Warning: Permanently added '10.128.1.125' (ED25519) to the list of known hosts.
[ 66.457590][ T4167] chnl_net:caif_netlink_parms(): no params data found
[ 66.505415][ T4167] bridge0: port 1(bridge_slave_0) entered blocking state
[ 66.513230][ T4167] bridge0: port 1(bridge_slave_0) entered disabled state
[ 66.521672][ T4167] device bridge_slave_0 entered promiscuous mode
[ 66.530927][ T4167] bridge0: port 2(bridge_slave_1) entered blocking state
[ 66.538093][ T4167] bridge0: port 2(bridge_slave_1) entered disabled state
[ 66.546037][ T4167] device bridge_slave_1 entered promiscuous mode
[ 66.569337][ T4167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 66.580534][ T4167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 66.606181][ T4167] team0: Port device team_slave_0 added
[ 66.613806][ T4167] team0: Port device team_slave_1 added
[ 66.633375][ T4167] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 66.640498][ T4167] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 66.666497][ T4167] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 66.680089][ T4167] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 66.687086][ T4167] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 66.713002][ T4167] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 66.744458][ T4167] device hsr_slave_0 entered promiscuous mode
[ 66.751821][ T4167] device hsr_slave_1 entered promiscuous mode
[ 66.847466][ T4167] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 66.857888][ T4167] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 66.866987][ T4167] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 66.876417][ T4167] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 66.898122][ T4167] bridge0: port 2(bridge_slave_1) entered blocking state
[ 66.905268][ T4167] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 66.913001][ T4167] bridge0: port 1(bridge_slave_0) entered blocking state
[ 66.920103][ T4167] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 66.964349][ T4167] 8021q: adding VLAN 0 to HW filter on device bond0
[ 66.977648][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 66.988483][ T9] bridge0: port 1(bridge_slave_0) entered disabled state
[ 66.997154][ T9] bridge0: port 2(bridge_slave_1) entered disabled state
[ 67.005075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 67.018393][ T4167] 8021q: adding VLAN 0 to HW filter on device team0
[ 67.029669][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 67.038275][ T144] bridge0: port 1(bridge_slave_0) entered blocking state
[ 67.045335][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 67.057296][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 67.065846][ T9] bridge0: port 2(bridge_slave_1) entered blocking state
[ 67.072940][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 67.093465][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 67.102372][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 67.114264][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 67.129654][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 67.140384][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 67.152487][ T4167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 67.169263][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 67.177347][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 67.191073][ T4167] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 67.209334][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 67.228269][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 67.237279][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 67.244941][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 67.255080][ T4167] device veth0_vlan entered promiscuous mode
[ 67.267072][ T4167] device veth1_vlan entered promiscuous mode
[ 67.288516][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 67.296608][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 67.304682][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 67.314976][ T4167] device veth0_macvtap entered promiscuous mode
[ 67.324983][ T4167] device veth1_macvtap entered promiscuous mode
[ 67.342705][ T4167] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 67.350671][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 67.360047][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 67.371574][ T4167] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 67.379960][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[ 67.392011][ T4167] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 67.401432][ T4167] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 67.410495][ T4167] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 67.419966][ T4167] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
