Warning: Permanently added '10.128.1.43' (ED25519) to the list of known hosts. [ 51.070791][ T4163] chnl_net:caif_netlink_parms(): no params data found [ 51.110265][ T4163] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.117755][ T4163] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.125869][ T4163] device bridge_slave_0 entered promiscuous mode [ 51.134703][ T4163] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.141968][ T4163] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.149582][ T4163] device bridge_slave_1 entered promiscuous mode [ 51.169322][ T4163] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.180913][ T4163] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.201683][ T4163] team0: Port device team_slave_0 added [ 51.208818][ T4163] team0: Port device team_slave_1 added [ 51.226044][ T4163] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.233169][ T4163] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.259084][ T4163] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.271939][ T4163] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.278896][ T4163] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.304819][ T4163] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.331655][ T4163] device hsr_slave_0 entered promiscuous mode [ 51.338755][ T4163] device hsr_slave_1 entered promiscuous mode [ 51.416960][ T4163] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 51.427673][ T4163] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 51.437268][ T4163] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 51.445984][ T4163] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 51.466500][ T4163] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.473676][ T4163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.481565][ T4163] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.488609][ T4163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.528127][ T4163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.539575][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.549783][ T1232] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.558345][ T1232] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.567358][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.580501][ T4163] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.592850][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.601333][ T1232] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.608368][ T1232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.619591][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.628323][ T1232] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.635411][ T1232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.653965][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.662931][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.674972][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.686377][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.697613][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.708350][ T4163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.725413][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 51.733113][ T1232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 51.745307][ T4163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.762355][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.779398][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.788159][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.796594][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.806128][ T4163] device veth0_vlan entered promiscuous mode [ 51.817520][ T4163] device veth1_vlan entered promiscuous mode [ 51.836268][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 51.844344][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 51.852880][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.863922][ T4163] device veth0_macvtap entered promiscuous mode [ 51.873816][ T4163] device veth1_macvtap entered promiscuous mode [ 51.887496][ T4163] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 51.895034][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.904478][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 51.916227][ T4163] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 51.925161][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 51.935678][ T4163] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.944737][ T4163] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.953756][ T4163] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.962799][ T4163] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program