Warning: Permanently added '10.128.1.158' (ED25519) to the list of known hosts.
2025/10/23 13:59:13 parsed 1 programs
[ 64.795894][ T4163] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 67.947471][ T4225] veth0_vlan: entered promiscuous mode
2025/10/23 13:59:17 executed programs: 0
[ 69.198770][ T1938] veth0_vlan: left promiscuous mode
[ 73.797041][ T4449] veth0_vlan: entered promiscuous mode
[ 73.859419][ T4456] veth0_vlan: entered promiscuous mode
[ 73.950961][ T4453] veth0_vlan: entered promiscuous mode
[ 74.034099][ T4445] veth0_vlan: entered promiscuous mode
2025/10/23 13:59:24 executed programs: 8
[ 75.379596][ T5194] syz.4.18[5194]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set
[ 75.409725][ T5194] loop4: detected capacity change from 0 to 256
[ 75.536166][ T5211] loop5: detected capacity change from 0 to 256
[ 75.545766][ T5210] loop2: detected capacity change from 0 to 256
[ 75.550363][ T5213] loop3: detected capacity change from 0 to 256
[ 75.569422][ T5194] loop4: detected capacity change from 0 to 2048
[ 75.611864][ T5194] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000)
[ 75.641668][ T5220] loop2: detected capacity change from 0 to 256
[ 75.656760][ T5218] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2
[ 75.696045][ T5211] loop5: detected capacity change from 0 to 2048
[ 75.696140][ T5218] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2
[ 75.737943][ T5218] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 75.758831][ T5213] loop3: detected capacity change from 0 to 2048
[ 75.781929][ T5218] Buffer I/O error on dev loop5, logical block 0, async page read
[ 75.786098][ T5213] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000)
[ 75.805830][ T5211] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000)
[ 75.822243][ T4449] ==================================================================
[ 75.830419][ T4449] BUG: KASAN: slab-use-after-free in udf_unlink+0x533/0x630
[ 75.837888][ T4449] Read of size 4 at addr ffff88807b284200 by task syz-executor/4449
[ 75.845980][ T4449]
[ 75.848324][ T4449] CPU: 0 PID: 4449 Comm: syz-executor Not tainted syzkaller #0
[ 75.855971][ T4449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 75.866129][ T4449] Call Trace:
[ 75.869415][ T4449]
[ 75.872345][ T4449] dump_stack_lvl+0xe0/0x160
[ 75.876928][ T4449] ? show_regs_print_info+0x10/0x10
[ 75.882137][ T4449] ? load_image+0x550/0x550
[ 75.886641][ T4449] ? __virt_addr_valid+0x21e/0x270
[ 75.891748][ T4449] print_report+0xac/0x220
[ 75.896163][ T4449] ? udf_unlink+0x533/0x630
[ 75.900663][ T4449] kasan_report+0x117/0x150
[ 75.905268][ T4449] ? udf_unlink+0x533/0x630
[ 75.910302][ T4449] udf_unlink+0x533/0x630
[ 75.914641][ T4449] ? udf_link+0x490/0x490
[ 75.918965][ T4449] ? generic_permission+0xc6/0x440
[ 75.924156][ T4449] ? down_write+0x104/0x160
[ 75.928652][ T4449] ? down_read_killable+0x330/0x330
[ 75.933854][ T4449] vfs_unlink+0x27b/0x4a0
[ 75.938190][ T4449] do_unlinkat+0x311/0x4b0
[ 75.942614][ T4449] ? fsnotify_link_count+0xd0/0xd0
[ 75.947729][ T4449] ? getname_flags+0x115/0x440
