Warning: Permanently added '10.128.1.66' (ED25519) to the list of known hosts. executing program [ 51.779354][ T4018] loop0: detected capacity change from 0 to 4096 [ 51.865012][ T4018] ntfs: (device loop0): check_mft_mirror(): Incomplete multi sector transfer detected in mft mirror record 0. [ 51.867918][ T4018] ntfs: (device loop0): load_system_files(): $MFTMirr does not match $MFT. Mounting read-only. Run ntfsfix and/or chkdsk. [ 51.871693][ T4018] ntfs: (device loop0): ntfs_read_locked_inode(): First extent of $DATA attribute has non zero lowest_vcn. [ 51.875244][ T4018] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -5. Marking corrupt inode 0xa as bad. Run chkdsk. [ 51.878815][ T4018] ntfs: (device loop0): load_and_init_upcase(): Failed to load $UpCase from the volume. Using default. [ 51.884694][ T4018] ntfs: volume version 3.1. [ 51.888875][ T4018] ntfs: (device loop0): ntfs_check_logfile(): Did not find any restart pages in $LogFile and it was not empty. [ 51.892730][ T4018] ntfs: (device loop0): load_system_files(): Failed to load $LogFile. Will not be able to remount read-write. Mount in Windows. [ 51.896891][ T4018] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Index entry out of bounds in directory inode 0x5. [ 51.899732][ T4018] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys. [ 51.902933][ T4018] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk. [ 51.909215][ T4018] ================================================================== [ 51.911451][ T4018] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xb60/0x2748 [ 51.913404][ T4018] Read of size 1 at addr ffff0000cc6ff171 by task syz-executor425/4018 [ 51.915487][ T4018] [ 51.916038][ T4018] CPU: 1 PID: 4018 Comm: syz-executor425 Not tainted 5.15.178-syzkaller #0 [ 51.918327][ T4018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 51.920959][ T4018] Call trace: [ 51.921779][ T4018] dump_backtrace+0x0/0x530 [ 51.922909][ T4018] show_stack+0x2c/0x3c [ 51.924019][ T4018] dump_stack_lvl+0x108/0x170 [ 51.925248][ T4018] print_address_description+0x7c/0x3f0 [ 51.926665][ T4018] kasan_report+0x174/0x1e4 [ 51.927819][ T4018] __asan_report_load1_noabort+0x44/0x50 [ 51.929243][ T4018] ntfs_readdir+0xb60/0x2748 [ 51.930439][ T4018] iterate_dir+0x1f4/0x4ec [ 51.931480][ T4018] __arm64_sys_getdents64+0x1c4/0x4c4 [ 51.932834][ T4018] invoke_syscall+0x98/0x2b8 [ 51.934033][ T4018] el0_svc_common+0x138/0x258 [ 51.935294][ T4018] do_el0_svc+0x58/0x14c [ 51.936418][ T4018] el0_svc+0x7c/0x1f0 [ 51.937427][ T4018] el0t_64_sync_handler+0x84/0xe4 [ 51.938732][ T4018] el0t_64_sync+0x1a0/0x1a4 [ 51.939887][ T4018] [ 51.940475][ T4018] Allocated by task 4018: [ 51.941527][ T4018] ____kasan_kmalloc+0xbc/0xfc [ 51.942710][ T4018] __kasan_kmalloc+0x10/0x1c [ 51.943843][ T4018] __kmalloc+0x29c/0x4c8 [ 51.944947][ T4018] ntfs_readdir+0x66c/0x2748 [ 51.946141][ T4018] iterate_dir+0x1f4/0x4ec [ 51.947292][ T4018] __arm64_sys_getdents64+0x1c4/0x4c4 [ 51.948659][ T4018] invoke_syscall+0x98/0x2b8 [ 51.949844][ T4018] el0_svc_common+0x138/0x258 [ 51.951027][ T4018] do_el0_svc+0x58/0x14c [ 51.952136][ T4018] el0_svc+0x7c/0x1f0 [ 51.953167][ T4018] el0t_64_sync_handler+0x84/0xe4 [ 51.954457][ T4018] el0t_64_sync+0x1a0/0x1a4 [ 51.955603][ T4018] [ 51.956192][ T4018] The buggy address belongs to the object at ffff0000cc6ff100 [ 51.956192][ T4018] which belongs to the cache kmalloc-128 of size 128 [ 51.960902][ T4018] The buggy address is located 113 bytes inside of [ 51.960902][ T4018] 128-byte region [ffff0000cc6ff100, ffff0000cc6ff180) [ 51.964310][ T4018] The buggy address belongs to the page: [ 51.965785][ T4018] page:000000004d056af8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c6ff [ 51.968376][ T4018] flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff) [ 51.970299][ T4018] raw: 05ffc00000000200 0000000000000000 0000000c00000001 ffff0000c0002300 [ 51.972425][ T4018] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 51.974510][ T4018] page dumped because: kasan: bad access detected [ 51.976068][ T4018] [ 51.976621][ T4018] Memory state around the buggy address: [ 51.977990][ T4018] ffff0000cc6ff000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.980085][ T4018] ffff0000cc6ff080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.982110][ T4018] >ffff0000cc6ff100: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 51.984173][ T4018] ^ [ 51.986137][ T4018] ffff0000cc6ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.988187][ T4018] ffff0000cc6ff200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.990313][ T4018] ================================================================== [ 51.992354][ T4018] Disabling lock debugging due to kernel taint