59.942979][ T4168] ntfs: volume version 3.1. [ 59.951130][ T4168] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup. [ 59.961466][ T4168] ntfs: (device loop0): load_and_init_usnjrnl(): Failed to find inode number for $UsnJrnl. [ 59.971812][ T4168] ntfs: (device loop0): load_system_files(): Failed to load $UsnJrnl. Mounting read-only. Run chkdsk. [ 59.993015][ T4167] ntfs: (device loop0): ntfs_ucstonls(): Unicode name contains characters that cannot be converted to character set maccenteuro. You might want to try to use the mount option nls=utf8. [ 60.011878][ T4167] ntfs: (device loop0): ntfs_filldir(): Skipping unrepresentable inode 0x4. [ 60.026690][ T4167] ================================================================== [ 60.034946][ T4167] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xdda/0x3550 [ 60.042546][ T4167] Read of size 1 at addr ffff8881464bd999 by task syz-executor353/4167 [ 60.050803][ T4167] [ 60.053159][ T4167] CPU: 0 PID: 4167 Comm: syz-executor353 Not tainted 5.15.183-syzkaller #0 [ 60.061760][ T4167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 60.071851][ T4167] Call Trace: [ 60.075154][ T4167] [ 60.078105][ T4167] dump_stack_lvl+0x168/0x230 [ 60.082826][ T4167] ? show_regs_print_info+0x20/0x20 [ 60.088044][ T4167] ? load_image+0x3b0/0x3b0 [ 60.092573][ T4167] ? _raw_spin_lock_irqsave+0xb0/0xf0 [ 60.097955][ T4167] print_address_description+0x60/0x2d0 [ 60.103584][ T4167] ? ntfs_readdir+0xdda/0x3550 [ 60.108339][ T4167] kasan_report+0xdf/0x130 [ 60.112845][ T4167] ? ntfs_readdir+0xdda/0x3550 [ 60.117602][ T4167] ntfs_readdir+0xdda/0x3550 [ 60.122222][ T4167] ? __might_sleep+0xf0/0xf0 [ 60.126828][ T4167] ? preempt_count_add+0x8d/0x190 [ 60.131850][ T4167] ? rwsem_write_trylock+0x12f/0x1b0 [ 60.137250][ T4167] ? clear_nonspinnable+0x60/0x60 [ 60.142266][ T4167] ? ntfs_unmap_page+0x200/0x200 [ 60.147202][ T4167] iterate_dir+0x218/0x560 [ 60.151617][ T4167] __se_sys_getdents64+0xe5/0x260 [ 60.156636][ T4167] ? __x64_sys_getdents64+0x80/0x80 [ 60.161825][ T4167] ? filldir+0x720/0x720 [ 60.166060][ T4167] ? vtime_user_exit+0x2dc/0x400 [ 60.171000][ T4167] ? lockdep_hardirqs_on+0x94/0x140 [ 60.176196][ T4167] do_syscall_64+0x4c/0xa0 [ 60.180607][ T4167] ? clear_bhb_loop+0x15/0x70 [ 60.185273][ T4167] ? clear_bhb_loop+0x15/0x70 [ 60.189950][ T4167] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 60.195850][ T4167] RIP: 0033:0x7f75d77b4ee3 [ 60.200257][ T4167] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 a2 48 fb ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 [ 60.219942][ T4167] RSP: 002b:00007ffe7ddeeab8 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 60.228476][ T4167] RAX: ffffffffffffffda RBX: 0000555589c80770 RCX: 00007f75d77b4ee3 [ 60.236448][ T4167] RDX: 0000000000008000 RSI: 0000555589c80770 RDI: 0000000000000005 [ 60.244416][ T4167] RBP: 0000555589c80744 R08: 0000000000000000 R09: 0000000000000000 [ 60.252383][ T4167] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffb8 [ 60.260346][ T4167] R13: 0000000000000016 R14: 0000555589c80740 R15: 431bde82d7b634db [ 60.268330][ T4167] [ 60.271345][ T4167] [ 60.273656][ T4167] Allocated by task 4167: [ 60.277967][ T4167] __kasan_kmalloc+0xb5/0xf0 [ 60.282550][ T4167] ntfs_readdir+0x798/0x3550 [ 60.287154][ T4167] iterate_dir+0x218/0x560 [ 60.291571][ T4167] __se_sys_getdents64+0xe5/0x260 [ 60.296582][ T4167] do_syscall_64+0x4c/0xa0 [ 60.300987][ T4167] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 60.306898][ T4167] [ 60.309213][ T4167] The buggy address belongs to the object at ffff8881464bd800 [ 60.309213][ T4167] which belongs to the cache kmalloc-512 of size 512 [ 60.323256][ T4167] The buggy address is located 409 bytes inside of [ 60.323256][ T4167] 512-byte region [ffff8881464bd800, ffff8881464bda00) [ 60.336520][ T4167] The buggy address belongs to the page: [ 60.342169][ T4167] page:ffffea0005192f00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8881464be400 pfn:0x1464bc [ 60.353907][ T4167] head:ffffea0005192f00 order:2 compound_mapcount:0 compound_pincount:0 [ 60.362232][ T4167] flags: 0x57ff00000010200(slab|head|node=1|zone=2|lastcpupid=0x7ff) [ 60.370309][ T4167] raw: 057ff00000010200 ffffea000531ba00 0000000400000004 ffff888016841c80 [ 60.378898][ T4167] raw: ffff8881464be400 000000008010000a 