Warning: Permanently added '10.128.0.54' (ED25519) to the list of known hosts. [ 35.427271][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 35.429350][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 35.432764][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 35.444165][ T174] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 35.446302][ T174] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 35.448810][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready executing program [ 35.483436][ T4222] loop0: detected capacity change from 0 to 4096 [ 35.486683][ T4222] ntfs: (device loop0): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 35.503695][ T4222] ntfs: volume version 3.1. [ 35.510427][ T4222] ================================================================== [ 35.512620][ T4222] BUG: KASAN: use-after-free in ntfs_perform_write+0x4288/0x6ef4 [ 35.514686][ T4222] Write of size 1 at addr ffff0000e12fe170 by task syz-executor432/4222 [ 35.516893][ T4222] [ 35.517493][ T4222] CPU: 0 PID: 4222 Comm: syz-executor432 Not tainted 6.1.89-syzkaller #0 [ 35.519720][ T4222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 35.522400][ T4222] Call trace: [ 35.523273][ T4222] dump_backtrace+0x1c8/0x1f4 [ 35.524545][ T4222] show_stack+0x2c/0x3c [ 35.525709][ T4222] dump_stack_lvl+0x108/0x170 [ 35.527062][ T4222] print_report+0x174/0x4c0 [ 35.528293][ T4222] kasan_report+0xd4/0x130 [ 35.529429][ T4222] kasan_check_range+0x264/0x2a4 [ 35.530755][ T4222] memcpy+0x60/0x90 [ 35.531775][ T4222] ntfs_perform_write+0x4288/0x6ef4 [ 35.533198][ T4222] ntfs_file_write_iter+0xf78/0x17b0 [ 35.534688][ T4222] vfs_write+0x610/0x914 [ 35.535810][ T4222] ksys_write+0x15c/0x26c [ 35.537047][ T4222] __arm64_sys_write+0x7c/0x90 [ 35.538370][ T4222] invoke_syscall+0x98/0x2c0 [ 35.539614][ T4222] el0_svc_common+0x138/0x258 [ 35.540827][ T4222] do_el0_svc+0x64/0x218 [ 35.541913][ T4222] el0_svc+0x58/0x168 [ 35.542949][ T4222] el0t_64_sync_handler+0x84/0xf0 [ 35.544270][ T4222] el0t_64_sync+0x18c/0x190 [ 35.545473][ T4222] [ 35.546070][ T4222] The buggy address belongs to the physical page: [ 35.547762][ T4222] page:00000000a3002a9a refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x1212fe [ 35.550596][ T4222] flags: 0x5ffe00000000000(node=0|zone=2|lastcpupid=0xfff) [ 35.552536][ T4222] raw: 05ffe00000000000 fffffc0003836248 fffffc00038523c8 0000000000000000 [ 35.554761][ T4222] raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 [ 35.557077][ T4222] page dumped because: kasan: bad access detected [ 35.558824][ T4222] [ 35.559423][ T4222] Memory state around the buggy address: [ 35.560904][ T4222] ffff0000e12fe000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.563026][ T4222] ffff0000e12fe080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.565146][ T4222] >ffff0000e12fe100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.567276][ T4222] ^ [ 35.569330][ T4222] ffff0000e12fe180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.571478][ T4222] ffff0000e12fe200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.573634][ T4222] ================================================================== [ 35.575914][ T4222] Disabling lock debugging due to kernel taint