[ 75.952503][ T4449] __x64_sys_unlink+0x44/0x50
[ 75.957235][ T4449] do_syscall_64+0x55/0xb0
[ 75.961662][ T4449] ? clear_bhb_loop+0x40/0x90
[ 75.966346][ T4449] ? clear_bhb_loop+0x40/0x90
[ 75.971018][ T4449] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 75.976923][ T4449] RIP: 0033:0x7f36cc98e197
[ 75.981442][ T4449] Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 75.984482][ T4456] ------------[ cut here ]------------
[ 76.001583][ T4449] RSP: 002b:00007ffdbc590f68 EFLAGS: 00000206 ORIG_RAX: 0000000000000057
[ 76.001596][ T4449] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f36cc98e197
[ 76.001601][ T4449] RDX: 00007ffdbc590f90 RSI: 00007ffdbc591020 RDI: 00007ffdbc591020
[ 76.001604][ T4449] RBP: 00007ffdbc591020 R08: 0000000000000000 R09: 0000000000000000
[ 76.001607][ T4449] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffdbc592110
[ 76.001610][ T4449] R13: 00007f36cca11c05 R14: 000000000001276d R15: 00007ffdbc5942d0
[ 76.001616][ T4449]
[ 76.001620][ T4449]
[ 76.001622][ T4449] Allocated by task 5023:
[ 76.001626][ T4449] kasan_set_track+0x4e/0x70
[ 76.001637][ T4449] __kasan_slab_alloc+0x6c/0x80
[ 76.001643][ T4449] slab_post_alloc_hook+0x66/0x430
[ 76.001648][ T4449] kmem_cache_alloc+0x11e/0x2d0
[ 76.001653][ T4449] getname_kernel+0x51/0x290
[ 76.001660][ T4449] kern_path+0x12/0x40
[ 76.001664][ T4449] tomoyo_realpath_nofollow+0x8b/0xe0
[ 76.001671][ T4449] tomoyo_find_next_domain+0x265/0x1a20
[ 76.001676][ T4449] tomoyo_bprm_check_security+0xfe/0x140
[ 76.001683][ T4449] security_bprm_check+0x27/0x70
[ 76.001689][ T4449] bprm_execve+0x730/0x1160
[ 76.001694][ T4449] kernel_execve+0x6be/0x7c0
[ 76.001699][ T4449] call_usermodehelper_exec_async+0x1d8/0x2e0
[ 76.001707][ T4449] ret_from_fork+0x2f/0x60
[ 76.001711][ T4449] ret_from_fork_asm+0x11/0x20
[ 76.001717][ T4449]
[ 76.001718][ T4449] Freed by task 5023:
[ 76.001721][ T4449] kasan_set_track+0x4e/0x70
[ 76.001726][ T4449] kasan_save_free_info+0x2e/0x50
[ 76.001731][ T4449] ____kasan_slab_free+0x126/0x1e0
[ 76.001736][ T4449] slab_free_freelist_hook+0x130/0x1b0
[ 76.001741][ T4449] kmem_cache_free+0xf8/0x280
[ 76.001746][ T4449] kern_path+0x34/0x40
[ 76.001750][ T4449] tomoyo_realpath_nofollow+0x8b/0xe0
[ 76.001756][ T4449] tomoyo_find_next_domain+0x265/0x1a20
[ 76.001760][ T4449] tomoyo_bprm_check_security+0xfe/0x140
[ 76.001765][ T4449] security_bprm_check+0x27/0x70
[ 76.001771][ T4449] bprm_execve+0x730/0x1160
[ 76.007526][ T4456] WARNING: CPU: 1 PID: 4456 at fs/udf/udfdecl.h:123 udf_unlink+0x4e6/0x630
[ 76.015672][ T4449] kernel_execve+0x6be/0x7c0
[ 76.024197][ T4456] Modules linked in:
[ 76.032094][ T4449] call_usermodehelper_exec_async+0x1d8/0x2e0
[ 76.032107][ T4449] ret_from_fork+0x2f/0x60
[ 76.032112][ T4449] ret_from_fork_asm+0x11/0x20
[ 76.032118][ T4449]
[ 76.032121][ T4449] The buggy address belongs to the object at ffff88807b283300
[ 76.032121][ T4449] which belongs to the cache names_cache of size 4096
[ 76.032126][ T4449] The buggy address is located 3840 bytes inside of
[ 76.032126][ T4449] freed 4096-byte region [ffff88807b283300, ffff88807b284300)
[ 76.040104][ T4456]
