Warning: Permanently added '10.128.0.205' (ED25519) to the list of known hosts. [ 64.573997][ T4166] chnl_net:caif_netlink_parms(): no params data found [ 64.621978][ T4166] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.629779][ T4166] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.638071][ T4166] device bridge_slave_0 entered promiscuous mode [ 64.647425][ T4166] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.654613][ T4166] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.662855][ T4166] device bridge_slave_1 entered promiscuous mode [ 64.685352][ T4166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.696944][ T4166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.721577][ T4166] team0: Port device team_slave_0 added [ 64.729301][ T4166] team0: Port device team_slave_1 added [ 64.748966][ T4166] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.756047][ T4166] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.782096][ T4166] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.794770][ T4166] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.801800][ T4166] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.827906][ T4166] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.859931][ T4166] device hsr_slave_0 entered promiscuous mode [ 64.867200][ T4166] device hsr_slave_1 entered promiscuous mode [ 64.965347][ T4166] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 64.976515][ T4166] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 64.986050][ T4166] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 64.995994][ T4166] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 65.018885][ T4166] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.026138][ T4166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.033913][ T4166] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.041533][ T4166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.088006][ T4166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.101100][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.111066][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.119817][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.128853][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 65.141990][ T4166] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.153630][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.163036][ T420] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.170132][ T420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.180881][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.189739][ T420] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.196848][ T420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.215747][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.225196][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.238095][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.249661][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.263193][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.274199][ T4166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.291969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.299591][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.312283][ T4166] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.331257][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.350397][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.360487][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.368808][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.379735][ T4166] device veth0_vlan entered promiscuous mode [ 65.391832][ T4166] device veth1_vlan entered promiscuous mode [ 65.411476][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 65.420367][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 65.428815][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.440327][ T4166] device veth0_macvtap entered promiscuous mode [ 65.450216][ T4166] device veth1_macvtap entered promiscuous mode [ 65.467541][ T4166] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.475911][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.485967][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 65.497865][ T4166] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.505825][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 65.518261][ T4166] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.527419][ T4166] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.536300][ T4166] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.545548][ T4166] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program executing program executing program [ 65.596559][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready [ 65.639823][ T4178] ================================================================== [ 65.648025][ T4178] BUG: KASAN: use-after-free in ax25_fillin_cb+0x459/0x640 [ 65.655237][ T4178] Read of size 4 at addr ffff88801b5fda38 by task syz-executor325/4178 [ 65.663476][ T4178] [ 65.665807][ T4178] CPU: 0 PID: 4178 Comm: syz-executor325 Not tainted 5.15.184-syzkaller #0 [ 65.674485][ T4178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 65.684555][ T4178] Call Trace: [ 65.687833][ T4178] [ 65.690870][ T4178] dump_stack_lvl+0x168/0x230 [ 65.695792][ T4178] ? show_regs_print_info+0x20/0x20 [ 65.701181][ T4178] ? _printk+0xcc/0x110 [ 65.705402][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 65.710279][ T4178] ? load_image+0x3b0/0x3b0 [ 65.714817][ T4178] print_address_description+0x60/0x2d0 [ 65.720392][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 65.725253][ T4178] kasan_report+0xdf/0x130 [ 65.729679][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 65.734539][ T4178] ax25_fillin_cb+0x459/0x640 [ 65.739222][ T4178] ax25_setsockopt+0x8a2/0xa40 [ 65.744025][ T4178] ? ax25_shutdown+0x10/0x10 [ 65.748632][ T4178] ? aa_sock_opt_perm+0x74/0x100 [ 65.753682][ T4178] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 65.759379][ T4178] ? security_socket_setsockopt+0x7a/0xa0 [ 65.765286][ T4178] ? ax25_shutdown+0x10/0x10 [ 65.769886][ T4178] __sys_setsockopt+0x3d6/0x5e0 [ 65.774758][ T4178] ? __ia32_sys_recv+0xb0/0xb0 [ 65.779539][ T4178] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 65.785658][ T4178] ? lock_chain_count+0x20/0x20 [ 65.790615][ T4178] ? vtime_user_exit+0x2dc/0x400 [ 65.795669][ T4178] __x64_sys_setsockopt+0xb1/0xc0 [ 65.800710][ T4178] do_syscall_64+0x4c/0xa0 [ 65.805150][ T4178] ? clear_bhb_loop+0x30/0x80 [ 65.809836][ T4178] ? clear_bhb_loop+0x30/0x80 [ 65.814539][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.820457][ T4178] RIP: 0033:0x7f338a67a619 [ 65.824879][ T4178] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 65.844488][ T4178] RSP: 002b:00007fff3eef2c98 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 65.853051][ T4178] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f338a67a619 [ 65.861024][ T4178] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000004 [ 65.868991][ T4178] RBP: 00007fff3eef2cd0 R08: 0000000000000010 R09: 0000000000000001 [ 65.877135][ T4178] R10: 00002000000001c0 R11: 0000000000000246 R12: 00000000000f4240 [ 65.885100][ T4178] R13: 0000000000010038 R14: 00007fff3eef2cb4 R15: 00007fff3eef2cc0 [ 65.893078][ T4178] [ 65.896098][ T4178] [ 65.898419][ T4178] Allocated by task 4175: [ 65.902731][ T4178] __kasan_kmalloc+0xb5/0xf0 [ 65.907322][ T4178] ax25_dev_device_up+0x50/0x580 [ 65.912274][ T4178] ax25_device_event+0x483/0x4f0 [ 65.917236][ T4178] raw_notifier_call_chain+0xcb/0x160 [ 65.922606][ T4178] __dev_notify_flags+0x178/0x2d0 [ 65.927622][ T4178] dev_change_flags+0xe3/0x1a0 [ 65.932386][ T4178] dev_ifsioc+0x147/0xe70 [ 65.936722][ T4178] dev_ioctl+0x55f/0xe50 [ 65.940963][ T4178] sock_do_ioctl+0x222/0x2f0 [ 65.945594][ T4178] sock_ioctl+0x4ed/0x6e0 [ 65.950050][ T4178] __se_sys_ioctl+0xfa/0x170 [ 65.954736][ T4178] do_syscall_64+0x4c/0xa0 [ 65.959155][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.965055][ T4178] [ 65.967389][ T4178] Freed by task 4177: [ 65.971360][ T4178] kasan_set_track+0x4b/0x70 [ 65.975952][ T4178] kasan_set_free_info+0x1f/0x40 [ 65.980892][ T4178] ____kasan_slab_free+0xd5/0x110 [ 65.985927][ T4178] slab_free_freelist_hook+0xea/0x170 [ 65.991345][ T4178] kfree+0xef/0x2a0 [ 65.995270][ T4178] ax25_release+0x661/0x870 [ 65.999773][ T4178] sock_close+0xd5/0x240 [ 66.004007][ T4178] __fput+0x234/0x930 [ 66.007995][ T4178] task_work_run+0x125/0x1a0 [ 66.012582][ T4178] exit_to_user_mode_loop+0x10f/0x130 [ 66.017945][ T4178] exit_to_user_mode_prepare+0xb1/0x140 [ 66.023482][ T4178] syscall_exit_to_user_mode+0x16/0x40 [ 66.028930][ T4178] do_syscall_64+0x58/0xa0 [ 66.033339][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.039232][ T4178] [ 66.041547][ T4178] The buggy address belongs to the object at ffff88801b5fda00 [ 66.041547][ T4178] which belongs to the cache kmalloc-192 of size 192 [ 66.055611][ T4178] The buggy address is located 56 bytes inside of [ 66.055611][ T4178] 192-byte region [ffff88801b5fda00, ffff88801b5fdac0) [ 66.068793][ T4178] The buggy address belongs to the page: [ 66.074442][ T4178] page:ffffea00006d7f40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b5fd [ 66.084583][ T4178] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 