00000001ffffffff 0000000000000000 [ 60.387480][ T4167] page dumped because: kasan: bad access detected [ 60.393896][ T4167] page_owner tracks the page as allocated [ 60.399598][ T4167] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, ts 4518881629, free_ts 0 [ 60.417481][ T4167] get_page_from_freelist+0x1b77/0x1c60 [ 60.423030][ T4167] __alloc_pages+0x1e1/0x470 [ 60.427632][ T4167] alloc_page_interleave+0x24/0x1e0 [ 60.432911][ T4167] new_slab+0xc0/0x4b0 [ 60.436976][ T4167] ___slab_alloc+0x81e/0xdf0 [ 60.441575][ T4167] kmem_cache_alloc_trace+0x1a5/0x2a0 [ 60.446950][ T4167] simd_skcipher_create_compat+0xab/0x770 [ 60.452678][ T4167] simd_register_skciphers_compat+0x1aa/0x350 [ 60.458747][ T4167] cast5_init+0xa7/0x100 [ 60.462995][ T4167] do_one_initcall+0x1ee/0x680 [ 60.467755][ T4167] do_initcall_level+0x137/0x1f0 [ 60.472689][ T4167] do_initcalls+0x4b/0x90 [ 60.477012][ T4167] kernel_init_freeable+0x3ce/0x560 [ 60.482236][ T4167] kernel_init+0x19/0x1b0 [ 60.486556][ T4167] ret_from_fork+0x1f/0x30 [ 60.491145][ T4167] page_owner free stack trace missing [ 60.496507][ T4167] [ 60.498823][ T4167] Memory state around the buggy address: [ 60.504442][ T4167] ffff8881464bd880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 60.512503][ T4167] ffff8881464bd900: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 60.520555][ T4167] >ffff8881464bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.528606][ T4167] ^ [ 60.533447][ T4167] ffff8881464bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.541494][ T4167] ffff8881464bda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.549538][ T4167] ================================================================== [ 60.557686][ T4167] Disabling lock debugging due to kernel taint [ 60.564497][ T4167] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 60.571717][ T4167] CPU: 1 PID: 4167 Comm: syz-executor353 Tainted: G B 5.15.183-syzkaller #0 [ 60.581698][ T4167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 60.591747][ T4167] Call Trace: [ 60.595041][ T4167] [ 60.597957][ T4167] dump_stack_lvl+0x168/0x230 [ 60.602627][ T4167] ? show_regs_print_info+0x20/0x20 [ 60.607899][ T4167] ? load_image+0x3b0/0x3b0 [ 60.612396][ T4167] panic+0x2c9/0x7f0 [ 60.616459][ T4167] ? bpf_jit_dump+0xd0/0xd0 [ 60.621067][ T4167] ? _raw_spin_unlock_irqrestore+0xf6/0x100 [ 60.626959][ T4167] ? _raw_spin_unlock+0x40/0x40 [ 60.631819][ T4167] ? ntfs_readdir+0xdda/0x3550 [ 60.636585][ T4167] check_panic_on_warn+0x80/0xa0 [ 60.641529][ T4167] ? ntfs_readdir+0xdda/0x3550 [ 60.646286][ T4167] end_report+0x6d/0xf0 [ 60.650438][ T4167] kasan_report+0x102/0x130 [ 60.654933][ T4167] ? ntfs_readdir+0xdda/0x3550 [ 60.659703][ T4167] ntfs_readdir+0xdda/0x3550 [ 60.664314][ T4167] ? __might_sleep+0xf0/0xf0 [ 60.668913][ T4167] ? preempt_count_add+0x8d/0x190 [ 60.673931][ T4167] ? rwsem_write_trylock+0x12f/0x1b0 [ 60.679258][ T4167] ? clear_nonspinnable+0x60/0x60 [ 60.684313][ T4167] ? ntfs_unmap_page+0x200/0x200 [ 60.689259][ T4167] iterate_dir+0x218/0x560 [ 60.693672][ T4167] __se_sys_getdents64+0xe5/0x260 [ 60.698690][ T4167] ? __x64_sys_getdents64+0x80/0x80 [ 60.703880][ T4167] ? filldir+0x720/0x720 [ 60.708112][ T4167] ? vtime_user_exit+0x2dc/0x400 [ 60.713039][ T4167] ? lockdep_hardirqs_on+0x94/0x140 [ 60.718263][ T4167] do_syscall_64+0x4c/0xa0 [ 60.722668][ T4167] ? clear_bhb_loop+0x15/0x70 [ 60.727351][ T4167] ? clear_bhb_loop+0x15/0x70 [ 60.732041][ T4167] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 60.737936][ T4167] RIP: 0033:0x7f75d77b4ee3 [ 60.742347][ T4167] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 a2 48 fb ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 [ 60.761938][ T4167] RSP: 002b:00007ffe7ddeeab8 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 60.770341][ T4167] RAX: ffffffffffffffda RBX: 0000555589c80770 RCX: 00007f75d77b4ee3 [ 60.778311][ T4167] RDX: 0000000000008000 RSI: 0000555589c80770 RDI: 0000000000000005 [ 60.786367][ T4167] RBP: 0000555589c80744 R08: 0000000000000000 R09: 0000000000000000 [ 60.794327][ T4167] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffb8 [ 60.802295][ T4167] R13: 0000000000000016 R14: 0000555589c80740 R15: 431bde82d7b634db [ 60.810263][ T4167] [ 60.813499][ T4167] Kernel Offset: disabled [ 60.817839][ T4167] Rebooting in 86400 seconds..