Warning: Permanently added '10.128.1.97' (ED25519) to the list of known hosts. [ 135.435388][ T27] audit: type=1400 audit(1700472853.645:83): avc: denied { execmem } for pid=5073 comm="syz-executor176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 executing program [ 135.487712][ T27] audit: type=1400 audit(1700472853.695:84): avc: denied { read write } for pid=5073 comm="syz-executor176" name="loop0" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.513801][ T27] audit: type=1400 audit(1700472853.695:85): avc: denied { open } for pid=5073 comm="syz-executor176" path="/dev/loop0" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.538701][ T27] audit: type=1400 audit(1700472853.695:86): avc: denied { ioctl } for pid=5073 comm="syz-executor176" path="/dev/loop0" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.553089][ T5074] loop0: detected capacity change from 0 to 2048 [ 135.577138][ T27] audit: type=1400 audit(1700472853.785:87): avc: denied { mounton } for pid=5074 comm="syz-executor176" path="/root/syzkaller.MhahL5/0/file0" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 135.604337][ T5074] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 135.615443][ T27] audit: type=1400 audit(1700472853.825:88): avc: denied { mount } for pid=5074 comm="syz-executor176" name="/" dev="loop0" ino=1376 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 135.699189][ T27] audit: type=1400 audit(1700472853.905:89): avc: denied { mounton } for pid=5074 comm="syz-executor176" path="/root/syzkaller.MhahL5/0/bus" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 135.854116][ T27] audit: type=1400 audit(1700472854.055:90): avc: denied { unmount } for pid=5073 comm="syz-executor176" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 135.876007][ T27] audit: type=1400 audit(1700472854.065:91): avc: denied { unmount } for pid=5073 comm="syz-executor176" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 135.884822][ T5073] ================================================================== [ 135.898558][ T27] audit: type=1400 audit(1700472854.095:92): avc: denied { append } for pid=4494 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 135.904312][ T5073] BUG: KASAN: use-after-free in udf_close_lvid+0x508/0x5c0 [ 135.933579][ T5073] Write of size 1 at addr ffff88808ad6f6c8 by task syz-executor176/5073 [ 135.941886][ T5073] [ 135.944194][ T5073] CPU: 1 PID: 5073 Comm: syz-executor176 Not tainted 6.7.0-rc1-syzkaller-00366-geb3479bc23fa #0 [ 135.954587][ T5073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 135.964626][ T5073] Call Trace: [ 135.967923][ T5073] [ 135.970860][ T5073] dump_stack_lvl+0xd9/0x1b0 [ 135.975440][ T5073] print_report+0xc4/0x620 [ 135.979843][ T5073] ? __virt_addr_valid+0x5e/0x2d0 [ 135.984855][ T5073] ? __phys_addr+0xc6/0x140 [ 135.989344][ T5073] kasan_report+0xda/0x110 [ 135.993763][ T5073] ? udf_close_lvid+0x508/0x5c0 [ 135.998602][ T5073] ? udf_close_lvid+0x508/0x5c0 [ 136.003445][ T5073] udf_close_lvid+0x508/0x5c0 [ 136.008128][ T5073] ? fscrypt_destroy_keyring+0x1e/0x3d0 [ 136.013688][ T5073] udf_put_super+0x19c/0x200 [ 136.018285][ T5073] ? udf_close_lvid+0x5c0/0x5c0 [ 136.023147][ T5073] generic_shutdown_super+0x161/0x3d0 [ 136.028530][ T5073] kill_block_super+0x3b/0x90 [ 136.033217][ T5073] deactivate_locked_super+0xbc/0x1a0 [ 136.038597][ T5073] deactivate_super+0xde/0x100 [ 136.043379][ T5073] cleanup_mnt+0x222/0x450 [ 136.047803][ T5073] task_work_run+0x14d/0x240 [ 136.052403][ T5073] ? task_work_cancel+0x30/0x30 [ 136.057270][ T5073] ? __x64_sys_umount+0x128/0x1a0 [ 136.062302][ T5073] exit_to_user_mode_prepare+0x217/0x240 [ 136.067946][ T5073] syscall_exit_to_user_mode+0x1e/0x60 [ 136.073416][ T5073] do_syscall_64+0x4d/0x110 [ 136.077921][ T5073] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 136.083827][ T5073] RIP: 0033:0x7f0039e93587 [ 136.088326][ T5073] Code: 09 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 [ 136.108020][ T5073] RSP: 002b:00007ffc2927fbd8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 136.116433][ T5073] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f0039e93587 [ 