Warning: Permanently added '10.128.10.8' (ED25519) to the list of known hosts. [ 70.819367][ T5036] chnl_net:caif_netlink_parms(): no params data found [ 70.880200][ T5036] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.887400][ T5036] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.894507][ T5036] bridge_slave_0: entered allmulticast mode [ 70.901301][ T5036] bridge_slave_0: entered promiscuous mode [ 70.909630][ T5036] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.916735][ T5036] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.923920][ T5036] bridge_slave_1: entered allmulticast mode [ 70.930760][ T5036] bridge_slave_1: entered promiscuous mode [ 70.958723][ T5036] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.970204][ T5036] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.999209][ T5036] team0: Port device team_slave_0 added [ 71.007586][ T5036] team0: Port device team_slave_1 added [ 71.034586][ T5036] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 71.041586][ T5036] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.067872][ T5036] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 71.079935][ T5036] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 71.086903][ T5036] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.113098][ T5036] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 71.153816][ T5036] hsr_slave_0: entered promiscuous mode [ 71.160208][ T5036] hsr_slave_1: entered promiscuous mode [ 71.276590][ T5036] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 71.286785][ T5036] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 71.296456][ T5036] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 71.306473][ T5036] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 71.331573][ T5036] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.338805][ T5036] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.346181][ T5036] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.353359][ T5036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.408932][ T5036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.424274][ T781] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.433388][ T781] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.446591][ T5036] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.459340][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.466458][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.478681][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.485778][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.549854][ T5036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.587307][ T5036] veth0_vlan: entered promiscuous mode [ 71.599050][ T5036] veth1_vlan: entered promiscuous mode [ 71.624397][ T5036] veth0_macvtap: entered promiscuous mode [ 71.635093][ T5036] veth1_macvtap: entered promiscuous mode [ 71.656742][ T5036] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.671093][ T5036] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.681815][ T5036] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.693747][ T1230] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.693813][ T1230] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.707813][ T5036] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 71.716521][ T5036] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.725222][ T5036] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.759569][ T5036] syz-executor151[5036]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 71.780002][ T5036] loop0: detected capacity change from 0 to 2048 [ 71.787176][ T5036] ======================================================= [ 71.787176][ T5036] WARNING: The mand mount option has been deprecated and [ 71.787176][ T5036] and is ignored by this kernel. Remove the mand [ 71.787176][ T5036] option from the mount to silence this warning. [ 71.787176][ T5036] ======================================================= [ 71.824454][ T5036] UDF-fs: error (device loop0): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d [ 71.838330][ T5036] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 71.856108][ T5036] syz-executor151[5036]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 71.880145][ T48] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.916116][ T5036] ================================================================== [ 71.924207][ T5036] BUG: KASAN: slab-out-of-bounds in udf_close_lvid+0x508/0x5c0 [ 71.931766][ T5036] Write of size 1 at addr ffff88807faed1d8 by task syz-executor151/5036 [ 71.940124][ T5036] [ 71.942473][ T5036] CPU: 1 PID: 5036 Comm: syz-executor151 Not tainted 6.5.0-rc7-next-20230825-syzkaller #0 [ 71.952395][ T5036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 71.962474][ T5036] Call Trace: [ 71.965758][ T5036] [ 71.968697][ T5036] dump_stack_lvl+0xd9/0x1b0 [ 71.973316][ T5036] print_report+0xc4/0x620 [ 71.977737][ T5036] ? __virt_addr_valid+0x5e/0x2d0 [ 71.982778][ T5036] ? __phys_addr+0xc6/0x140 [ 71.987304][ T5036] kasan_report+0xda/0x110 [ 71.991732][ T5036] ? udf_close_lvid+0x508/0x5c0 [ 71.996597][ T5036] ? udf_close_lvid+0x508/0x5c0 [ 72.001467][ T5036] udf_close_lvid+0x508/0x5c0 [ 72.006170][ T5036] udf_put_super+0x19c/0x200 [ 72.010778][ T5036] ? udf_close_lvid+0x5c0/0x5c0 [ 72.015651][ T5036] generic_shutdown_super+0x161/0x3c0 [ 72.021132][ T5036] kill_block_super+0x3b/0x70 [ 72.025840][ T5036] deactivate_locked_super+0xa0/0x2d0 [ 72.031242][ T5036] deactivate_super+0xde/0x100 [ 72.036033][ T5036] cleanup_mnt+0x222/0x3d0 [ 72.040478][ T5036] task_work_run+0x14d/0x240 [ 72.045102][ T5036] ? task_work_cancel+0x30/0x30 [ 72.049980][ T5036] ? __put_net+0x61/0x70 [ 72.054244][ T5036] do_exit+0xa99/0x2a20 [ 72.058420][ T5036] ? do_group_exit+0x1c5/0x2a0 [ 72.063206][ T5036] ? reacquire_held_locks+0x4b0/0x4b0 [ 72.068599][ T5036] ? do_raw_spin_lock+0x12e/0x2b0 [ 72.073646][ T5036] ? mm_update_next_owner+0x850/0x850 [ 72.079040][ T5036] ? spin_bug+0x1d0/0x1d0 [ 72.083387][ T5036] ? rcu_is_watching+0x12/0xb0 [ 72.088162][ T5036] do_group_exit+0xd4/0x2a0 [ 72.092703][ T5036] __x64_sys_exit_group+0x3e/0x50 [ 72.097749][ T5036] do_syscall_64+0x38/0xb0 [ 72.102189][ T5036] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 72.108102][ T5036] RIP: 0033:0x7f90053839e9 [ 72.112519][ T5036] Code: Unable to access opcode bytes at 0x7f90053839bf. [ 72.119537][ T5036] RSP: 002b:00007fff8257a9f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 72.128015][ T5036] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f90053839e9 [ 72.136009][ T5036] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 72.143989][ T5036] RBP: 00007f9005421390 R08: ffffffffffffffb8 R09: 0000000000000000 [ 72.151972][ T5036] R10: 0000000000000022 R11: 0000000000000246 R12: 00007f9005421390 [ 72.159957][ T5036] R13: 0000000000000000 R14: 00007f90054241c0 R15: 00007f9005351190 [ 72.167954][ T5036] [ 72.170983][ T5036] [ 72.173307][ T5036] Allocated by task 4816: [ 72.177632][ T5036] kasan_save_stack+0x33/0x50 [ 72.182329][ T5036] kasan_set_track+0x25/0x30 [ 72.186938][ T5036] __kasan_kmalloc+0xa2/0xb0 [ 72.191540][ T5036] tomoyo_find_next_domain+0x14a/0x2020 [ 72.197105][ T5036] tomoyo_bprm_check_security+0x12d/0x1d0 [ 72.202854][ T5036] security_bprm_check+0x6a/0xe0 [ 72.207804][ T5036] bprm_execve+0x74d/0x1a50 [ 72.212312][ T5036] do_execveat_common.isra.0+0x5d3/0x740 [ 72.217956][ T5036] __x64_sys_execve+0x8c/0xb0 [ 72.222660][ T5036] do_syscall_64+0x38/0xb0 [ 72.227104][ T5036] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 72.233034][ T5036] [ 72.235360][ T5036] Freed by task 4816: [ 72.239349][ T5036] kasan_save_stack+0x33/0x50 [ 72.244047][ T5036] kasan_set_track+0x25/0x30 [ 72.248662][ T5036] kasan_save_free_info+0x2b/0x40 [ 72.253698][ T5036] ____kasan_slab_free+0x15b/0x1b0 [ 72.258824][ T5036] slab_free_freelist_hook+0x114/0x1e0 [ 72.264302][ T5036] __kmem_cache_free+0xb8/0x2f0 [ 72.269172][ T5036] tomoyo_find_next_domain+0x74b/0x2020 [ 72.274729][ T5036] tomoyo_bprm_check_security+0x12d/0x1d0 [ 72.280465][ T5036] security_bprm_check+0x6a/0xe0 [ 72.285422][ T5036] bprm_execve+0x74d/0x1a50 [ 72.289933][ T5036] do_execveat_common.isra.0+0x5d3/0x740 [ 72.295575][ T5036] __x64_sys_execve+0x8c/0xb0 [ 72.300259][ T5036] do_syscall_64+0x38/0xb0 [ 72.304690][ T5036] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 72.310688][ T5036] [ 72.313012][ T5036] The buggy address belongs to the object at ffff88807faec000 [ 72.313012][ T5036] which belongs to the cache kmalloc-4k of size 4096 [ 72.327076][ T5036] The buggy address is located 472 bytes to the right of [ 72.327076][ T5036] allocated 4096-byte region [ffff88807faec000, ffff88807faed000) [ 72.341863][ T5036] [ 72.344190][ T5036] The buggy address belongs to the physical page: [ 72.350606][ T5036] page:ffffea0001feba00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7fae8 [ 72.361369][ T5036] head:ffffea0001feba00 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 72.370310][ T5036] flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 72.378289][ T5036] page_type: 0xffffffff() [ 72.382628][ T5036] raw: 00fff00000000840 ffff888012c42140 dead000000000122 0000000000000000 [ 72.391216][ T5036] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 72.399795][ T5036] page dumped because: kasan: bad access detected [ 72.406204][ T5036] page_owner tracks the page as allocated [ 72.411924][ T5036] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4814, tgid 4814 (dhcpcd-run-hook), ts 41441639470, free_ts 41418153821 [ 72.432791][ T5036] post_alloc_hook+0x2cf/0x340 [ 72.437583][ T5036] get_page_from_freelist+0xf17/0x2e50 [ 72.443064][ T5036] __alloc_pages+0x1d0/0x4a0 [ 72.447671][ T5036] alloc_pages+0x1a9/0x270 [ 72.452104][ T5036] allocate_slab+0x251/0x380 [ 72.456706][ T5036] ___slab_alloc+0x8be/0x1570 [ 72.461401][ T5036] __slab_alloc.constprop.0+0x56/0xa0 [ 72.466792][ T5036] __kmem_cache_alloc_node+0x137/0x350 [ 72.472271][ T5036] __kmalloc+0x4f/0x100 [ 72.476435][ T5036] tomoyo_realpath_from_path+0xb9/0x710 [ 72.481994][ T5036] tomoyo_path_perm+0x271/0x450 [ 72.486857][ T5036] security_inode_getattr+0xf1/0x150 [ 72.492161][ T5036] vfs_statx+0x180/0x430 [ 72.496425][ T5036] vfs_fstatat+0x90/0xb0 [ 72.500686][ T5036] __do_sys_newfstatat+0x98/0x110 [ 72.505715][ T5036] do_syscall_64+0x38/0xb0 [ 72.511708][ T5036] page last free stack trace: [ 72.516377][ T5036] free_unref_page_prepare+0x476/0xa40 [ 72.521854][ T5036] free_unref_page+0x33/0x3b0 [ 72.526795][ T5036] __unfreeze_partials+0x21d/0x240 [ 72.532206][ T5036] qlist_free_all+0x6a/0x170 [ 72.537762][ T5036] kasan_quarantine_reduce+0x18b/0x1d0 [ 72.543451][ T5036] __kasan_slab_alloc+0x65/0x90 [ 72.548319][ T5036] kmem_cache_alloc+0x172/0x3b0 [ 72.553196][ T5036] getname_flags.part.0+0x50/0x4d0 [ 72.558317][ T5036] getname_flags+0x9c/0xf0 [ 72.562744][ T5036] vfs_fstatat+0x77/0xb0 [ 72.567006][ T5036] __do_sys_newfstatat+0x98/0x110 [ 72.572040][ T5036] do_syscall_64+0x38/0xb0 [ 72.576477][ T5036] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 72.582389][ T5036] [ 72.584711][ T5036] Memory state around the buggy address: [ 72.590334][ T5036] ffff88807faed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.598396][ T5036] ffff88807faed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.606458][ T5036] >ffff88807faed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.614518][ T5036] ^ [ 72.621452][ T5036] ffff88807faed200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.629520][ T5036] ffff88807faed280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.639598][ T5036] ================================================================== [ 72.661800][ T5036] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 72.669020][ T5036] CPU: 1 PID: 5036 Comm: syz-executor151 Not tainted 6.5.0-rc7-next-20230825-syzkaller #0 [ 72.678919][ T5036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 72.688977][ T5036] Call Trace: [ 72.692256][ T5036] [ 72.695189][ T5036] dump_stack_lvl+0xd9/0x1b0 [ 72.699803][ T5036] panic+0x6a6/0x750 [ 72.703711][ T5036] ? panic_smp_self_stop+0xa0/0xa0 [ 72.708836][ T5036] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 72.714831][ T5036] ? preempt_schedule_thunk+0x1a/0x30 [ 72.720224][ T5036] ? preempt_schedule_common+0x45/0xc0 [ 72.725710][ T5036] check_panic_on_warn+0xab/0xb0 [ 72.730859][ T5036] end_report+0x108/0x150 [ 72.735300][ T5036] kasan_report+0xea/0x110 [ 72.739734][ T5036] ? udf_close_lvid+0x508/0x5c0 [ 72.744824][ T5036] ? udf_close_lvid+0x508/0x5c0 [ 72.749705][ T5036] udf_close_lvid+0x508/0x5c0 [ 72.754411][ T5036] udf_put_super+0x19c/0x200 [ 72.759013][ T5036] ? udf_close_lvid+0x5c0/0x5c0 [ 72.763863][ T5036] generic_shutdown_super+0x161/0x3c0 [ 72.769251][ T5036] kill_block_super+0x3b/0x70 [ 72.773931][ T5036] deactivate_locked_super+0xa0/0x2d0 [ 72.779309][ T5036] deactivate_super+0xde/0x100 [ 72.784076][ T5036] cleanup_mnt+0x222/0x3d0 [ 72.788495][ T5036] task_work_run+0x14d/0x240 [ 72.793094][ T5036] ? task_work_cancel+0x30/0x30 [ 72.797946][ T5036] ? __put_net+0x61/0x70 [ 72.802188][ T5036] do_exit+0xa99/0x2a20 [ 72.806349][ T5036] ? do_group_exit+0x1c5/0x2a0 [ 72.811120][ T5036] ? reacquire_held_locks+0x4b0/0x4b0 [ 72.816492][ T5036] ? do_raw_spin_lock+0x12e/0x2b0 [ 72.821523][ T5036] ? mm_update_next_owner+0x850/0x850 [ 72.826897][ T5036] ? spin_bug+0x1d0/0x1d0 [ 72.831559][ T5036] ? rcu_is_watching+0x12/0xb0 [ 72.836859][ T5036] do_group_exit+0xd4/0x2a0 [ 72.841407][ T5036] __x64_sys_exit_group+0x3e/0x50 [ 72.846475][ T5036] do_syscall_64+0x38/0xb0 [ 72.850912][ T5036] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 72.856926][ T5036] RIP: 0033:0x7f90053839e9 [ 72.861353][ T5036] Code: Unable to access opcode bytes at 0x7f90053839bf. [ 72.868364][ T5036] RSP: 002b:00007fff8257a9f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 72.876773][ T5036] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f90053839e9 [ 72.884746][ T5036] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 72.892712][ T5036] RBP: 00007f9005421390 R08: ffffffffffffffb8 R09: 0000000000000000 [ 72.900676][ T5036] R10: 0000000000000022 R11: 0000000000000246 R12: 00007f9005421390 [ 72.908641][ T5036] R13: 0000000000000000 R14: 00007f90054241c0 R15: 00007f9005351190 [ 72.916613][ T5036] [ 72.919829][ T5036] Kernel Offset: disabled [ 72.924149][ T5036] Rebooting in 86400 seconds..