Warning: Permanently added '10.128.1.151' (ED25519) to the list of known hosts.
[ 57.546057][ T4164] chnl_net:caif_netlink_parms(): no params data found
[ 57.592517][ T4164] bridge0: port 1(bridge_slave_0) entered blocking state
[ 57.599995][ T4164] bridge0: port 1(bridge_slave_0) entered disabled state
[ 57.608099][ T4164] device bridge_slave_0 entered promiscuous mode
[ 57.616796][ T4164] bridge0: port 2(bridge_slave_1) entered blocking state
[ 57.624067][ T4164] bridge0: port 2(bridge_slave_1) entered disabled state
[ 57.631980][ T4164] device bridge_slave_1 entered promiscuous mode
[ 57.655513][ T4164] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 57.666784][ T4164] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 57.690641][ T4164] team0: Port device team_slave_0 added
[ 57.698412][ T4164] team0: Port device team_slave_1 added
[ 57.717457][ T4164] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 57.724497][ T4164] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 57.750441][ T4164] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 57.763085][ T4164] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 57.770098][ T4164] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 57.796106][ T4164] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 57.827987][ T4164] device hsr_slave_0 entered promiscuous mode
[ 57.835258][ T4164] device hsr_slave_1 entered promiscuous mode
[ 57.930458][ T4164] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 57.940988][ T4164] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 57.950175][ T4164] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 57.959072][ T4164] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 57.981833][ T4164] bridge0: port 2(bridge_slave_1) entered blocking state
[ 57.989025][ T4164] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 57.996938][ T4164] bridge0: port 1(bridge_slave_0) entered blocking state
[ 58.004025][ T4164] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 58.049989][ T4164] 8021q: adding VLAN 0 to HW filter on device bond0
[ 58.062712][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 58.074488][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
[ 58.083013][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 58.091202][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 58.104269][ T4164] 8021q: adding VLAN 0 to HW filter on device team0
[ 58.115716][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 58.125633][ T154] bridge0: port 1(bridge_slave_0) entered blocking state
[ 58.132764][ T154] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 58.143847][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 58.152415][ T154] bridge0: port 2(bridge_slave_1) entered blocking state
[ 58.159529][ T154] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 58.179500][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 58.188089][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 58.201126][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 58.213285][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 58.226992][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 58.238147][ T4164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 58.256153][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 58.263577][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 58.277107][ T4164] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 58.294948][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 58.314077][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 58.322497][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 58.330899][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 58.341225][ T4164] device veth0_vlan entered promiscuous mode
[ 58.352404][ T4164] device veth1_vlan entered promiscuous mode
[ 58.372140][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 58.380339][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 58.388705][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 58.399472][ T4164] device veth0_macvtap entered promiscuous mode
[ 58.410451][ T4164] device veth1_macvtap entered promiscuous mode
[ 58.428008][ T4164] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 58.436840][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 58.446307][ T3089] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 58.457710][ T4164] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 58.465449][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[ 58.476479][ T4164] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 58.486491][ T4164] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 58.495350][ T4164] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 58.504359][ T4164] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
