Warning: Permanently added '10.128.0.148' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 36.991103] ================================================================== [ 36.998719] BUG: KASAN: use-after-free in ex_handler_refcount+0x18f/0x1c0 [ 37.005706] Write of size 4 at addr ffff8880afe8e078 by task syz-executor345/8242 [ 37.013338] [ 37.014986] CPU: 0 PID: 8242 Comm: syz-executor345 Not tainted 4.19.211-syzkaller #0 [ 37.022874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 37.032260] Call Trace: [ 37.034864] dump_stack+0x1fc/0x2ef executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.038512] print_address_description.cold+0x54/0x219 [ 37.043805] kasan_report_error.cold+0x8a/0x1b9 [ 37.048489] ? ex_handler_refcount+0x18f/0x1c0 [ 37.053171] __asan_report_store4_noabort+0x88/0x90 [ 37.058198] ? ex_handler_refcount+0x18f/0x1c0 [ 37.062793] ex_handler_refcount+0x18f/0x1c0 [ 37.067390] ? ex_handler_clear_fs+0xb0/0xb0 [ 37.071810] fixup_exception+0x8a/0xd0 [ 37.075712] do_trap+0x61/0x250 [ 37.079012] do_error_trap+0x15d/0x310 [ 37.082912] ? math_error+0x310/0x310 [ 37.086719] ? debug_check_no_obj_freed+0x201/0x490 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.091747] ? __noinstr_text_end+0x392f/0x7813 [ 37.096433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.101295] invalid_op+0x14/0x20 [ 37.104769] RIP: 0010:__noinstr_text_end+0x392f/0x7813 [ 37.110055] Code: 01 00 00 0f 0b 48 8d 8b e8 fd ff ff 0f 0b 48 8d 8b d8 00 00 00 0f 0b 48 8d 8b b0 fe ff ff 0f 0b 48 8d 4d 38 0f 0b 48 8d 4d 38 <0f> 0b 48 8d 8d 84 00 00 00 0f 0b 48 8d 8d 84 00 00 00 0f 0b 49 8d [ 37.128963] RSP: 0018:ffff888093cc7c68 EFLAGS: 00010297 [ 37.134335] RAX: ffff8880952e4440 RBX: 00000000ffffff01 RCX: ffff8880afe8e078 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.141708] RDX: 0000000000000000 RSI: ffffffff852a12fa RDI: ffff8880afe8e040 [ 37.149038] RBP: ffff8880afe8e040 R08: 0000000000000000 R09: 0000000000000000 [ 37.156320] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8a948d40 [ 37.163605] R13: 0000000000000000 R14: ffff8880b02c0de8 R15: 0000000000000000 [ 37.170913] ? put_dev+0xa/0x80 [ 37.174206] ? put_dev+0xa/0x80 [ 37.177577] gadgetfs_kill_sb+0x2a/0x60 [ 37.181583] deactivate_locked_super+0x94/0x160 [ 37.186261] mount_single+0x13f/0x170 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.190091] mount_fs+0xa3/0x310 [ 37.193473] vfs_kern_mount.part.0+0x68/0x470 [ 37.197981] do_mount+0x115c/0x2f50 [ 37.201623] ? lock_downgrade+0x720/0x720 [ 37.205779] ? lock_acquire+0x170/0x3c0 [ 37.209764] ? __might_fault+0xef/0x1d0 [ 37.213789] ? copy_mount_string+0x40/0x40 [ 37.218074] ? __might_fault+0x192/0x1d0 [ 37.222152] ? _copy_from_user+0xd2/0x130 [ 37.226370] ? copy_mount_options+0x26f/0x380 [ 37.230881] ksys_mount+0xcf/0x130 [ 37.234483] __x64_sys_mount+0xba/0x150 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.238472] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 37.243109] do_syscall_64+0xf9/0x620 [ 37.246922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.252121] RIP: 0033:0x7fb4c8aa4e29 [ 37.255894] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 37.274808] RSP: 002b:00007ffc12d842e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 37.282524] RAX: ffffffffffffffda RBX: 00000000000f4240 RCX: 00007fb4c8aa4e29 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.289850] RDX: 0000000020000480 RSI: 0000000020000440 RDI: 0000000000000000 [ 37.297132] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 37.304410] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000009060 [ 37.311693] R13: 00007ffc12d842fc R14: 00007ffc12d84310 R15: 00007ffc12d84300 [ 37.318979] [ 37.320632] Allocated by task 8243: [ 37.324275] kmem_cache_alloc_trace+0x12f/0x380 [ 37.328955] gadgetfs_fill_super+0x1e0/0x460 [ 37.333381] mount_single+0xf1/0x170 [ 37.337103] mount_fs+0xa3/0x310 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.340485] vfs_kern_mount.part.0+0x68/0x470 [ 37.344991] do_mount+0x115c/0x2f50 [ 37.348627] ksys_mount+0xcf/0x130 [ 37.352177] __x64_sys_mount+0xba/0x150 [ 37.356162] do_syscall_64+0xf9/0x620 [ 37.359975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.365158] [ 37.366787] Freed by task 8244: [ 37.370071] kfree+0xcc/0x210 [ 37.373185] put_dev+0x67/0x80 [ 37.376382] gadgetfs_kill_sb+0x2a/0x60 [ 37.380367] deactivate_locked_super+0x94/0x160 [ 37.385126] deactivate_super+0x174/0x1a0 [ 37.389284] cleanup_mnt+0x1a8/0x290 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.393009] task_work_run+0x148/0x1c0 [ 37.396991] exit_to_usermode_loop+0x251/0x2a0 [ 37.401581] do_syscall_64+0x538/0x620 [ 37.405477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.410661] [ 37.412294] The buggy address belongs to the object at ffff8880afe8e040 [ 37.412294] which belongs to the cache kmalloc-1024 of size 1024 [ 