Warning: Permanently added '10.128.0.94' (ED25519) to the list of known hosts.
[ 56.692482][ T4167] chnl_net:caif_netlink_parms(): no params data found
[ 56.735836][ T4167] bridge0: port 1(bridge_slave_0) entered blocking state
[ 56.743195][ T4167] bridge0: port 1(bridge_slave_0) entered disabled state
[ 56.751052][ T4167] device bridge_slave_0 entered promiscuous mode
[ 56.759597][ T4167] bridge0: port 2(bridge_slave_1) entered blocking state
[ 56.766759][ T4167] bridge0: port 2(bridge_slave_1) entered disabled state
[ 56.774446][ T4167] device bridge_slave_1 entered promiscuous mode
[ 56.794194][ T4167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 56.805353][ T4167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 56.826935][ T4167] team0: Port device team_slave_0 added
[ 56.834407][ T4167] team0: Port device team_slave_1 added
[ 56.851748][ T4167] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 56.858682][ T4167] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 56.884720][ T4167] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 56.896785][ T4167] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 56.903786][ T4167] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 56.929660][ T4167] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 56.958063][ T4167] device hsr_slave_0 entered promiscuous mode
[ 56.964718][ T4167] device hsr_slave_1 entered promiscuous mode
[ 57.050205][ T4167] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 57.060337][ T4167] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 57.068769][ T4167] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 57.077809][ T4167] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 57.097664][ T4167] bridge0: port 2(bridge_slave_1) entered blocking state
[ 57.104838][ T4167] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 57.112483][ T4167] bridge0: port 1(bridge_slave_0) entered blocking state
[ 57.119520][ T4167] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 57.161619][ T4167] 8021q: adding VLAN 0 to HW filter on device bond0
[ 57.173721][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 57.183779][ T145] bridge0: port 1(bridge_slave_0) entered disabled state
[ 57.191769][ T145] bridge0: port 2(bridge_slave_1) entered disabled state
[ 57.199517][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 57.211363][ T4167] 8021q: adding VLAN 0 to HW filter on device team0
[ 57.222113][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 57.230541][ T1280] bridge0: port 1(bridge_slave_0) entered blocking state
[ 57.237564][ T1280] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 57.248524][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 57.257226][ T1280] bridge0: port 2(bridge_slave_1) entered blocking state
[ 57.264288][ T1280] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 57.281664][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 57.290539][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 57.301130][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 57.313076][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 57.324678][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 57.335269][ T4167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 57.351418][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 57.358814][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 57.371233][ T4167] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 57.387320][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 57.405282][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 57.413636][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 57.422394][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 57.432172][ T4167] device veth0_vlan entered promiscuous mode
[ 57.442539][ T4167] device veth1_vlan entered promiscuous mode
[ 57.459449][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 57.467584][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 57.475987][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 57.486378][ T4167] device veth0_macvtap entered promiscuous mode
[ 57.495066][ T4167] device veth1_macvtap entered promiscuous mode
[ 57.510904][ T4167] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 57.518275][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 57.527473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 57.538512][ T4167] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 57.546476][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[ 57.557367][ T4167] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 57.566439][ T4167] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 57.575743][ T4167] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 57.584616][ T4167] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
