Warning: Permanently added '10.128.0.93' (ED25519) to the list of known hosts. 2023/07/25 20:36:59 ignoring optional flag "sandboxArg"="0" 2023/07/25 20:36:59 parsed 1 programs 2023/07/25 20:36:59 executed programs: 0 [ 55.647167][ T1993] loop0: detected capacity change from 0 to 2048 [ 55.653948][ T1993] ======================================================= [ 55.653948][ T1993] WARNING: The mand mount option has been deprecated and [ 55.653948][ T1993] and is ignored by this kernel. Remove the mand [ 55.653948][ T1993] option from the mount to silence this warning. [ 55.653948][ T1993] ======================================================= [ 55.690334][ T1993] UDF-fs: error (device loop0): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d [ 55.702046][ T1993] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 55.727734][ T1582] ================================================================== [ 55.735987][ T1582] BUG: KASAN: use-after-free in udf_close_lvid+0x5c1/0x930 [ 55.743178][ T1582] Write of size 1 at addr ffff88809f7ce980 by task syz-executor.0/1582 [ 55.751383][ T1582] [ 55.753679][ T1582] CPU: 1 PID: 1582 Comm: syz-executor.0 Not tainted 6.1.41-syzkaller #0 [ 55.762164][ T1582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 55.772207][ T1582] Call Trace: [ 55.775481][ T1582] [ 55.778569][ T1582] dump_stack_lvl+0xf4/0x251 [ 55.783151][ T1582] ? nf_tcp_handle_invalid+0x2f3/0x2f3 [ 55.788683][ T1582] ? panic+0x3f7/0x3f7 [ 55.792809][ T1582] ? vprintk_emit+0x115/0x1e0 [ 55.797465][ T1582] ? _printk+0xca/0x10a [ 55.801590][ T1582] ? mutex_lock_nested+0x10/0x10 [ 55.806757][ T1582] print_report+0x15f/0x4f0 [ 55.811311][ T1582] ? hook_sb_delete+0x3d7/0x780 [ 55.816182][ T1582] ? udf_close_lvid+0x5c1/0x930 [ 55.821011][ T1582] kasan_report+0x136/0x160 [ 55.825677][ T1582] ? udf_close_lvid+0x5c1/0x930 [ 55.830535][ T1582] udf_close_lvid+0x5c1/0x930 [ 55.835298][ T1582] ? hook_inode_free_security+0x10/0x10 [ 55.840829][ T1582] ? udf_open_lvid+0x5a0/0x5a0 [ 55.845667][ T1582] udf_put_super+0xad/0x130 [ 55.850279][ T1582] generic_shutdown_super+0x107/0x2c0 [ 55.855833][ T1582] kill_block_super+0x75/0xb0 [ 55.860679][ T1582] deactivate_locked_super+0x71/0xd0 [ 55.865963][ T1582] cleanup_mnt+0x2bd/0x330 [ 55.870450][ T1582] task_work_run+0x206/0x280 [ 55.876012][ T1582] ? task_work_cancel+0x2a0/0x2a0 [ 55.881160][ T1582] ? __x64_sys_umount+0xe4/0x120 [ 55.886079][ T1582] ? path_umount+0xc70/0xc70 [ 55.890742][ T1582] exit_to_user_mode_loop+0xa4/0xb0 [ 55.895922][ T1582] exit_to_user_mode_prepare+0x64/0xb0 [ 55.901640][ T1582] syscall_exit_to_user_mode+0x27/0x1c0 [ 55.907517][ T1582] do_syscall_64+0x49/0x80 [ 55.911912][ T1582] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 55.917792][ T1582] RIP: 0033:0x7fb3be87dc87 [ 55.922295][ T1582] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 55.942064][ T1582] RSP: 002b:00007ffc1f56c218 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 55.951055][ T1582] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb3be87dc87 [ 55.959008][ T1582] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007ffc1f56c2d0 [ 55.966951][ T1582] RBP: 00007ffc1f56c2d0 R08: 0000000000000000 R09: 0000000000000000 [ 55.974913][ T1582] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc1f56d390 [ 55.983027][ T1582] R13: 00007fb3be8d7c5a R14: 000000000000d937 R15: 0000000000000006 [ 55.991040][ T1582] [ 55.994043][ T1582] [ 55.996346][ T1582] The buggy address belongs to the physical page: [ 56.002746][ T1582] page:ffffea00027df380 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9f7ce [ 56.012956][ T1582] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 56.020215][ T1582] raw: 00fff00000000000 ffffea00027df388 ffffea00027df388 0000000000000000 [ 56.028782][ T1582] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 56.038200][ T1582] page dumped because: kasan: bad access detected [ 56.044581][ T1582] page_owner info is not present (never set?) [ 56.050606][ T1582] [ 56.052899][ T1582] Memory state around the buggy address: [ 56.058670][ T1582] ffff88809f7ce880: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.066700][ T1582] ffff88809f7ce900: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.074725][ T1582] >ffff88809f7ce980: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.082750][ T1582] ^ [ 56.086784][ T1582] ffff88809f7cea00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.094879][ T1582] ffff88809f7cea80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.103024][ T1582] ================================================================== [ 56.111429][ T1582] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 56.118929][ T1582] Kernel Offset: disabled [ 56.123232][ T1582] Rebooting in 86400 seconds..