Warning: Permanently added '10.128.1.105' (ED25519) to the list of known hosts.
executing program
[ 62.497151][ T4164] loop0: detected capacity change from 0 to 4096
[ 62.603545][ T4164] ntfs: (device loop0): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1.
[ 62.632569][ T4164] ntfs: volume version 3.1.
[ 62.639910][ T4164] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup.
[ 62.649892][ T4164] ntfs: (device loop0): load_and_init_usnjrnl(): Failed to find inode number for $UsnJrnl.
[ 62.659961][ T4164] ntfs: (device loop0): load_system_files(): Failed to load $UsnJrnl. Mounting read-only. Run chkdsk.
[ 62.684651][ T4163] ntfs: (device loop0): ntfs_ucstonls(): Unicode name contains characters that cannot be converted to character set maccenteuro. You might want to try to use the mount option nls=utf8.
[ 62.703565][ T4163] ntfs: (device loop0): ntfs_filldir(): Skipping unrepresentable inode 0x4.
[ 62.717033][ T4163] ==================================================================
[ 62.725182][ T4163] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xed5/0x36f0
[ 62.732756][ T4163] Read of size 1 at addr ffff88802ae65d99 by task syz-executor113/4163
[ 62.740999][ T4163]
[ 62.743450][ T4163] CPU: 1 PID: 4163 Comm: syz-executor113 Not tainted 5.15.175-syzkaller #0
[ 62.752163][ T4163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 62.762419][ T4163] Call Trace:
[ 62.765704][ T4163]
[ 62.768632][ T4163] dump_stack_lvl+0x1e3/0x2d0
[ 62.773310][ T4163] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 62.778945][ T4163] ? _printk+0xd1/0x120
[ 62.783106][ T4163] ? __wake_up_klogd+0xcc/0x100
[ 62.787950][ T4163] ? panic+0x860/0x860
[ 62.792011][ T4163] ? _raw_spin_lock_irqsave+0xdd/0x120
[ 62.797472][ T4163] print_address_description+0x63/0x3b0
[ 62.803014][ T4163] ? ntfs_readdir+0xed5/0x36f0
[ 62.807770][ T4163] kasan_report+0x16b/0x1c0
[ 62.812297][ T4163] ? ntfs_readdir+0xed5/0x36f0
[ 62.817140][ T4163] ntfs_readdir+0xed5/0x36f0
[ 62.821738][ T4163] ? rwsem_write_trylock+0x166/0x210
[ 62.827015][ T4163] ? __fdget_pos+0x2cb/0x380
[ 62.831597][ T4163] ? clear_nonspinnable+0x60/0x60
[ 62.836627][ T4163] ? ntfs_unmap_page+0x1e0/0x1e0
[ 62.841641][ T4163] ? common_file_perm+0x17d/0x1d0
[ 62.846667][ T4163] iterate_dir+0x224/0x570
[ 62.851083][ T4163] __se_sys_getdents64+0x209/0x4f0
[ 62.856220][ T4163] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 62.862190][ T4163] ? __x64_sys_getdents64+0x80/0x80
[ 62.867377][ T4163] ? filldir+0x720/0x720
[ 62.871616][ T4163] ? syscall_enter_from_user_mode+0x2e/0x240
[ 62.877593][ T4163] ? lockdep_hardirqs_on+0x94/0x130
[ 62.882786][ T4163] ? syscall_enter_from_user_mode+0x2e/0x240
[ 62.888758][ T4163] do_syscall_64+0x3b/0xb0
[ 62.893163][ T4163] ? clear_bhb_loop+0x15/0x70
[ 62.897829][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 62.903713][ T4163] RIP: 0033:0x7f9e71995ea3
[ 62.908143][ T4163] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 92 48 fb ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8
[ 62.927741][ T4163] RSP: 002b:00007ffc6d196188 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9
[ 62.936577][ T4163] RAX: ffffffffffffffda RBX: 0000555572f6d770 RCX: 00007f9e71995ea3
[ 62.944549][ T4163] RDX: 0000000000008000 RSI: 0000555572f6d770 RDI: 0000000000000005
[ 62.952582][ T4163] RBP: 0000555572f6d744 R08: 0000000000000000 R09: 0000000000000000
[ 62.961565][ T4163] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffb8
[ 62.969569][ T4163] R13: 0000000000000016 R14: 0000555572f6d740 R15: 431bde82d7b634db
[ 62.977565][ T4163]
[ 62.980572][ T4163]
[ 62.982901][ T4163] Allocated by task 4163:
[ 62.987221][ T4163] ____kasan_kmalloc+0xba/0xf0
[ 62.991980][ T4163] __kmalloc+0x168/0x300
[ 62.996216][ T4163] ntfs_readdir+0x823/0x36f0
[ 63.000794][ T4163] iterate_dir+0x224/0x570
[ 63.005200][ T4163] __se_sys_getdents64+0x209/0x4f0
[ 63.010306][ T4163] do_syscall_64+0x3b/0xb0
[ 63.014723][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 63.020612][ T4163]
[ 63.022942][ T4163] The buggy address belongs to the object at ffff88802ae65c00
[ 63.022942][ T4163] which belongs to the cache kmalloc-512 of size 512
[ 63.036983][ T4163] The buggy address is located 409 bytes inside of
[ 63.036983][ T4163] 512-byte region [ffff88802ae65c00, ffff88802ae65e00)
[ 63.050274][ T4163] The buggy address belongs to the page:
[ 63.055909][ T4163] page:ffffea0000ab9900 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2ae64
[ 63.066049][ T4163] head:ffffea0000ab9900 order:2 compound_mapcount:0 compound_pincount:0
