Warning: Permanently added '10.128.1.167' (ECDSA) to the list of known hosts. executing program [ 39.152139][ T3499] loop0: detected capacity change from 0 to 4096 [ 39.162138][ T3499] ntfs: (device loop0): ntfs_is_extended_system_file(): Corrupt file name attribute. You should run chkdsk. [ 39.173658][ T3499] ntfs: (device loop0): ntfs_read_locked_inode(): $DATA attribute is missing. [ 39.182517][ T3499] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -2. Marking corrupt inode 0x1 as bad. Run chkdsk. [ 39.195765][ T3499] ntfs: (device loop0): load_system_files(): Failed to load $MFTMirr. Mounting read-only. Run ntfsfix and/or chkdsk. [ 39.215261][ T3499] ntfs: volume version 3.1. [ 39.221424][ T3499] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup. [ 39.231585][ T3499] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys. [ 39.243127][ T3499] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk. [ 39.263361][ T3499] ================================================================== [ 39.271544][ T3499] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xed5/0x36f0 [ 39.279023][ T3499] Read of size 1 at addr ffff88801cfeb0f1 by task syz-executor287/3499 [ 39.287264][ T3499] [ 39.289586][ T3499] CPU: 0 PID: 3499 Comm: syz-executor287 Not tainted 5.15.118-syzkaller #0 [ 39.298152][ T3499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 39.308187][ T3499] Call Trace: [ 39.311445][ T3499] [ 39.314356][ T3499] dump_stack_lvl+0x1e3/0x2cb [ 39.319040][ T3499] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 39.324648][ T3499] ? _printk+0xd1/0x111 [ 39.328784][ T3499] ? __wake_up_klogd+0xcc/0x100 [ 39.333609][ T3499] ? panic+0x84d/0x84d [ 39.337653][ T3499] ? _raw_spin_lock_irqsave+0xdd/0x120 [ 39.343094][ T3499] print_address_description+0x63/0x3b0 [ 39.348617][ T3499] ? ntfs_readdir+0xed5/0x36f0 [ 39.353355][ T3499] kasan_report+0x16b/0x1c0 [ 39.357836][ T3499] ? ntfs_readdir+0xed5/0x36f0 [ 39.362574][ T3499] ntfs_readdir+0xed5/0x36f0 [ 39.367152][ T3499] ? ntfs_unmap_page+0x1e0/0x1e0 [ 39.372070][ T3499] ? down_write+0x170/0x170 [ 39.376552][ T3499] ? common_file_perm+0x17d/0x1d0 [ 39.381555][ T3499] ? fsnotify_perm+0x438/0x5a0 [ 39.386297][ T3499] iterate_dir+0x224/0x570 [ 39.390692][ T3499] __se_sys_getdents64+0x209/0x4f0 [ 39.395784][ T3499] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 39.401743][ T3499] ? __x64_sys_getdents64+0x80/0x80 [ 39.406919][ T3499] ? filldir+0x720/0x720 [ 39.411138][ T3499] ? syscall_enter_from_user_mode+0x2e/0x230 [ 39.417095][ T3499] ? lockdep_hardirqs_on+0x94/0x130 [ 39.422270][ T3499] ? syscall_enter_from_user_mode+0x2e/0x230 [ 39.428226][ T3499] do_syscall_64+0x3d/0xb0 [ 39.432620][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.438489][ T3499] RIP: 0033:0x7fd976a437b9 [ 39.442886][ T3499] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 39.462561][ T3499] RSP: 002b:00007ffe4eb23988 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 39.470950][ T3499] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd976a437b9 [ 39.478898][ T3499] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004 [ 39.486848][ T3499] RBP: 00007fd976a03050 R08: 0000000000000000 R09: 0000000000000000 [ 39.494795][ T3499] R10: 000000000001f1b8 R11: 0000000000000246 R12: 00007fd976a030e0 [ 39.502749][ T3499] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 39.510717][ T3499] [ 39.513714][ T3499] [ 39.516023][ T3499] Allocated by task 3499: [ 39.520321][ T3499] ____kasan_kmalloc+0xba/0xf0 [ 39.525062][ T3499] __kmalloc+0x168/0x300 [ 39.529277][ T3499] ntfs_readdir+0x823/0x36f0 [ 39.533841][ T3499] iterate_dir+0x224/0x570 [ 39.538229][ T3499] __se_sys_getdents64+0x209/0x4f0 [ 39.543313][ T3499] do_syscall_64+0x3d/0xb0 [ 39.547702][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.553567][ T3499] [ 39.555867][ T3499] The buggy address belongs to the object at ffff88801cfeb080 [ 39.555867][ T3499] which belongs to the cache kmalloc-64 of size 64 [ 39.569716][ T3499] The buggy address is located 49 bytes to the right of [ 39.569716][ T3499] 64-byte region [ffff88801cfeb080, ffff88801cfeb0c0) [ 39.583308][ T3499] The buggy address belongs to the page: [ 39.588909][ T3499] page:ffffea000073fac0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1cfeb [ 39.599031][ T3499] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 39.606555][ T3499] raw: 00fff00000000200 ffffea000066e140 0000000200000002 ffff888011c41640 [ 39.615112][ T3499] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 