Warning: Permanently added '10.128.1.68' (ED25519) to the list of known hosts.
[ 67.962698][ T4169] chnl_net:caif_netlink_parms(): no params data found
[ 68.018530][ T4169] bridge0: port 1(bridge_slave_0) entered blocking state
[ 68.027535][ T4169] bridge0: port 1(bridge_slave_0) entered disabled state
[ 68.036872][ T4169] device bridge_slave_0 entered promiscuous mode
[ 68.047881][ T4169] bridge0: port 2(bridge_slave_1) entered blocking state
[ 68.055803][ T4169] bridge0: port 2(bridge_slave_1) entered disabled state
[ 68.065151][ T4169] device bridge_slave_1 entered promiscuous mode
[ 68.092892][ T4169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 68.106466][ T4169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 68.134706][ T4169] team0: Port device team_slave_0 added
[ 68.147388][ T4169] team0: Port device team_slave_1 added
[ 68.170946][ T4169] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 68.178435][ T4169] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 68.210759][ T4169] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 68.224398][ T4169] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 68.231668][ T4169] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 68.266246][ T4169] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 68.305035][ T4169] device hsr_slave_0 entered promiscuous mode
[ 68.313319][ T4169] device hsr_slave_1 entered promiscuous mode
[ 68.442567][ T4169] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 68.455845][ T4169] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 68.472032][ T4169] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 68.485900][ T4169] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 68.514095][ T4169] bridge0: port 2(bridge_slave_1) entered blocking state
[ 68.523276][ T4169] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 68.533343][ T4169] bridge0: port 1(bridge_slave_0) entered blocking state
[ 68.543335][ T4169] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 68.602496][ T4169] 8021q: adding VLAN 0 to HW filter on device bond0
[ 68.620494][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 68.633858][ T767] bridge0: port 1(bridge_slave_0) entered disabled state
[ 68.646141][ T767] bridge0: port 2(bridge_slave_1) entered disabled state
[ 68.656557][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 68.673920][ T4169] 8021q: adding VLAN 0 to HW filter on device team0
[ 68.687982][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 68.699985][ T767] bridge0: port 1(bridge_slave_0) entered blocking state
[ 68.708433][ T767] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 68.723068][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 68.732861][ T767] bridge0: port 2(bridge_slave_1) entered blocking state
[ 68.743146][ T767] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 68.770100][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 68.782818][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 68.798056][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 68.813079][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 68.827336][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 68.843400][ T4169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 68.866116][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 68.874925][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 68.889359][ T4169] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 68.915405][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 68.940120][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 68.952970][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 68.965004][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 68.979398][ T4169] device veth0_vlan entered promiscuous mode
[ 68.994126][ T4169] device veth1_vlan entered promiscuous mode
[ 69.019855][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 69.040237][ T767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 69.052767][ T4169] device veth0_macvtap entered promiscuous mode
[ 69.066531][ T4169] device veth1_macvtap entered promiscuous mode
[ 69.086263][ T4169] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 69.096886][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 69.105726][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 69.118365][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 69.135948][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 69.151078][ T4169] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 69.160219][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 69.174435][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 69.188406][ T4169] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 69.200263][ T4169] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 69.213796][ T4169] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 69.224720][ T4169] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
