Warning: Permanently added '10.128.1.99' (ED25519) to the list of known hosts.
[ 62.301664][ T4167] chnl_net:caif_netlink_parms(): no params data found
[ 62.350162][ T4167] bridge0: port 1(bridge_slave_0) entered blocking state
[ 62.357892][ T4167] bridge0: port 1(bridge_slave_0) entered disabled state
[ 62.366312][ T4167] device bridge_slave_0 entered promiscuous mode
[ 62.375706][ T4167] bridge0: port 2(bridge_slave_1) entered blocking state
[ 62.383075][ T4167] bridge0: port 2(bridge_slave_1) entered disabled state
[ 62.391976][ T4167] device bridge_slave_1 entered promiscuous mode
[ 62.414558][ T4167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 62.426968][ T4167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 62.450729][ T4167] team0: Port device team_slave_0 added
[ 62.458406][ T4167] team0: Port device team_slave_1 added
[ 62.479061][ T4167] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 62.486157][ T4167] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 62.512316][ T4167] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 62.525066][ T4167] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 62.532023][ T4167] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 62.558026][ T4167] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 62.590184][ T4167] device hsr_slave_0 entered promiscuous mode
[ 62.597236][ T4167] device hsr_slave_1 entered promiscuous mode
[ 62.695183][ T4167] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 62.706126][ T4167] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 62.715206][ T4167] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 62.724428][ T4167] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 62.747861][ T4167] bridge0: port 2(bridge_slave_1) entered blocking state
[ 62.755060][ T4167] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 62.762896][ T4167] bridge0: port 1(bridge_slave_0) entered blocking state
[ 62.770005][ T4167] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 62.818709][ T4167] 8021q: adding VLAN 0 to HW filter on device bond0
[ 62.831413][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 62.841602][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
[ 62.850404][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 62.860116][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 62.873587][ T4167] 8021q: adding VLAN 0 to HW filter on device team0
[ 62.884915][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 62.893510][ T154] bridge0: port 1(bridge_slave_0) entered blocking state
[ 62.900637][ T154] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 62.912868][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 62.921726][ T154] bridge0: port 2(bridge_slave_1) entered blocking state
[ 62.928865][ T154] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 62.948560][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 62.957512][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 62.969958][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 62.982573][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 62.996675][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 63.006798][ T4167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 63.025229][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 63.032753][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 63.046571][ T4167] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 63.064718][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 63.085263][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 63.093804][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 63.102580][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 63.112595][ T4167] device veth0_vlan entered promiscuous mode
[ 63.126068][ T4167] device veth1_vlan entered promiscuous mode
[ 63.146471][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 63.155041][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 63.163357][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 63.174269][ T4167] device veth0_macvtap entered promiscuous mode
[ 63.185045][ T4167] device veth1_macvtap entered promiscuous mode
[ 63.202387][ T4167] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 63.210569][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 63.221037][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 63.233345][ T4167] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 63.242329][ T1452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[ 63.253272][ T4167] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 63.263109][ T4167] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 63.272152][ T4167] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 63.281110][ T4167] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
