Warning: Permanently added '10.128.1.0' (ECDSA) to the list of known hosts. 1970/01/01 00:00:46 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:00:46 parsed 1 programs [ 46.584965][ T4058] cgroup: Unknown subsys name 'net' [ 46.891820][ T4058] cgroup: Unknown subsys name 'rlimit' 1970/01/01 00:00:47 executed programs: 0 [ 47.171184][ T4065] chnl_net:caif_netlink_parms(): no params data found [ 47.207914][ T4065] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.209812][ T4065] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.212167][ T4065] device bridge_slave_0 entered promiscuous mode [ 47.216244][ T4065] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.217950][ T4065] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.220636][ T4065] device bridge_slave_1 entered promiscuous mode [ 47.236268][ T4065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 47.240419][ T4065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 47.254625][ T4065] team0: Port device team_slave_0 added [ 47.257945][ T4065] team0: Port device team_slave_1 added [ 47.270894][ T4065] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 47.272528][ T4065] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.278766][ T4065] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 47.282945][ T4065] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 47.284593][ T4065] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.290645][ T4065] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 47.370658][ T4065] device hsr_slave_0 entered promiscuous mode [ 47.408876][ T4065] device hsr_slave_1 entered promiscuous mode [ 47.518951][ T4065] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 47.551145][ T4065] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 47.600281][ T4065] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 47.640329][ T4065] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 47.694556][ T4065] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.696355][ T4065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.698372][ T4065] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.700167][ T4065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.743023][ T4065] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.749772][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.753349][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.756382][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.760411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 47.767071][ T4065] 8021q: adding VLAN 0 to HW filter on device team0 [ 47.772760][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.774960][ T21] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.776664][ T21] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.783971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.786577][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.788127][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.800347][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.804058][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.814437][ T4065] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 47.816815][ T4065] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 47.822001][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.824325][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.827133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.830080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.904950][ T4065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.909046][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 47.910887][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.920899][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.932795][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.935100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.937322][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.941992][ T4065] device veth0_vlan entered promiscuous mode [ 47.947989][ T4065] device veth1_vlan entered promiscuous mode [ 47.963665][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.965860][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.968152][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.974031][ T4065] device veth0_macvtap entered promiscuous mode [ 47.977902][ T4065] device veth1_macvtap entered promiscuous mode [ 47.988545][ T4065] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.990455][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.993711][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.999836][ T4065] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.001748][ T1955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.006048][ T4065] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.008128][ T4065] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.010862][ T4065] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.012884][ T4065] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.056365][ T288] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.058250][ T288] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 48.065116][ T3551] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 48.077847][ T148] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.081093][ T148] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 48.083539][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 48.166231][ T4082] loop0: detected capacity change from 0 to 2048 [ 48.170034][ T4082] ======================================================= [ 48.170034][ T4082] WARNING: The mand mount option has been deprecated and [ 48.170034][ T4082] and is ignored by this kernel. Remove the mand [ 48.170034][ T4082] option from the mount to silence this warning. [ 48.170034][ T4082] ======================================================= [ 48.185019][ T4082] UDF-fs: error (device loop0): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d [ 48.199665][ T4082] ================================================================== [ 48.201599][ T4082] BUG: KASAN: slab-out-of-bounds in udf_write_aext+0x578/0x668 [ 48.203330][ T4082] Write of size 4 at addr ffff0000cf77e3f8 by task syz-executor.0/4082 [ 48.205171][ T4082] [ 48.205730][ T4082] CPU: 1 PID: 4082 Comm: syz-executor.0 Not tainted 5.15.104-syzkaller #0 [ 48.207632][ T4082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 48.210064][ T4082] Call trace: [ 48.210840][ T4082] dump_backtrace+0x0/0x530 [ 48.211970][ T4082] show_stack+0x2c/0x3c [ 48.212938][ T4082] dump_stack_lvl+0x108/0x170 [ 48.214034][ T4082] print_address_description+0x7c/0x3f0 [ 48.215357][ T4082] kasan_report+0x174/0x1e4 [ 48.216453][ T4082] __asan_report_store_n_noabort+0x40/0x4c [ 48.217882][ T4082] udf_write_aext+0x578/0x668 [ 48.219030][ T4082] udf_add_entry+0x11e0/0x28b0 [ 48.220150][ T4082] udf_mkdir+0x158/0x7e0 [ 48.221204][ T4082] vfs_mkdir+0x350/0x514 [ 48.222234][ T4082] do_mkdirat+0x20c/0x610 [ 48.223285][ T4082] __arm64_sys_mkdirat+0x90/0xa8 [ 48.224466][ T4082] invoke_syscall+0x98/0x2b8 [ 48.225589][ T4082] el0_svc_common+0x138/0x258 [ 48.226727][ T4082] do_el0_svc+0x58/0x14c [ 48.227734][ T4082] el0_svc+0x7c/0x1f0 [ 48.228669][ T4082] el0t_64_sync_handler+0x84/0xe4 [ 48.229830][ T4082] el0t_64_sync+0x1a0/0x1a4 [ 48.230904][ T4082] [ 48.231454][ T4082] Allocated by task 4082: [ 48.232522][ T4082] ____kasan_kmalloc+0xbc/0xfc [ 48.233681][ T4082] __kasan_kmalloc+0x10/0x1c [ 48.234871][ T4082] __kmalloc+0x29c/0x4c8 [ 48.235924][ T4082] __udf_iget+0xb14/0x3134 [ 48.236992][ T4082] udf_fill_super+0xfbc/0x1a7c [ 48.238079][ T4082] mount_bdev+0x26c/0x368 [ 48.239045][ T4082] udf_mount+0x44/0x58 [ 48.239977][ T4082] legacy_get_tree+0xd4/0x16c [ 48.241132][ T4082] vfs_get_tree+0x90/0x274 [ 48.242188][ T4082] do_new_mount+0x25c/0x8c8 [ 48.243211][ T4082] path_mount+0x590/0x104c [ 48.244275][ T4082] __arm64_sys_mount+0x510/0x5e0 [ 48.245365][ T4082] invoke_syscall+0x98/0x2b8 [ 48.246494][ T4082] el0_svc_common+0x138/0x258 [ 48.247647][ T4082] do_el0_svc+0x58/0x14c [ 48.248655][ T4082] el0_svc+0x7c/0x1f0 [ 48.249621][ T4082] el0t_64_sync_handler+0x84/0xe4 [ 48.250844][ T4082] el0t_64_sync+0x1a0/0x1a4 [ 48.251907][ T4082] [ 48.252457][ T4082] The buggy address belongs to the object at ffff0000cf77e000 [ 48.252457][ T4082] which belongs to the cache kmalloc-512 of size 512 [ 48.255799][ T4082] The buggy address is located 504 bytes to the right of [ 48.255799][ T4082] 512-byte region [ffff0000cf77e000, ffff0000cf77e200) [ 48.259025][ T4082] The buggy address belongs to the page: [ 48.260293][ T4082] page:00000000a2d507e4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10f77c [ 48.262700][ T4082] head:00000000a2d507e4 order:2 compound_mapcount:0 compound_pincount:0 [ 48.264647][ T4082] flags: 0x5ffc00000010200(slab|head|node=0|zone=2|lastcpupid=0x7ff) [ 48.266652][ T4082] raw: 05ffc00000010200 0000000000000000 dead000000000122 ffff0000c0002600 [ 48.268713][ T4082] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 48.270737][ T4082] page dumped because: kasan: bad access detected [ 48.272291][ T4082] [ 48.272844][ T4082] Memory state around the buggy address: [ 48.274155][ T4082] ffff0000cf77e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.275969][ T4082] ffff0000cf77e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.277858][ T4082] >ffff0000cf77e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.279779][ T4082] ^ [ 48.281659][ T4082] ffff0000cf77e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.283630][ T4082] ffff0000cf77e480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.285550][ T4082] ================================================================== [ 48.287418][ T4082] Disabling lock debugging due to kernel taint