Warning: Permanently added '10.128.1.167' (ECDSA) to the list of known hosts.
executing program
[ 39.152139][ T3499] loop0: detected capacity change from 0 to 4096
[ 39.162138][ T3499] ntfs: (device loop0): ntfs_is_extended_system_file(): Corrupt file name attribute. You should run chkdsk.
[ 39.173658][ T3499] ntfs: (device loop0): ntfs_read_locked_inode(): $DATA attribute is missing.
[ 39.182517][ T3499] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -2. Marking corrupt inode 0x1 as bad. Run chkdsk.
[ 39.195765][ T3499] ntfs: (device loop0): load_system_files(): Failed to load $MFTMirr. Mounting read-only. Run ntfsfix and/or chkdsk.
[ 39.215261][ T3499] ntfs: volume version 3.1.
[ 39.221424][ T3499] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup.
[ 39.231585][ T3499] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys.
[ 39.243127][ T3499] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk.
[ 39.263361][ T3499] ==================================================================
[ 39.271544][ T3499] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xed5/0x36f0
[ 39.279023][ T3499] Read of size 1 at addr ffff88801cfeb0f1 by task syz-executor287/3499
[ 39.287264][ T3499]
[ 39.289586][ T3499] CPU: 0 PID: 3499 Comm: syz-executor287 Not tainted 5.15.118-syzkaller #0
[ 39.298152][ T3499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
[ 39.308187][ T3499] Call Trace:
[ 39.311445][ T3499]
[ 39.314356][ T3499] dump_stack_lvl+0x1e3/0x2cb
[ 39.319040][ T3499] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 39.324648][ T3499] ? _printk+0xd1/0x111
[ 39.328784][ T3499] ? __wake_up_klogd+0xcc/0x100
[ 39.333609][ T3499] ? panic+0x84d/0x84d
[ 39.337653][ T3499] ? _raw_spin_lock_irqsave+0xdd/0x120
[ 39.343094][ T3499] print_address_description+0x63/0x3b0
[ 39.348617][ T3499] ? ntfs_readdir+0xed5/0x36f0
[ 39.353355][ T3499] kasan_report+0x16b/0x1c0
[ 39.357836][ T3499] ? ntfs_readdir+0xed5/0x36f0
[ 39.362574][ T3499] ntfs_readdir+0xed5/0x36f0
[ 39.367152][ T3499] ? ntfs_unmap_page+0x1e0/0x1e0
[ 39.372070][ T3499] ? down_write+0x170/0x170
[ 39.376552][ T3499] ? common_file_perm+0x17d/0x1d0
[ 39.381555][ T3499] ? fsnotify_perm+0x438/0x5a0
[ 39.386297][ T3499] iterate_dir+0x224/0x570
[ 39.390692][ T3499] __se_sys_getdents64+0x209/0x4f0
[ 39.395784][ T3499] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 39.401743][ T3499] ? __x64_sys_getdents64+0x80/0x80
[ 39.406919][ T3499] ? filldir+0x720/0x720
[ 39.411138][ T3499] ? syscall_enter_from_user_mode+0x2e/0x230
[ 39.417095][ T3499] ? lockdep_hardirqs_on+0x94/0x130
[ 39.422270][ T3499] ? syscall_enter_from_user_mode+0x2e/0x230
[ 39.428226][ T3499] do_syscall_64+0x3d/0xb0
[ 39.432620][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 39.438489][ T3499] RIP: 0033:0x7fd976a437b9
[ 39.442886][ T3499] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 39.462561][ T3499] RSP: 002b:00007ffe4eb23988 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 39.470950][ T3499] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd976a437b9
[ 39.478898][ T3499] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004
[ 39.486848][ T3499] RBP: 00007fd976a03050 R08: 0000000000000000 R09: 0000000000000000
[ 39.494795][ T3499] R10: 000000000001f1b8 R11: 0000000000000246 R12: 00007fd976a030e0
[ 39.502749][ T3499] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 39.510717][ T3499]
[ 39.513714][ T3499]
[ 39.516023][ T3499] Allocated by task 3499:
[ 39.520321][ T3499] ____kasan_kmalloc+0xba/0xf0
[ 39.525062][ T3499] __kmalloc+0x168/0x300
[ 39.529277][ T3499] ntfs_readdir+0x823/0x36f0
[ 39.533841][ T3499] iterate_dir+0x224/0x570
[ 39.538229][ T3499] __se_sys_getdents64+0x209/0x4f0
[ 39.543313][ T3499] do_syscall_64+0x3d/0xb0
[ 39.547702][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 39.553567][ T3499]
[ 39.555867][ T3499] The buggy address belongs to the object at ffff88801cfeb080
[ 39.555867][ T3499] which belongs to the cache kmalloc-64 of size 64
[ 39.569716][ T3499] The buggy address is located 49 bytes to the right of
[ 39.569716][ T3499] 64-byte region [ffff88801cfeb080, ffff88801cfeb0c0)
[ 39.583308][ T3499] The buggy address belongs to the page:
[ 39.588909][ T3499] page:ffffea000073fac0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1cfeb
[ 39.599031][ T3499] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 39.606555][ T3499] raw: 00fff00000000200 ffffea000066e140 0000000200000002 ffff888011c41640
