Warning: Permanently added '10.128.1.15' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 41.980985] audit: type=1400 audit(1603218705.884:8): avc: denied { execmem } for pid=6476 comm="syz-executor046" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 41.997899] ntfs: (device loop0): is_boot_sector_ntfs(): Invalid end of sector marker. [ 42.010133] ================================================================== [ 42.017567] BUG: KASAN: use-after-free in ntfs_attr_find+0xa42/0xb70 [ 42.024093] Read of size 4 at addr ffff8880a459edbf by task syz-executor046/6476 [ 42.031624] [ 42.033269] CPU: 0 PID: 6476 Comm: syz-executor046 Not tainted 4.19.152-syzkaller #0 [ 42.041174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.050541] Call Trace: [ 42.053137] dump_stack+0x22c/0x33e [ 42.056766] print_address_description.cold+0x56/0x25c [ 42.062093] kasan_report_error.cold+0x66/0xb9 [ 42.066700] ? ntfs_attr_find+0xa42/0xb70 [ 42.070858] __asan_report_load_n_noabort+0x8b/0xa0 [ 42.075888] ? ntfs_attr_find+0xa42/0xb70 [ 42.080405] ntfs_attr_find+0xa42/0xb70 [ 42.084383] ntfs_attr_lookup+0x1087/0x2060 [ 42.088715] ? do_raw_spin_unlock+0x171/0x240 [ 42.093223] ? cache_alloc_refill+0x351/0x410 [ 42.097720] ? guard_bio_eod+0x2de/0x690 [ 42.101797] ? check_preemption_disabled+0x41/0x2b0 [ 42.106818] ? ntfs_attr_reinit_search_ctx+0x3c0/0x3c0 [ 42.112102] ? kmem_cache_alloc+0x31b/0x4a0 [ 42.116428] ntfs_read_inode_mount+0x7e4/0x23b0 [ 42.121122] ntfs_fill_super+0x1761/0x89d2 [ 42.125442] ? snprintf+0xbb/0xf0 [ 42.128889] ? vsprintf+0x30/0x30 [ 42.132339] ? ntfs_remount+0x500/0x500 [ 42.136303] ? __mutex_add_waiter+0x160/0x160 [ 42.140801] ? set_blocksize+0x163/0x3f0 [ 42.144890] mount_bdev+0x2fc/0x3b0 [ 42.148516] ? ntfs_remount+0x500/0x500 [ 42.152477] mount_fs+0xa3/0x318 [ 42.155851] vfs_kern_mount.part.0+0x68/0x470 [ 42.160358] do_mount+0x51c/0x2f10 [ 42.163892] ? __do_page_fault+0x1ca/0xe00 [ 42.168316] ? copy_mount_string+0x40/0x40 [ 42.172585] ? copy_mount_options+0x1c3/0x370 [ 42.177095] ? copy_mount_options+0x1d0/0x370 [ 42.181598] ? memset+0x20/0x40 [ 42.184881] ? copy_mount_options+0x261/0x370 [ 42.189394] ksys_mount+0xcf/0x130 [ 42.192942] __x64_sys_mount+0xba/0x150 [ 42.196920] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 42.201525] do_syscall_64+0xf9/0x670 [ 42.205325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.210599] RIP: 0033:0x44995a [ 42.214060] Code: b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 fd ad fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 da ad fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 42.232948] RSP: 002b:00007fff9c966658 EFLAGS: 00000287 ORIG_RAX: 00000000000000a5 [ 42.240678] RAX: ffffffffffffffda RBX: 00007fff9c9666b0 RCX: 000000000044995a [ 42.247937] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fff9c966670 [ 42.255202] RBP: 00007fff9c966670 R08: 00007fff9c9666b0 R09: 00007fff00000015 [ 42.262456] R10: 0000000000000000 R11: 0000000000000287 R12: 000000000000013c [ 42.269719] R13: 0000000000000004 R14: 0000000000000003 R15: 0000000000000003 [ 42.277001] [ 42.278614] Allocated by task 4725: [ 42.282234] kmem_cache_alloc+0x126/0x4a0 [ 42.286371] copy_process.part.0+0x2b24/0x7fb0 [ 42.290943] _do_fork+0x22f/0x1020 [ 42.294474] do_syscall_64+0xf9/0x670 [ 42.298283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.303457] [ 42.305068] Freed by task 6155: [ 42.308346] kmem_cache_free+0x7f/0x2b0 [ 42.312304] mmput+0x3b6/0x4a0 [ 42.315476] flush_old_exec+0x8ea/0x1c50 [ 42.319525] load_elf_binary+0x958/0x5010 [ 42.323679] search_binary_handler+0x177/0x570 [ 42.328282] __do_execve_file+0x13a8/0x23c0 [ 42.332633] do_execve+0x35/0x50 [ 42.336019] __x64_sys_execve+0x7c/0xa0 [ 42.339988] do_syscall_64+0xf9/0x670 [ 42.343791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.348961] [ 42.350568] The buggy address belongs to the object at ffff8880a459ec40 [ 42.350568] which belongs to the cache mm_struct of size 1496 [ 42.363147] The buggy address is