[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.15.196' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 36.560389] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 36.567326] UDF-fs: Scanning with blocksize 512 failed [ 36.576122] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 36.582799] UDF-fs: Scanning with blocksize 1024 failed [ 36.588889] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 36.595624] UDF-fs: Scanning with blocksize 2048 failed [ 36.601324] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 36.612337] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 36.627833] ================================================================== [ 36.635279] BUG: KASAN: slab-out-of-bounds in udf_write_aext+0x780/0x860 [ 36.642114] Write of size 4 at addr ffff8880abb9e5f0 by task syz-executor728/8097 [ 36.649724] [ 36.651344] CPU: 1 PID: 8097 Comm: syz-executor728 Not tainted 4.19.211-syzkaller #0 [ 36.659206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 36.668537] Call Trace: [ 36.671104] dump_stack+0x1fc/0x2ef [ 36.674713] print_address_description.cold+0x54/0x219 [ 36.679967] kasan_report_error.cold+0x8a/0x1b9 [ 36.684619] ? udf_write_aext+0x780/0x860 [ 36.688750] __asan_report_store_n_noabort+0x8b/0xa0 [ 36.693846] ? udf_write_aext+0x780/0x860 [ 36.697978] udf_write_aext+0x780/0x860 [ 36.701933] udf_add_entry+0xdab/0x2a20 [ 36.705905] ? udf_write_fi+0xf40/0xf40 [ 36.709870] ? udf_new_inode+0xa7b/0xf30 [ 36.713931] udf_mkdir+0x145/0x650 [ 36.717458] ? map_id_up+0x178/0x2f0 [ 36.721153] ? udf_create+0x180/0x180 [ 36.724935] ? putname+0xe1/0x120 [ 36.728372] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 36.733370] ? generic_permission+0x116/0x4d0 [ 36.737843] ? security_inode_permission+0xc5/0xf0 [ 36.742755] ? inode_permission.part.0+0x10c/0x450 [ 36.747667] vfs_mkdir+0x508/0x7a0 [ 36.751186] do_mkdirat+0x262/0x2d0 [ 36.754805] ? __ia32_sys_mknod+0x120/0x120 [ 36.759119] ? trace_hardirqs_off_caller+0x6e/0x210 [ 36.764119] ? do_syscall_64+0x21/0x620 [ 36.768081] do_syscall_64+0xf9/0x620 [ 36.771868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.777037] RIP: 0033:0x7fc51643ae67 [ 36.780732] Code: ff ff ff ff c3 66 0f 1f 44 00 00 48 c7 c0 c0 ff ff ff 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 36.799612] RSP: 002b:00007ffddcd205a8 EFLAGS: 00000286 ORIG_RAX: 0000000000000053 [ 36.807298] RAX: ffffffffffffffda RBX: 0000555555d672c0 RCX: 00007fc51643ae67 [ 36.814546] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 [ 36.821791] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 36.829037] R10: 0000000000000000 R11: 0000000000000286 R12: 0000000020000040 [ 36.836287] R13: 00000000200002c0 R14: 0000000000000000 R15: 00007ffddcd20640 [ 36.843539] [ 36.845146] Allocated by task 8097: [ 36.848754] __kmalloc+0x15a/0x3c0 [ 36.852274] udf_new_inode+0x220/0xf30 [ 36.856136] udf_mkdir+0xa8/0x650 [ 36.859565] vfs_mkdir+0x508/0x7a0 [ 36.863079] do_mkdirat+0x262/0x2d0 [ 36.866681] do_syscall_64+0xf9/0x620 [ 36.870458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.875618] [ 36.877220] Freed by task 0: [ 36.880210] (stack is not available) [ 36.883894] [ 36.885501] The buggy address belongs to the object at ffff8880abb9e600 [ 36.885501] which belongs to the cache kmalloc-4096 of size 4096 [ 36.898313] The buggy address is located 16 bytes