Warning: Permanently added '10.128.1.117' (ED25519) to the list of known hosts.
executing program
[ 53.274694][ T3506] loop0: detected capacity change from 0 to 4096
[ 53.284452][ T3506] ntfs: (device loop0): ntfs_is_extended_system_file(): Corrupt file name attribute. You should run chkdsk.
[ 53.296079][ T3506] ntfs: (device loop0): ntfs_read_locked_inode(): $DATA attribute is missing.
[ 53.305171][ T3506] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -2. Marking corrupt inode 0x1 as bad. Run chkdsk.
[ 53.318219][ T3506] ntfs: (device loop0): load_system_files(): Failed to load $MFTMirr. Mounting read-only. Run ntfsfix and/or chkdsk.
[ 53.336690][ T3506] ntfs: volume version 3.1.
[ 53.342930][ T3506] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup.
[ 53.352875][ T3506] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys.
[ 53.364166][ T3506] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk.
[ 53.387421][ T3506] ==================================================================
[ 53.395498][ T3506] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xe9d/0x2b70
[ 53.402981][ T3506] Read of size 1 at addr ffff888021c37a71 by task syz-executor400/3506
[ 53.411210][ T3506]
[ 53.413535][ T3506] CPU: 1 PID: 3506 Comm: syz-executor400 Not tainted 6.1.45-syzkaller #0
[ 53.421945][ T3506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[ 53.431979][ T3506] Call Trace:
[ 53.435243][ T3506]
[ 53.438157][ T3506] dump_stack_lvl+0x1e3/0x2cb
[ 53.442826][ T3506] ? irq_work_queue+0xc6/0x150
[ 53.447570][ T3506] ? nf_tcp_handle_invalid+0x642/0x642
[ 53.453011][ T3506] ? panic+0x75d/0x75d
[ 53.457062][ T3506] ? _printk+0xd1/0x111
[ 53.461195][ T3506] ? _raw_spin_lock_irqsave+0xac/0x120
[ 53.466642][ T3506] print_report+0x15f/0x4f0
[ 53.471122][ T3506] ? mutex_unlock+0x10/0x10
[ 53.475605][ T3506] ? __virt_addr_valid+0x22b/0x2e0
[ 53.480702][ T3506] ? __phys_addr+0xb6/0x170
[ 53.485184][ T3506] ? ntfs_readdir+0xe9d/0x2b70
[ 53.489928][ T3506] kasan_report+0x136/0x160
[ 53.494410][ T3506] ? ntfs_readdir+0xe9d/0x2b70
[ 53.499154][ T3506] ntfs_readdir+0xe9d/0x2b70
[ 53.503814][ T3506] ? read_lock_is_recursive+0x10/0x10
[ 53.509167][ T3506] ? rwsem_write_trylock+0x166/0x210
[ 53.514439][ T3506] ? __fdget_pos+0x2ba/0x360
[ 53.519008][ T3506] ? clear_nonspinnable+0x60/0x60
[ 53.524017][ T3506] ? ntfs_unmap_page+0x250/0x250
[ 53.528934][ T3506] ? common_file_perm+0x17d/0x1d0
[ 53.533966][ T3506] ? iterate_dir+0x131/0x560
[ 53.538534][ T3506] iterate_dir+0x224/0x560
[ 53.542928][ T3506] __se_sys_getdents64+0x209/0x4f0
[ 53.548021][ T3506] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 53.553986][ T3506] ? __x64_sys_getdents64+0x80/0x80
[ 53.559162][ T3506] ? filldir+0x6f0/0x6f0
[ 53.563387][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220
[ 53.569347][ T3506] ? lockdep_hardirqs_on+0x94/0x130
[ 53.574531][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220
[ 53.580495][ T3506] do_syscall_64+0x3d/0xb0
[ 53.584893][ T3506] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 53.590769][ T3506] RIP: 0033:0x7f0c5cb845f9
[ 53.595159][ T3506] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 53.614741][ T3506] RSP: 002b:00007ffcddaaab08 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 53.623138][ T3506] RAX: ffffffffffffffda RBX: 00007ffcddaaacd8 RCX: 00007f0c5cb845f9