39.623663][ T3499] page dumped because: kasan: bad access detected [ 39.630042][ T3499] page_owner tracks the page as allocated [ 39.635727][ T3499] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 9, ts 6332496693, free_ts 0 [ 39.650541][ T3499] get_page_from_freelist+0x322a/0x33c0 [ 39.656066][ T3499] __alloc_pages+0x272/0x700 [ 39.660629][ T3499] new_slab+0xbb/0x4b0 [ 39.664671][ T3499] ___slab_alloc+0x6f6/0xe10 [ 39.669231][ T3499] kmem_cache_alloc_node_trace+0x1ce/0x2e0 [ 39.675010][ T3499] __get_vm_area_node+0x11f/0x2f0 [ 39.680013][ T3499] __vmalloc_node_range+0xe3/0x8c0 [ 39.685096][ T3499] dup_task_struct+0x428/0xb60 [ 39.689836][ T3499] copy_process+0x5eb/0x3ef0 [ 39.694398][ T3499] kernel_clone+0x210/0x960 [ 39.698873][ T3499] kernel_thread+0x168/0x1e0 [ 39.703434][ T3499] call_usermodehelper_exec_work+0x58/0x220 [ 39.709299][ T3499] process_one_work+0x8a1/0x10c0 [ 39.714211][ T3499] worker_thread+0xaca/0x1280 [ 39.718866][ T3499] kthread+0x3f6/0x4f0 [ 39.722908][ T3499] ret_from_fork+0x1f/0x30 [ 39.727300][ T3499] page_owner free stack trace missing [ 39.732636][ T3499] [ 39.734934][ T3499] Memory state around the buggy address: [ 39.740534][ T3499] ffff88801cfeaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.748578][ T3499] ffff88801cfeb000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 39.756625][ T3499] >ffff88801cfeb080: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 39.764786][ T3499] ^ [ 39.772483][ T3499] ffff88801cfeb100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.780520][ T3499] ffff88801cfeb180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 39.788558][ T3499] ================================================================== [ 39.796591][ T3499] Disabling lock debugging due to kernel taint [ 39.802938][ T3499] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 39.810223][ T3499] CPU: 0 PID: 3499 Comm: syz-executor287 Tainted: G B 5.15.118-syzkaller #0 [ 39.820183][ T3499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 39.830220][ T3499] Call Trace: [ 39.833484][ T3499] [ 39.836396][ T3499] dump_stack_lvl+0x1e3/0x2cb [ 39.841055][ T3499] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 39.846661][ T3499] ? panic+0x84d/0x84d [ 39.850701][ T3499] ? rcu_is_watching+0x11/0xa0 [ 39.855440][ T3499] ? preempt_schedule_common+0xa6/0xd0 [ 39.860878][ T3499] panic+0x318/0x84d [ 39.864749][ T3499] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 39.870878][ T3499] ? check_panic_on_warn+0x1d/0xa0 [ 39.875964][ T3499] ? fb_is_primary_device+0xcc/0xcc [ 39.881135][ T3499] ? _raw_spin_unlock_irqrestore+0x128/0x130 [ 39.887087][ T3499] ? _raw_spin_unlock+0x40/0x40 [ 39.891911][ T3499] check_panic_on_warn+0x7e/0xa0 [ 39.896824][ T3499] ? ntfs_readdir+0xed5/0x36f0 [ 39.901561][ T3499] end_report+0x6d/0xf0 [ 39.905695][ T3499] kasan_report+0x18e/0x1c0 [ 39.910173][ T3499] ? ntfs_readdir+0xed5/0x36f0 [ 39.914910][ T3499] ntfs_readdir+0xed5/0x36f0 [ 39.919477][ T3499] ? ntfs_unmap_page+0x1e0/0x1e0 [ 39.924385][ T3499] ? down_write+0x170/0x170 [ 39.928862][ T3499] ? common_file_perm+0x17d/0x1d0 [ 39.933860][ T3499] ? fsnotify_perm+0x438/0x5a0 [ 39.938598][ T3499] iterate_dir+0x224/0x570 [ 39.942988][ T3499] __se_sys_getdents64+0x209/0x4f0 [ 39.948074][ T3499] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 39.954027][ T3499] ? __x64_sys_getdents64+0x80/0x80 [ 39.959221][ T3499] ? filldir+0x720/0x720 [ 39.963441][ T3499] ? syscall_enter_from_user_mode+0x2e/0x230 [ 39.969394][ T3499] ? lockdep_hardirqs_on+0x94/0x130 [ 39.974566][ T3499] ? syscall_enter_from_user_mode+0x2e/0x230 [ 39.980520][ T3499] do_syscall_64+0x3d/0xb0 [ 39.984909][ T3499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.990779][ T3499] RIP: 0033:0x7fd976a437b9 [ 39.995170][ T3499] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 40.014751][ T3499] RSP: 002b:00007ffe4eb23988 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 40.023151][ T3499] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd976a437b9 [ 40.031132][ T3499] RDX: 00000000000000ab RSI: 0000000020000080 RDI: 0000000000000004 [ 40.039076][ T3499] RBP: 00007fd976a03050 R08: 0000000000000000 R09: 0000000000000000 [ 40.047020][ T3499] R10: 000000000001f1b8 R11: 0000000000000246 R12: 00007fd976a030e0 [ 40.054973][ T3499] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 40.062930][ T3499] [ 40.066110][ T3499] Kernel Offset: disabled [ 40.070414][ T3499] Rebooting in 86400 seconds..