Warning: Permanently added '10.128.1.147' (ED25519) to the list of known hosts. 2024/05/03 05:22:38 ignoring optional flag "sandboxArg"="0" 2024/05/03 05:22:39 parsed 1 programs 2024/05/03 05:22:39 executed programs: 0 [ 50.716491][ T1589] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 55.673680][ T2013] loop0: detected capacity change from 0 to 4096 [ 55.683547][ T2013] ntfs: (device loop0): check_mft_mirror(): Incomplete multi sector transfer detected in mft mirror record 0. [ 55.695501][ T2013] ntfs: (device loop0): load_system_files(): $MFTMirr does not match $MFT. Mounting read-only. Run ntfsfix and/or chkdsk. [ 55.709279][ T2013] ntfs: (device loop0): ntfs_read_locked_inode(): First extent of $DATA attribute has non zero lowest_vcn. [ 55.720933][ T2013] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -5. Marking corrupt inode 0xa as bad. Run chkdsk. [ 55.734875][ T2013] ntfs: (device loop0): load_and_init_upcase(): Failed to load $UpCase from the volume. Using default. [ 55.746789][ T2013] ntfs: volume version 3.1. [ 55.752193][ T2013] ntfs: (device loop0): ntfs_check_logfile(): Did not find any restart pages in $LogFile and it was not empty. [ 55.764071][ T2013] ntfs: (device loop0): load_system_files(): Failed to load $LogFile. Will not be able to remount read-write. Mount in Windows. [ 55.777907][ T2013] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Index entry out of bounds in directory inode 0x5. [ 55.789284][ T2013] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys. [ 55.800647][ T2013] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk. [ 55.816725][ T2013] ================================================================== [ 55.824892][ T2013] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xc1b/0x2d10 [ 55.832700][ T2013] Read of size 1 at addr ffff888078754b71 by task syz-executor.0/2013 [ 55.841094][ T2013] [ 55.843419][ T2013] CPU: 0 PID: 2013 Comm: syz-executor.0 Not tainted 6.1.90-syzkaller #0 [ 55.851720][ T2013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 55.861979][ T2013] Call Trace: [ 55.865283][ T2013] [ 55.868808][ T2013] dump_stack_lvl+0xf4/0x251 [ 55.873683][ T2013] ? nf_tcp_handle_invalid+0x2f3/0x2f3 [ 55.879488][ T2013] ? panic+0x3fe/0x3fe [ 55.883659][ T2013] ? lock_acquire+0xbe/0x390 [ 55.888331][ T2013] ? read_lock_is_recursive+0x10/0x10 [ 55.893710][ T2013] ? __virt_addr_valid+0x139/0x260 [ 55.898818][ T2013] ? __virt_addr_valid+0x211/0x260 [ 55.904129][ T2013] print_report+0x15f/0x4f0 [ 55.908742][ T2013] ? __virt_addr_valid+0x139/0x260 [ 55.913851][ T2013] ? __virt_addr_valid+0x211/0x260 [ 55.919125][ T2013] ? ntfs_readdir+0xc1b/0x2d10 [ 55.923884][ T2013] kasan_report+0x136/0x160 [ 55.928371][ T2013] ? ntfs_readdir+0xc1b/0x2d10 [ 55.933111][ T2013] ntfs_readdir+0xc1b/0x2d10 [ 55.937711][ T2013] ? __lock_acquire+0x607/0xb70 [ 55.942656][ T2013] ? __down_write_common+0x12a/0x1e0 [ 55.947935][ T2013] ? ntfs_unmap_page+0x120/0x120 [ 55.953153][ T2013] ? common_file_perm+0x130/0x1e0 [ 55.958279][ T2013] ? iterate_dir+0xf9/0x4f0 [ 55.962797][ T2013] iterate_dir+0x1fa/0x4f0 [ 55.967238][ T2013] __se_sys_getdents64+0x1af/0x3e0 [ 55.972351][ T2013] ? __x64_sys_getdents64+0x80/0x80 [ 55.977577][ T2013] ? filldir+0x570/0x570 [ 55.981803][ T2013] ? switch_fpu_return+0xc9/0x130 [ 55.986827][ T2013] do_syscall_64+0x3b/0x80 [ 55.991521][ T2013] ? clear_bhb_loop+0x45/0xa0 [ 55.996242][ T2013] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 56.002218][ T2013] RIP: 0033:0x7fe3d967dda9 [ 56.006622][ T2013] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 56.027363][ T2013] RSP: 002b:00007fe3da38e0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 56.036721][ T2013] RAX: ffffffffffffffda RBX: 00007fe3d97abf80 RCX: 00007fe3d967dda9 [ 56.044933][ T2013] RDX: 0000000000000ff9 RSI: 0000000020001280 RDI: 0000000000000004 [ 56.053972][ T2013] RBP: 00007fe3d96ca47a R08: 0000000000000000 