[ 76.048023][ T4449]
[ 76.048026][ T4449] The buggy address belongs to the physical page:
[ 76.048031][ T4449] page:ffffea0001eca000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7b280
[ 76.048048][ T4449] head:ffffea0001eca000 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 76.048052][ T4449] flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 76.048063][ T4449] page_type: 0xffffffff()
[ 76.048069][ T4449] raw: 00fff00000000840 ffff88801024d640 ffffea0001eb1200 dead000000000002
[ 76.048073][ T4449] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000
[ 76.048076][ T4449] page dumped because: kasan: bad access detected
[ 76.048080][ T4449] page_owner tracks the page as allocated
[ 76.048083][ T4449] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3283, tgid 3283 (udevadm), ts 10651838279, free_ts 8850990878
[ 76.056132][ T4456] CPU: 1 PID: 4456 Comm: syz-executor Not tainted syzkaller #0
[ 76.059121][ T4449] post_alloc_hook+0xed/0x120
[ 76.059132][ T4449] get_page_from_freelist+0x2423/0x2560
[ 76.059137][ T4449] __alloc_pages+0x1e3/0x460
[ 76.059142][ T4449] alloc_slab_page+0x5d/0x170
[ 76.059148][ T4449] new_slab+0x87/0x280
[ 76.059152][ T4449] ___slab_alloc+0xa32/0xfe0
[ 76.059157][ T4449] kmem_cache_alloc+0x1ad/0x2d0
[ 76.061451][ T4456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 76.066010][ T4449] getname_flags+0xa4/0x440
[ 76.070597][ T4456] RIP: 0010:udf_unlink+0x4e6/0x630
[ 76.075380][ T4449] vfs_fstatat+0xb0/0xf0
[ 76.080508][ T4456] Code: 00 00 41 c6 44 0e 1f 00 65 48 8b 0c 25 28 00 00 00 48 3b 8c 24 40 01 00 00 75 16 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b e9 c4 fe ff ff e8 fe 1c 11 04 89 d1 80 e1 07 80 c1 03 38 c1
[ 76.085379][ T4449] __se_sys_newfstatat+0xc1/0x310
[ 76.090349][ T4456] RSP: 0018:ffffc90002dcfc00 EFLAGS: 00010286
[ 76.094008][ T4449] do_syscall_64+0x55/0xb0
[ 76.099418][ T4456]
[ 76.104974][ T4449] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 76.110743][ T4456] RAX: 0000000000000000 RBX: ffff88806874b01c RCX: ffffffff8244b923
[ 76.115692][ T4449] page last free stack trace:
[ 76.115697][ T4449] free_unref_page_prepare+0x6f9/0x810
[ 76.120237][ T4456] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888079b2d200
[ 76.124771][ T4449] free_unref_page+0x32/0x290
[ 76.130916][ T4456] RBP: ffffc90002dcfd88 R08: ffffffff88e77c2f R09: 1ffffffff11cef85
[ 76.135277][ T4449] free_contig_range+0xa1/0x160
[ 76.140040][ T4456] R10: dffffc0000000000 R11: fffffbfff11cef86 R12: dffffc0000000000
[ 76.142403][ T4449] destroy_args+0x6e/0x6e0
[ 76.146443][ T4456] R13: ffff88806874b01f R14: 1ffff920005b9f88 R15: ffff88801ee8e618
[ 76.146449][ T4456] FS: 000055555c19d500(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
[ 76.151000][ T4449] debug_vm_pgtable+0x30e/0x340
[ 76.151007][ T4449] do_one_initcall+0x1a8/0x500
[ 76.151014][ T4449] do_initcall_level+0xee/0x120
[ 76.151021][ T4449] do_initcalls+0x54/0xa0
[ 76.151027][ T4449] kernel_init_freeable+0x302/0x460
[ 76.151033][ T4449] kernel_init+0x17/0x120
[ 76.151038][ T4449] ret_from_fork+0x2f/0x60
[ 76.151044][ T4449] ret_from_fork_asm+0x11/0x20