[ 63.074369][ T4163] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 63.082365][ T4163] raw: 00fff00000010200 ffffea0000977200 0000000500000005 ffff888017441c80
[ 63.090939][ T4163] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 63.099529][ T4163] page dumped because: kasan: bad access detected
[ 63.105961][ T4163] page_owner tracks the page as allocated
[ 63.111658][ T4163] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3106, ts 15789254797, free_ts 0
[ 63.129872][ T4163] get_page_from_freelist+0x3b78/0x3d40
[ 63.135435][ T4163] __alloc_pages+0x272/0x700
[ 63.140036][ T4163] new_slab+0xbb/0x4b0
[ 63.144097][ T4163] ___slab_alloc+0x6f6/0xe10
[ 63.148675][ T4163] kmem_cache_alloc_trace+0x1a0/0x290
[ 63.154033][ T4163] alloc_bprm+0x57/0x700
[ 63.158263][ T4163] kernel_execve+0x49/0x9b0
[ 63.162757][ T4163] call_usermodehelper_exec_async+0x22f/0x370
[ 63.168811][ T4163] ret_from_fork+0x1f/0x30
[ 63.173236][ T4163] page_owner free stack trace missing
[ 63.178587][ T4163]
[ 63.180897][ T4163] Memory state around the buggy address:
[ 63.186513][ T4163] ffff88802ae65c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 63.194564][ T4163] ffff88802ae65d00: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc
[ 63.202610][ T4163] >ffff88802ae65d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 63.210661][ T4163] ^
[ 63.215500][ T4163] ffff88802ae65e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 63.223571][ T4163] ffff88802ae65e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 63.231618][ T4163] ==================================================================
[ 63.240091][ T4163] Disabling lock debugging due to kernel taint
[ 63.248210][ T4163] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 63.255436][ T4163] CPU: 1 PID: 4163 Comm: syz-executor113 Tainted: G B 5.15.175-syzkaller #0
[ 63.265399][ T4163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 63.275441][ T4163] Call Trace:
[ 63.278707][ T4163]
[ 63.281647][ T4163] dump_stack_lvl+0x1e3/0x2d0
[ 63.286320][ T4163] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 63.291940][ T4163] ? panic+0x860/0x860
[ 63.296015][ T4163] ? rcu_is_watching+0x11/0xa0
[ 63.300768][ T4163] ? preempt_schedule_common+0xa6/0xd0
[ 63.306237][ T4163] panic+0x318/0x860
[ 63.310121][ T4163] ? asm_sysvec_apic_timer_interrupt+0x16/0x20
[ 63.316263][ T4163] ? check_panic_on_warn+0x1d/0xa0
[ 63.321364][ T4163] ? fb_is_primary_device+0xd0/0xd0
[ 63.326550][ T4163] ? _raw_spin_unlock_irqrestore+0x128/0x130
[ 63.332526][ T4163] ? _raw_spin_unlock+0x40/0x40
[ 63.337369][ T4163] check_panic_on_warn+0x7e/0xa0
[ 63.342296][ T4163] ? ntfs_readdir+0xed5/0x36f0
[ 63.347044][ T4163] end_report+0x6d/0xf0
[ 63.351186][ T4163] kasan_report+0x18e/0x1c0
[ 63.356378][ T4163] ? ntfs_readdir+0xed5/0x36f0
[ 63.361145][ T4163] ntfs_readdir+0xed5/0x36f0
[ 63.365757][ T4163] ? rwsem_write_trylock+0x166/0x210
[ 63.371036][ T4163] ? __fdget_pos+0x2cb/0x380
[ 63.375631][ T4163] ? clear_nonspinnable+0x60/0x60
[ 63.380659][ T4163] ? ntfs_unmap_page+0x1e0/0x1e0
[ 63.385592][ T4163] ? common_file_perm+0x17d/0x1d0
[ 63.390619][ T4163] iterate_dir+0x224/0x570
[ 63.395032][ T4163] __se_sys_getdents64+0x209/0x4f0
[ 63.400163][ T4163] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 63.406140][ T4163] ? __x64_sys_getdents64+0x80/0x80
[ 63.411348][ T4163] ? filldir+0x720/0x720
[ 63.415604][ T4163] ? syscall_enter_from_user_mode+0x2e/0x240
[ 63.421573][ T4163] ? lockdep_hardirqs_on+0x94/0x130
[ 63.426775][ T4163] ? syscall_enter_from_user_mode+0x2e/0x240
[ 63.432745][ T4163] do_syscall_64+0x3b/0xb0
[ 63.437149][ T4163] ? clear_bhb_loop+0x15/0x70
[ 63.441813][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 63.447698][ T4163] RIP: 0033:0x7f9e71995ea3
[ 63.452100][ T4163] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 92 48 fb ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8
[ 63.471703][ T4163] RSP: 002b:00007ffc6d196188 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9
[ 63.480120][ T4163] RAX: ffffffffffffffda RBX: 0000555572f6d770 RCX: 00007f9e71995ea3
[ 63.488098][ T4163] RDX: 0000000000008000 RSI: 0000555572f6d770 RDI: 0000000000000005
[ 63.496076][ T4163] RBP: 0000555572f6d744 R08: 0000000000000000 R09: 0000000000000000
[ 63.504032][ T4163] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffb8
[ 63.511997][ T4163] R13: 0000000000000016 R14: 0000555572f6d740 R15: 431bde82d7b634db
[ 63.519958][ T4163]
[ 63.523815][ T4163] Kernel Offset: disabled
[ 63.528165][ T4163] Rebooting in 86400 seconds..