Warning: Permanently added '10.128.10.57' (ECDSA) to the list of known hosts. executing program [ 41.077887] audit: type=1400 audit(1602641773.392:8): avc: denied { execmem } for pid=6469 comm="syz-executor983" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 41.105830] ntfs: (device loop0): is_boot_sector_ntfs(): Invalid end of sector marker. [ 41.116116] ================================================================== [ 41.123501] BUG: KASAN: slab-out-of-bounds in ntfs_attr_find+0xa42/0xb70 [ 41.130354] Read of size 4 at addr ffff88808914ba00 by task syz-executor983/6470 [ 41.137968] [ 41.139614] CPU: 0 PID: 6470 Comm: syz-executor983 Not tainted 4.19.150-syzkaller #0 [ 41.147642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.156973] Call Trace: [ 41.159544] dump_stack+0x22c/0x33e [ 41.163205] print_address_description.cold+0x56/0x25c [ 41.168521] kasan_report_error.cold+0x66/0xb9 [ 41.173099] ? ntfs_attr_find+0xa42/0xb70 [ 41.177227] __asan_report_load_n_noabort+0x8b/0xa0 [ 41.182229] ? ntfs_attr_find+0xa42/0xb70 [ 41.186354] ntfs_attr_find+0xa42/0xb70 [ 41.190320] ntfs_attr_lookup+0x1087/0x2060 [ 41.194625] ? do_raw_spin_unlock+0x171/0x240 [ 41.199098] ? cache_alloc_refill+0x351/0x410 [ 41.203569] ? guard_bio_eod+0x2de/0x690 [ 41.207609] ? check_preemption_disabled+0x41/0x2b0 [ 41.212618] ? ntfs_attr_reinit_search_ctx+0x3c0/0x3c0 [ 41.217873] ? kmem_cache_alloc+0x31b/0x4a0 [ 41.222174] ntfs_read_inode_mount+0x7e4/0x23b0 [ 41.226829] ntfs_fill_super+0x1761/0x89d2 [ 41.231045] ? snprintf+0xbb/0xf0 [ 41.234473] ? vsprintf+0x30/0x30 [ 41.237933] ? ntfs_remount+0x500/0x500 [ 41.241898] ? __mutex_add_waiter+0x160/0x160 [ 41.246372] ? set_blocksize+0x163/0x3f0 [ 41.250415] mount_bdev+0x2fc/0x3b0 [ 41.254028] ? ntfs_remount+0x500/0x500 [ 41.258000] mount_fs+0xa3/0x318 [ 41.261362] vfs_kern_mount.part.0+0x68/0x470 [ 41.265837] do_mount+0x51c/0x2f10 [ 41.269354] ? check_preemption_disabled+0x41/0x2b0 [ 41.274348] ? copy_mount_string+0x40/0x40 [ 41.278563] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 41.283382] ? _copy_from_user+0xd2/0x130 [ 41.287507] ? copy_mount_options+0x261/0x370 [ 41.291996] ksys_mount+0xcf/0x130 [ 41.295513] __x64_sys_mount+0xba/0x150 [ 41.299503] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 41.304064] do_syscall_64+0xf9/0x670 [ 41.307844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.313014] RIP: 0033:0x4484ba [ 41.316211] Code: b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d a3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a a3 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 41.335089] RSP: 002b:00007ffc46e09388 EFLAGS: 00000287 ORIG_RAX: 00000000000000a5 [ 41.342772] RAX: ffffffffffffffda RBX: 00007ffc46e093e0 RCX: 00000000004484ba [ 41.350038] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffc46e093a0 [ 41.357301] RBP: 00007ffc46e093a0 R08: 00007ffc46e093e0 R09: 0000000000000000 [ 41.364556] R10: 0000000000000000 R11: 0000000000000287 R12: 000000000000003a [ 41.371815] R13: 0000000000000004 R14: 0000000000000003 R15: 0000000000000003 [ 41.379066] [ 41.380687] Allocated by task 6463: [ 41.384297] kmem_cache_alloc+0x126/0x4a0 [ 41.388422] getname_flags+0xce/0x590 [ 41.392203] user_path_at_empty+0x2a/0x50 [ 41.396341] vfs_statx+0x113/0x210 [ 41.399856] __se_sys_newstat+0x96/0x120 [ 41.403893] do_syscall_64+0xf9/0x670 [ 41.407687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.412863] [ 41.414467] Freed by task 6463: [ 41.417740] kmem_cache_free+0x7f/0x2b0 [ 41.421692] putname+0xe1/0x130 [ 41.424964] filename_lookup+0x3d0/0x5a0 [ 41.429016] vfs_statx+0x113/0x210 [ 41.432532] __se_sys_newstat+0x96/0x120 [ 41.436571] do_syscall_64+0xf9/0x670 [ 41.440367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.445576] [ 41.447182] The buggy address belongs to the object at ffff88808914aa00 [ 41.447182] which belongs to the cache names_cache of size 4096 [ 41.459914] The buggy address is located 0 