[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.45' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 50.692927] audit: type=1400 audit(1601770290.364:8): avc: denied { execmem } for pid=6471 comm="syz-executor353" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 50.705852] ntfs: (device loop0): is_boot_sector_ntfs(): Invalid end of sector marker. [ 50.722301] ================================================================== [ 50.730109] BUG: KASAN: slab-out-of-bounds in ntfs_attr_find+0xa42/0xb70 [ 50.736942] Read of size 4 at addr ffff8880a539403f by task syz-executor353/6471 [ 50.744515] [ 50.746156] CPU: 0 PID: 6471 Comm: syz-executor353 Not tainted 4.19.149-syzkaller #0 [ 50.754194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.763527] Call Trace: [ 50.766111] dump_stack+0x22c/0x33e [ 50.769741] print_address_description.cold+0x56/0x25c [ 50.775007] kasan_report_error.cold+0x66/0xb9 [ 50.779567] ? ntfs_attr_find+0xa42/0xb70 [ 50.783707] __asan_report_load_n_noabort+0x8b/0xa0 [ 50.788707] ? ntfs_attr_find+0xa42/0xb70 [ 50.792832] ntfs_attr_find+0xa42/0xb70 [ 50.796789] ntfs_attr_lookup+0x1087/0x2060 [ 50.801262] ? do_raw_spin_unlock+0x171/0x240 [ 50.805756] ? cache_alloc_refill+0x351/0x410 [ 50.810231] ? guard_bio_eod+0x2de/0x690 [ 50.814283] ? check_preemption_disabled+0x41/0x2b0 [ 50.819797] ? ntfs_attr_reinit_search_ctx+0x3c0/0x3c0 [ 50.825055] ? kmem_cache_alloc+0x31b/0x4a0 [ 50.829368] ntfs_read_inode_mount+0x7e4/0x23b0 [ 50.834024] ntfs_fill_super+0x1761/0x89d2 [ 50.838244] ? snprintf+0xbb/0xf0 [ 50.841675] ? vsprintf+0x30/0x30 [ 50.845108] ? ntfs_remount+0x500/0x500 [ 50.849329] ? __mutex_add_waiter+0x160/0x160 [ 50.853803] ? set_blocksize+0x163/0x3f0 [ 50.857847] mount_bdev+0x2fc/0x3b0 [ 50.861457] ? ntfs_remount+0x500/0x500 [ 50.865412] mount_fs+0xa3/0x318 [ 50.868761] vfs_kern_mount.part.0+0x68/0x470 [ 50.873494] do_mount+0x51c/0x2f10 [ 50.877021] ? do_raw_spin_unlock+0x171/0x240 [ 50.881585] ? check_preemption_disabled+0x41/0x2b0 [ 50.886581] ? copy_mount_string+0x40/0x40 [ 50.890796] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 50.895620] ? copy_mount_options+0x261/0x370 [ 50.900104] ksys_mount+0xcf/0x130 [ 50.903640] __x64_sys_mount+0xba/0x150 [ 50.907607] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 50.912182] do_syscall_64+0xf9/0x670 [ 50.915977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.922106] RIP: 0033:0x44c1fa [ 50.925380] Code: b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 fd ad fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 da ad fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 50.944270] RSP: 002b:00007ffc1695edb8 EFLAGS: 00000287 ORIG_RAX: 00000000000000a5 [ 50.952665] RAX: ffffffffffffffda RBX: 00007ffc1695ee10 RCX: 000000000044c1fa [ 50.959911] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffc1695edd0 [ 50.967167] RBP: 00007ffc1695edd0 R08: 00007ffc1695ee10 R09: 00007ffc00000015 [ 50.975367] R10: 0000000000000000 R11: 0000000000000287 R12: 000000000000025d [ 50.982622] R13: 0000000000000004 R14: 0000000000000003 R15: 0000000000000003 [ 50.989879] [ 50.991491] Allocated by task 6471: [ 50.995100] kmem_cache_alloc_trace+0x12f/0x4b0 [ 50.999756] copy_mount_options+0x59/0x370 [ 51.003980] ksys_mount+0x9b/0x130 [ 51.007494] __x64_sys_mount+0xba/0x150 [ 51.011448] do_syscall_64+0xf9/0x670 [ 51.015237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.020406] [ 51.022014] Freed by task 0: [ 51.025016] (stack is not available) [ 51.028709] [ 51.030324] The buggy address belongs to the object at ffff8880a5394e40 [ 51.030324] which belongs to the cache kmalloc-4096 of size 4096 [ 51.043138] The buggy address is located 3585 bytes to the left of [ 51.043138] 4096-byte region [ffff8880a5394e40, ffff8880a5395e40) [ 51.055616] The buggy address belongs to the page: [ 