executing program executing program [ 52.006441][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready [ 52.048442][ T4175] ================================================================== [ 52.056649][ T4175] BUG: KASAN: use-after-free in ax25_fillin_cb+0x460/0x660 [ 52.063879][ T4175] Read of size 4 at addr ffff888019d81638 by task syz-executor155/4175 [ 52.072106][ T4175] [ 52.074443][ T4175] CPU: 0 PID: 4175 Comm: syz-executor155 Not tainted 5.15.180-syzkaller #0 [ 52.083017][ T4175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 52.093064][ T4175] Call Trace: [ 52.096352][ T4175] [ 52.099263][ T4175] dump_stack_lvl+0x1e3/0x2d0 [ 52.103956][ T4175] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 52.109574][ T4175] ? _printk+0xd1/0x120 [ 52.113708][ T4175] ? __wake_up_klogd+0xcc/0x100 [ 52.118666][ T4175] ? panic+0x860/0x860 [ 52.122723][ T4175] ? _raw_spin_lock_irqsave+0xdd/0x120 [ 52.128189][ T4175] ? __lock_acquire+0x1ff0/0x1ff0 [ 52.133198][ T4175] print_address_description+0x63/0x3b0 [ 52.138729][ T4175] ? ax25_fillin_cb+0x460/0x660 [ 52.143564][ T4175] kasan_report+0x16b/0x1c0 [ 52.148050][ T4175] ? ax25_fillin_cb+0x460/0x660 [ 52.152883][ T4175] ax25_fillin_cb+0x460/0x660 [ 52.157543][ T4175] ax25_setsockopt+0xab7/0xe70 [ 52.162301][ T4175] ? ax25_shutdown+0x10/0x10 [ 52.166873][ T4175] ? aa_sock_opt_perm+0x79/0x110 [ 52.171789][ T4175] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 52.177333][ T4175] ? security_socket_setsockopt+0x7d/0xa0 [ 52.183030][ T4175] ? ax25_shutdown+0x10/0x10 [ 52.187616][ T4175] __sys_setsockopt+0x57e/0x990 [ 52.192447][ T4175] ? __ia32_sys_recv+0xb0/0xb0 [ 52.197193][ T4175] ? syscall_enter_from_user_mode+0x2e/0x240 [ 52.203150][ T4175] __x64_sys_setsockopt+0xb1/0xc0 [ 52.208157][ T4175] do_syscall_64+0x3b/0xb0 [ 52.212558][ T4175] ? clear_bhb_loop+0x15/0x70 [ 52.217217][ T4175] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.223087][ T4175] RIP: 0033:0x7f4d815385d9 [ 52.227491][ T4175] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 52.247091][ T4175] RSP: 002b:00007fff3073cf78 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 [ 52.255496][ T4175] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f4d815385d9 [ 52.263457][ T4175] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000004 [ 52.271423][ T4175] RBP: 00007fff3073cfb0 R08: 0000000000000010 R09: 0000000000000001 [ 52.279379][ T4175] R10: 0000200000000000 R11: 0000000000000206 R12: 00000000000f4240 [ 52.287330][ T4175] R13: 000000000000cb25 R14: 00007fff3073cf94 R15: 00007fff3073cfa0 [ 52.295323][ T4175] [ 52.298328][ T4175] [ 52.300633][ T4175] Allocated by task 4172: [ 52.304937][ T4175] ____kasan_kmalloc+0xba/0xf0 [ 52.309681][ T4175] kmem_cache_alloc_trace+0x143/0x290 [ 52.315051][ T4175] ax25_dev_device_up+0x51/0x5a0 [ 52.319995][ T4175] ax25_device_event+0x4a0/0x510 [ 52.324920][ T4175] raw_notifier_call_chain+0xd0/0x170 [ 52.330271][ T4175] __dev_notify_flags+0x1fd/0x3f0 [ 52.335280][ T4175] dev_change_flags+0xe7/0x190 [ 52.340019][ T4175] dev_ifsioc+0x147/0x10c0 [ 52.344424][ T4175] dev_ioctl+0x504/0xf60 [ 52.348660][ T4175] sock_do_ioctl+0x34f/0x5a0 [ 52.353242][ T4175] sock_ioctl+0x484/0x770 [ 52.357553][ T4175] __se_sys_ioctl+0xf1/0x160 [ 52.362123][ T4175] do_syscall_64+0x3b/0xb0 [ 52.366520][ T4175] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.372390][ T4175] [ 52.374712][ T4175] Freed by task 4174: [ 52.378668][ T4175] kasan_set_track+0x4b/0x80 [ 52.383256][ T4175] kasan_set_free_info+0x1f/0x40 [ 52.388174][ T4175] ____kasan_slab_free+0xd8/0x120 [ 52.393179][ T4175] slab_free_freelist_hook+0xdd/0x160 [ 52.398533][ T4175] kfree+0xf1/0x270 [ 52.402318][ T4175] ax25_release+0x3b3/0x840 [ 52.406802][ T4175] sock_close+0xcd/0x230 [ 52.411019][ T4175] __fput+0x3fe/0x8e0 [ 52.414977][ T4175] task_work_run+0x129/0x1a0 [ 52.419547][ T4175] exit_to_user_mode_loop+0x106/0x130 [ 52.424897][ T4175] exit_to_user_mode_prepare+0xb1/0x140 [ 52.430418][ T4175] syscall_exit_to_user_mode+0x5d/0x240 [ 52.435942][ T4175] do_syscall_64+0x47/0xb0 [ 52.440340][ T4175] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.446210][ T4175] [ 52.448512][ T4175] The buggy address belongs to the object at ffff888019d81600 [ 52.448512][ T4175] which belongs to the cache kmalloc-192 of size 192 [ 52.462539][ T4175] The buggy address is located 56 bytes inside of [ 52.462539][ T4175] 192-byte region [ffff888019d81600, ffff888019d816c0) [ 52.475708][ T4175] The buggy address belongs to the page: [ 52.481327][ T4175] page:ffffea0000676040 