Warning: Permanently added '10.128.0.160' (ED25519) to the list of known hosts. executing program [ 46.025290][ T4025] loop0: detected capacity change from 0 to 4096 [ 46.111779][ T4025] ntfs: (device loop0): check_mft_mirror(): Incomplete multi sector transfer detected in mft mirror record 0. [ 46.114708][ T4025] ntfs: (device loop0): load_system_files(): $MFTMirr does not match $MFT. Mounting read-only. Run ntfsfix and/or chkdsk. [ 46.118382][ T4025] ntfs: (device loop0): ntfs_read_locked_inode(): First extent of $DATA attribute has non zero lowest_vcn. [ 46.122401][ T4025] ntfs: (device loop0): ntfs_read_locked_inode(): Failed with error code -5. Marking corrupt inode 0xa as bad. Run chkdsk. [ 46.125753][ T4025] ntfs: (device loop0): load_and_init_upcase(): Failed to load $UpCase from the volume. Using default. [ 46.130728][ T4025] ntfs: volume version 3.1. [ 46.134765][ T4025] ntfs: (device loop0): ntfs_check_logfile(): Did not find any restart pages in $LogFile and it was not empty. [ 46.137753][ T4025] ntfs: (device loop0): load_system_files(): Failed to load $LogFile. Will not be able to remount read-write. Mount in Windows. [ 46.142123][ T4025] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Index entry out of bounds in directory inode 0x5. [ 46.144684][ T4025] ntfs: (device loop0): check_windows_hibernation_status(): Failed to find inode number for hiberfil.sys. [ 46.147364][ T4025] ntfs: (device loop0): load_system_files(): Failed to determine if Windows is hibernated. Will not be able to remount read-write. Run chkdsk. [ 46.152959][ T4025] ================================================================== [ 46.155001][ T4025] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xb60/0x2748 [ 46.156765][ T4025] Read of size 1 at addr ffff0000caf24271 by task syz-executor131/4025 [ 46.158820][ T4025] [ 46.159371][ T4025] CPU: 0 PID: 4025 Comm: syz-executor131 Not tainted 5.15.178-syzkaller #0 [ 46.161406][ T4025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 46.163895][ T4025] Call trace: [ 46.164630][ T4025] dump_backtrace+0x0/0x530 [ 46.165725][ T4025] show_stack+0x2c/0x3c [ 46.166662][ T4025] dump_stack_lvl+0x108/0x170 [ 46.167807][ T4025] print_address_description+0x7c/0x3f0 [ 46.169102][ T4025] kasan_report+0x174/0x1e4 [ 46.170274][ T4025] __asan_report_load1_noabort+0x44/0x50 [ 46.171654][ T4025] ntfs_readdir+0xb60/0x2748 [ 46.172814][ T4025] iterate_dir+0x1f4/0x4ec [ 46.173917][ T4025] __arm64_sys_getdents64+0x1c4/0x4c4 [ 46.175246][ T4025] invoke_syscall+0x98/0x2b8 [ 46.176450][ T4025] el0_svc_common+0x138/0x258 [ 46.177541][ T4025] do_el0_svc+0x58/0x14c [ 46.178580][ T4025] el0_svc+0x7c/0x1f0 [ 46.179562][ T4025] el0t_64_sync_handler+0x84/0xe4 [ 46.180732][ T4025] el0t_64_sync+0x1a0/0x1a4 [ 46.181758][ T4025] [ 46.182290][ T4025] Allocated by task 4025: [ 46.183351][ T4025] ____kasan_kmalloc+0xbc/0xfc [ 46.184456][ T4025] __kasan_kmalloc+0x10/0x1c [ 46.185556][ T4025] __kmalloc+0x29c/0x4c8 [ 46.186556][ T4025] ntfs_readdir+0x66c/0x2748 [ 46.187636][ T4025] iterate_dir+0x1f4/0x4ec [ 46.188659][ T4025] __arm64_sys_getdents64+0x1c4/0x4c4 [ 46.190058][ T4025] invoke_syscall+0x98/0x2b8 [ 46.191155][ T4025] el0_svc_common+0x138/0x258 [ 46.192282][ T4025] do_el0_svc+0x58/0x14c [ 46.193281][ T4025] el0_svc+0x7c/0x1f0 [ 46.194216][ T4025] el0t_64_sync_handler+0x84/0xe4 [ 46.195420][ T4025] el0t_64_sync+0x1a0/0x1a4 [ 46.196546][ T4025] [ 46.197101][ T4025] The buggy address belongs to the object at ffff0000caf24200 [ 46.197101][ T4025] which belongs to the cache kmalloc-128 of size 128 [ 46.200369][ T4025] The buggy address is located 113 bytes inside of [ 46.200369][ T4025] 128-byte region [ffff0000caf24200, ffff0000caf24280) [ 46.203684][ T4025] The buggy address belongs to the page: [ 46.205083][ T4025] page:000000001948f24b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10af24 [ 46.207580][ T4025] flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff) [ 46.209506][ T4025] raw: 05ffc00000000200 dead000000000100 dead000000000122 ffff0000c0002300 [ 46.211568][ T4025] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 46.213706][ T4025] page dumped because: kasan: bad access detected [ 46.215260][ T4025] [ 46.215825][ T4025] Memory state around the buggy address: [ 46.217259][ T4025] ffff0000caf24100: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 46.219252][ T4025] ffff0000caf24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.221254][ T4025] >ffff0000caf24200: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 46.223145][ T4025] ^ [ 46.225029][ T4025] ffff0000caf24280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.226941][ T4025] ffff0000caf24300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.228858][ T4025] ================================================================== [ 46.230772][ T4025] Disabling lock debugging due to kernel taint