executing program
executing program
executing program
[ 67.472092][ T4176] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready
[ 67.515584][ T4179] ==================================================================
[ 67.523886][ T4179] BUG: KASAN: use-after-free in ax25_fillin_cb+0x459/0x640
[ 67.531093][ T4179] Read of size 4 at addr ffff888019bc6338 by task syz-executor250/4179
[ 67.539321][ T4179]
[ 67.541649][ T4179] CPU: 1 PID: 4179 Comm: syz-executor250 Not tainted 5.15.184-syzkaller #0
[ 67.550232][ T4179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 67.560313][ T4179] Call Trace:
[ 67.563586][ T4179]
[ 67.566510][ T4179] dump_stack_lvl+0x168/0x230
[ 67.571217][ T4179] ? show_regs_print_info+0x20/0x20
[ 67.576411][ T4179] ? _printk+0xcc/0x110
[ 67.580564][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 67.585408][ T4179] ? load_image+0x3b0/0x3b0
[ 67.589905][ T4179] print_address_description+0x60/0x2d0
[ 67.595444][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 67.600287][ T4179] kasan_report+0xdf/0x130
[ 67.604699][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 67.609561][ T4179] ax25_fillin_cb+0x459/0x640
[ 67.614231][ T4179] ax25_setsockopt+0x8a2/0xa40
[ 67.619103][ T4179] ? ax25_shutdown+0x10/0x10
[ 67.623693][ T4179] ? aa_sock_opt_perm+0x74/0x100
[ 67.628622][ T4179] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 67.634168][ T4179] ? security_socket_setsockopt+0x7a/0xa0
[ 67.639885][ T4179] ? ax25_shutdown+0x10/0x10
[ 67.644471][ T4179] __sys_setsockopt+0x3d6/0x5e0
[ 67.649319][ T4179] ? __ia32_sys_recv+0xb0/0xb0
[ 67.654106][ T4179] ? lockdep_hardirqs_on_prepare+0x3fc/0x760
[ 67.660084][ T4179] ? lock_chain_count+0x20/0x20
[ 67.664935][ T4179] ? vtime_user_exit+0x2dc/0x400
[ 67.669872][ T4179] __x64_sys_setsockopt+0xb1/0xc0
[ 67.674900][ T4179] do_syscall_64+0x4c/0xa0
[ 67.679309][ T4179] ? clear_bhb_loop+0x30/0x80
[ 67.683976][ T4179] ? clear_bhb_loop+0x30/0x80
[ 67.688650][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 67.694556][ T4179] RIP: 0033:0x7f366072e5d9
[ 67.699126][ T4179] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 67.718819][ T4179] RSP: 002b:00007ffc7b384da8 EFLAGS: 00000206 ORIG_RAX: 0000000000000036
[ 67.727244][ T4179] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f366072e5d9
[ 67.735209][ T4179] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000004
[ 67.743171][ T4179] RBP: 00007ffc7b384de0 R08: 0000000000000010 R09: 0000000000000001
[ 67.751165][ T4179] R10: 0000200000000000 R11: 0000000000000206 R12: 00000000000f4240
[ 67.759129][ T4179] R13: 000000000001078a R14: 00007ffc7b384dc4 R15: 00007ffc7b384dd0
[ 67.767099][ T4179]
[ 67.770102][ T4179]
[ 67.772433][ T4179] Allocated by task 4176:
[ 67.776743][ T4179] __kasan_kmalloc+0xb5/0xf0
[ 67.781332][ T4179] ax25_dev_device_up+0x50/0x580
[ 67.786264][ T4179] ax25_device_event+0x483/0x4f0
[ 67.791192][ T4179] raw_notifier_call_chain+0xcb/0x160
[ 67.796556][ T4179] __dev_notify_flags+0x178/0x2d0
[ 67.801592][ T4179] dev_change_flags+0xe3/0x1a0
[ 67.806348][ T4179] dev_ifsioc+0x147/0xe70
[ 67.810665][ T4179] dev_ioctl+0x55f/0xe50
[ 67.814903][ T4179] sock_do_ioctl+0x222/0x2f0
[ 67.819479][ T4179] sock_ioctl+0x4ed/0x6e0
[ 67.823795][ T4179] __se_sys_ioctl+0xfa/0x170
[ 67.828371][ T4179] do_syscall_64+0x4c/0xa0
[ 67.832796][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 67.838875][ T4179]
[ 67.841186][ T4179] Freed by task 4178:
[ 67.845149][ T4179] kasan_set_track+0x4b/0x70
[ 67.849733][ T4179] kasan_set_free_info+0x1f/0x40
[ 67.854817][ T4179] ____kasan_slab_free+0xd5/0x110
[ 67.859833][ T4179] slab_free_freelist_hook+0xea/0x170
[ 67.865275][ T4179] kfree+0xef/0x2a0
[ 67.869073][ T4179] ax25_release+0x661/0x870
[ 67.873581][ T4179] sock_close+0xd5/0x240
[ 67.877824][ T4179] __fput+0x234/0x930
[ 67.881809][ T4179] task_work_run+0x125/0x1a0
[ 67.886399][ T4179] exit_to_user_mode_loop+0x10f/0x130
[ 67.891794][ T4179] exit_to_user_mode_prepare+0xb1/0x140
[ 67.897329][ T4179] syscall_exit_to_user_mode+0x16/0x40
[ 67.902780][ T4179] do_syscall_64+0x58/0xa0
[ 67.907183][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 67.913064][ T4179]
[ 67.915378][ T4179] The buggy address belongs to the object at ffff888019bc6300
[ 67.915378][ T4179] which belongs to the cache kmalloc-192 of size 192
[ 67.929414][ T4179] The buggy address is located 56 bytes inside of
[ 67.929414][ T4179] 192-byte region [ffff888019bc6300, ffff888019bc63c0)
[ 67.942585][ T4179] The buggy address belongs to the page:
[ 67.948213][ T4179] page:ffffea000066f180 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19bc6