[ 39.615112][ T3499] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[ 39.623663][ T3499] page dumped because: kasan: bad access detected
[ 39.630042][ T3499] page_owner tracks the page as allocated
[ 39.635727][ T3499] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 9, ts 6332496693, free_ts 0
[ 39.650541][ T3499] get_page_from_freelist+0x322a/0x33c0
[ 39.656066][ T3499] __alloc_pages+0x272/0x700
[ 39.660629][ T3499] new_slab+0xbb/0x4b0
[ 39.664671][ T3499] ___slab_alloc+0x6f6/0xe10
[ 39.669231][ T3499] kmem_cache_alloc_node_trace+0x1ce/0x2e0
[ 39.675010][ T3499] __get_vm_area_node+0x11f/0x2f0
[ 39.680013][ T3499] __vmalloc_node_range+0xe3/0x8c0
[ 39.685096][ T3499] dup_task_struct+0x428/0xb60
[ 39.689836][ T3499] copy_process+0x5eb/0x3ef0
[ 39.694398][ T3499] kernel_clone+0x210/0x960
[ 39.698873][ T3499] kernel_thread+0x168/0x1e0
[ 39.703434][ T3499] call_usermodehelper_exec_work+0x58/0x220
[ 39.709299][ T3499] process_one_work+0x8a1/0x10c0
[ 39.714211][ T3499] worker_thread+0xaca/0x1280
[ 39.718866][ T3499] kthread+0x3f6/0x4f0
[ 39.722908][ T3499] ret_from_fork+0x1f/0x30
[ 39.727300][ T3499] page_owner free stack trace missing
[ 39.732636][ T3499]
[ 39.734934][ T3499] Memory state around the buggy address:
[ 39.740534][ T3499] ffff88801cfeaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.748578][ T3499] ffff88801cfeb000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 39.756625][ T3499] >ffff88801cfeb080: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[ 39.764786][ T3499] ^
[ 39.772483][ T3499] ffff88801cfeb100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 39.780520][ T3499] ffff88801cfeb180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 39.788558][ T3499] ==================================================================
[ 39.796591][ T3499] Disabling lock debugging due to kernel taint
[ 39.802938][ T3499] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 39.810223][ T3499] CPU: 0 PID: 3499 Comm: syz-executor287 Tainted: G B 5.15.118-syzkaller #0
[ 39.820183][ T3499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
[ 39.830220][ T3499] Call Trace:
[ 39.833484][ T3499]
[ 39.836396][ T3499] dump_stack_lvl+0x1e3/0x2cb
[ 39.841055][ T3499] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 39.846661][ T3499] ? panic+0x84d/0x84d
[ 39.850701][ T3499] ? rcu_is_watching+0x11/0xa0
[ 39.855440][ T3499] ? preempt_schedule_common+0xa6/0xd0
[ 39.860878][ T3499] panic+0x318/0x84d
[ 39.864749][ T3499] ? asm_sysvec_apic_timer_interrupt+0x16/0x20
[ 39.870878][ T3499] ? check_panic_on_warn+0x1d/0xa0
[ 39.875964][ T3499] ? fb_is_primary_device+0xcc/0xcc
[ 39.881135][ T3499] ? _raw_spin_unlock_irqrestore+0x128/0x130
[ 39.887087][ T3499] ? _raw_spin_unlock+0x40/0x40
[ 39.891911][ T3499] check_panic_on_warn+0x7e/0xa0
[ 39.896824][ T3499] ? ntfs_readdir+0xed5/0x36f0
[ 39.901561][ T3499] end_report+0x6d/0xf0
[ 39.905695][ T3499] kasan_report+0x18e/0x1c0
[ 39.910173][ T3499] ? ntfs_readdir+0xed5/0x36f0
[ 39.914910][ T3499] ntfs_readdir+0xed5/0x36f0
[ 39.919477][ T3499] ? ntfs_unmap_page+0x1e0/0x1e0
[ 39.924385][ T3499] ? down_write+0x170/0x170
[ 39.928862][ T3499] ? common_file_perm+0x17d/0x1d0
[ 39.933860][ T3499] ? fsnotify_perm+0x438/0x5a0
[ 39.938598][ T3499] iterate_dir+0x224/0x570
[ 39.942988][ T3499] __se_sys_getdents64+0x209/0x4f0
[ 39.948074][ T3499] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 39.954027][ T3499] ? __x64_sys_getdents64+0x80/0x80
[ 39.959221][ T3499] ? filldir+0x720/0x720
[ 39.963441][ T3499] ? syscall_enter_from_user_mode+0x2e/0x230
[ 39.969394][ T3499] ? lockdep_hardirqs_on+0x94/0x130
[ 39.974566][ T3499] ? syscall_enter_from_user_mode+0x2e/0x230
[ 39.980520][ T3499] do_syscall_64+0x3d/0xb0
[ 39.984909][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 39.990779][ T3499] RIP: 0033:0x7fd976a437b9
[ 39.995170][ T3499] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 40.014751][ T3499] RSP: 002b:00007ffe4eb23988 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 40.023151][ T3499] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd976a437b9
[ 40.031132][ T3499] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004
[ 40.039076][ T3499] RBP: 00007fd976a03050 R08: 0000000000000000 R09: 0000000000000000
[ 40.047020][ T3499] R10: 000000000001f1b8 R11: 0000000000000246 R12: 00007fd976a030e0
[ 40.054973][ T3499] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 40.062930][ T3499]
[ 40.066110][ T3499] Kernel Offset: disabled
[ 40.070414][ T3499] Rebooting in 86400 seconds..