Warning: Permanently added '10.128.0.199' (ED25519) to the list of known hosts. executing program [ 52.172175][ T3497] loop0: detected capacity change from 0 to 4096 [ 52.182507][ T3497] ntfs3: loop0: Different NTFS' sector size (4096) and media sector size (512) [ 52.208106][ T3497] ntfs3: loop0: Mark volume as dirty due to NTFS errors [ 52.216108][ T3497] ================================================================== [ 52.224345][ T3497] BUG: KASAN: slab-out-of-bounds in ntfs_listxattr+0x3a2/0x5b0 [ 52.231946][ T3497] Read of size 48 at addr ffff888079de9fb0 by task syz-executor232/3497 [ 52.240301][ T3497] [ 52.242645][ T3497] CPU: 1 PID: 3497 Comm: syz-executor232 Not tainted 5.15.123-syzkaller #0 [ 52.251250][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 52.261310][ T3497] Call Trace: [ 52.264595][ T3497] [ 52.267524][ T3497] dump_stack_lvl+0x1e3/0x2cb [ 52.272206][ T3497] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 52.277836][ T3497] ? _printk+0xd1/0x111 [ 52.282079][ T3497] ? __wake_up_klogd+0xcc/0x100 [ 52.286957][ T3497] ? panic+0x84d/0x84d [ 52.291041][ T3497] ? _raw_spin_lock_irqsave+0xdd/0x120 [ 52.296504][ T3497] ? ntfs_read_ea+0x83c/0xa00 [ 52.301185][ T3497] print_address_description+0x63/0x3b0 [ 52.306737][ T3497] ? ntfs_listxattr+0x3a2/0x5b0 [ 52.311618][ T3497] kasan_report+0x16b/0x1c0 [ 52.316128][ T3497] ? ntfs_listxattr+0x3a2/0x5b0 [ 52.320997][ T3497] kasan_check_range+0x27e/0x290 [ 52.325933][ T3497] ? ntfs_listxattr+0x3a2/0x5b0 [ 52.330793][ T3497] memcpy+0x25/0x60 [ 52.334600][ T3497] ntfs_listxattr+0x3a2/0x5b0 [ 52.339289][ T3497] ? ntfs_permission+0xf0/0xf0 [ 52.344051][ T3497] ? __kmalloc_node+0x199/0x390 [ 52.348899][ T3497] ? kvmalloc_node+0x80/0x140 [ 52.353579][ T3497] ? bpf_lsm_inode_listxattr+0x5/0x10 [ 52.358954][ T3497] listxattr+0x282/0x2e0 [ 52.363196][ T3497] ? ntfs_permission+0xf0/0xf0 [ 52.367986][ T3497] __x64_sys_listxattr+0x172/0x230 [ 52.373097][ T3497] ? print_irqtrace_events+0x210/0x210 [ 52.378561][ T3497] ? __ia32_sys_fgetxattr+0x200/0x200 [ 52.383936][ T3497] ? syscall_enter_from_user_mode+0x2e/0x230 [ 52.389916][ T3497] ? lockdep_hardirqs_on+0x94/0x130 [ 52.395112][ T3497] ? syscall_enter_from_user_mode+0x2e/0x230 [ 52.401090][ T3497] do_syscall_64+0x3d/0xb0 [ 52.405509][ T3497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.411404][ T3497] RIP: 0033:0x7ff45ae375f9 [ 52.415817][ T3497] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 52.435422][ T3497] RSP: 002b:00007fff89b964d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000c2 [ 52.443838][ T3497] RAX: ffffffffffffffda RBX: 0032656c69662f2e RCX: 00007ff45ae375f9 [ 52.451808][ T3497] RDX: 0000000000000098 RSI: 0000000020000100 RDI: 0000000020000040 [ 52.459779][ T3497] RBP: 00007ff45aec9610 R08: 000000000001f1b1 R09: 0000000000000000 [ 52.467746][ T3497] R10: 00007fff89b963a0 R11: 0000000000000246 R12: 0000000000000001 [ 52.475714][ T3497] R13: 00007fff89b966a8 R14: 0000000000000001 R15: 0000000000000001 [ 52.483694][ T3497] [ 52.486715][ T3497] [ 52.489117][ T3497] Allocated by task 3497: [ 52.493439][ T3497] ____kasan_kmalloc+0xba/0xf0 [ 52.498203][ T3497] __kmalloc+0x168/0x300 [ 52.502462][ T3497] ntfs_read_ea+0x48a/0xa00 [ 52.506964][ T3497] ntfs_listxattr+0x177/0x5b0 [ 52.511642][ T3497] listxattr+0x282/0x2e0 [ 52.515880][ T3497] __x64_sys_listxattr+0x172/0x230 [ 52.520987][ T3497] do_syscall_64+0x3d/0xb0 [ 52.525414][ T3497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.531317][ T3497] [ 52.533634][ T3497] The buggy address belongs to the object at ffff888079de9f80 [ 52.533634][ T3497] which belongs to the cache kmalloc-64 of size 64 [ 52.547506][ T3497] The buggy address is located 48 bytes inside of [ 52.547506][ T3497] 64-byte region [ffff888079de9f80, ffff888079de9fc0) [ 52.560604][ T3497] The buggy address belongs to the page: [ 52.566230][ T3497] page:ffffea0001e77a40 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888079de9e00 pfn:0x79de9 [ 52.577703][ T3497] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 52.585255][ T3497] raw: 00fff00000000200 ffffea000063fcc0 0000000400000004 ffff888011c41640 [ 52.593845][ T3497] raw: ffff888079de9e00 000000008020001a 00000001ffffffff 0000000000000000 [ 52.602417][ T3497] page dumped because: kasan: bad access detected [ 52.608842][ T3497] page_owner tracks the page as allocated [ 52.614655][ T3497] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12c40(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY), pid 2960, ts 21146069901, free_ts 17826824929 [ 52.630600][ T3497] get_page_from_freelist+0x322a/0x33c0 [ 52.636160][ T3497] __alloc_pages+0x272/0x700 [ 52.640810][ T3497] new_slab+0xbb/0x4b0 [ 52.644911][ T3497] ___slab_alloc+0x6f6/0xe10 [ 52.649501][ T3497] __kmalloc+0x1c9/0x300 [ 52.653741][ T3497] tomoyo_encode+0x26b/0x530 [ 52.658327][ T3497] tomoyo_realpath_from_path+0x5a2/0x5e0 [ 52.663960][ T3497] tomoyo_check_open_permission+0x22c/0x490 [ 52.669853][ T3497] security_file_open+0x5f/0xa0 [ 52.676707][ T3497] do_dentry_open+0x315/0xfb0 [ 52.681389][ T3497] path_openat+0x2702/0x2f20 [ 52.685994][ T3497] do_filp_open+0x21c/0x460 [ 52.690494][ T3497] do_sys_openat2+0x13b/0x500 [ 52.695166][ T3497] __x64_sys_openat+0x243/0x290 [ 52.700012][ T3497] do_syscall_64+0x3d/0xb0 [ 52.704439][ T3497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.710355][ T3497] page last free stack trace: [ 52.715019][ T3497] free_unref_page_prepare+0xc34/0xcf0 [ 52.720478][ T3497] free_unref_page+0x95/0x2d0 [ 52.725178][ T3497] free_contig_range+0x95/0xf0 [ 52.729938][ T3497] destroy_args+0xfe/0x97f [ 52.734372][ T3497] debug_vm_pgtable+0x40d/0x462 [ 52.739226][ T3497] do_one_initcall+0x22b/0x7a0 [ 52.744151][ T3497] do_initcall_level+0x157/0x207 [ 52.749114][ T3497] do_initcalls+0x49/0x86 [ 52.753453][ T3497] kernel_init_freeable+0x43c/0x5c5 [ 52.758648][ T3497] kernel_init+0x19/0x290 [ 52.762998][ T3497] ret_from_fork+0x1f/0x30 [ 52.767429][ T3497] [ 52.769762][ T3497] Memory state around the buggy address: [ 52.775396][ T3497] ffff888079de9e80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.783463][ T3497] ffff888079de9f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 52.791524][ T3497] >ffff888079de9f80: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc [ 52.799575][ T3497] ^ [ 