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19d81 [ 52.491547][ T4175] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 52.499082][ T4175] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888017441a00 [ 52.507663][ T4175] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 52.516225][ T4175] page dumped because: kasan: bad access detected [ 52.522625][ T4175] page_owner tracks the page as allocated [ 52.528316][ T4175] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2402473874, free_ts 0 [ 52.543149][ T4175] get_page_from_freelist+0x3b78/0x3d40 [ 52.548710][ T4175] __alloc_pages+0x272/0x700 [ 52.553275][ T4175] alloc_page_interleave+0x22/0x1c0 [ 52.558449][ T4175] new_slab+0xbb/0x4b0 [ 52.562502][ T4175] ___slab_alloc+0x6f6/0xe10 [ 52.567172][ T4175] __kmalloc_track_caller+0x1c7/0x300 [ 52.572520][ T4175] krealloc+0x5c/0xf0 [ 52.576480][ T4175] add_sysfs_param+0xca/0x7f0 [ 52.581132][ T4175] kernel_add_sysfs_param+0xb0/0x130 [ 52.586413][ T4175] param_sysfs_builtin+0x16a/0x1f0 [ 52.591518][ T4175] param_sysfs_init+0x66/0x70 [ 52.596170][ T4175] do_one_initcall+0x22b/0x7a0 [ 52.600911][ T4175] do_initcall_level+0x157/0x210 [ 52.605825][ T4175] do_initcalls+0x49/0x90 [ 52.610128][ T4175] kernel_init_freeable+0x425/0x5c0 [ 52.615306][ T4175] kernel_init+0x19/0x290 [ 52.619613][ T4175] page_owner free stack trace missing [ 52.624955][ T4175] [ 52.627259][ T4175] Memory state around the buggy address: [ 52.632866][ T4175] ffff888019d81500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.640908][ T4175] ffff888019d81580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.648941][ T4175] >ffff888019d81600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.656976][ T4175] ^ [ 52.662847][ T4175] ffff888019d81680: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.670883][ T4175] ffff888019d81700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.678917][ T4175] ================================================================== [ 52.686951][ T4175] Disabling lock debugging due to kernel taint [ 52.699611][ T4175] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 52.706826][ T4175] CPU: 0 PID: 4175 Comm: syz-executor155 Tainted: G B 5.15.180-syzkaller #0 [ 52.716782][ T4175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 52.726848][ T4175] Call Trace: [ 52.730110][ T4175] [ 52.733019][ T4175] dump_stack_lvl+0x1e3/0x2d0 [ 52.737688][ T4175] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 52.743302][ T4175] ? panic+0x860/0x860 [ 52.747345][ T4175] ? preempt_schedule_common+0xa6/0xd0 [ 52.752778][ T4175] ? preempt_schedule+0xd9/0xe0 [ 52.757606][ T4175] panic+0x318/0x860 [ 52.761475][ T4175] ? check_panic_on_warn+0x1d/0xa0 [ 52.766563][ T4175] ? fb_is_primary_device+0xd0/0xd0 [ 52.771743][ T4175] ? _raw_spin_unlock_irqrestore+0x128/0x130 [ 52.777705][ T4175] ? _raw_spin_unlock+0x40/0x40 [ 52.782534][ T4175] check_panic_on_warn+0x7e/0xa0 [ 52.787450][ T4175] ? ax25_fillin_cb+0x460/0x660 [ 52.792289][ T4175] end_report+0x6d/0xf0 [ 52.796419][ T4175] kasan_report+0x18e/0x1c0 [ 52.800895][ T4175] ? ax25_fillin_cb+0x460/0x660 [ 52.805727][ T4175] ax25_fillin_cb+0x460/0x660 [ 52.810383][ T4175] ax25_setsockopt+0xab7/0xe70 [ 52.815126][ T4175] ? ax25_shutdown+0x10/0x10 [ 52.819695][ T4175] ? aa_sock_opt_perm+0x79/0x110 [ 52.824646][ T4175] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 52.830192][ T4175] ? security_socket_setsockopt+0x7d/0xa0 [ 52.835887][ T4175] ? ax25_shutdown+0x10/0x10 [ 52.840455][ T4175] __sys_setsockopt+0x57e/0x990 [ 52.845303][ T4175] ? __ia32_sys_recv+0xb0/0xb0 [ 52.850044][ T4175] ? syscall_enter_from_user_mode+0x2e/0x240 [ 52.855998][ T4175] __x64_sys_setsockopt+0xb1/0xc0 [ 52.860999][ T4175] do_syscall_64+0x3b/0xb0 [ 52.865392][ T4175] ? clear_bhb_loop+0x15/0x70 [ 52.870057][ T4175] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.875941][ T4175] RIP: 0033:0x7f4d815385d9 [ 52.880336][ T4175] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 52.899924][ T4175] RSP: 002b:00007fff3073cf78 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 [ 52.908345][ T4175] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f4d815385d9 [ 52.916295][ T4175] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000004 [ 52.924242][ T4175] RBP: 00007fff3073cfb0 R08: 0000000000000010 R09: 0000000000000001 [ 52.932192][ T4175] R10: 0000200000000000 R11: 0000000000000206 R12: 00000000000f4240 [ 52.940141][ T4175] R13: 000000000000cb25 R14: 00007fff3073cf94 R15: 00007fff3073cfa0 [ 52.948094][ T4175] [ 52.951310][ T4175] Kernel Offset: disabled [ 52.955628][ T4175] Rebooting in 86400 seconds..