Warning: Permanently added '10.128.0.207' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 38.385006] audit: type=1400 audit(1601212944.546:8): avc: denied { execmem } for pid=6480 comm="syz-executor763" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 38.404623] ntfs: (device loop0): is_boot_sector_ntfs(): Invalid end of sector marker. [ 38.427382] ================================================================== [ 38.434808] BUG: KASAN: use-after-free in ntfs_attr_find+0xa42/0xb70 [ 38.441282] Read of size 4 at addr ffff8880853e25ff by task syz-executor763/6480 [ 38.448820] [ 38.450435] CPU: 1 PID: 6480 Comm: syz-executor763 Not tainted 4.19.148-syzkaller #0 [ 38.458323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.467650] Call Trace: [ 38.470218] dump_stack+0x22c/0x33e [ 38.473829] print_address_description.cold+0x56/0x25c [ 38.479082] kasan_report_error.cold+0x66/0xb9 [ 38.483639] ? ntfs_attr_find+0xa42/0xb70 [ 38.487770] __asan_report_load_n_noabort+0x8b/0xa0 [ 38.492770] ? ntfs_attr_find+0xa42/0xb70 [ 38.496891] ntfs_attr_find+0xa42/0xb70 [ 38.500843] ntfs_attr_lookup+0x1087/0x2060 [ 38.505143] ? do_raw_spin_unlock+0x171/0x240 [ 38.509616] ? cache_alloc_refill+0x351/0x410 [ 38.514098] ? guard_bio_eod+0x2de/0x690 [ 38.518138] ? check_preemption_disabled+0x41/0x2b0 [ 38.523144] ? ntfs_attr_reinit_search_ctx+0x3c0/0x3c0 [ 38.528667] ? kmem_cache_alloc+0x31b/0x4a0 [ 38.532965] ntfs_read_inode_mount+0x7e4/0x23b0 [ 38.537614] ntfs_fill_super+0x1761/0x89d2 [ 38.541825] ? snprintf+0xbb/0xf0 [ 38.545340] ? vsprintf+0x30/0x30 [ 38.548769] ? ntfs_remount+0x500/0x500 [ 38.552720] ? __mutex_add_waiter+0x160/0x160 [ 38.557191] ? set_blocksize+0x163/0x3f0 [ 38.561256] mount_bdev+0x2fc/0x3b0 [ 38.564856] ? ntfs_remount+0x500/0x500 [ 38.568807] mount_fs+0xa3/0x318 [ 38.572150] vfs_kern_mount.part.0+0x68/0x470 [ 38.576643] do_mount+0x51c/0x2f10 [ 38.580162] ? __do_page_fault+0x1ca/0xe00 [ 38.584377] ? copy_mount_string+0x40/0x40 [ 38.588588] ? copy_mount_options+0x1c3/0x370 [ 38.593058] ? copy_mount_options+0x1d0/0x370 [ 38.597537] ? memset+0x20/0x40 [ 38.601487] ? copy_mount_options+0x261/0x370 [ 38.605970] ksys_mount+0xcf/0x130 [ 38.609492] __x64_sys_mount+0xba/0x150 [ 38.613444] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 38.618004] do_syscall_64+0xf9/0x670 [ 38.621782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.626944] RIP: 0033:0x44c1fa [ 38.630114] Code: b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 fd ad fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 da ad fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 38.648989] RSP: 002b:00007fff9d7ab8c8 EFLAGS: 00000287 ORIG_RAX: 00000000000000a5 [ 38.656676] RAX: ffffffffffffffda RBX: 00007fff9d7ab920 RCX: 000000000044c1fa [ 38.663920] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fff9d7ab8e0 [ 38.671166] RBP: 00007fff9d7ab8e0 R08: 00007fff9d7ab920 R09: 00007fff00000015 [ 38.678436] R10: 0000000000000000 R11: 0000000000000287 R12: 000000000000025d [ 38.685679] R13: 0000000000000004 R14: 0000000000000003 R15: 0000000000000003 [ 38.692927] [ 38.694532] Allocated by task 3721: [ 38.698139] kmem_cache_alloc+0x126/0x4a0 [ 38.702263] getname_flags+0xce/0x590 [ 38.706087] do_mkdirat+0x8d/0x2d0 [ 38.709604] do_syscall_64+0xf9/0x670 [ 38.713379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.718538] [ 38.720140] Freed by task 3721: [ 38.723395] kmem_cache_free+0x7f/0x2b0 [ 38.727344] putname+0xe1/0x130 [ 38.730597] filename_parentat+0x4da/0x590 [ 38.734834] filename_create+0x9e/0x490 [ 38.738789] do_mkdirat+0xa0/0x2d0 [ 38.742302] do_syscall_64+0xf9/0x670 [ 38.746078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.751237] [ 38.752842] The buggy address belongs to the object at ffff8880853e2480 [ 38.752842] which belongs to the cache names_cache of size 4096 [ 38.765560] The buggy address is located 383 bytes inside of [ 38.765560] 4096-byte region [ffff8880853e2480, ffff8880853e3480) [ 38.777644] The buggy address belongs to the page: [ 38.782550] page:ffffea000214f880 count:1 mapcount:0 mapping:ffff88821bc44b00 index:0x0 compound_mapcount: 0 [ 38.792499] flags: 0xfffe0000008100(slab|head) [ 38.797076] raw: 00fffe0000008100 ffffea0002235988 ffffea00028c6388 ffff88821bc44b00 [ 38.804940] raw: 0000000000000000 ffff8880853e2480 0000000100000001 0000000000000000 [ 38.812792] page dumped because: kasan: bad access detected [ 38.818472] [ 38.820079] Memory state around the buggy address: [ 38.824994] ffff8880853e2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.832328] ffff8880853e2500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.839662] >ffff8880853e2580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.846992] ^ [ 38.854239] ffff8880853e2600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.861574] ffff8880853e2680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.868903] ================================================================== [ 38.876234] Disabling lock debugging due to kernel taint [ 38.884790] Kernel panic - not syncing: panic_on_warn set ... [ 38.884790] [ 38.892171] CPU: 0 PID: 6480 Comm: syz-executor763 Tainted: G B 4.19.148-syzkaller #0 [ 38.901548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.910893] Call Trace: [ 38.913471] dump_stack+0x22c/0x33e [ 38.917079] panic+0x2ac/0x565 [ 38.920277] ? __warn_printk+0xf3/0xf3 [ 38.924146] ? preempt_schedule_common+0x45/0xc0 [ 38.929055] ? ___preempt_schedule+0x16/0x18 [ 38.933442] ? trace_hardirqs_on+0x55/0x210 [ 38.937741] kasan_end_report+0x43/0x49 [ 38.941689] kasan_report_error.cold+0x83/0xb9 [ 38.946288] ? ntfs_attr_find+0xa42/0xb70 [ 38.950414] __asan_report_load_n_noabort+0x8b/0xa0 [ 38.955425] ? ntfs_attr_find+0xa42/0xb70 [ 38.959552] ntfs_attr_find+0xa42/0xb70 [ 38.963521] ntfs_attr_lookup+0x1087/0x2060 [ 38.967820] ? do_raw_spin_unlock+0x171/0x240 [ 38.972293] ? cache_alloc_refill+0x351/0x410 [ 38.976772] ? guard_bio_eod+0x2de/0x690 [ 38.980810] ? check_preemption_disabled+0x41/0x2b0 [ 38.985803] ? ntfs_attr_reinit_search_ctx+0x3c0/0x3c0 [ 38.991055] ? kmem_cache_alloc+0x31b/0x4a0 [ 38.995394] ntfs_read_inode_mount+0x7e4/0x23b0 [ 39.000128] ntfs_fill_super+0x1761/0x89d2 [ 39.004360] ? snprintf+0xbb/0xf0 [ 39.007825] ? vsprintf+0x30/0x30 [ 39.011265] ? ntfs_remount+0x500/0x500 [ 39.015475] ? __mutex_add_waiter+0x160/0x160 [ 39.019951] ? set_blocksize+0x163/0x3f0 [ 39.023990] mount_bdev+0x2fc/0x3b0 [ 39.027593] ? ntfs_remount+0x500/0x500 [ 39.031649] mount_fs+0xa3/0x318 [ 39.034993] vfs_kern_mount.part.0+0x68/0x470 [ 39.039466] do_mount+0x51c/0x2f10 [ 39.042984] ? __do_page_fault+0x1ca/0xe00 [ 39.047198] ? copy_mount_string+0x40/0x40 [ 39.051441] ? copy_mount_options+0x1c3/0x370 [ 39.055910] ? copy_mount_options+0x1d0/0x370 [ 39.060380] ? memset+0x20/0x40 [ 39.063651] ? copy_mount_options+0x261/0x370 [ 39.068125] ksys_mount+0xcf/0x130 [ 39.071658] __x64_sys_mount+0xba/0x150 [ 39.075608] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 39.080168] do_syscall_64+0xf9/0x670 [ 39.083948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 39.089113] RIP: 0033:0x44c1fa [ 39.092284] Code: b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 fd ad fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 da ad fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 39.111185] RSP: 002b:00007fff9d7ab8c8 EFLAGS: 00000287 ORIG_RAX: 00000000000000a5 [ 39.118868] RAX: ffffffffffffffda RBX: 00007fff9d7ab920 RCX: 000000000044c1fa [ 39.126132] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fff9d7ab8e0 [ 39.133380] RBP: 00007fff9d7ab8e0 R08: 00007fff9d7ab920 R09: 00007fff00000015 [ 39.140644] R10: 0000000000000000 R11: 0000000000000287 R12: 000000000000025d [ 39.147889] R13: 0000000000000004 R14: 0000000000000003 R15: 0000000000000003 [ 39.156279] Kernel Offset: disabled [ 39.159913] Rebooting in 86400 seconds..