Warning: Permanently added '10.128.0.51' (ED25519) to the list of known hosts. executing program [ 35.564415][ T4228] loop0: detected capacity change from 0 to 2048 [ 35.572826][ T4228] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 35.574695][ T4228] UDF-fs: Scanning with blocksize 512 failed [ 35.578571][ T4228] UDF-fs: error (device loop0): udf_read_tagged: tag checksum failed, block 112: 0xb2 != 0xba [ 35.581816][ T4228] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 35.587777][ T4228] ================================================================== [ 35.589776][ T4228] BUG: KASAN: slab-out-of-bounds in udf_write_aext+0x578/0x668 [ 35.591679][ T4228] Write of size 4 at addr ffff0000d84af7f8 by task syz-executor192/4228 [ 35.593862][ T4228] [ 35.594440][ T4228] CPU: 0 PID: 4228 Comm: syz-executor192 Not tainted 6.1.79-syzkaller #0 [ 35.596489][ T4228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 35.598911][ T4228] Call trace: [ 35.599782][ T4228] dump_backtrace+0x1c8/0x1f4 [ 35.601015][ T4228] show_stack+0x2c/0x3c [ 35.602087][ T4228] dump_stack_lvl+0x108/0x170 [ 35.603247][ T4228] print_report+0x174/0x4c0 [ 35.604332][ T4228] kasan_report+0xd4/0x130 [ 35.605467][ T4228] __asan_report_store_n_noabort+0x28/0x34 [ 35.607069][ T4228] udf_write_aext+0x578/0x668 [ 35.608289][ T4228] udf_add_entry+0x11e0/0x28b0 [ 35.609583][ T4228] udf_mkdir+0x158/0x7e0 [ 35.610614][ T4228] vfs_mkdir+0x334/0x4e4 [ 35.611676][ T4228] do_mkdirat+0x220/0x510 [ 35.612777][ T4228] __arm64_sys_mkdirat+0x90/0xa8 [ 35.613936][ T4228] invoke_syscall+0x98/0x2c0 [ 35.615055][ T4228] el0_svc_common+0x138/0x258 [ 35.616186][ T4228] do_el0_svc+0x64/0x218 [ 35.617240][ T4228] el0_svc+0x58/0x168 [ 35.618220][ T4228] el0t_64_sync_handler+0x84/0xf0 [ 35.619519][ T4228] el0t_64_sync+0x18c/0x190 [ 35.620558][ T4228] [ 35.621107][ T4228] Allocated by task 4228: [ 35.622061][ T4228] kasan_set_track+0x4c/0x80 [ 35.623271][ T4228] kasan_save_alloc_info+0x24/0x30 [ 35.624516][ T4228] __kasan_kmalloc+0xac/0xc4 [ 35.625668][ T4228] __kmalloc+0xd8/0x1c4 [ 35.626832][ T4228] __udf_iget+0x988/0x3134 [ 35.627943][ T4228] udf_fill_super+0xf9c/0x1a44 [ 35.629267][ T4228] mount_bdev+0x274/0x370 [ 35.630433][ T4228] udf_mount+0x44/0x58 [ 35.631417][ T4228] legacy_get_tree+0xd4/0x16c [ 35.632563][ T4228] vfs_get_tree+0x90/0x274 [ 35.633591][ T4228] do_new_mount+0x278/0x8fc [ 35.634677][ T4228] path_mount+0x590/0xe5c [ 35.635689][ T4228] __arm64_sys_mount+0x45c/0x594 [ 35.636932][ T4228] invoke_syscall+0x98/0x2c0 [ 35.638100][ T4228] el0_svc_common+0x138/0x258 [ 35.639234][ T4228] do_el0_svc+0x64/0x218 [ 35.640256][ T4228] el0_svc+0x58/0x168 [ 35.641392][ T4228] el0t_64_sync_handler+0x84/0xf0 [ 35.642549][ T4228] el0t_64_sync+0x18c/0x190 [ 35.643785][ T4228] [ 35.644324][ T4228] The buggy address belongs to the object at ffff0000d84af000 [ 35.644324][ T4228] which belongs to the cache kmalloc-1k of size 1024 [ 35.647538][ T4228] The buggy address is located 1016 bytes to the right of [ 35.647538][ T4228] 1024-byte region [ffff0000d84af000, ffff0000d84af400) [ 35.651017][ T4228] [ 35.651597][ T4228] The buggy address belongs to the physical page: [ 35.653333][ T4228] page:0000000066745f7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1184a8 [ 35.655961][ T4228] head:0000000066745f7f order:3 compound_mapcount:0 compound_pincount:0 [ 35.657971][ T4228] flags: 0x5ffc00000010200(slab|head|node=0|zone=2|lastcpupid=0x7ff) [ 35.659969][ T4228] raw: 05ffc00000010200 0000000000000000 dead000000000122 ffff0000c0002780 [ 35.662102][ T4228] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 35.664236][ T4228] page dumped because: kasan: bad access detected [ 35.665765][ T4228] [ 35.666349][ T4228] Memory state around the buggy address: [ 35.667737][ T4228] ffff0000d84af680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.669745][ T4228] ffff0000d84af700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.671891][ T4228] >ffff0000d84af780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.674056][ T4228] ^ [ 35.676107][ T4228] ffff0000d84af800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.678007][ T4228] ffff0000d84af880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.680102][ T4228] ================================================================== [ 35.682373][ T4228] Disabling lock debugging due to kernel taint