[ 53.631088][ T3506] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004
[ 53.639039][ T3506] RBP: 00007f0c5cc16610 R08: 0000000000000000 R09: 00007ffcddaaacd8
[ 53.646993][ T3506] R10: 000000000001f1b8 R11: 0000000000000246 R12: 0000000000000001
[ 53.654942][ T3506] R13: 00007ffcddaaacc8 R14: 0000000000000001 R15: 0000000000000001
[ 53.662899][ T3506]
[ 53.665897][ T3506]
[ 53.668198][ T3506] Allocated by task 3506:
[ 53.672497][ T3506] kasan_set_track+0x4b/0x70
[ 53.677069][ T3506] __kasan_kmalloc+0x97/0xb0
[ 53.681641][ T3506] __kmalloc+0xb2/0x230
[ 53.685770][ T3506] ntfs_readdir+0x825/0x2b70
[ 53.690428][ T3506] iterate_dir+0x224/0x560
[ 53.694818][ T3506] __se_sys_getdents64+0x209/0x4f0
[ 53.699910][ T3506] do_syscall_64+0x3d/0xb0
[ 53.704304][ T3506] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 53.710183][ T3506]
[ 53.712483][ T3506] The buggy address belongs to the object at ffff888021c37a00
[ 53.712483][ T3506] which belongs to the cache kmalloc-64 of size 64
[ 53.726335][ T3506] The buggy address is located 49 bytes to the right of
[ 53.726335][ T3506] 64-byte region [ffff888021c37a00, ffff888021c37a40)
[ 53.739929][ T3506]
[ 53.742230][ T3506] The buggy address belongs to the physical page:
[ 53.748614][ T3506] page:ffffea0000870dc0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21c37
[ 53.758826][ T3506] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 53.766354][ T3506] raw: 00fff00000000200 ffffea00008a3180 dead000000000004 ffff888012441640
[ 53.774914][ T3506] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 53.783474][ T3506] page dumped because: kasan: bad access detected
[ 53.789859][ T3506] page_owner tracks the page as allocated
[ 53.795547][ T3506] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1258, tgid 1258 (kworker/u4:5), ts 8269004462, free_ts 8268058983
[ 53.813666][ T3506] post_alloc_hook+0x18d/0x1b0
[ 53.818417][ T3506] get_page_from_freelist+0x32ed/0x3480
[ 53.823940][ T3506] __alloc_pages+0x28d/0x770
[ 53.828506][ T3506] alloc_slab_page+0x6a/0x150
[ 53.833158][ T3506] new_slab+0x84/0x2d0
[ 53.837203][ T3506] ___slab_alloc+0xa71/0x1080
[ 53.841856][ T3506] __kmem_cache_alloc_node+0x19f/0x260
[ 53.847294][ T3506] __kmalloc+0xa1/0x230
[ 53.851423][ T3506] security_task_alloc+0x3f/0x120
[ 53.856422][ T3506] copy_process+0x17ea/0x4020
[ 53.861086][ T3506] kernel_clone+0x222/0x920
[ 53.865564][ T3506] user_mode_thread+0x12e/0x190
[ 53.870391][ T3506] call_usermodehelper_exec_work+0x58/0x220
[ 53.876262][ T3506] process_one_work+0x8aa/0x11f0
[ 53.881176][ T3506] worker_thread+0xa5f/0x1210
[ 53.885830][ T3506] kthread+0x26e/0x300
[ 53.889876][ T3506] page last free stack trace:
[ 53.894521][ T3506] free_unref_page_prepare+0xf63/0x1120
[ 53.900045][ T3506] free_unref_page+0x98/0x570
[ 53.904698][ T3506] __mmdrop+0xb2/0x470
[ 53.908743][ T3506] free_bprm+0x135/0x2f0
[ 53.912961][ T3506] kernel_execve+0x8f1/0xa10
[ 53.917526][ T3506] call_usermodehelper_exec_async+0x22f/0x370
[ 53.923568][ T3506] ret_from_fork+0x1f/0x30
[ 53.927964][ T3506]
[ 53.930266][ T3506] Memory state around the buggy address:
[ 53.935867][ T3506] ffff888021c37900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 53.943989][ T3506] ffff888021c37980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 53.952023][ T3506] >ffff888021c37a00: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[ 53.960145][ T3506] ^
[ 53.967834][ T3506] ffff888021c37a80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 53.975867][ T3506] ffff888021c37b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 53.983909][ T3506] ==================================================================
[ 53.995391][ T3506] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 54.002595][ T3506] CPU: 1 PID: 3506 Comm: syz-executor400 Not tainted 6.1.45-syzkaller #0
[ 54.010987][ T3506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[ 54.021028][ T3506] Call Trace:
[ 54.024291][ T3506]
[ 54.027207][ T3506] dump_stack_lvl+0x1e3/0x2cb
[ 54.031868][ T3506] ? nf_tcp_handle_invalid+0x642/0x642
[ 54.037311][ T3506] ? panic+0x75d/0x75d
[ 54.041358][ T3506] ? preempt_schedule_common+0xa6/0xd0
[ 54.046796][ T3506] ? vscnprintf+0x59/0x80
[ 54.051119][ T3506] panic+0x318/0x75d
[ 54.054999][ T3506] ? check_panic_on_warn+0x1d/0xa0
[ 54.060101][ T3506] ? memcpy_page_flushcache+0xfc/0xfc
[ 54.065462][ T3506] ? _raw_spin_unlock_irqrestore+0x128/0x130
[ 54.071428][ T3506] ? _raw_spin_unlock+0x40/0x40
[ 54.076261][ T3506] ? print_report+0x4a3/0x4f0
[ 54.081005][ T3506] check_panic_on_warn+0x7e/0xa0
[ 54.085922][ T3506] ? ntfs_readdir+0xe9d/0x2b70
[ 54.090669][ T3506] end_report+0x66/0x110
[ 54.094891][ T3506] kasan_report+0x143/0x160
[ 54.099377][ T3506] ? ntfs_readdir+0xe9d/0x2b70
[ 54.104138][ T3506] ntfs_readdir+0xe9d/0x2b70
[ 54.108728][ T3506] ? read_lock_is_recursive+0x10/0x10
[ 54.114086][ T3506] ? rwsem_write_trylock+0x166/0x210
[ 54.119367][ T3506] ? __fdget_pos+0x2ba/0x360
[ 54.123949][ T3506] ? clear_nonspinnable+0x60/0x60
[ 54.128965][ T3506] ? ntfs_unmap_page+0x250/0x250
[ 54.133893][ T3506] ? common_file_perm+0x17d/0x1d0
[ 54.138904][ T3506] ? iterate_dir+0x131/0x560
[ 54.143481][ T3506] iterate_dir+0x224/0x560
[ 54.147887][ T3506] __se_sys_getdents64+0x209/0x4f0
[ 54.152987][ T3506] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 54.158966][ T3506] ? __x64_sys_getdents64+0x80/0x80
[ 54.164159][ T3506] ? filldir+0x6f0/0x6f0
[ 54.168394][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220
[ 54.174366][ T3506] ? lockdep_hardirqs_on+0x94/0x130
[ 54.179727][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220
[ 54.185698][ T3506] do_syscall_64+0x3d/0xb0
[ 54.190117][ T3506] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 54.196008][ T3506] RIP: 0033:0x7f0c5cb845f9
[ 54.200410][ T3506] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 54.220005][ T3506] RSP: 002b:00007ffcddaaab08 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 54.228410][ T3506] RAX: ffffffffffffffda RBX: 00007ffcddaaacd8 RCX: 00007f0c5cb845f9
[ 54.236366][ T3506] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004
[ 54.244326][ T3506] RBP: 00007f0c5cc16610 R08: 0000000000000000 R09: 00007ffcddaaacd8
[ 54.252288][ T3506] R10: 000000000001f1b8 R11: 0000000000000246 R12: 0000000000000001
[ 54.260246][ T3506] R13: 00007ffcddaaacc8 R14: 0000000000000001 R15: 0000000000000001
[ 54.268219][ T3506]
[ 54.271404][ T3506] Kernel Offset: disabled
[ 54.275714][ T3506] Rebooting in 86400 seconds..