Warning: Permanently added '10.128.0.109' (ED25519) to the list of known hosts. executing program [ 33.440026][ T4219] loop0: detected capacity change from 0 to 2048 [ 33.443182][ T4219] ======================================================= [ 33.443182][ T4219] WARNING: The mand mount option has been deprecated and [ 33.443182][ T4219] and is ignored by this kernel. Remove the mand [ 33.443182][ T4219] option from the mount to silence this warning. [ 33.443182][ T4219] ======================================================= [ 33.454054][ T4219] UDF-fs: error (device loop0): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d [ 33.457499][ T4219] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 33.472239][ T4219] ================================================================== [ 33.474064][ T4219] BUG: KASAN: slab-out-of-bounds in udf_write_aext+0x4c0/0x668 [ 33.475619][ T4219] Write of size 4 at addr ffff0000dcf41bf0 by task syz-executor306/4219 [ 33.477451][ T4219] [ 33.478148][ T4219] CPU: 1 PID: 4219 Comm: syz-executor306 Not tainted 6.1.77-syzkaller #0 [ 33.479964][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 33.482213][ T4219] Call trace: [ 33.482900][ T4219] dump_backtrace+0x1c8/0x1f4 [ 33.483970][ T4219] show_stack+0x2c/0x3c [ 33.484861][ T4219] dump_stack_lvl+0x108/0x170 [ 33.485874][ T4219] print_report+0x174/0x4c0 [ 33.486955][ T4219] kasan_report+0xd4/0x130 [ 33.488000][ T4219] __asan_report_store_n_noabort+0x28/0x34 [ 33.489188][ T4219] udf_write_aext+0x4c0/0x668 [ 33.490246][ T4219] udf_add_entry+0x11e0/0x28b0 [ 33.491314][ T4219] udf_mkdir+0x158/0x7e0 [ 33.492193][ T4219] vfs_mkdir+0x334/0x4e4 [ 33.493006][ T4219] do_mkdirat+0x220/0x510 [ 33.493966][ T4219] __arm64_sys_mkdirat+0x90/0xa8 [ 33.494993][ T4219] invoke_syscall+0x98/0x2c0 [ 33.495933][ T4219] el0_svc_common+0x138/0x258 [ 33.497201][ T4219] do_el0_svc+0x64/0x218 [ 33.498077][ T4219] el0_svc+0x58/0x168 [ 33.498861][ T4219] el0t_64_sync_handler+0x84/0xf0 [ 33.500019][ T4219] el0t_64_sync+0x18c/0x190 [ 33.500928][ T4219] [ 33.501417][ T4219] Allocated by task 3855: [ 33.502328][ T4219] kasan_set_track+0x4c/0x80 [ 33.503350][ T4219] kasan_save_alloc_info+0x24/0x30 [ 33.504451][ T4219] __kasan_kmalloc+0xac/0xc4 [ 33.505522][ T4219] __kmalloc_node_track_caller+0xd0/0x1c0 [ 33.506824][ T4219] __alloc_skb+0x180/0x580 [ 33.507802][ T4219] alloc_uevent_skb+0x78/0x1e4 [ 33.508829][ T4219] kobject_uevent_net_broadcast+0x2bc/0x528 [ 33.510191][ T4219] kobject_uevent_env+0x530/0x874 [ 33.511317][ T4219] kobject_synth_uevent+0x818/0xa70 [ 33.512471][ T4219] uevent_store+0x34/0x84 [ 33.513426][ T4219] dev_attr_store+0x6c/0x90 [ 33.514405][ T4219] sysfs_kf_write+0x200/0x280 [ 33.515424][ T4219] kernfs_fop_write_iter+0x334/0x48c [ 33.516585][ T4219] vfs_write+0x610/0x914 [ 33.517481][ T4219] ksys_write+0x15c/0x26c [ 33.518480][ T4219] __arm64_sys_write+0x7c/0x90 [ 33.519525][ T4219] invoke_syscall+0x98/0x2c0 [ 33.520511][ T4219] el0_svc_common+0x138/0x258 [ 33.521489][ T4219] do_el0_svc+0x64/0x218 [ 33.522457][ T4219] el0_svc+0x58/0x168 [ 33.523303][ T4219] el0t_64_sync_handler+0x84/0xf0 [ 33.524377][ T4219] el0t_64_sync+0x18c/0x190 [ 33.525400][ T4219] [ 33.525859][ T4219] The buggy address belongs to the object at ffff0000dcf41800 [ 33.525859][ T4219] which belongs to the cache kmalloc-512 of size 512 [ 33.528874][ T4219] The buggy address is located 496 bytes to the right of [ 33.528874][ T4219] 512-byte region [ffff0000dcf41800, ffff0000dcf41a00) [ 33.531797][ T4219] [ 33.532254][ T4219] The buggy address belongs to the physical page: [ 33.533582][ T4219] page:00000000efb60d4c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11cf40 [ 33.535795][ T4219] head:00000000efb60d4c order:2 compound_mapcount:0 compound_pincount:0 [ 33.537618][ T4219] flags: 0x5ffc00000010200(slab|head|node=0|zone=2|lastcpupid=0x7ff) [ 33.539420][ T4219] raw: 05ffc00000010200 fffffc000365da00 dead000000000002 ffff0000c0002600 [ 33.541441][ T4219] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 33.543287][ T4219] page dumped because: kasan: bad access detected [ 33.544726][ T4219] [ 33.545215][ T4219] Memory state around the buggy address: [ 33.546398][ T4219] ffff0000dcf41a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.548235][ T4219] ffff0000dcf41b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.549947][ T4219] >ffff0000dcf41b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.551751][ T4219] ^ [ 33.553391][ T4219] ffff0000dcf41c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.555043][ T4219] ffff0000dcf41c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.556745][ T4219] ================================================================== [ 33.558927][ T4219] Disabling lock debugging due to kernel taint