51.060536] page:ffffea000294e500 count:1 mapcount:0 mapping:ffff88812c3f6dc0 index:0x0 compound_mapcount: 0 [ 51.070493] flags: 0xfffe0000008100(slab|head) [ 51.075069] raw: 00fffe0000008100 ffffea0002935608 ffffea0002920408 ffff88812c3f6dc0 [ 51.082943] raw: 0000000000000000 ffff8880a5394e40 0000000100000001 0000000000000000 [ 51.090808] page dumped because: kasan: bad access detected [ 51.096754] [ 51.098367] Memory state around the buggy address: [ 51.103276] ffff8880a5393f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 51.110633] ffff8880a5393f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 51.118029] >ffff8880a5394000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.125448] ^ [ 51.130612] ffff8880a5394080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.137964] ffff8880a5394100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.145731] ================================================================== [ 51.153073] Disabling lock debugging due to kernel taint [ 51.159788] Kernel panic - not syncing: panic_on_warn set ... [ 51.159788] [ 51.167172] CPU: 0 PID: 6471 Comm: syz-executor353 Tainted: G B 4.19.149-syzkaller #0 [ 51.176437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.185780] Call Trace: [ 51.188377] dump_stack+0x22c/0x33e [ 51.192011] panic+0x2ac/0x565 [ 51.195202] ? __warn_printk+0xf3/0xf3 [ 51.199093] ? preempt_schedule_common+0x45/0xc0 [ 51.203937] ? ___preempt_schedule+0x16/0x18 [ 51.208353] ? trace_hardirqs_on+0x55/0x210 [ 51.212707] kasan_end_report+0x43/0x49 [ 51.216672] kasan_report_error.cold+0x83/0xb9 [ 51.221251] ? ntfs_attr_find+0xa42/0xb70 [ 51.225382] __asan_report_load_n_noabort+0x8b/0xa0 [ 51.230386] ? ntfs_attr_find+0xa42/0xb70 [ 51.234521] ntfs_attr_find+0xa42/0xb70 [ 51.238482] ntfs_attr_lookup+0x1087/0x2060 [ 51.243042] ? do_raw_spin_unlock+0x171/0x240 [ 51.247518] ? cache_alloc_refill+0x351/0x410 [ 51.252002] ? guard_bio_eod+0x2de/0x690 [ 51.256044] ? check_preemption_disabled+0x41/0x2b0 [ 51.261046] ? ntfs_attr_reinit_search_ctx+0x3c0/0x3c0 [ 51.266316] ? kmem_cache_alloc+0x31b/0x4a0 [ 51.270619] ntfs_read_inode_mount+0x7e4/0x23b0 [ 51.275281] ntfs_fill_super+0x1761/0x89d2 [ 51.279505] ? snprintf+0xbb/0xf0 [ 51.282945] ? vsprintf+0x30/0x30 [ 51.286389] ? ntfs_remount+0x500/0x500 [ 51.290455] ? __mutex_add_waiter+0x160/0x160 [ 51.294937] ? set_blocksize+0x163/0x3f0 [ 51.298988] mount_bdev+0x2fc/0x3b0 [ 51.302610] ? ntfs_remount+0x500/0x500 [ 51.306574] mount_fs+0xa3/0x318 [ 51.309948] vfs_kern_mount.part.0+0x68/0x470 [ 51.314461] do_mount+0x51c/0x2f10 [ 51.318011] ? do_raw_spin_unlock+0x171/0x240 [ 51.322482] ? check_preemption_disabled+0x41/0x2b0 [ 51.327477] ? copy_mount_string+0x40/0x40 [ 51.331694] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 51.336516] ? copy_mount_options+0x261/0x370 [ 51.340997] ksys_mount+0xcf/0x130 [ 51.344515] __x64_sys_mount+0xba/0x150 [ 51.348477] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 51.353041] do_syscall_64+0xf9/0x670 [ 51.356822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.363641] RIP: 0033:0x44c1fa [ 51.366812] Code: b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 fd ad fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 da ad fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 51.385826] RSP: 002b:00007ffc1695edb8 EFLAGS: 00000287 ORIG_RAX: 00000000000000a5 [ 51.393514] RAX: ffffffffffffffda RBX: 00007ffc1695ee10 RCX: 000000000044c1fa [ 51.400772] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffc1695edd0 [ 51.408207] RBP: 00007ffc1695edd0 R08: 00007ffc1695ee10 R09: 00007ffc00000015 [ 51.415456] R10: 0000000000000000 R11: 0000000000000287 R12: 000000000000025d [ 51.422719] R13: 0000000000000004 R14: 0000000000000003 R15: 0000000000000003 [ 51.431283] Kernel Offset: disabled [ 51.434898] Rebooting in 86400 seconds..