52.805478][ T3497] ffff888079dea000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb [ 52.813535][ T3497] ffff888079dea080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 52.821593][ T3497] ================================================================== [ 52.829643][ T3497] Disabling lock debugging due to kernel taint [ 52.836204][ T3497] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 52.843416][ T3497] CPU: 1 PID: 3497 Comm: syz-executor232 Tainted: G B 5.15.123-syzkaller #0 [ 52.853407][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 52.863458][ T3497] Call Trace: [ 52.866732][ T3497] [ 52.869661][ T3497] dump_stack_lvl+0x1e3/0x2cb [ 52.874340][ T3497] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 52.879971][ T3497] ? panic+0x84d/0x84d [ 52.884074][ T3497] ? preempt_schedule_common+0xa6/0xd0 [ 52.889532][ T3497] ? preempt_schedule+0xd9/0xe0 [ 52.894401][ T3497] panic+0x318/0x84d [ 52.898349][ T3497] ? check_panic_on_warn+0x1d/0xa0 [ 52.903457][ T3497] ? fb_is_primary_device+0xcc/0xcc [ 52.908651][ T3497] ? _raw_spin_unlock_irqrestore+0x128/0x130 [ 52.914642][ T3497] ? _raw_spin_unlock+0x40/0x40 [ 52.919595][ T3497] ? print_memory_metadata+0xe2/0x140 [ 52.924978][ T3497] check_panic_on_warn+0x7e/0xa0 [ 52.929964][ T3497] ? ntfs_listxattr+0x3a2/0x5b0 [ 52.934831][ T3497] end_report+0x6d/0xf0 [ 52.938982][ T3497] kasan_report+0x18e/0x1c0 [ 52.943587][ T3497] ? ntfs_listxattr+0x3a2/0x5b0 [ 52.948447][ T3497] kasan_check_range+0x27e/0x290 [ 52.953411][ T3497] ? ntfs_listxattr+0x3a2/0x5b0 [ 52.958269][ T3497] memcpy+0x25/0x60 [ 52.962078][ T3497] ntfs_listxattr+0x3a2/0x5b0 [ 52.966754][ T3497] ? ntfs_permission+0xf0/0xf0 [ 52.971516][ T3497] ? __kmalloc_node+0x199/0x390 [ 52.976505][ T3497] ? kvmalloc_node+0x80/0x140 [ 52.981192][ T3497] ? bpf_lsm_inode_listxattr+0x5/0x10 [ 52.986653][ T3497] listxattr+0x282/0x2e0 [ 52.991058][ T3497] ? ntfs_permission+0xf0/0xf0 [ 52.995843][ T3497] __x64_sys_listxattr+0x172/0x230 [ 53.000972][ T3497] ? print_irqtrace_events+0x210/0x210 [ 53.006447][ T3497] ? __ia32_sys_fgetxattr+0x200/0x200 [ 53.011812][ T3497] ? syscall_enter_from_user_mode+0x2e/0x230 [ 53.017792][ T3497] ? lockdep_hardirqs_on+0x94/0x130 [ 53.022995][ T3497] ? syscall_enter_from_user_mode+0x2e/0x230 [ 53.028977][ T3497] do_syscall_64+0x3d/0xb0 [ 53.033412][ T3497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.039301][ T3497] RIP: 0033:0x7ff45ae375f9 [ 53.043719][ T3497] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 53.063494][ T3497] RSP: 002b:00007fff89b964d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000c2 [ 53.071923][ T3497] RAX: ffffffffffffffda RBX: 0032656c69662f2e RCX: 00007ff45ae375f9 [ 53.079889][ T3497] RDX: 0000000000000098 RSI: 0000000020000100 RDI: 0000000020000040 [ 53.087856][ T3497] RBP: 00007ff45aec9610 R08: 000000000001f1b1 R09: 0000000000000000 [ 53.095821][ T3497] R10: 00007fff89b963a0 R11: 0000000000000246 R12: 0000000000000001 [ 53.103787][ T3497] R13: 00007fff89b966a8 R14: 0000000000000001 R15: 0000000000000001 [ 53.111767][ T3497] [ 53.115095][ T3497] Kernel Offset: disabled [ 53.119427][ T3497] Rebooting in 86400 seconds..