executing program
executing program
[ 57.625568][ T4175] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready
[ 57.656888][ T4177] ==================================================================
[ 57.665036][ T4177] BUG: KASAN: use-after-free in ax25_fillin_cb+0x459/0x640
[ 57.672233][ T4177] Read of size 4 at addr ffff88801b3e9538 by task syz-executor256/4177
[ 57.680469][ T4177]
[ 57.682792][ T4177] CPU: 0 PID: 4177 Comm: syz-executor256 Not tainted 5.15.184-syzkaller #0
[ 57.691356][ T4177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 57.701400][ T4177] Call Trace:
[ 57.704663][ T4177]
[ 57.707575][ T4177] dump_stack_lvl+0x168/0x230
[ 57.712245][ T4177] ? show_regs_print_info+0x20/0x20
[ 57.717428][ T4177] ? _printk+0xcc/0x110
[ 57.721572][ T4177] ? ax25_fillin_cb+0x459/0x640
[ 57.726416][ T4177] ? load_image+0x3b0/0x3b0
[ 57.730908][ T4177] print_address_description+0x60/0x2d0
[ 57.736446][ T4177] ? ax25_fillin_cb+0x459/0x640
[ 57.741280][ T4177] kasan_report+0xdf/0x130
[ 57.745691][ T4177] ? ax25_fillin_cb+0x459/0x640
[ 57.750523][ T4177] ax25_fillin_cb+0x459/0x640
[ 57.755181][ T4177] ax25_setsockopt+0x8a2/0xa40
[ 57.759939][ T4177] ? ax25_shutdown+0x10/0x10
[ 57.764525][ T4177] ? aa_sock_opt_perm+0x74/0x100
[ 57.769445][ T4177] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 57.774976][ T4177] ? security_socket_setsockopt+0x7a/0xa0
[ 57.780694][ T4177] ? ax25_shutdown+0x10/0x10
[ 57.785283][ T4177] __sys_setsockopt+0x3d6/0x5e0
[ 57.790122][ T4177] ? __ia32_sys_recv+0xb0/0xb0
[ 57.794884][ T4177] ? lockdep_hardirqs_on_prepare+0x3fc/0x760
[ 57.800851][ T4177] ? lock_chain_count+0x20/0x20
[ 57.805685][ T4177] ? vtime_user_exit+0x2dc/0x400
[ 57.810606][ T4177] __x64_sys_setsockopt+0xb1/0xc0
[ 57.815615][ T4177] do_syscall_64+0x4c/0xa0
[ 57.820014][ T4177] ? clear_bhb_loop+0x30/0x80
[ 57.824682][ T4177] ? clear_bhb_loop+0x30/0x80
[ 57.829341][ T4177] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 57.835220][ T4177] RIP: 0033:0x7f64a344e619
[ 57.839641][ T4177] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 57.859232][ T4177] RSP: 002b:00007fff0b480018 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 57.867627][ T4177] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f64a344e619
[ 57.875581][ T4177] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 57.883535][ T4177] RBP: 00007fff0b480050 R08: 0000000000000010 R09: 0000000000000001
[ 57.891490][ T4177] R10: 00002000000001c0 R11: 0000000000000246 R12: 00000000000f4240
[ 57.899472][ T4177] R13: 000000000000e118 R14: 00007fff0b480034 R15: 00007fff0b480040
[ 57.907523][ T4177]
[ 57.910524][ T4177]
[ 57.912828][ T4177] Allocated by task 4175:
[ 57.917129][ T4177] __kasan_kmalloc+0xb5/0xf0
[ 57.921702][ T4177] ax25_dev_device_up+0x50/0x580
[ 57.926626][ T4177] ax25_device_event+0x483/0x4f0
[ 57.931553][ T4177] raw_notifier_call_chain+0xcb/0x160
[ 57.936929][ T4177] __dev_notify_flags+0x178/0x2d0
[ 57.941942][ T4177] dev_change_flags+0xe3/0x1a0
[ 57.946694][ T4177] dev_ifsioc+0x147/0xe70
[ 57.951003][ T4177] dev_ioctl+0x55f/0xe50
[ 57.955226][ T4177] sock_do_ioctl+0x222/0x2f0
[ 57.959799][ T4177] sock_ioctl+0x4ed/0x6e0
[ 57.964119][ T4177] __se_sys_ioctl+0xfa/0x170
[ 57.968692][ T4177] do_syscall_64+0x4c/0xa0
[ 57.973087][ T4177] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 57.978966][ T4177]
[ 57.981269][ T4177] Freed by task 4176:
[ 57.985222][ T4177] kasan_set_track+0x4b/0x70
[ 57.989792][ T4177] kasan_set_free_info+0x1f/0x40
[ 57.994707][ T4177] ____kasan_slab_free+0xd5/0x110
[ 57.999715][ T4177] slab_free_freelist_hook+0xea/0x170
[ 58.005078][ T4177] kfree+0xef/0x2a0
[ 58.008865][ T4177] ax25_release+0x661/0x870
[ 58.013350][ T4177] sock_close+0xd5/0x240
[ 58.017590][ T4177] __fput+0x234/0x930
[ 58.021572][ T4177] task_work_run+0x125/0x1a0
[ 58.026146][ T4177] exit_to_user_mode_loop+0x10f/0x130
[ 58.031495][ T4177] exit_to_user_mode_prepare+0xb1/0x140
[ 58.037060][ T4177] syscall_exit_to_user_mode+0x16/0x40
[ 58.042500][ T4177] do_syscall_64+0x58/0xa0
[ 58.046905][ T4177] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 58.052793][ T4177]
[ 58.055095][ T4177] The buggy address belongs to the object at ffff88801b3e9500
[ 58.055095][ T4177] which belongs to the cache kmalloc-192 of size 192
[ 58.069122][ T4177] The buggy address is located 56 bytes inside of
[ 58.069122][ T4177] 192-byte region [ffff88801b3e9500, ffff88801b3e95c0)
[ 58.082288][ T4177] The buggy address belongs to the page:
[ 58.087914][ T4177] page:ffffea00006cfa40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b3e9