66.092150][ T4178] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888016841a00 [ 66.100819][ T4178] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.109387][ T4178] page dumped because: kasan: bad access detected [ 66.115793][ T4178] page_owner tracks the page as allocated [ 66.121495][ T4178] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2430751317, free_ts 0 [ 66.136330][ T4178] get_page_from_freelist+0x1b77/0x1c60 [ 66.141878][ T4178] __alloc_pages+0x1e1/0x470 [ 66.146734][ T4178] alloc_page_interleave+0x24/0x1e0 [ 66.151951][ T4178] new_slab+0xc0/0x4b0 [ 66.156010][ T4178] ___slab_alloc+0x81e/0xdf0 [ 66.160596][ T4178] kmem_cache_alloc_trace+0x1a5/0x2a0 [ 66.166054][ T4178] call_usermodehelper_setup+0x8a/0x260 [ 66.171591][ T4178] kobject_uevent_env+0x65e/0x890 [ 66.176607][ T4178] kernel_add_sysfs_param+0xfb/0x120 [ 66.181881][ T4178] param_sysfs_builtin+0x164/0x1e0 [ 66.186980][ T4178] param_sysfs_init+0x66/0x70 [ 66.191748][ T4178] do_one_initcall+0x1ee/0x680 [ 66.196513][ T4178] do_initcall_level+0x137/0x1f0 [ 66.201452][ T4178] do_initcalls+0x4b/0x90 [ 66.205768][ T4178] kernel_init_freeable+0x3ce/0x560 [ 66.210956][ T4178] kernel_init+0x19/0x1b0 [ 66.215286][ T4178] page_owner free stack trace missing [ 66.220640][ T4178] [ 66.222950][ T4178] Memory state around the buggy address: [ 66.228569][ T4178] ffff88801b5fd900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.236630][ T4178] ffff88801b5fd980: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.244676][ T4178] >ffff88801b5fda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.252722][ T4178] ^ [ 66.258602][ T4178] ffff88801b5fda80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.266745][ T4178] ffff88801b5fdb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.274798][ T4178] ================================================================== [ 66.282858][ T4178] Disabling lock debugging due to kernel taint [ 66.292652][ T4178] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 66.299873][ T4178] CPU: 1 PID: 4178 Comm: syz-executor325 Tainted: G B 5.15.184-syzkaller #0 [ 66.309855][ T4178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 66.319929][ T4178] Call Trace: [ 66.323196][ T4178] [ 66.326120][ T4178] dump_stack_lvl+0x168/0x230 [ 66.330798][ T4178] ? show_regs_print_info+0x20/0x20 [ 66.336089][ T4178] ? load_image+0x3b0/0x3b0 [ 66.340582][ T4178] panic+0x2c9/0x7f0 [ 66.344468][ T4178] ? bpf_jit_dump+0xd0/0xd0 [ 66.348963][ T4178] ? _raw_spin_unlock_irqrestore+0xf6/0x100 [ 66.354982][ T4178] ? _raw_spin_unlock+0x40/0x40 [ 66.359830][ T4178] ? print_memory_metadata+0x314/0x400 [ 66.365289][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 66.370152][ T4178] check_panic_on_warn+0x80/0xa0 [ 66.375295][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 66.380146][ T4178] end_report+0x6d/0xf0 [ 66.384299][ T4178] kasan_report+0x102/0x130 [ 66.388798][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 66.393649][ T4178] ax25_fillin_cb+0x459/0x640 [ 66.398333][ T4178] ax25_setsockopt+0x8a2/0xa40 [ 66.403196][ T4178] ? ax25_shutdown+0x10/0x10 [ 66.407778][ T4178] ? aa_sock_opt_perm+0x74/0x100 [ 66.412710][ T4178] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 66.418261][ T4178] ? security_socket_setsockopt+0x7a/0xa0 [ 66.423971][ T4178] ? ax25_shutdown+0x10/0x10 [ 66.428550][ T4178] __sys_setsockopt+0x3d6/0x5e0 [ 66.433397][ T4178] ? __ia32_sys_recv+0xb0/0xb0 [ 66.438368][ T4178] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 66.444357][ T4178] ? lock_chain_count+0x20/0x20 [ 66.449203][ T4178] ? vtime_user_exit+0x2dc/0x400 [ 66.454143][ T4178] __x64_sys_setsockopt+0xb1/0xc0 [ 66.459162][ T4178] do_syscall_64+0x4c/0xa0 [ 66.463702][ T4178] ? clear_bhb_loop+0x30/0x80 [ 66.468376][ T4178] ? clear_bhb_loop+0x30/0x80 [ 66.473052][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.478940][ T4178] RIP: 0033:0x7f338a67a619 [ 66.483370][ T4178] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 66.502964][ T4178] RSP: 002b:00007fff3eef2c98 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 66.511392][ T4178] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f338a67a619 [ 66.519358][ T4178] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000004 [ 66.527319][ T4178] RBP: 00007fff3eef2cd0 R08: 0000000000000010 R09: 0000000000000001 [ 66.535368][ T4178] R10: 00002000000001c0 R11: 0000000000000246 R12: 00000000000f4240 [ 66.543411][ T4178] R13: 0000000000010038 R14: 00007fff3eef2cb4 R15: 00007fff3eef2cc0 [ 66.551384][ T4178] [ 66.554720][ T4178] Kernel Offset: disabled [ 66.559042][ T4178] Rebooting in 86400 seconds..