37.425137] The buggy address is located 56 bytes inside of [ 37.425137] 1024-byte region [ffff8880afe8e040, ffff8880afe8e440) [ 37.437015] The buggy address belongs to the page: executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.441962] page:ffffea0002bfa380 count:1 mapcount:0 mapping:ffff88813bff0ac0 index:0x0 compound_mapcount: 0 [ 37.451938] flags: 0xfff00000008100(slab|head) [ 37.456541] raw: 00fff00000008100 ffffea0002510a88 ffffea0002c05c08 ffff88813bff0ac0 [ 37.464471] raw: 0000000000000000 ffff8880afe8e040 0000000100000007 0000000000000000 [ 37.472351] page dumped because: kasan: bad access detected [ 37.478069] [ 37.479824] Memory state around the buggy address: [ 37.484766] ffff8880afe8df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.492135] ffff8880afe8df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.499503] >ffff8880afe8e000: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 37.506866] ^ [ 37.514145] ffff8880afe8e080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.521514] ffff8880afe8e100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.528975] ================================================================== [ 37.536346] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.550804] Kernel panic - not syncing: panic_on_warn set ... [ 37.550804] [ 37.558987] CPU: 0 PID: 8242 Comm: syz-executor345 Tainted: G B 4.19.211-syzkaller #0 [ 37.568257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 37.577610] Call Trace: [ 37.580210] dump_stack+0x1fc/0x2ef [ 37.583855] panic+0x26a/0x50e [ 37.587065] ? __warn_printk+0xf3/0xf3 [ 37.591056] ? preempt_schedule_common+0x45/0xc0 [ 37.596433] ? ___preempt_schedule+0x16/0x18 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.601123] ? trace_hardirqs_on+0x55/0x210 [ 37.605804] kasan_end_report+0x43/0x49 [ 37.609790] kasan_report_error.cold+0xa7/0x1b9 [ 37.614553] ? ex_handler_refcount+0x18f/0x1c0 [ 37.619931] __asan_report_store4_noabort+0x88/0x90 [ 37.625065] ? ex_handler_refcount+0x18f/0x1c0 [ 37.629654] ex_handler_refcount+0x18f/0x1c0 [ 37.634070] ? ex_handler_clear_fs+0xb0/0xb0 [ 37.638497] fixup_exception+0x8a/0xd0 [ 37.642484] do_trap+0x61/0x250 [ 37.645776] do_error_trap+0x15d/0x310 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.649676] ? math_error+0x310/0x310 [ 37.653570] ? debug_check_no_obj_freed+0x201/0x490 [ 37.658599] ? __noinstr_text_end+0x392f/0x7813 [ 37.663294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.668250] invalid_op+0x14/0x20 [ 37.671728] RIP: 0010:__noinstr_text_end+0x392f/0x7813 [ 37.677009] Code: 01 00 00 0f 0b 48 8d 8b e8 fd ff ff 0f 0b 48 8d 8b d8 00 00 00 0f 0b 48 8d 8b b0 fe ff ff 0f 0b 48 8d 4d 38 0f 0b 48 8d 4d 38 <0f> 0b 48 8d 8d 84 00 00 00 0f 0b 48 8d 8d 84 00 00 00 0f 0b 49 8d [ 37.696325] RSP: 0018:ffff888093cc7c68 EFLAGS: 00010297 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.701698] RAX: ffff8880952e4440 RBX: 00000000ffffff01 RCX: ffff8880afe8e078 [ 37.708972] RDX: 0000000000000000 RSI: ffffffff852a12fa RDI: ffff8880afe8e040 [ 37.716400] RBP: ffff8880afe8e040 R08: 0000000000000000 R09: 0000000000000000 [ 37.723703] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8a948d40 [ 37.734195] R13: 0000000000000000 R14: ffff8880b02c0de8 R15: 0000000000000000 [ 37.741576] ? put_dev+0xa/0x80 [ 37.744871] ? put_dev+0xa/0x80 [ 37.748169] gadgetfs_kill_sb+0x2a/0x60 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.752177] deactivate_locked_super+0x94/0x160 [ 37.757031] mount_single+0x13f/0x170 [ 37.760842] mount_fs+0xa3/0x310 [ 37.764223] vfs_kern_mount.part.0+0x68/0x470 [ 37.768735] do_mount+0x115c/0x2f50 [ 37.772374] ? lock_downgrade+0x720/0x720 [ 37.776538] ? lock_acquire+0x170/0x3c0 [ 37.780518] ? __might_fault+0xef/0x1d0 [ 37.784603] ? copy_mount_string+0x40/0x40 [ 37.788853] ? __might_fault+0x192/0x1d0 [ 37.793033] ? _copy_from_user+0xd2/0x130 [ 37.797201] ? copy_mount_options+0x26f/0x380 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.801707] ksys_mount+0xcf/0x130 [ 37.805262] __x64_sys_mount+0xba/0x150 [ 37.809248] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 37.813929] do_syscall_64+0xf9/0x620 [ 37.817744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.822940] RIP: 0033:0x7fb4c8aa4e29 [ 37.826656] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 37.845741] RSP: 002b:00007ffc12d842e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 37.853557] RAX: ffffffffffffffda RBX: 00000000000f4240 RCX: 00007fb4c8aa4e29 [ 37.860844] RDX: 0000000020000480 RSI: 0000000020000440 RDI: 0000000000000000 [ 37.868118] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 37.875482] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000009060 [ 37.882762] R13: 00007ffc12d842fc R14: 00007ffc12d84310 R15: 00007ffc12d84300 [ 37.890262] Kernel Offset: disabled [ 37.893888] Rebooting in 86400 seconds..