executing program
executing program
executing program
[ 69.288195][ T4177] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready
[ 69.323556][ T4179] ==================================================================
[ 69.332857][ T4179] BUG: KASAN: use-after-free in ax25_fillin_cb+0x460/0x660
[ 69.341169][ T4179] Read of size 4 at addr ffff888019dd2638 by task syz-executor324/4179
[ 69.350096][ T4179]
[ 69.353065][ T4179] CPU: 0 PID: 4179 Comm: syz-executor324 Not tainted 5.15.180-syzkaller #0
[ 69.363512][ T4179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 69.375220][ T4179] Call Trace:
[ 69.379065][ T4179]
[ 69.382498][ T4179] dump_stack_lvl+0x1e3/0x2d0
[ 69.388124][ T4179] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 69.394344][ T4179] ? _printk+0xd1/0x120
[ 69.398922][ T4179] ? __wake_up_klogd+0xcc/0x100
[ 69.403984][ T4179] ? panic+0x860/0x860
[ 69.408725][ T4179] ? _raw_spin_lock_irqsave+0xdd/0x120
[ 69.414534][ T4179] ? __lock_acquire+0x1ff0/0x1ff0
[ 69.419798][ T4179] print_address_description+0x63/0x3b0
[ 69.426446][ T4179] ? ax25_fillin_cb+0x460/0x660
[ 69.433515][ T4179] kasan_report+0x16b/0x1c0
[ 69.438700][ T4179] ? ax25_fillin_cb+0x460/0x660
[ 69.444538][ T4179] ax25_fillin_cb+0x460/0x660
[ 69.450593][ T4179] ax25_setsockopt+0xab7/0xe70
[ 69.455820][ T4179] ? ax25_shutdown+0x10/0x10
[ 69.460793][ T4179] ? aa_sock_opt_perm+0x79/0x110
[ 69.467562][ T4179] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 69.474251][ T4179] ? security_socket_setsockopt+0x7d/0xa0
[ 69.480617][ T4179] ? ax25_shutdown+0x10/0x10
[ 69.485762][ T4179] __sys_setsockopt+0x57e/0x990
[ 69.491223][ T4179] ? __ia32_sys_recv+0xb0/0xb0
[ 69.496754][ T4179] ? syscall_enter_from_user_mode+0x2e/0x240
[ 69.504224][ T4179] __x64_sys_setsockopt+0xb1/0xc0
[ 69.510097][ T4179] do_syscall_64+0x3b/0xb0
[ 69.514797][ T4179] ? clear_bhb_loop+0x15/0x70
[ 69.519954][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.526255][ T4179] RIP: 0033:0x7f5032a5e619
[ 69.532552][ T4179] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 69.559830][ T4179] RSP: 002b:00007fff7b34ceb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 69.569432][ T4179] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f5032a5e619
[ 69.579808][ T4179] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 69.592516][ T4179] RBP: 00007fff7b34cef0 R08: 0000000000000010 R09: 0000000000000001
[ 69.602570][ T4179] R10: 0000200000000000 R11: 0000000000000246 R12: 00000000000f4240
[ 69.611934][ T4179] R13: 0000000000010e93 R14: 00007fff7b34ced4 R15: 00007fff7b34cee0
[ 69.622191][ T4179]
[ 69.627400][ T4179]
[ 69.630715][ T4179] Allocated by task 4177:
[ 69.636114][ T4179] ____kasan_kmalloc+0xba/0xf0
[ 69.643167][ T4179] kmem_cache_alloc_trace+0x143/0x290
[ 69.650597][ T4179] ax25_dev_device_up+0x51/0x5a0
[ 69.657374][ T4179] ax25_device_event+0x4a0/0x510
[ 69.662628][ T4179] raw_notifier_call_chain+0xd0/0x170
[ 69.669299][ T4179] __dev_notify_flags+0x1fd/0x3f0
[ 69.678966][ T4179] dev_change_flags+0xe7/0x190
[ 69.684548][ T4179] dev_ifsioc+0x147/0x10c0
[ 69.690198][ T4179] dev_ioctl+0x504/0xf60
[ 69.695269][ T4179] sock_do_ioctl+0x34f/0x5a0
[ 69.700268][ T4179] sock_ioctl+0x484/0x770
[ 69.705058][ T4179] __se_sys_ioctl+0xf1/0x160
[ 69.711324][ T4179] do_syscall_64+0x3b/0xb0
[ 69.716959][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.723460][ T4179]
[ 69.726412][ T4179] Freed by task 4178:
[ 69.731911][ T4179] kasan_set_track+0x4b/0x80
[ 69.737374][ T4179] kasan_set_free_info+0x1f/0x40
[ 69.742541][ T4179] ____kasan_slab_free+0xd8/0x120
[ 69.747669][ T4179] slab_free_freelist_hook+0xdd/0x160
[ 69.753577][ T4179] kfree+0xf1/0x270
[ 69.758098][ T4179] ax25_release+0x3b3/0x840
[ 69.763113][ T4179] sock_close+0xcd/0x230
[ 69.767721][ T4179] __fput+0x3fe/0x8e0
[ 69.771718][ T4179] task_work_run+0x129/0x1a0
[ 69.777053][ T4179] exit_to_user_mode_loop+0x106/0x130
[ 69.782963][ T4179] exit_to_user_mode_prepare+0xb1/0x140
[ 69.788897][ T4179] syscall_exit_to_user_mode+0x5d/0x240
[ 69.795251][ T4179] do_syscall_64+0x47/0xb0
[ 69.799825][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.806023][ T4179]
[ 69.808897][ T4179] The buggy address belongs to the object at ffff888019dd2600
[ 69.808897][ T4179] which belongs to the cache kmalloc-192 of size 192
[ 69.826443][ T4179] The buggy address is located 56 bytes inside of
[ 69.826443][ T4179] 192-byte region [ffff888019dd2600, ffff888019dd26c0)
[ 69.843601][ T4179] The buggy address belongs to the page:
