Warning: Permanently added '10.128.0.46' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 43.157119][ T4215] loop0: detected capacity change from 0 to 4096 [ 43.166468][ T4215] ntfs: (device loop0): ntfs_is_extended_system_file(): Corrupt file name attribute. You should run chkdsk. [ 43.169096][ T4215] ntfs: (device loop0): ntfs_read_locked_inode(): $DATA attribute is missing. [ 43.171008][ T4215] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -2. Marking corrupt inode 0x1 as bad. Run chkdsk. [ 43.173925][ T4215] ntfs: (device loop0): load_system_files(): Failed to load $MFTMirr. Mounting read-only. Run ntfsfix and/or chkdsk. [ 43.182171][ T4215] ntfs: volume version 3.1. [ 43.184546][ T4215] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup. [ 43.186734][ T4215] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys. [ 43.189246][ T4215] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk. [ 43.194535][ T4215] ================================================================== [ 43.196475][ T4215] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xb00/0x2be8 [ 43.198275][ T4215] Read of size 1 at addr ffff0000c402f371 by task syz-executor175/4215 [ 43.200136][ T4215] [ 43.200600][ T4215] CPU: 1 PID: 4215 Comm: syz-executor175 Not tainted 6.1.32-syzkaller #0 [ 43.202542][ T4215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 43.204757][ T4215] Call trace: [ 43.205487][ T4215] dump_backtrace+0x1c8/0x1f4 [ 43.206596][ T4215] show_stack+0x2c/0x3c [ 43.207518][ T4215] dump_stack_lvl+0x108/0x170 [ 43.208594][ T4215] print_report+0x174/0x4c0 [ 43.209722][ T4215] kasan_report+0xd4/0x130 [ 43.210823][ T4215] __asan_report_load1_noabort+0x2c/0x38 [ 43.212194][ T4215] ntfs_readdir+0xb00/0x2be8 [ 43.213284][ T4215] iterate_dir+0x1f4/0x4e4 [ 43.214252][ T4215] __arm64_sys_getdents64+0x1c4/0x4a0 [ 43.215471][ T4215] invoke_syscall+0x98/0x2c0 [ 43.216520][ T4215] el0_svc_common+0x138/0x258 [ 43.217551][ T4215] do_el0_svc+0x64/0x218 [ 43.218639][ T4215] el0_svc+0x58/0x168 [ 43.219528][ T4215] el0t_64_sync_handler+0x84/0xf0 [ 43.220747][ T4215] el0t_64_sync+0x18c/0x190 [ 43.221788][ T4215] [ 43.222324][ T4215] Allocated by task 4215: [ 43.223285][ T4215] kasan_set_track+0x4c/0x80 [ 43.224317][ T4215] kasan_save_alloc_info+0x24/0x30 [ 43.225495][ T4215] __kasan_kmalloc+0xac/0xc4 [ 43.226669][ T4215] __kmalloc+0xd8/0x1c4 [ 43.227616][ T4215] ntfs_readdir+0x65c/0x2be8 [ 43.228702][ T4215] iterate_dir+0x1f4/0x4e4 [ 43.229677][ T4215] __arm64_sys_getdents64+0x1c4/0x4a0 [ 43.230912][ T4215] invoke_syscall+0x98/0x2c0 [ 43.231916][ T4215] el0_svc_common+0x138/0x258 [ 43.232929][ T4215] do_el0_svc+0x64/0x218 [ 43.233869][ T4215] el0_svc+0x58/0x168 [ 43.234808][ T4215] el0t_64_sync_handler+0x84/0xf0 [ 43.235921][ T4215] el0t_64_sync+0x18c/0x190 [ 43.236937][ T4215] [ 43.237450][ T4215] The buggy address belongs to the object at ffff0000c402f300 [ 43.237450][ T4215] which belongs to the cache kmalloc-128 of size 128 [ 43.240670][ T4215] The buggy address is located 113 bytes inside of [ 43.240670][ T4215] 128-byte region [ffff0000c402f300, ffff0000c402f380) [ 43.243796][ T4215] [ 43.244376][ T4215] The buggy address belongs to the physical page: [ 43.245919][ T4215] page:00000000729a9d4d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f [ 43.248277][ T4215] flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff) [ 43.250008][ T4215] raw: 05ffc00000000200 dead000000000100 dead000000000122 ffff0000c0002300 [ 43.251970][ T4215] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 43.254025][ T4215] page dumped because: kasan: bad access detected [ 43.255529][ T4215] [ 43.256059][ T4215] Memory state around the buggy address: [ 43.257354][ T4215] ffff0000c402f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.259125][ T4215] ffff0000c402f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.261086][ T4215] >ffff0000c402f300: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 43.262917][ T4215] ^ [ 43.264730][ T4215] ffff0000c402f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.266557][ T4215] ffff0000c402f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.268277][ T4215] ================================================================== [ 43.270232][ T4215] Disabling lock debugging due to kernel taint