Warning: Permanently added '10.128.1.117' (ED25519) to the list of known hosts. executing program [ 53.274694][ T3506] loop0: detected capacity change from 0 to 4096 [ 53.284452][ T3506] ntfs: (device loop0): ntfs_is_extended_system_file(): Corrupt file name attribute. You should run chkdsk. [ 53.296079][ T3506] ntfs: (device loop0): ntfs_read_locked_inode(): $DATA attribute is missing. [ 53.305171][ T3506] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -2. Marking corrupt inode 0x1 as bad. Run chkdsk. [ 53.318219][ T3506] ntfs: (device loop0): load_system_files(): Failed to load $MFTMirr. Mounting read-only. Run ntfsfix and/or chkdsk. [ 53.336690][ T3506] ntfs: volume version 3.1. [ 53.342930][ T3506] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup. [ 53.352875][ T3506] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys. [ 53.364166][ T3506] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk. [ 53.387421][ T3506] ================================================================== [ 53.395498][ T3506] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xe9d/0x2b70 [ 53.402981][ T3506] Read of size 1 at addr ffff888021c37a71 by task syz-executor400/3506 [ 53.411210][ T3506] [ 53.413535][ T3506] CPU: 1 PID: 3506 Comm: syz-executor400 Not tainted 6.1.45-syzkaller #0 [ 53.421945][ T3506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 53.431979][ T3506] Call Trace: [ 53.435243][ T3506] [ 53.438157][ T3506] dump_stack_lvl+0x1e3/0x2cb [ 53.442826][ T3506] ? irq_work_queue+0xc6/0x150 [ 53.447570][ T3506] ? nf_tcp_handle_invalid+0x642/0x642 [ 53.453011][ T3506] ? panic+0x75d/0x75d [ 53.457062][ T3506] ? _printk+0xd1/0x111 [ 53.461195][ T3506] ? _raw_spin_lock_irqsave+0xac/0x120 [ 53.466642][ T3506] print_report+0x15f/0x4f0 [ 53.471122][ T3506] ? mutex_unlock+0x10/0x10 [ 53.475605][ T3506] ? __virt_addr_valid+0x22b/0x2e0 [ 53.480702][ T3506] ? __phys_addr+0xb6/0x170 [ 53.485184][ T3506] ? ntfs_readdir+0xe9d/0x2b70 [ 53.489928][ T3506] kasan_report+0x136/0x160 [ 53.494410][ T3506] ? ntfs_readdir+0xe9d/0x2b70 [ 53.499154][ T3506] ntfs_readdir+0xe9d/0x2b70 [ 53.503814][ T3506] ? read_lock_is_recursive+0x10/0x10 [ 53.509167][ T3506] ? rwsem_write_trylock+0x166/0x210 [ 53.514439][ T3506] ? __fdget_pos+0x2ba/0x360 [ 53.519008][ T3506] ? clear_nonspinnable+0x60/0x60 [ 53.524017][ T3506] ? ntfs_unmap_page+0x250/0x250 [ 53.528934][ T3506] ? common_file_perm+0x17d/0x1d0 [ 53.533966][ T3506] ? iterate_dir+0x131/0x560 [ 53.538534][ T3506] iterate_dir+0x224/0x560 [ 53.542928][ T3506] __se_sys_getdents64+0x209/0x4f0 [ 53.548021][ T3506] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.553986][ T3506] ? __x64_sys_getdents64+0x80/0x80 [ 53.559162][ T3506] ? filldir+0x6f0/0x6f0 [ 53.563387][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.569347][ T3506] ? lockdep_hardirqs_on+0x94/0x130 [ 53.574531][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.580495][ T3506] do_syscall_64+0x3d/0xb0 [ 53.584893][ T3506] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.590769][ T3506] RIP: 0033:0x7f0c5cb845f9 [ 53.595159][ T3506] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 53.614741][ T3506] RSP: 002b:00007ffcddaaab08 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 53.623138][ T3506] RAX: ffffffffffffffda RBX: 00007ffcddaaacd8 RCX: 00007f0c5cb845f9 [ 53.631088][ T3506] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004 [ 53.639039][ T3506] RBP: 00007f0c5cc16610 R08: 0000000000000000 R09: 00007ffcddaaacd8 [ 53.646993][ T3506] R10: 000000000001f1b8 R11: 0000000000000246 R12: 0000000000000001 [ 53.654942][ T3506] R13: 00007ffcddaaacc8 R14: 0000000000000001 R15: 0000000000000001 [ 53.662899][ T3506] [ 53.665897][ T3506] [ 53.668198][ T3506] Allocated by task 3506: [ 53.672497][ T3506] kasan_set_track+0x4b/0x70 [ 53.677069][ T3506] __kasan_kmalloc+0x97/0xb0 [ 53.681641][ T3506] __kmalloc+0xb2/0x230 [ 53.685770][ T3506] ntfs_readdir+0x825/0x2b70 [ 53.690428][ T3506] iterate_dir+0x224/0x560 [ 53.694818][ T3506] __se_sys_getdents64+0x209/0x4f0 [ 53.699910][ T3506] do_syscall_64+0x3d/0xb0 [ 53.704304][ T3506] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.710183][ T3506] [ 53.712483][ T3506] The buggy address belongs to the object at ffff888021c37a00 [ 53.712483][ T3506] which belongs to the cache kmalloc-64 of size 64 [ 53.726335][ T3506] The buggy address is located 49 bytes to the right of [ 53.726335][ T3506] 64-byte region [ffff888021c37a00, ffff888021c37a40) [ 53.739929][ T3506] [ 53.742230][ T3506] The buggy address belongs to the physical page: [ 53.748614][ T3506] page:ffffea0000870dc0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21c37 [ 53.758826][ T3506] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 53.766354][ T3506] raw: 00fff00000000200 ffffea00008a3180 dead000000000004 ffff888012441640 [ 53.774914][ T3506] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 53.783474][ T3506] page dumped because: kasan: bad access detected [ 53.789859][ T3506] page_owner tracks the page as allocated [ 53.795547][ T3506] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1258, tgid 1258 (kworker/u4:5), ts 8269004462, free_ts 8268058983 [ 53.813666][ T3506] post_alloc_hook+0x18d/0x1b0 [ 53.818417][ T3506] get_page_from_freelist+0x32ed/0x3480 [ 53.823940][ T3506] __alloc_pages+0x28d/0x770 [ 53.828506][ T3506] alloc_slab_page+0x6a/0x150 [ 53.833158][ T3506] new_slab+0x84/0x2d0 [ 53.837203][ T3506] ___slab_alloc+0xa71/0x1080 [ 53.841856][ T3506] __kmem_cache_alloc_node+0x19f/0x260 [ 53.847294][ T3506] __kmalloc+0xa1/0x230 [ 53.851423][ T3506] security_task_alloc+0x3f/0x120 [ 53.856422][ T3506] copy_process+0x17ea/0x4020 [ 53.861086][ T3506] kernel_clone+0x222/0x920 [ 53.865564][ T3506] user_mode_thread+0x12e/0x190 [ 53.870391][ T3506] call_usermodehelper_exec_work+0x58/0x220 [ 53.876262][ T3506] process_one_work+0x8aa/0x11f0 [ 53.881176][ T3506] worker_thread+0xa5f/0x1210 [ 53.885830][ T3506] kthread+0x26e/0x300 [ 53.889876][ T3506] page last free stack trace: [ 53.894521][ T3506] free_unref_page_prepare+0xf63/0x1120 [ 53.900045][ T3506] free_unref_page+0x98/0x570 [ 53.904698][ T3506] __mmdrop+0xb2/0x470 [ 53.908743][ T3506] free_bprm+0x135/0x2f0 [ 53.912961][ T3506] kernel_execve+0x8f1/0xa10 [ 53.917526][ T3506] call_usermodehelper_exec_async+0x22f/0x370 [ 53.923568][ T3506] ret_from_fork+0x1f/0x30 [ 53.927964][ T3506] [ 53.930266][ T3506] Memory state around the buggy address: [ 53.935867][ T3506] ffff888021c37900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.943989][ T3506] ffff888021c37980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 53.952023][ T3506] >ffff888021c37a00: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 53.960145][ T3506] ^ [ 53.967834][ T3506] ffff888021c37a80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 53.975867][ T3506] ffff888021c37b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 53.983909][ T3506] ================================================================== [ 53.995391][ T3506] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 54.002595][ T3506] CPU: 1 PID: 3506 Comm: syz-executor400 Not tainted 6.1.45-syzkaller #0 [ 54.010987][ T3506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 54.021028][ T3506] Call Trace: [ 54.024291][ T3506] [ 54.027207][ T3506] dump_stack_lvl+0x1e3/0x2cb [ 54.031868][ T3506] ? nf_tcp_handle_invalid+0x642/0x642 [ 54.037311][ T3506] ? panic+0x75d/0x75d [ 54.041358][ T3506] ? preempt_schedule_common+0xa6/0xd0 [ 54.046796][ T3506] ? vscnprintf+0x59/0x80 [ 54.051119][ T3506] panic+0x318/0x75d [ 54.054999][ T3506] ? check_panic_on_warn+0x1d/0xa0 [ 54.060101][ T3506] ? memcpy_page_flushcache+0xfc/0xfc [ 54.065462][ T3506] ? _raw_spin_unlock_irqrestore+0x128/0x130 [ 54.071428][ T3506] ? _raw_spin_unlock+0x40/0x40 [ 54.076261][ T3506] ? print_report+0x4a3/0x4f0 [ 54.081005][ T3506] check_panic_on_warn+0x7e/0xa0 [ 54.085922][ T3506] ? ntfs_readdir+0xe9d/0x2b70 [ 54.090669][ T3506] end_report+0x66/0x110 [ 54.094891][ T3506] kasan_report+0x143/0x160 [ 54.099377][ T3506] ? ntfs_readdir+0xe9d/0x2b70 [ 54.104138][ T3506] ntfs_readdir+0xe9d/0x2b70 [ 54.108728][ T3506] ? read_lock_is_recursive+0x10/0x10 [ 54.114086][ T3506] ? rwsem_write_trylock+0x166/0x210 [ 54.119367][ T3506] ? __fdget_pos+0x2ba/0x360 [ 54.123949][ T3506] ? clear_nonspinnable+0x60/0x60 [ 54.128965][ T3506] ? ntfs_unmap_page+0x250/0x250 [ 54.133893][ T3506] ? common_file_perm+0x17d/0x1d0 [ 54.138904][ T3506] ? iterate_dir+0x131/0x560 [ 54.143481][ T3506] iterate_dir+0x224/0x560 [ 54.147887][ T3506] __se_sys_getdents64+0x209/0x4f0 [ 54.152987][ T3506] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 54.158966][ T3506] ? __x64_sys_getdents64+0x80/0x80 [ 54.164159][ T3506] ? filldir+0x6f0/0x6f0 [ 54.168394][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220 [ 54.174366][ T3506] ? lockdep_hardirqs_on+0x94/0x130 [ 54.179727][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220 [ 54.185698][ T3506] do_syscall_64+0x3d/0xb0 [ 54.190117][ T3506] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 54.196008][ T3506] RIP: 0033:0x7f0c5cb845f9 [ 54.200410][ T3506] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.220005][ T3506] RSP: 002b:00007ffcddaaab08 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 54.228410][ T3506] RAX: ffffffffffffffda RBX: 00007ffcddaaacd8 RCX: 00007f0c5cb845f9 [ 54.236366][ T3506] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004 [ 54.244326][ T3506] RBP: 00007f0c5cc16610 R08: 0000000000000000 R09: 00007ffcddaaacd8 [ 54.252288][ T3506] R10: 000000000001f1b8 R11: 0000000000000246 R12: 0000000000000001 [ 54.260246][ T3506] R13: 00007ffcddaaacc8 R14: 0000000000000001 R15: 0000000000000001 [ 54.268219][ T3506] [ 54.271404][ T3506] Kernel Offset: disabled [ 54.275714][ T3506] Rebooting in 86400 seconds..