located 383 bytes inside of [ 42.363147] 1496-byte region [ffff8880a459ec40, ffff8880a459f218) [ 42.375105] The buggy address belongs to the page: [ 42.380022] page:ffffea0002916780 count:1 mapcount:0 mapping:ffff88812c25a680 index:0xffff8880a459ec40 compound_mapcount: 0 [ 42.391387] flags: 0xfffe0000008100(slab|head) [ 42.395970] raw: 00fffe0000008100 ffffea0002813788 ffffea000297c708 ffff88812c25a680 [ 42.403858] raw: ffff8880a459ec40 ffff8880a459e5c0 0000000100000001 0000000000000000 [ 42.411732] page dumped because: kasan: bad access detected [ 42.417421] [ 42.419022] Memory state around the buggy address: [ 42.423951] ffff8880a459ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.431393] ffff8880a459ed00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.438748] >ffff8880a459ed80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.446107] ^ [ 42.451299] ffff8880a459ee00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.458655] ffff8880a459ee80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.466005] ================================================================== [ 42.473354] Disabling lock debugging due to kernel taint [ 42.483262] Kernel panic - not syncing: panic_on_warn set ... [ 42.483262] [ 42.490670] CPU: 1 PID: 6476 Comm: syz-executor046 Tainted: G B 4.19.152-syzkaller #0 [ 42.499939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.509331] Call Trace: [ 42.511931] dump_stack+0x22c/0x33e [ 42.515568] panic+0x2ac/0x565 [ 42.518764] ? __warn_printk+0xf3/0xf3 [ 42.522697] ? preempt_schedule_common+0x45/0xc0 [ 42.527478] ? ___preempt_schedule+0x16/0x18 [ 42.531878] ? trace_hardirqs_on+0x55/0x210 [ 42.536243] kasan_end_report+0x43/0x49 [ 42.540226] kasan_report_error.cold+0x83/0xb9 [ 42.544812] ? ntfs_attr_find+0xa42/0xb70 [ 42.548952] __asan_report_load_n_noabort+0x8b/0xa0 [ 42.553972] ? ntfs_attr_find+0xa42/0xb70 [ 42.558110] ntfs_attr_find+0xa42/0xb70 [ 42.562093] ntfs_attr_lookup+0x1087/0x2060 [ 42.566406] ? do_raw_spin_unlock+0x171/0x240 [ 42.570906] ? cache_alloc_refill+0x351/0x410 [ 42.575403] ? guard_bio_eod+0x2de/0x690 [ 42.579465] ? check_preemption_disabled+0x41/0x2b0 [ 42.584479] ? ntfs_attr_reinit_search_ctx+0x3c0/0x3c0 [ 42.589760] ? kmem_cache_alloc+0x31b/0x4a0 [ 42.594177] ntfs_read_inode_mount+0x7e4/0x23b0 [ 42.598854] ntfs_fill_super+0x1761/0x89d2 [ 42.603093] ? snprintf+0xbb/0xf0 [ 42.606538] ? vsprintf+0x30/0x30 [ 42.609979] ? ntfs_remount+0x500/0x500 [ 42.613940] ? __mutex_add_waiter+0x160/0x160 [ 42.618421] ? set_blocksize+0x163/0x3f0 [ 42.622485] mount_bdev+0x2fc/0x3b0 [ 42.626110] ? ntfs_remount+0x500/0x500 [ 42.630082] mount_fs+0xa3/0x318 [ 42.633448] vfs_kern_mount.part.0+0x68/0x470 [ 42.637934] do_mount+0x51c/0x2f10 [ 42.641462] ? __do_page_fault+0x1ca/0xe00 [ 42.645700] ? copy_mount_string+0x40/0x40 [ 42.649960] ? copy_mount_options+0x1c3/0x370 [ 42.654460] ? copy_mount_options+0x1d0/0x370 [ 42.658958] ? memset+0x20/0x40 [ 42.662238] ? copy_mount_options+0x261/0x370 [ 42.666735] ksys_mount+0xcf/0x130 [ 42.670287] __x64_sys_mount+0xba/0x150 [ 42.674271] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 42.678866] do_syscall_64+0xf9/0x670 [ 42.682673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.687861] RIP: 0033:0x44995a [ 42.691038] Code: b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 fd ad fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 da ad fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 42.709930] RSP: 002b:00007fff9c966658 EFLAGS: 00000287 ORIG_RAX: 00000000000000a5 [ 42.717666] RAX: ffffffffffffffda RBX: 00007fff9c9666b0 RCX: 000000000044995a [ 42.724922] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fff9c966670 [ 42.732182] RBP: 00007fff9c966670 R08: 00007fff9c9666b0 R09: 00007fff00000015 [ 42.739436] R10: 0000000000000000 R11: 0000000000000287 R12: 000000000000013c [ 42.746702] R13: 0000000000000004 R14: 0000000000000003 R15: 0000000000000003 [ 42.755149] Kernel Offset: disabled [ 42.758789] Rebooting in 86400 seconds..