R09: 0000000000000000 [ 56.062469][ T2013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 56.070771][ T2013] R13: 0000000000000006 R14: 00007fe3d97abf80 R15: 00007fff6348cf38 [ 56.078984][ T2013] [ 56.081986][ T2013] [ 56.084291][ T2013] Allocated by task 2013: [ 56.088600][ T2013] kasan_set_track+0x4b/0x70 [ 56.093276][ T2013] __kasan_kmalloc+0x97/0xb0 [ 56.097846][ T2013] __kmalloc+0xa6/0x1c0 [ 56.101978][ T2013] ntfs_readdir+0x5a8/0x2d10 [ 56.106546][ T2013] iterate_dir+0x1fa/0x4f0 [ 56.110930][ T2013] __se_sys_getdents64+0x1af/0x3e0 [ 56.116098][ T2013] do_syscall_64+0x3b/0x80 [ 56.120486][ T2013] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 56.126352][ T2013] [ 56.128656][ T2013] The buggy address belongs to the object at ffff888078754b00 [ 56.128656][ T2013] which belongs to the cache kmalloc-64 of size 64 [ 56.142650][ T2013] The buggy address is located 49 bytes to the right of [ 56.142650][ T2013] 64-byte region [ffff888078754b00, ffff888078754b40) [ 56.156625][ T2013] [ 56.158934][ T2013] The buggy address belongs to the physical page: [ 56.165420][ T2013] page:ffffea0001e1d500 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x78754 [ 56.175556][ T2013] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 56.183350][ T2013] raw: 00fff00000000200 ffffea0001e42c80 dead000000000004 ffff888008c41640 [ 56.192100][ T2013] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 56.200846][ T2013] page dumped because: kasan: bad access detected [ 56.207345][ T2013] page_owner tracks the page as allocated [ 56.213219][ T2013] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12c40(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY), pid 934, tgid 934 (udevd), ts 7716818443, free_ts 6356596460 [ 56.230474][ T2013] post_alloc_hook+0x286/0x2b0 [ 56.235218][ T2013] get_page_from_freelist+0x2fdd/0x3170 [ 56.240826][ T2013] __alloc_pages+0x251/0x640 [ 56.245407][ T2013] alloc_slab_page+0x6a/0x150 [ 56.250058][ T2013] new_slab+0x70/0x250 [ 56.254170][ T2013] ___slab_alloc+0x9df/0xe70 [ 56.258760][ T2013] __kmem_cache_alloc_node+0x195/0x250 [ 56.264390][ T2013] __kmalloc+0x95/0x1c0 [ 56.268705][ T2013] tomoyo_encode+0xa6/0x480 [ 56.273273][ T2013] tomoyo_realpath_from_path+0x4a2/0x4e0 [ 56.278985][ T2013] tomoyo_check_open_permission+0x242/0x950 [ 56.284853][ T2013] security_file_open+0x23/0x80 [ 56.289765][ T2013] do_dentry_open+0x2a5/0xe10 [ 56.294434][ T2013] path_openat+0x1e59/0x2410 [ 56.299095][ T2013] do_filp_open+0x226/0x430 [ 56.303678][ T2013] do_sys_openat2+0x10b/0x420 [ 56.308419][ T2013] page last free stack trace: [ 56.313078][ T2013] free_unref_page_prepare+0xd4b/0xee0 [ 56.318527][ T2013] free_unref_page+0x33/0x390 [ 56.323286][ T2013] free_contig_range+0x8d/0x130 [ 56.328138][ T2013] destroy_args+0xde/0x79f [ 56.332560][ T2013] debug_vm_pgtable+0x373/0x5ad [ 56.337404][ T2013] do_one_initcall+0x19f/0x4c0 [ 56.342180][ T2013] do_initcall_level+0x11e/0x1cd [ 56.347264][ T2013] do_initcalls+0x46/0x74 [ 56.351583][ T2013] kernel_init_freeable+0x375/0x4e4 [ 56.356781][ T2013] kernel_init+0x14/0x190 [ 56.361106][ T2013] ret_from_fork+0x1f/0x30 [ 56.365516][ T2013] [ 56.367822][ T2013] Memory state around the buggy address: [ 56.374681][ T2013] ffff888078754a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.383264][ T2013] ffff888078754a80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.391838][ T2013] >ffff888078754b00: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 56.400172][ T2013] ^ [ 56.407873][ T2013] ffff888078754b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.415939][ T2013] ffff888078754c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.424112][ T2013] ================================================================== [ 56.432968][ T2013] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 56.440576][ T2013] Kernel Offset: disabled [ 56.444916][ T2013] Rebooting in 86400 seconds..