Unable to handle kernel write to read-only memory at virtual address ffff0001cd4d86c8
KASAN: maybe wild-memory-access in range [0xfffc000e6a6c3640-0xfffc000e6a6c3647]
Mem abort info:
ESR = 0x000000009600004e
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x0e: level 2 permission fault
Data abort info:
ISV = 0, ISS = 0x0000004e
CM = 0, WnR = 1
swapper pgtable: 4k pages, 48-bit VAs, pgdp=000000020e1fd000
[ffff0001cd4d86c8] pgd=180000023fffa003, p4d=180000023fffa003, pud=180000023ec11003, pmd=006000020d400781
Internal error: Oops: 000000009600004e [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 4417 Comm: syz-executor Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025
pstate: 62400005 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
pc : udf_close_lvid+0x134/0x780 fs/udf/super.c:2105
lr : udf_close_lvid+0x114/0x780 fs/udf/super.c:2104
sp : ffff800020ab7880
x29: ffff800020ab7900 x28: ffff0001cd4d86b0 x27: 1fffe0001b1518cf
x26: dfff800000000000 x25: ffff0000e00fe658 x24: ffff0000daa24000
x23: 1ffff00004156f14 x22: ffff0000ea1ac04b x21: ffff0000d8a8c678
x20: ffff0000ea1ac000 x19: ffff0000daa24038 x18: ffff800011a5bd40
x17: ffff800018184000 x16: ffff8000082cb864 x15: ffff800008a26150
x14: ffff8000089a2b8c x13: 1ffff00002a0a0b1 x12: 0000000000ff0100
x11: ff0080000a895d54 x10: 0000000000000001 x9 : 1fffe00039a9b0d9
x8 : 0000000000000004 x7 : ffff8000098264e4 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000082cacfc
x2 : ffff0000d804d340 x1 : ffff800011f49d20 x0 : ffff0001cd4d86c9
Call trace:
udf_close_lvid+0x134/0x780 fs/udf/super.c:2106
udf_put_super+0xb8/0x148 fs/udf/super.c:2392
generic_shutdown_super+0x130/0x324 fs/super.c:501
kill_block_super+0x70/0xdc fs/super.c:1470
deactivate_locked_super+0xac/0x124 fs/super.c:332
deactivate_super+0xe8/0x108 fs/super.c:363
cleanup_mnt+0x37c/0x404 fs/namespace.c:1191
__cleanup_mnt+0x20/0x30 fs/namespace.c:1198
task_work_run+0x1ec/0x270 kernel/task_work.c:203
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
do_notify_resume+0x2038/0x2b28 arch/arm64/kernel/signal.c:1137
prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline]
exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline]
el0_svc+0x98/0x138 arch/arm64/kernel/entry-common.c:638
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Code: 91006780 52800088 f9000ff7 d343fc09 (39006388)
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
0: 91006780 add x0, x28, #0x19
4: 52800088 mov w8, #0x4 // #4
8: f9000ff7 str x23, [sp, #24]
c: d343fc09 lsr x9, x0, #3
* 10: 39006388 strb w8, [x28, #24] <-- trapping instruction