Warning: Permanently added '10.128.1.105' (ED25519) to the list of known hosts. executing program [ 62.497151][ T4164] loop0: detected capacity change from 0 to 4096 [ 62.603545][ T4164] ntfs: (device loop0): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 62.632569][ T4164] ntfs: volume version 3.1. [ 62.639910][ T4164] ntfs: (device loop0): ntfs_lookup_inode_by_name(): Corrupt directory. Aborting lookup. [ 62.649892][ T4164] ntfs: (device loop0): load_and_init_usnjrnl(): Failed to find inode number for $UsnJrnl. [ 62.659961][ T4164] ntfs: (device loop0): load_system_files(): Failed to load $UsnJrnl. Mounting read-only. Run chkdsk. [ 62.684651][ T4163] ntfs: (device loop0): ntfs_ucstonls(): Unicode name contains characters that cannot be converted to character set maccenteuro. You might want to try to use the mount option nls=utf8. [ 62.703565][ T4163] ntfs: (device loop0): ntfs_filldir(): Skipping unrepresentable inode 0x4. [ 62.717033][ T4163] ================================================================== [ 62.725182][ T4163] BUG: KASAN: slab-out-of-bounds in ntfs_readdir+0xed5/0x36f0 [ 62.732756][ T4163] Read of size 1 at addr ffff88802ae65d99 by task syz-executor113/4163 [ 62.740999][ T4163] [ 62.743450][ T4163] CPU: 1 PID: 4163 Comm: syz-executor113 Not tainted 5.15.175-syzkaller #0 [ 62.752163][ T4163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 62.762419][ T4163] Call Trace: [ 62.765704][ T4163] [ 62.768632][ T4163] dump_stack_lvl+0x1e3/0x2d0 [ 62.773310][ T4163] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 62.778945][ T4163] ? _printk+0xd1/0x120 [ 62.783106][ T4163] ? __wake_up_klogd+0xcc/0x100 [ 62.787950][ T4163] ? panic+0x860/0x860 [ 62.792011][ T4163] ? _raw_spin_lock_irqsave+0xdd/0x120 [ 62.797472][ T4163] print_address_description+0x63/0x3b0 [ 62.803014][ T4163] ? ntfs_readdir+0xed5/0x36f0 [ 62.807770][ T4163] kasan_report+0x16b/0x1c0 [ 62.812297][ T4163] ? ntfs_readdir+0xed5/0x36f0 [ 62.817140][ T4163] ntfs_readdir+0xed5/0x36f0 [ 62.821738][ T4163] ? rwsem_write_trylock+0x166/0x210 [ 62.827015][ T4163] ? __fdget_pos+0x2cb/0x380 [ 62.831597][ T4163] ? clear_nonspinnable+0x60/0x60 [ 62.836627][ T4163] ? ntfs_unmap_page+0x1e0/0x1e0 [ 62.841641][ T4163] ? common_file_perm+0x17d/0x1d0 [ 62.846667][ T4163] iterate_dir+0x224/0x570 [ 62.851083][ T4163] __se_sys_getdents64+0x209/0x4f0 [ 62.856220][ T4163] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 62.862190][ T4163] ? __x64_sys_getdents64+0x80/0x80 [ 62.867377][ T4163] ? filldir+0x720/0x720 [ 62.871616][ T4163] ? syscall_enter_from_user_mode+0x2e/0x240 [ 62.877593][ T4163] ? lockdep_hardirqs_on+0x94/0x130 [ 62.882786][ T4163] ? syscall_enter_from_user_mode+0x2e/0x240 [ 62.888758][ T4163] do_syscall_64+0x3b/0xb0 [ 62.893163][ T4163] ? clear_bhb_loop+0x15/0x70 [ 62.897829][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 62.903713][ T4163] RIP: 0033:0x7f9e71995ea3 [ 62.908143][ T4163] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 92 48 fb ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 [ 62.927741][ T4163] RSP: 002b:00007ffc6d196188 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 62.936577][ T4163] RAX: ffffffffffffffda RBX: 0000555572f6d770 RCX: 00007f9e71995ea3 [ 62.944549][ T4163] RDX: 0000000000008000 RSI: 0000555572f6d770 RDI: 0000000000000005 [ 62.952582][ T4163] RBP: 0000555572f6d744 R08: 0000000000000000 R09: 0000000000000000 [ 62.961565][ T4163] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffb8 [ 62.969569][ T4163] R13: 0000000000000016 R14: 0000555572f6d740 R15: 431bde82d7b634db [ 62.977565][ T4163] [ 62.980572][ T4163] [ 62.982901][ T4163] Allocated by task 4163: [ 62.987221][ T4163] ____kasan_kmalloc+0xba/0xf0 [ 62.991980][ T4163] __kmalloc+0x168/0x300 [ 62.996216][ T4163] ntfs_readdir+0x823/0x36f0 [ 63.000794][ T4163] iterate_dir+0x224/0x570 [ 63.005200][ T4163] __se_sys_getdents64+0x209/0x4f0 [ 63.010306][ T4163] do_syscall_64+0x3b/0xb0 [ 63.014723][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 63.020612][ T4163] [ 63.022942][ T4163] The buggy address belongs to the object at ffff88802ae65c00 [ 63.022942][ T4163] which belongs to the cache kmalloc-512 of size 512 [ 63.036983][ T4163] The buggy address is located 409 bytes inside of [ 63.036983][ T4163] 512-byte region [ffff88802ae65c00, ffff88802ae65e00) [ 63.050274][ T4163] The buggy address belongs to the page: [ 63.055909][ T4163] page:ffffea0000ab9900 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2ae64 [ 63.066049][ T4163] head:ffffea0000ab9900 order:2 compound_mapcount:0 