executing program
executing program
[ 63.332554][ T4176] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready
[ 63.365616][ T4178] ==================================================================
[ 63.373804][ T4178] BUG: KASAN: use-after-free in ax25_fillin_cb+0x459/0x640
[ 63.381029][ T4178] Read of size 4 at addr ffff88801b5c3b38 by task syz-executor215/4178
[ 63.389540][ T4178]
[ 63.391885][ T4178] CPU: 1 PID: 4178 Comm: syz-executor215 Not tainted 5.15.182-syzkaller #0
[ 63.400571][ T4178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[ 63.410637][ T4178] Call Trace:
[ 63.413920][ T4178]
[ 63.416871][ T4178] dump_stack_lvl+0x168/0x230
[ 63.421576][ T4178] ? show_regs_print_info+0x20/0x20
[ 63.426784][ T4178] ? _printk+0xcc/0x110
[ 63.430950][ T4178] ? ax25_fillin_cb+0x459/0x640
[ 63.435811][ T4178] ? load_image+0x3b0/0x3b0
[ 63.440310][ T4178] print_address_description+0x60/0x2d0
[ 63.445931][ T4178] ? ax25_fillin_cb+0x459/0x640
[ 63.450871][ T4178] kasan_report+0xdf/0x130
[ 63.455282][ T4178] ? ax25_fillin_cb+0x459/0x640
[ 63.460343][ T4178] ax25_fillin_cb+0x459/0x640
[ 63.465043][ T4178] ax25_setsockopt+0x8a2/0xa40
[ 63.469861][ T4178] ? ax25_shutdown+0x10/0x10
[ 63.474477][ T4178] ? aa_sock_opt_perm+0x74/0x100
[ 63.479414][ T4178] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 63.485081][ T4178] ? security_socket_setsockopt+0x7a/0xa0
[ 63.490806][ T4178] ? ax25_shutdown+0x10/0x10
[ 63.495395][ T4178] __sys_setsockopt+0x3d6/0x5e0
[ 63.500248][ T4178] ? __ia32_sys_recv+0xb0/0xb0
[ 63.505017][ T4178] ? lockdep_hardirqs_on_prepare+0x3fc/0x760
[ 63.511092][ T4178] ? lock_chain_count+0x20/0x20
[ 63.515942][ T4178] ? vtime_user_exit+0x2dc/0x400
[ 63.520884][ T4178] __x64_sys_setsockopt+0xb1/0xc0
[ 63.525914][ T4178] do_syscall_64+0x4c/0xa0
[ 63.530332][ T4178] ? clear_bhb_loop+0x15/0x70
[ 63.535007][ T4178] ? clear_bhb_loop+0x15/0x70
[ 63.539685][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 63.545600][ T4178] RIP: 0033:0x7f2a82b0d619
[ 63.550021][ T4178] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 63.569632][ T4178] RSP: 002b:00007ffd44bf3ed8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 63.578068][ T4178] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f2a82b0d619
[ 63.586129][ T4178] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 63.594097][ T4178] RBP: 00007ffd44bf3f10 R08: 0000000000000010 R09: 0000000000000001
[ 63.602065][ T4178] R10: 00002000000001c0 R11: 0000000000000246 R12: 00000000000f4240
[ 63.610036][ T4178] R13: 000000000000f74c R14: 00007ffd44bf3ef4 R15: 00007ffd44bf3f00
[ 63.618106][ T4178]
[ 63.621118][ T4178]
[ 63.623439][ T4178] Allocated by task 4176:
[ 63.627757][ T4178] __kasan_kmalloc+0xb5/0xf0
[ 63.632343][ T4178] ax25_dev_device_up+0x50/0x580
[ 63.637276][ T4178] ax25_device_event+0x483/0x4f0
[ 63.642205][ T4178] raw_notifier_call_chain+0xcb/0x160
[ 63.647658][ T4178] __dev_notify_flags+0x178/0x2d0
[ 63.652866][ T4178] dev_change_flags+0xe3/0x1a0
[ 63.657652][ T4178] dev_ifsioc+0x147/0xe70
[ 63.661983][ T4178] dev_ioctl+0x55f/0xe50
[ 63.666239][ T4178] sock_do_ioctl+0x222/0x2f0
[ 63.670841][ T4178] sock_ioctl+0x4ed/0x6e0
[ 63.675165][ T4178] __se_sys_ioctl+0xfa/0x170
[ 63.679746][ T4178] do_syscall_64+0x4c/0xa0
[ 63.684153][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 63.690044][ T4178]
[ 63.692357][ T4178] Freed by task 4177:
[ 63.696331][ T4178] kasan_set_track+0x4b/0x70
[ 63.700910][ T4178] kasan_set_free_info+0x1f/0x40
[ 63.705834][ T4178] ____kasan_slab_free+0xd5/0x110
[ 63.710853][ T4178] slab_free_freelist_hook+0xea/0x170
[ 63.716214][ T4178] kfree+0xef/0x2a0
[ 63.720109][ T4178] ax25_release+0x661/0x870
[ 63.724608][ T4178] sock_close+0xd5/0x240
[ 63.728835][ T4178] __fput+0x234/0x930
[ 63.732908][ T4178] task_work_run+0x125/0x1a0
[ 63.737581][ T4178] exit_to_user_mode_loop+0x10f/0x130
[ 63.743065][ T4178] exit_to_user_mode_prepare+0xb1/0x140
[ 63.748703][ T4178] syscall_exit_to_user_mode+0x16/0x40
[ 63.754161][ T4178] do_syscall_64+0x58/0xa0
[ 63.758572][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 63.764556][ T4178]
[ 63.766882][ T4178] The buggy address belongs to the object at ffff88801b5c3b00
[ 63.766882][ T4178] which belongs to the cache kmalloc-192 of size 192
[ 63.781014][ T4178] The buggy address is located 56 bytes inside of
[ 63.781014][ T4178] 192-byte region [ffff88801b5c3b00, ffff88801b5c3bc0)
[ 63.794271][ T4178] The buggy address belongs to the page:
[ 63.799902][ T4178] page:ffffea00006d70c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b5c3