[ 58.098043][ T4177] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 58.105587][ T4177] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888016841a00
[ 58.114151][ T4177] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 58.122717][ T4177] page dumped because: kasan: bad access detected
[ 58.129129][ T4177] page_owner tracks the page as allocated
[ 58.134821][ T4177] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2083381218, free_ts 0
[ 58.149650][ T4177] get_page_from_freelist+0x1b77/0x1c60
[ 58.155193][ T4177] __alloc_pages+0x1e1/0x470
[ 58.159770][ T4177] alloc_page_interleave+0x24/0x1e0
[ 58.164961][ T4177] new_slab+0xc0/0x4b0
[ 58.169041][ T4177] ___slab_alloc+0x81e/0xdf0
[ 58.173613][ T4177] kmem_cache_alloc_trace+0x1a5/0x2a0
[ 58.178969][ T4177] call_usermodehelper_setup+0x8a/0x260
[ 58.184498][ T4177] kobject_uevent_env+0x65e/0x890
[ 58.189501][ T4177] kernel_add_sysfs_param+0xfb/0x120
[ 58.194764][ T4177] param_sysfs_builtin+0x164/0x1e0
[ 58.199862][ T4177] param_sysfs_init+0x66/0x70
[ 58.204525][ T4177] do_one_initcall+0x1ee/0x680
[ 58.209284][ T4177] do_initcall_level+0x137/0x1f0
[ 58.214221][ T4177] do_initcalls+0x4b/0x90
[ 58.218539][ T4177] kernel_init_freeable+0x3ce/0x560
[ 58.223722][ T4177] kernel_init+0x19/0x1b0
[ 58.228052][ T4177] page_owner free stack trace missing
[ 58.233396][ T4177]
[ 58.235703][ T4177] Memory state around the buggy address:
[ 58.241396][ T4177] ffff88801b3e9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 58.249441][ T4177] ffff88801b3e9480: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 58.257502][ T4177] >ffff88801b3e9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 58.265551][ T4177] ^
[ 58.271420][ T4177] ffff88801b3e9580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 58.279457][ T4177] ffff88801b3e9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 58.287490][ T4177] ==================================================================
[ 58.295522][ T4177] Disabling lock debugging due to kernel taint
[ 58.303776][ T4177] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 58.310980][ T4177] CPU: 0 PID: 4177 Comm: syz-executor256 Tainted: G B 5.15.184-syzkaller #0
[ 58.320953][ T4177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 58.330996][ T4177] Call Trace:
[ 58.334365][ T4177]
[ 58.337280][ T4177] dump_stack_lvl+0x168/0x230
[ 58.341943][ T4177] ? show_regs_print_info+0x20/0x20
[ 58.347216][ T4177] ? load_image+0x3b0/0x3b0
[ 58.351704][ T4177] panic+0x2c9/0x7f0
[ 58.355586][ T4177] ? bpf_jit_dump+0xd0/0xd0
[ 58.360071][ T4177] ? _raw_spin_unlock_irqrestore+0xf6/0x100
[ 58.365999][ T4177] ? _raw_spin_unlock+0x40/0x40
[ 58.370839][ T4177] ? print_memory_metadata+0x314/0x400
[ 58.376290][ T4177] ? ax25_fillin_cb+0x459/0x640
[ 58.381121][ T4177] check_panic_on_warn+0x80/0xa0
[ 58.386040][ T4177] ? ax25_fillin_cb+0x459/0x640
[ 58.390869][ T4177] end_report+0x6d/0xf0
[ 58.395008][ T4177] kasan_report+0x102/0x130
[ 58.399491][ T4177] ? ax25_fillin_cb+0x459/0x640
[ 58.404320][ T4177] ax25_fillin_cb+0x459/0x640
[ 58.408975][ T4177] ax25_setsockopt+0x8a2/0xa40
[ 58.413720][ T4177] ? ax25_shutdown+0x10/0x10
[ 58.418296][ T4177] ? aa_sock_opt_perm+0x74/0x100
[ 58.423217][ T4177] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 58.428768][ T4177] ? security_socket_setsockopt+0x7a/0xa0
[ 58.434468][ T4177] ? ax25_shutdown+0x10/0x10
[ 58.439039][ T4177] __sys_setsockopt+0x3d6/0x5e0
[ 58.443872][ T4177] ? __ia32_sys_recv+0xb0/0xb0
[ 58.448621][ T4177] ? lockdep_hardirqs_on_prepare+0x3fc/0x760
[ 58.454583][ T4177] ? lock_chain_count+0x20/0x20
[ 58.459417][ T4177] ? vtime_user_exit+0x2dc/0x400
[ 58.464336][ T4177] __x64_sys_setsockopt+0xb1/0xc0
[ 58.469360][ T4177] do_syscall_64+0x4c/0xa0
[ 58.473843][ T4177] ? clear_bhb_loop+0x30/0x80
[ 58.478499][ T4177] ? clear_bhb_loop+0x30/0x80
[ 58.483157][ T4177] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 58.489033][ T4177] RIP: 0033:0x7f64a344e619
[ 58.493425][ T4177] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 58.513008][ T4177] RSP: 002b:00007fff0b480018 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 58.521401][ T4177] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f64a344e619
[ 58.529352][ T4177] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 58.537300][ T4177] RBP: 00007fff0b480050 R08: 0000000000000010 R09: 0000000000000001
[ 58.545249][ T4177] R10: 00002000000001c0 R11: 0000000000000246 R12: 00000000000f4240
[ 58.553201][ T4177] R13: 000000000000e118 R14: 00007fff0b480034 R15: 00007fff0b480040
[ 58.561163][ T4177]
[ 58.564472][ T4177] Kernel Offset: disabled
[ 58.568790][ T4177] Rebooting in 86400 seconds..