bytes to the right of [ 41.459914] 4096-byte region [ffff88808914aa00, ffff88808914ba00) [ 41.472206] The buggy address belongs to the page: [ 41.477118] page:ffffea0002245280 count:1 mapcount:0 mapping:ffff88821bc44b00 index:0x0 compound_mapcount: 0 [ 41.487075] flags: 0xfffe0000008100(slab|head) [ 41.491638] raw: 00fffe0000008100 ffffea0002241708 ffffea00028fbe08 ffff88821bc44b00 [ 41.499618] raw: 0000000000000000 ffff88808914aa00 0000000100000001 0000000000000000 [ 41.507472] page dumped because: kasan: bad access detected [ 41.513155] [ 41.515383] Memory state around the buggy address: [ 41.520315] ffff88808914b900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.527738] ffff88808914b980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.535073] >ffff88808914ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.542410] ^ [ 41.545754] ffff88808914ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.553138] ffff88808914bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.560487] ================================================================== [ 41.567837] Disabling lock debugging due to kernel taint [ 41.578353] Kernel panic - not syncing: panic_on_warn set ... [ 41.578353] [ 41.585741] CPU: 0 PID: 6470 Comm: syz-executor983 Tainted: G B 4.19.150-syzkaller #0 [ 41.595005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.604449] Call Trace: [ 41.607031] dump_stack+0x22c/0x33e [ 41.610637] panic+0x2ac/0x565 [ 41.613816] ? __warn_printk+0xf3/0xf3 [ 41.617689] ? preempt_schedule_common+0x45/0xc0 [ 41.622425] ? ___preempt_schedule+0x16/0x18 [ 41.626861] ? trace_hardirqs_on+0x55/0x210 [ 41.631218] kasan_end_report+0x43/0x49 [ 41.635175] kasan_report_error.cold+0x83/0xb9 [ 41.639737] ? ntfs_attr_find+0xa42/0xb70 [ 41.643865] __asan_report_load_n_noabort+0x8b/0xa0 [ 41.648863] ? ntfs_attr_find+0xa42/0xb70 [ 41.653052] ntfs_attr_find+0xa42/0xb70 [ 41.657073] ntfs_attr_lookup+0x1087/0x2060 [ 41.661376] ? do_raw_spin_unlock+0x171/0x240 [ 41.665853] ? cache_alloc_refill+0x351/0x410 [ 41.670427] ? guard_bio_eod+0x2de/0x690 [ 41.674468] ? check_preemption_disabled+0x41/0x2b0 [ 41.679465] ? ntfs_attr_reinit_search_ctx+0x3c0/0x3c0 [ 41.684722] ? kmem_cache_alloc+0x31b/0x4a0 [ 41.689025] ntfs_read_inode_mount+0x7e4/0x23b0 [ 41.693732] ntfs_fill_super+0x1761/0x89d2 [ 41.697957] ? snprintf+0xbb/0xf0 [ 41.701396] ? vsprintf+0x30/0x30 [ 41.704838] ? ntfs_remount+0x500/0x500 [ 41.708805] ? __mutex_add_waiter+0x160/0x160 [ 41.713293] ? set_blocksize+0x163/0x3f0 [ 41.717456] mount_bdev+0x2fc/0x3b0 [ 41.721075] ? ntfs_remount+0x500/0x500 [ 41.725032] mount_fs+0xa3/0x318 [ 41.728442] vfs_kern_mount.part.0+0x68/0x470 [ 41.732919] do_mount+0x51c/0x2f10 [ 41.736441] ? check_preemption_disabled+0x41/0x2b0 [ 41.741455] ? copy_mount_string+0x40/0x40 [ 41.745674] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 41.750499] ? _copy_from_user+0xd2/0x130 [ 41.754626] ? copy_mount_options+0x261/0x370 [ 41.759109] ksys_mount+0xcf/0x130 [ 41.762637] __x64_sys_mount+0xba/0x150 [ 41.766595] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 41.771194] do_syscall_64+0xf9/0x670 [ 41.774996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.780215] RIP: 0033:0x4484ba [ 41.783406] Code: b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d a3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a a3 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 41.802307] RSP: 002b:00007ffc46e09388 EFLAGS: 00000287 ORIG_RAX: 00000000000000a5 [ 41.810084] RAX: ffffffffffffffda RBX: 00007ffc46e093e0 RCX: 00000000004484ba [ 41.817361] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ffc46e093a0 [ 41.824626] RBP: 00007ffc46e093a0 R08: 00007ffc46e093e0 R09: 0000000000000000 [ 41.831873] R10: 0000000000000000 R11: 0000000000000287 R12: 000000000000003a [ 41.839137] R13: 0000000000000004 R14: 0000000000000003 R15: 0000000000000003 [ 41.847689] Kernel Offset: disabled [ 41.851309] Rebooting in 86400 seconds..