[ 69.850780][ T4179] page:ffffea0000677480 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19dd2
[ 69.861720][ T4179] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 69.870119][ T4179] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888017441a00
[ 69.879396][ T4179] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 69.888313][ T4179] page dumped because: kasan: bad access detected
[ 69.898965][ T4179] page_owner tracks the page as allocated
[ 69.905265][ T4179] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2607526367, free_ts 0
[ 69.922635][ T4179] get_page_from_freelist+0x3b78/0x3d40
[ 69.929041][ T4179] __alloc_pages+0x272/0x700
[ 69.935111][ T4179] alloc_page_interleave+0x22/0x1c0
[ 69.941695][ T4179] new_slab+0xbb/0x4b0
[ 69.948122][ T4179] ___slab_alloc+0x6f6/0xe10
[ 69.954864][ T4179] kmem_cache_alloc_trace+0x1a0/0x290
[ 69.961291][ T4179] call_usermodehelper_setup+0x8a/0x260
[ 69.967885][ T4179] kobject_uevent_env+0x681/0x8d0
[ 69.975147][ T4179] kernel_add_sysfs_param+0x106/0x130
[ 69.982051][ T4179] param_sysfs_builtin+0x16a/0x1f0
[ 69.987555][ T4179] param_sysfs_init+0x66/0x70
[ 69.992777][ T4179] do_one_initcall+0x22b/0x7a0
[ 69.998100][ T4179] do_initcall_level+0x157/0x210
[ 70.003852][ T4179] do_initcalls+0x49/0x90
[ 70.010120][ T4179] kernel_init_freeable+0x425/0x5c0
[ 70.015602][ T4179] kernel_init+0x19/0x290
[ 70.020427][ T4179] page_owner free stack trace missing
[ 70.028340][ T4179]
[ 70.032655][ T4179] Memory state around the buggy address:
[ 70.039226][ T4179] ffff888019dd2500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 70.049339][ T4179] ffff888019dd2580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 70.059561][ T4179] >ffff888019dd2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 70.070909][ T4179] ^
[ 70.079067][ T4179] ffff888019dd2680: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 70.089429][ T4179] ffff888019dd2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 70.100790][ T4179] ==================================================================
[ 70.110686][ T4179] Disabling lock debugging due to kernel taint
[ 70.128119][ T4179] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 70.140664][ T4179] CPU: 0 PID: 4179 Comm: syz-executor324 Tainted: G B 5.15.180-syzkaller #0
[ 70.155623][ T4179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 70.167723][ T4179] Call Trace:
[ 70.172066][ T4179]
[ 70.177167][ T4179] dump_stack_lvl+0x1e3/0x2d0
[ 70.182477][ T4179] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 70.191509][ T4179] ? panic+0x860/0x860
[ 70.196104][ T4179] ? preempt_schedule_common+0xa6/0xd0
[ 70.201988][ T4179] ? preempt_schedule+0xd9/0xe0
[ 70.207720][ T4179] panic+0x318/0x860
[ 70.211856][ T4179] ? check_panic_on_warn+0x1d/0xa0
[ 70.217963][ T4179] ? fb_is_primary_device+0xd0/0xd0
[ 70.223825][ T4179] ? _raw_spin_unlock_irqrestore+0x128/0x130
[ 70.230624][ T4179] ? _raw_spin_unlock+0x40/0x40
[ 70.235514][ T4179] check_panic_on_warn+0x7e/0xa0
[ 70.240751][ T4179] ? ax25_fillin_cb+0x460/0x660
[ 70.246908][ T4179] end_report+0x6d/0xf0
[ 70.253437][ T4179] kasan_report+0x18e/0x1c0
[ 70.259947][ T4179] ? ax25_fillin_cb+0x460/0x660
[ 70.265307][ T4179] ax25_fillin_cb+0x460/0x660
[ 70.270825][ T4179] ax25_setsockopt+0xab7/0xe70
[ 70.276781][ T4179] ? ax25_shutdown+0x10/0x10
[ 70.284919][ T4179] ? aa_sock_opt_perm+0x79/0x110
[ 70.294476][ T4179] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 70.305241][ T4179] ? security_socket_setsockopt+0x7d/0xa0
[ 70.313702][ T4179] ? ax25_shutdown+0x10/0x10
[ 70.319501][ T4179] __sys_setsockopt+0x57e/0x990
[ 70.324931][ T4179] ? __ia32_sys_recv+0xb0/0xb0
[ 70.330336][ T4179] ? syscall_enter_from_user_mode+0x2e/0x240
[ 70.337949][ T4179] __x64_sys_setsockopt+0xb1/0xc0
[ 70.344775][ T4179] do_syscall_64+0x3b/0xb0
[ 70.351985][ T4179] ? clear_bhb_loop+0x15/0x70
[ 70.357222][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 70.363758][ T4179] RIP: 0033:0x7f5032a5e619
[ 70.369780][ T4179] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 70.394236][ T4179] RSP: 002b:00007fff7b34ceb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 70.403593][ T4179] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f5032a5e619
[ 70.413951][ T4179] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 70.424470][ T4179] RBP: 00007fff7b34cef0 R08: 0000000000000010 R09: 0000000000000001
[ 70.436152][ T4179] R10: 0000200000000000 R11: 0000000000000246 R12: 00000000000f4240
[ 70.445958][ T4179] R13: 0000000000010e93 R14: 00007fff7b34ced4 R15: 00007fff7b34cee0
[ 70.456113][ T4179]
[ 70.459719][ T4179] Kernel Offset: disabled
[ 70.464616][ T4179] Rebooting in 86400 seconds..