[ 63.810043][ T4178] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 63.817600][ T4178] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888016841a00
[ 63.826177][ T4178] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 63.834746][ T4178] page dumped because: kasan: bad access detected
[ 63.841151][ T4178] page_owner tracks the page as allocated
[ 63.846874][ T4178] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2375436415, free_ts 0
[ 63.861725][ T4178] get_page_from_freelist+0x1b77/0x1c60
[ 63.867316][ T4178] __alloc_pages+0x1e1/0x470
[ 63.872053][ T4178] alloc_page_interleave+0x24/0x1e0
[ 63.877253][ T4178] new_slab+0xc0/0x4b0
[ 63.881318][ T4178] ___slab_alloc+0x81e/0xdf0
[ 63.885901][ T4178] kmem_cache_alloc_trace+0x1a5/0x2a0
[ 63.891292][ T4178] call_usermodehelper_setup+0x8a/0x260
[ 63.897049][ T4178] kobject_uevent_env+0x65e/0x890
[ 63.902297][ T4178] kernel_add_sysfs_param+0xfb/0x120
[ 63.907730][ T4178] param_sysfs_builtin+0x164/0x1e0
[ 63.912844][ T4178] param_sysfs_init+0x66/0x70
[ 63.917607][ T4178] do_one_initcall+0x1ee/0x680
[ 63.922373][ T4178] do_initcall_level+0x137/0x1f0
[ 63.927383][ T4178] do_initcalls+0x4b/0x90
[ 63.931706][ T4178] kernel_init_freeable+0x3ce/0x560
[ 63.937384][ T4178] kernel_init+0x19/0x1b0
[ 63.941727][ T4178] page_owner free stack trace missing
[ 63.947243][ T4178]
[ 63.949559][ T4178] Memory state around the buggy address:
[ 63.955376][ T4178] ffff88801b5c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 63.963429][ T4178] ffff88801b5c3a80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 63.971486][ T4178] >ffff88801b5c3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 63.979625][ T4178] ^
[ 63.985523][ T4178] ffff88801b5c3b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 63.993573][ T4178] ffff88801b5c3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 64.001625][ T4178] ==================================================================
[ 64.009667][ T4178] Disabling lock debugging due to kernel taint
[ 64.018909][ T4178] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 64.026134][ T4178] CPU: 1 PID: 4178 Comm: syz-executor215 Tainted: G B 5.15.182-syzkaller #0
[ 64.036097][ T4178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[ 64.046244][ T4178] Call Trace:
[ 64.049525][ T4178]
[ 64.052447][ T4178] dump_stack_lvl+0x168/0x230
[ 64.057121][ T4178] ? show_regs_print_info+0x20/0x20
[ 64.062311][ T4178] ? load_image+0x3b0/0x3b0
[ 64.066813][ T4178] panic+0x2c9/0x7f0
[ 64.070706][ T4178] ? bpf_jit_dump+0xd0/0xd0
[ 64.075511][ T4178] ? _raw_spin_unlock_irqrestore+0xf6/0x100
[ 64.081407][ T4178] ? _raw_spin_unlock+0x40/0x40
[ 64.086252][ T4178] ? print_memory_metadata+0x314/0x400
[ 64.091707][ T4178] ? ax25_fillin_cb+0x459/0x640
[ 64.096602][ T4178] check_panic_on_warn+0x80/0xa0
[ 64.101551][ T4178] ? ax25_fillin_cb+0x459/0x640
[ 64.106392][ T4178] end_report+0x6d/0xf0
[ 64.110538][ T4178] kasan_report+0x102/0x130
[ 64.115207][ T4178] ? ax25_fillin_cb+0x459/0x640
[ 64.120056][ T4178] ax25_fillin_cb+0x459/0x640
[ 64.124732][ T4178] ax25_setsockopt+0x8a2/0xa40
[ 64.129606][ T4178] ? ax25_shutdown+0x10/0x10
[ 64.134190][ T4178] ? aa_sock_opt_perm+0x74/0x100
[ 64.139117][ T4178] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 64.144655][ T4178] ? security_socket_setsockopt+0x7a/0xa0
[ 64.150370][ T4178] ? ax25_shutdown+0x10/0x10
[ 64.154976][ T4178] __sys_setsockopt+0x3d6/0x5e0
[ 64.159829][ T4178] ? __ia32_sys_recv+0xb0/0xb0
[ 64.164593][ T4178] ? lockdep_hardirqs_on_prepare+0x3fc/0x760
[ 64.170595][ T4178] ? lock_chain_count+0x20/0x20
[ 64.175454][ T4178] ? vtime_user_exit+0x2dc/0x400
[ 64.180450][ T4178] __x64_sys_setsockopt+0xb1/0xc0
[ 64.185601][ T4178] do_syscall_64+0x4c/0xa0
[ 64.190011][ T4178] ? clear_bhb_loop+0x15/0x70
[ 64.194675][ T4178] ? clear_bhb_loop+0x15/0x70
[ 64.199353][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 64.205252][ T4178] RIP: 0033:0x7f2a82b0d619
[ 64.209666][ T4178] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 64.229309][ T4178] RSP: 002b:00007ffd44bf3ed8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 64.237725][ T4178] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f2a82b0d619
[ 64.245696][ T4178] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 64.253850][ T4178] RBP: 00007ffd44bf3f10 R08: 0000000000000010 R09: 0000000000000001
[ 64.262099][ T4178] R10: 00002000000001c0 R11: 0000000000000246 R12: 00000000000f4240
[ 64.270068][ T4178] R13: 000000000000f74c R14: 00007ffd44bf3ef4 R15: 00007ffd44bf3f00
[ 64.278044][ T4178]
[ 64.281382][ T4178] Kernel Offset: disabled
[ 64.285711][ T4178] Rebooting in 86400 seconds..