[ 76.151050][ T4449]
[ 76.151052][ T4449] Memory state around the buggy address:
[ 76.151056][ T4449] ffff88807b284100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 76.151059][ T4449] ffff88807b284180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 76.151063][ T4449] >ffff88807b284200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 76.156099][ T4456] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 76.161367][ T4449] ^
[ 76.161374][ T4449] ffff88807b284280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 76.161379][ T4449] ffff88807b284300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 76.161381][ T4449] ==================================================================
[ 76.316037][ T4449] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 76.316046][ T4449] CPU: 0 PID: 4449 Comm: syz-executor Not tainted syzkaller #0
[ 76.316054][ T4449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 76.316059][ T4449] Call Trace:
[ 76.316063][ T4449]
[ 76.316066][ T4449] dump_stack_lvl+0xe0/0x160
[ 76.316079][ T4449] ? show_regs_print_info+0x10/0x10
[ 76.316085][ T4449] ? load_image+0x550/0x550
[ 76.316092][ T4449] ? vsnprintf+0x799/0x1b70
[ 76.316099][ T4449] panic+0x1be/0x480
[ 76.316106][ T4449] ? ptdump_walk_pgd_level_checkwx+0x1b0/0x1b0
[ 76.316113][ T4449] ? _raw_spin_unlock_irqrestore+0xed/0x100
[ 76.316120][ T4449] ? _raw_spin_unlock+0x40/0x40
[ 76.316126][ T4449] ? print_memory_metadata+0x314/0x400
[ 76.316132][ T4449] ? udf_unlink+0x533/0x630
[ 76.316139][ T4449] check_panic_on_warn+0x5a/0x80
[ 76.316146][ T4449] end_report+0x6f/0x140
[ 76.316153][ T4449] kasan_report+0x128/0x150
[ 76.316160][ T4449] ? udf_unlink+0x533/0x630
[ 76.316167][ T4449] udf_unlink+0x533/0x630
[ 76.316174][ T4449] ? udf_link+0x490/0x490
[ 76.316179][ T4449] ? generic_permission+0xc6/0x440
[ 76.316189][ T4449] ? down_write+0x104/0x160
[ 76.316194][ T4449] ? down_read_killable+0x330/0x330
[ 76.316201][ T4449] vfs_unlink+0x27b/0x4a0
[ 76.316208][ T4449] do_unlinkat+0x311/0x4b0
[ 76.316213][ T4449] ? fsnotify_link_count+0xd0/0xd0
[ 76.316220][ T4449] ? getname_flags+0x115/0x440
[ 76.316227][ T4449] __x64_sys_unlink+0x44/0x50
[ 76.316232][ T4449] do_syscall_64+0x55/0xb0
[ 76.316238][ T4449] ? clear_bhb_loop+0x40/0x90
[ 76.316244][ T4449] ? clear_bhb_loop+0x40/0x90
[ 76.316249][ T4449] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 76.316254][ T4449] RIP: 0033:0x7f36cc98e197
[ 76.316261][ T4449] Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 76.316266][ T4449] RSP: 002b:00007ffdbc590f68 EFLAGS: 00000206 ORIG_RAX: 0000000000000057
[ 76.316275][ T4449] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f36cc98e197
[ 76.316280][ T4449] RDX: 00007ffdbc590f90 RSI: 00007ffdbc591020 RDI: 00007ffdbc591020
[ 76.316283][ T4449] RBP: 00007ffdbc591020 R08: 0000000000000000 R09: 0000000000000000
[ 76.316286][ T4449] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffdbc592110
[ 76.316290][ T4449] R13: 00007f36cca11c05 R14: 000000000001276d R15: 00007ffdbc5942d0
[ 76.316295][ T4449]
[ 76.318280][ T4449] Kernel Offset: disabled