136.124403][ T5073] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007ffc2927fc90 [ 136.132370][ T5073] RBP: 00007ffc2927fc90 R08: 0000000000000000 R09: 0000000000000000 [ 136.140339][ T5073] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffc29280d00 [ 136.148308][ T5073] R13: 0000555555a5f6c0 R14: 431bde82d7b634db R15: 00007ffc29280d20 [ 136.156283][ T5073] [ 136.159299][ T5073] [ 136.161616][ T5073] The buggy address belongs to the physical page: [ 136.168016][ T5073] page:ffffea00022b5bc0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8ad6f [ 136.178167][ T5073] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 136.185270][ T5073] page_type: 0xffffffff() [ 136.189595][ T5073] raw: 00fff00000000000 ffffea00022b5bc8 ffffea00022b5bc8 0000000000000000 [ 136.198177][ T5073] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 136.206749][ T5073] page dumped because: kasan: bad access detected [ 136.213165][ T5073] page_owner info is not present (never set?) [ 136.219218][ T5073] [ 136.221538][ T5073] Memory state around the buggy address: [ 136.227155][ T5073] ffff88808ad6f580: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 136.235208][ T5073] ffff88808ad6f600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 136.243263][ T5073] >ffff88808ad6f680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 136.251311][ T5073] ^ [ 136.257714][ T5073] ffff88808ad6f700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 136.265765][ T5073] ffff88808ad6f780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 136.273814][ T5073] ================================================================== [ 136.282367][ T5073] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 136.289568][ T5073] CPU: 1 PID: 5073 Comm: syz-executor176 Not tainted 6.7.0-rc1-syzkaller-00366-geb3479bc23fa #0 [ 136.299985][ T5073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 136.310032][ T5073] Call Trace: [ 136.313334][ T5073] [ 136.316268][ T5073] dump_stack_lvl+0xd9/0x1b0 [ 136.320871][ T5073] panic+0x6dc/0x790 [ 136.324774][ T5073] ? panic_smp_self_stop+0xa0/0xa0 [ 136.329895][ T5073] ? preempt_schedule_thunk+0x1a/0x30 [ 136.335276][ T5073] ? preempt_schedule_common+0x45/0xc0 [ 136.340743][ T5073] ? check_panic_on_warn+0x1f/0xb0 [ 136.345861][ T5073] check_panic_on_warn+0xab/0xb0 [ 136.350802][ T5073] end_report+0x108/0x150 [ 136.355127][ T5073] kasan_report+0xea/0x110 [ 136.359543][ T5073] ? udf_close_lvid+0x508/0x5c0 [ 136.364399][ T5073] ? udf_close_lvid+0x508/0x5c0 [ 136.369250][ T5073] udf_close_lvid+0x508/0x5c0 [ 136.373932][ T5073] ? fscrypt_destroy_keyring+0x1e/0x3d0 [ 136.380094][ T5073] udf_put_super+0x19c/0x200 [ 136.384690][ T5073] ? udf_close_lvid+0x5c0/0x5c0 [ 136.389540][ T5073] generic_shutdown_super+0x161/0x3d0 [ 136.394919][ T5073] kill_block_super+0x3b/0x90 [ 136.399603][ T5073] deactivate_locked_super+0xbc/0x1a0 [ 136.404983][ T5073] deactivate_super+0xde/0x100 [ 136.409754][ T5073] cleanup_mnt+0x222/0x450 [ 136.414175][ T5073] task_work_run+0x14d/0x240 [ 136.418791][ T5073] ? task_work_cancel+0x30/0x30 [ 136.423649][ T5073] ? __x64_sys_umount+0x128/0x1a0 [ 136.428678][ T5073] exit_to_user_mode_prepare+0x217/0x240 [ 136.434319][ T5073] syscall_exit_to_user_mode+0x1e/0x60 [ 136.439787][ T5073] do_syscall_64+0x4d/0x110 [ 136.444290][ T5073] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 136.450192][ T5073] RIP: 0033:0x7f0039e93587 [ 136.454610][ T5073] Code: 09 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 [ 136.474302][ T5073] RSP: 002b:00007ffc2927fbd8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 136.482711][ T5073] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f0039e93587 [ 136.490676][ T5073] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007ffc2927fc90 [ 136.498644][ T5073] RBP: 00007ffc2927fc90 R08: 0000000000000000 R09: 0000000000000000 [ 136.506630][ T5073] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffc29280d00 [ 136.514603][ T5073] R13: 0000555555a5f6c0 R14: 431bde82d7b634db R15: 00007ffc29280d20 [ 136.522581][ T5073] [ 136.525793][ T5073] Kernel Offset: disabled [ 136.530098][ T5073] Rebooting in 86400 seconds..