compound_pincount:0 [ 63.074369][ T4163] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 63.082365][ T4163] raw: 00fff00000010200 ffffea0000977200 0000000500000005 ffff888017441c80 [ 63.090939][ T4163] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 63.099529][ T4163] page dumped because: kasan: bad access detected [ 63.105961][ T4163] page_owner tracks the page as allocated [ 63.111658][ T4163] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3106, ts 15789254797, free_ts 0 [ 63.129872][ T4163] get_page_from_freelist+0x3b78/0x3d40 [ 63.135435][ T4163] __alloc_pages+0x272/0x700 [ 63.140036][ T4163] new_slab+0xbb/0x4b0 [ 63.144097][ T4163] ___slab_alloc+0x6f6/0xe10 [ 63.148675][ T4163] kmem_cache_alloc_trace+0x1a0/0x290 [ 63.154033][ T4163] alloc_bprm+0x57/0x700 [ 63.158263][ T4163] kernel_execve+0x49/0x9b0 [ 63.162757][ T4163] call_usermodehelper_exec_async+0x22f/0x370 [ 63.168811][ T4163] ret_from_fork+0x1f/0x30 [ 63.173236][ T4163] page_owner free stack trace missing [ 63.178587][ T4163] [ 63.180897][ T4163] Memory state around the buggy address: [ 63.186513][ T4163] ffff88802ae65c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.194564][ T4163] ffff88802ae65d00: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 63.202610][ T4163] >ffff88802ae65d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.210661][ T4163] ^ [ 63.215500][ T4163] ffff88802ae65e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.223571][ T4163] ffff88802ae65e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.231618][ T4163] ================================================================== [ 63.240091][ T4163] Disabling lock debugging due to kernel taint [ 63.248210][ T4163] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 63.255436][ T4163] CPU: 1 PID: 4163 Comm: syz-executor113 Tainted: G B 5.15.175-syzkaller #0 [ 63.265399][ T4163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 63.275441][ T4163] Call Trace: [ 63.278707][ T4163] [ 63.281647][ T4163] dump_stack_lvl+0x1e3/0x2d0 [ 63.286320][ T4163] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 63.291940][ T4163] ? panic+0x860/0x860 [ 63.296015][ T4163] ? rcu_is_watching+0x11/0xa0 [ 63.300768][ T4163] ? preempt_schedule_common+0xa6/0xd0 [ 63.306237][ T4163] panic+0x318/0x860 [ 63.310121][ T4163] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 63.316263][ T4163] ? check_panic_on_warn+0x1d/0xa0 [ 63.321364][ T4163] ? fb_is_primary_device+0xd0/0xd0 [ 63.326550][ T4163] ? _raw_spin_unlock_irqrestore+0x128/0x130 [ 63.332526][ T4163] ? _raw_spin_unlock+0x40/0x40 [ 63.337369][ T4163] check_panic_on_warn+0x7e/0xa0 [ 63.342296][ T4163] ? ntfs_readdir+0xed5/0x36f0 [ 63.347044][ T4163] end_report+0x6d/0xf0 [ 63.351186][ T4163] kasan_report+0x18e/0x1c0 [ 63.356378][ T4163] ? ntfs_readdir+0xed5/0x36f0 [ 63.361145][ T4163] ntfs_readdir+0xed5/0x36f0 [ 63.365757][ T4163] ? rwsem_write_trylock+0x166/0x210 [ 63.371036][ T4163] ? __fdget_pos+0x2cb/0x380 [ 63.375631][ T4163] ? clear_nonspinnable+0x60/0x60 [ 63.380659][ T4163] ? ntfs_unmap_page+0x1e0/0x1e0 [ 63.385592][ T4163] ? common_file_perm+0x17d/0x1d0 [ 63.390619][ T4163] iterate_dir+0x224/0x570 [ 63.395032][ T4163] __se_sys_getdents64+0x209/0x4f0 [ 63.400163][ T4163] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 63.406140][ T4163] ? __x64_sys_getdents64+0x80/0x80 [ 63.411348][ T4163] ? filldir+0x720/0x720 [ 63.415604][ T4163] ? syscall_enter_from_user_mode+0x2e/0x240 [ 63.421573][ T4163] ? lockdep_hardirqs_on+0x94/0x130 [ 63.426775][ T4163] ? syscall_enter_from_user_mode+0x2e/0x240 [ 63.432745][ T4163] do_syscall_64+0x3b/0xb0 [ 63.437149][ T4163] ? clear_bhb_loop+0x15/0x70 [ 63.441813][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 63.447698][ T4163] RIP: 0033:0x7f9e71995ea3 [ 63.452100][ T4163] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 92 48 fb ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 [ 63.471703][ T4163] RSP: 002b:00007ffc6d196188 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 63.480120][ T4163] RAX: ffffffffffffffda RBX: 0000555572f6d770 RCX: 00007f9e71995ea3 [ 63.488098][ T4163] RDX: 0000000000008000 RSI: 0000555572f6d770 RDI: 0000000000000005 [ 63.496076][ T4163] RBP: 0000555572f6d744 R08: 0000000000000000 R09: 0000000000000000 [ 63.504032][ T4163] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffb8 [ 63.511997][ T4163] R13: 0000000000000016 R14: 0000555572f6d740 R15: 431bde82d7b634db [ 63.519958][ T4163] [ 63.523815][ T4163] Kernel Offset: disabled [ 63.528165][ T4163] Rebooting in 86400 seconds..