to the left of [ 36.898313] 4096-byte region [ffff8880abb9e600, ffff8880abb9f600) [ 36.910603] The buggy address belongs to the page: [ 36.915515] page:ffffea0002aee780 count:1 mapcount:0 mapping:ffff88813bff0dc0 index:0x0 compound_mapcount: 0 [ 36.925466] flags: 0xfff00000008100(slab|head) [ 36.930058] raw: 00fff00000008100 ffffea0002d45e08 ffffea000255bf88 ffff88813bff0dc0 [ 36.937918] raw: 0000000000000000 ffff8880abb9e600 0000000100000001 0000000000000000 [ 36.945771] page dumped because: kasan: bad access detected [ 36.951451] [ 36.953052] Memory state around the buggy address: [ 36.957960] ffff8880abb9e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.965296] ffff8880abb9e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.972633] >ffff8880abb9e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.979967] ^ [ 36.986953] ffff8880abb9e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.994287] ffff8880abb9e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.001619] ================================================================== [ 37.008950] Disabling lock debugging due to kernel taint [ 37.014582] Kernel panic - not syncing: panic_on_warn set ... [ 37.014582] [ 37.021948] CPU: 1 PID: 8097 Comm: syz-executor728 Tainted: G B 4.19.211-syzkaller #0 [ 37.031210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 37.040550] Call Trace: [ 37.043118] dump_stack+0x1fc/0x2ef [ 37.046723] panic+0x26a/0x50e [ 37.049892] ? __warn_printk+0xf3/0xf3 [ 37.053756] ? preempt_schedule_common+0x45/0xc0 [ 37.058494] ? ___preempt_schedule+0x16/0x18 [ 37.062881] ? trace_hardirqs_on+0x55/0x210 [ 37.067180] kasan_end_report+0x43/0x49 [ 37.071137] kasan_report_error.cold+0xa7/0x1b9 [ 37.075788] ? udf_write_aext+0x780/0x860 [ 37.079912] __asan_report_store_n_noabort+0x8b/0xa0 [ 37.084992] ? udf_write_aext+0x780/0x860 [ 37.089114] udf_write_aext+0x780/0x860 [ 37.093073] udf_add_entry+0xdab/0x2a20 [ 37.097025] ? udf_write_fi+0xf40/0xf40 [ 37.100977] ? udf_new_inode+0xa7b/0xf30 [ 37.105019] udf_mkdir+0x145/0x650 [ 37.108535] ? map_id_up+0x178/0x2f0 [ 37.112222] ? udf_create+0x180/0x180 [ 37.115998] ? putname+0xe1/0x120 [ 37.119437] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 37.124430] ? generic_permission+0x116/0x4d0 [ 37.128902] ? security_inode_permission+0xc5/0xf0 [ 37.133808] ? inode_permission.part.0+0x10c/0x450 [ 37.138714] vfs_mkdir+0x508/0x7a0 [ 37.142230] do_mkdirat+0x262/0x2d0 [ 37.145834] ? __ia32_sys_mknod+0x120/0x120 [ 37.150134] ? trace_hardirqs_off_caller+0x6e/0x210 [ 37.155127] ? do_syscall_64+0x21/0x620 [ 37.159077] do_syscall_64+0xf9/0x620 [ 37.162856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.168021] RIP: 0033:0x7fc51643ae67 [ 37.171711] Code: ff ff ff ff c3 66 0f 1f 44 00 00 48 c7 c0 c0 ff ff ff 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 37.190587] RSP: 002b:00007ffddcd205a8 EFLAGS: 00000286 ORIG_RAX: 0000000000000053 [ 37.198270] RAX: ffffffffffffffda RBX: 0000555555d672c0 RCX: 00007fc51643ae67 [ 37.205514] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 [ 37.212758] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 37.220003] R10: 0000000000000000 R11: 0000000000000286 R12: 0000000020000040 [ 37.227247] R13: 00000000200002c0 R14: 0000000000000000 R15: 00007ffddcd20640 [ 37.234668] Kernel Offset: disabled [ 37.238275] Rebooting in 86400 seconds..