[ 67.958350][ T4179] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 67.966119][ T4179] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888016841a00
[ 67.974805][ T4179] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 67.983389][ T4179] page dumped because: kasan: bad access detected
[ 67.990028][ T4179] page_owner tracks the page as allocated
[ 67.995743][ T4179] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2933995291, free_ts 0
[ 68.010583][ T4179] get_page_from_freelist+0x1b77/0x1c60
[ 68.016129][ T4179] __alloc_pages+0x1e1/0x470
[ 68.020722][ T4179] alloc_page_interleave+0x24/0x1e0
[ 68.025907][ T4179] new_slab+0xc0/0x4b0
[ 68.029979][ T4179] ___slab_alloc+0x81e/0xdf0
[ 68.034554][ T4179] kmem_cache_alloc_trace+0x1a5/0x2a0
[ 68.039912][ T4179] call_usermodehelper_setup+0x8a/0x260
[ 68.045450][ T4179] kobject_uevent_env+0x65e/0x890
[ 68.050465][ T4179] kernel_add_sysfs_param+0xfb/0x120
[ 68.055735][ T4179] param_sysfs_builtin+0x164/0x1e0
[ 68.060836][ T4179] param_sysfs_init+0x66/0x70
[ 68.065495][ T4179] do_one_initcall+0x1ee/0x680
[ 68.070242][ T4179] do_initcall_level+0x137/0x1f0
[ 68.075164][ T4179] do_initcalls+0x4b/0x90
[ 68.079476][ T4179] kernel_init_freeable+0x3ce/0x560
[ 68.084679][ T4179] kernel_init+0x19/0x1b0
[ 68.089012][ T4179] page_owner free stack trace missing
[ 68.094359][ T4179]
[ 68.096674][ T4179] Memory state around the buggy address:
[ 68.102294][ T4179] ffff888019bc6200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 68.110339][ T4179] ffff888019bc6280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 68.118386][ T4179] >ffff888019bc6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 68.126430][ T4179] ^
[ 68.132304][ T4179] ffff888019bc6380: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 68.140346][ T4179] ffff888019bc6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 68.148384][ T4179] ==================================================================
[ 68.156424][ T4179] Disabling lock debugging due to kernel taint
[ 68.164743][ T4179] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 68.171955][ T4179] CPU: 0 PID: 4179 Comm: syz-executor250 Tainted: G B 5.15.184-syzkaller #0
[ 68.181940][ T4179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 68.191979][ T4179] Call Trace:
[ 68.195245][ T4179]
[ 68.198177][ T4179] dump_stack_lvl+0x168/0x230
[ 68.202845][ T4179] ? show_regs_print_info+0x20/0x20
[ 68.208026][ T4179] ? load_image+0x3b0/0x3b0
[ 68.212522][ T4179] panic+0x2c9/0x7f0
[ 68.216404][ T4179] ? bpf_jit_dump+0xd0/0xd0
[ 68.220897][ T4179] ? _raw_spin_unlock_irqrestore+0xf6/0x100
[ 68.226777][ T4179] ? _raw_spin_unlock+0x40/0x40
[ 68.231627][ T4179] ? print_memory_metadata+0x314/0x400
[ 68.237083][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 68.241916][ T4179] check_panic_on_warn+0x80/0xa0
[ 68.246838][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 68.251672][ T4179] end_report+0x6d/0xf0
[ 68.255814][ T4179] kasan_report+0x102/0x130
[ 68.260300][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 68.265136][ T4179] ax25_fillin_cb+0x459/0x640
[ 68.269808][ T4179] ax25_setsockopt+0x8a2/0xa40
[ 68.274557][ T4179] ? ax25_shutdown+0x10/0x10
[ 68.279134][ T4179] ? aa_sock_opt_perm+0x74/0x100
[ 68.284057][ T4179] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 68.289586][ T4179] ? security_socket_setsockopt+0x7a/0xa0
[ 68.295296][ T4179] ? ax25_shutdown+0x10/0x10
[ 68.299869][ T4179] __sys_setsockopt+0x3d6/0x5e0
[ 68.304721][ T4179] ? __ia32_sys_recv+0xb0/0xb0
[ 68.309473][ T4179] ? lockdep_hardirqs_on_prepare+0x3fc/0x760
[ 68.315443][ T4179] ? lock_chain_count+0x20/0x20
[ 68.320274][ T4179] ? vtime_user_exit+0x2dc/0x400
[ 68.325198][ T4179] __x64_sys_setsockopt+0xb1/0xc0
[ 68.330209][ T4179] do_syscall_64+0x4c/0xa0
[ 68.334614][ T4179] ? clear_bhb_loop+0x30/0x80
[ 68.339275][ T4179] ? clear_bhb_loop+0x30/0x80
[ 68.343932][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 68.349812][ T4179] RIP: 0033:0x7f366072e5d9
[ 68.354212][ T4179] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 68.373799][ T4179] RSP: 002b:00007ffc7b384da8 EFLAGS: 00000206 ORIG_RAX: 0000000000000036
[ 68.382195][ T4179] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f366072e5d9
[ 68.390150][ T4179] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000004
[ 68.398101][ T4179] RBP: 00007ffc7b384de0 R08: 0000000000000010 R09: 0000000000000001
[ 68.406061][ T4179] R10: 0000200000000000 R11: 0000000000000206 R12: 00000000000f4240
[ 68.414026][ T4179] R13: 000000000001078a R14: 00007ffc7b384dc4 R15: 00007ffc7b384dd0
[ 68.421992][ T4179]
[ 68.425281][ T4179] Kernel Offset: disabled
[ 68.429597][ T4179] Rebooting in 86400 seconds..