executing program
executing program
[ 58.552931][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready
[ 58.585939][ T4174] ==================================================================
[ 58.594164][ T4174] BUG: KASAN: use-after-free in ax25_fillin_cb+0x460/0x660
[ 58.601398][ T4174] Read of size 4 at addr ffff88801a398538 by task syz-executor373/4174
[ 58.609644][ T4174]
[ 58.611971][ T4174] CPU: 1 PID: 4174 Comm: syz-executor373 Not tainted 5.15.178-syzkaller #0
[ 58.620542][ T4174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 58.630590][ T4174] Call Trace:
[ 58.633871][ T4174]
[ 58.636803][ T4174] dump_stack_lvl+0x1e3/0x2d0
[ 58.641493][ T4174] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 58.647123][ T4174] ? _printk+0xd1/0x120
[ 58.651307][ T4174] ? __wake_up_klogd+0xcc/0x100
[ 58.656169][ T4174] ? panic+0x860/0x860
[ 58.660272][ T4174] ? _raw_spin_lock_irqsave+0xdd/0x120
[ 58.665754][ T4174] ? __lock_acquire+0x1ff0/0x1ff0
[ 58.670792][ T4174] print_address_description+0x63/0x3b0
[ 58.676327][ T4174] ? ax25_fillin_cb+0x460/0x660
[ 58.681215][ T4174] kasan_report+0x16b/0x1c0
[ 58.685744][ T4174] ? ax25_fillin_cb+0x460/0x660
[ 58.690597][ T4174] ax25_fillin_cb+0x460/0x660
[ 58.695271][ T4174] ax25_setsockopt+0xab7/0xe70
[ 58.700045][ T4174] ? ax25_shutdown+0x10/0x10
[ 58.704625][ T4174] ? aa_sock_opt_perm+0x79/0x110
[ 58.709553][ T4174] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 58.715092][ T4174] ? security_socket_setsockopt+0x7d/0xa0
[ 58.720799][ T4174] ? ax25_shutdown+0x10/0x10
[ 58.725377][ T4174] __sys_setsockopt+0x57e/0x990
[ 58.730218][ T4174] ? __ia32_sys_recv+0xb0/0xb0
[ 58.734986][ T4174] ? syscall_enter_from_user_mode+0x2e/0x240
[ 58.740953][ T4174] __x64_sys_setsockopt+0xb1/0xc0
[ 58.745972][ T4174] do_syscall_64+0x3b/0xb0
[ 58.750389][ T4174] ? clear_bhb_loop+0x15/0x70
[ 58.755058][ T4174] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 58.760943][ T4174] RIP: 0033:0x7fcecb315619
[ 58.765349][ T4174] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 58.784975][ T4174] RSP: 002b:00007fffa6ffab58 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 58.793384][ T4174] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fcecb315619
[ 58.801448][ T4174] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 58.809416][ T4174] RBP: 00007fffa6ffab90 R08: 0000000000000010 R09: 0000000000000001
[ 58.817382][ T4174] R10: 00004000000000c0 R11: 0000000000000246 R12: 00000000000f4240
[ 58.825353][ T4174] R13: 000000000000e4aa R14: 00007fffa6ffab74 R15: 00007fffa6ffab80
[ 58.833332][ T4174]
[ 58.836342][ T4174]
[ 58.838690][ T4174] Allocated by task 4172:
[ 58.843015][ T4174] ____kasan_kmalloc+0xba/0xf0
[ 58.847794][ T4174] kmem_cache_alloc_trace+0x143/0x290
[ 58.853163][ T4174] ax25_dev_device_up+0x51/0x5a0
[ 58.858091][ T4174] ax25_device_event+0x49b/0x500
[ 58.863042][ T4174] raw_notifier_call_chain+0xd0/0x170
[ 58.868409][ T4174] __dev_notify_flags+0x304/0x610
[ 58.873428][ T4174] dev_change_flags+0xe7/0x190
[ 58.878177][ T4174] dev_ifsioc+0x147/0x10c0
[ 58.882592][ T4174] dev_ioctl+0x504/0xf60
[ 58.886834][ T4174] sock_do_ioctl+0x34f/0x5a0
[ 58.891416][ T4174] sock_ioctl+0x47f/0x770
[ 58.895743][ T4174] __se_sys_ioctl+0xf1/0x160
[ 58.900508][ T4174] do_syscall_64+0x3b/0xb0
[ 58.904923][ T4174] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 58.910825][ T4174]
[ 58.913153][ T4174] Freed by task 4173:
[ 58.917124][ T4174] kasan_set_track+0x4b/0x80
[ 58.921703][ T4174] kasan_set_free_info+0x1f/0x40
[ 58.926626][ T4174] ____kasan_slab_free+0xd8/0x120
[ 58.931637][ T4174] slab_free_freelist_hook+0xdd/0x160
[ 58.937032][ T4174] kfree+0xf1/0x270
[ 58.940842][ T4174] ax25_release+0x3b3/0x840
[ 58.945337][ T4174] sock_close+0xcd/0x230
[ 58.949585][ T4174] __fput+0x3fe/0x8e0
[ 58.953578][ T4174] task_work_run+0x129/0x1a0
[ 58.958175][ T4174] exit_to_user_mode_loop+0x106/0x130
[ 58.963533][ T4174] exit_to_user_mode_prepare+0xb1/0x140
[ 58.969066][ T4174] syscall_exit_to_user_mode+0x5d/0x240
[ 58.974601][ T4174] do_syscall_64+0x47/0xb0
[ 58.979019][ T4174] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 58.984905][ T4174]
[ 58.987214][ T4174] The buggy address belongs to the object at ffff88801a398500
[ 58.987214][ T4174] which belongs to the cache kmalloc-192 of size 192
[ 59.001250][ T4174] The buggy address is located 56 bytes inside of
[ 59.001250][ T4174] 192-byte region [ffff88801a398500, ffff88801a3985c0)
[ 59.014427][ T4174] The buggy address belongs to the page:
[ 59.020059][ T4174] page:ffffea000068e600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a398
[ 59.030208][ T4174] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 59.037755][ T4174] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888017441a00
[ 59.046335][ T4174] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 59.054902][ T4174] page dumped because: kasan: bad access detected
[ 59.061304][ T4174] page_owner tracks the page as allocated
[ 59.067010][ T4174] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2261896935, free_ts 0
[ 59.081841][ T4174] get_page_from_freelist+0x3b78/0x3d40
[ 59.087377][ T4174] __alloc_pages+0x272/0x700
[ 59.091956][ T4174] alloc_page_interleave+0x22/0x1c0
[ 59.097146][ T4174] new_slab+0xbb/0x4b0
[ 59.101248][ T4174] ___slab_alloc+0x6f6/0xe10
[ 59.105828][ T4174] kmem_cache_alloc_trace+0x1a0/0x290
[ 59.111186][ T4174] call_usermodehelper_setup+0x8a/0x260
[ 59.116717][ T4174] kobject_uevent_env+0x681/0x8d0
[ 59.121730][ T4174] kernel_add_sysfs_param+0x106/0x130
[ 59.127089][ T4174] param_sysfs_builtin+0x16a/0x1f0
[ 59.132182][ T4174] param_sysfs_init+0x66/0x70
[ 59.136952][ T4174] do_one_initcall+0x22b/0x7a0
[ 59.141709][ T4174] do_initcall_level+0x157/0x210
[ 59.146636][ T4174] do_initcalls+0x49/0x90
[ 59.150956][ T4174] kernel_init_freeable+0x425/0x5c0
[ 59.156158][ T4174] kernel_init+0x19/0x290
[ 59.160478][ T4174] page_owner free stack trace missing
[ 59.165846][ T4174]
[ 59.168168][ T4174] Memory state around the buggy address:
[ 59.173787][ T4174] ffff88801a398400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 59.181887][ T4174] ffff88801a398480: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 59.189939][ T4174] >ffff88801a398500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 59.197986][ T4174] ^
[ 59.203893][ T4174] ffff88801a398580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 59.212060][ T4174] ffff88801a398600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 59.220126][ T4174] ==================================================================
[ 59.228167][ T4174] Disabling lock debugging due to kernel taint
[ 59.237178][ T4174] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 59.244413][ T4174] CPU: 0 PID: 4174 Comm: syz-executor373 Tainted: G B 5.15.178-syzkaller #0
[ 59.254394][ T4174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 59.264463][ T4174] Call Trace:
[ 59.267735][ T4174]
[ 59.270655][ T4174] dump_stack_lvl+0x1e3/0x2d0
[ 59.275323][ T4174] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 59.280961][ T4174] ? panic+0x860/0x860
[ 59.285014][ T4174] ? preempt_schedule_common+0xa6/0xd0
[ 59.290494][ T4174] ? preempt_schedule+0xd9/0xe0
[ 59.295332][ T4174] panic+0x318/0x860
[ 59.299235][ T4174] ? check_panic_on_warn+0x1d/0xa0
[ 59.304334][ T4174] ? fb_is_primary_device+0xd0/0xd0
[ 59.309523][ T4174] ? _raw_spin_unlock_irqrestore+0x128/0x130
[ 59.315495][ T4174] ? _raw_spin_unlock+0x40/0x40
[ 59.320332][ T4174] check_panic_on_warn+0x7e/0xa0
[ 59.325340][ T4174] ? ax25_fillin_cb+0x460/0x660
[ 59.330179][ T4174] end_report+0x6d/0xf0
[ 59.334321][ T4174] kasan_report+0x18e/0x1c0
[ 59.338809][ T4174] ? ax25_fillin_cb+0x460/0x660
[ 59.343655][ T4174] ax25_fillin_cb+0x460/0x660
[ 59.348331][ T4174] ax25_setsockopt+0xab7/0xe70
[ 59.353100][ T4174] ? ax25_shutdown+0x10/0x10
[ 59.357676][ T4174] ? aa_sock_opt_perm+0x79/0x110
[ 59.362614][ T4174] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 59.368142][ T4174] ? security_socket_setsockopt+0x7d/0xa0
[ 59.373850][ T4174] ? ax25_shutdown+0x10/0x10
[ 59.378427][ T4174] __sys_setsockopt+0x57e/0x990
[ 59.383263][ T4174] ? __ia32_sys_recv+0xb0/0xb0
[ 59.388034][ T4174] ? syscall_enter_from_user_mode+0x2e/0x240
[ 59.394006][ T4174] __x64_sys_setsockopt+0xb1/0xc0
[ 59.399019][ T4174] do_syscall_64+0x3b/0xb0
[ 59.403418][ T4174] ? clear_bhb_loop+0x15/0x70
[ 59.408081][ T4174] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 59.413960][ T4174] RIP: 0033:0x7fcecb315619
[ 59.418358][ T4174] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 59.437949][ T4174] RSP: 002b:00007fffa6ffab58 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 59.446348][ T4174] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fcecb315619
[ 59.454305][ T4174] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 59.462259][ T4174] RBP: 00007fffa6ffab90 R08: 0000000000000010 R09: 0000000000000001
[ 59.470215][ T4174] R10: 00004000000000c0 R11: 0000000000000246 R12: 00000000000f4240
[ 59.478171][ T4174] R13: 000000000000e4aa R14: 00007fffa6ffab74 R15: 00007fffa6ffab80
[ 59.486135][ T4174]
[ 59.489421][ T4174] Kernel Offset: disabled
[ 59.493762][ T4174] Rebooting in 86400 seconds..