Warning: Permanently added '10.128.10.33' (ED25519) to the list of known hosts. [ 68.512476][ T4166] chnl_net:caif_netlink_parms(): no params data found [ 68.562623][ T4166] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.570205][ T4166] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.578380][ T4166] device bridge_slave_0 entered promiscuous mode [ 68.588216][ T4166] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.595431][ T4166] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.603627][ T4166] device bridge_slave_1 entered promiscuous mode [ 68.627101][ T4166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.639215][ T4166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.663224][ T4166] team0: Port device team_slave_0 added [ 68.670866][ T4166] team0: Port device team_slave_1 added [ 68.691056][ T4166] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.698154][ T4166] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.724260][ T4166] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.737097][ T4166] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.744172][ T4166] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.770204][ T4166] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.802348][ T4166] device hsr_slave_0 entered promiscuous mode [ 68.809248][ T4166] device hsr_slave_1 entered promiscuous mode [ 68.908796][ T4166] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.920809][ T4166] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.930154][ T4166] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.941079][ T4166] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.965606][ T4166] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.973292][ T4166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.981409][ T4166] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.988650][ T4166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.033220][ T4166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.049297][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.061353][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.070888][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.080472][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 69.093998][ T4166] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.106635][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.116488][ T144] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.123784][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.137486][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.146746][ T154] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.154213][ T154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.174683][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.183673][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.196940][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.209631][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.224242][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.236832][ T4166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 69.256953][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 69.265603][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 69.278872][ T4166] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.299702][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 69.321486][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.331989][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.340996][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.352076][ T4166] device veth0_vlan entered promiscuous mode [ 69.364301][ T4166] device veth1_vlan entered promiscuous mode [ 69.384433][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 69.393072][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 69.402434][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.414777][ T4166] device veth0_macvtap entered promiscuous mode [ 69.427251][ T4166] device veth1_macvtap entered promiscuous mode [ 69.446938][ T4166] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.455973][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.466591][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 69.482772][ T4166] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.493856][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 69.507683][ T4166] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.517719][ T4166] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.526821][ T4166] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.537663][ T4166] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program executing program [ 69.592874][ T4176] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready [ 69.634385][ T4178] ================================================================== [ 69.643831][ T4178] BUG: KASAN: use-after-free in ax25_fillin_cb+0x459/0x640 [ 69.651624][ T4178] Read of size 4 at addr ffff888019186e38 by task syz-executor124/4178 [ 69.660365][ T4178] [ 69.662894][ T4178] CPU: 0 PID: 4178 Comm: syz-executor124 Not tainted 5.15.185-syzkaller #0 [ 69.671691][ T4178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 69.681773][ T4178] Call Trace: [ 69.685061][ T4178] [ 69.688024][ T4178] dump_stack_lvl+0x168/0x230 [ 69.692742][ T4178] ? show_regs_print_info+0x20/0x20 [ 69.697960][ T4178] ? _printk+0xcc/0x110 [ 69.702143][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 69.707017][ T4178] ? load_image+0x3b0/0x3b0 [ 69.711532][ T4178] print_address_description+0x60/0x2d0 [ 69.717191][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 69.722256][ T4178] kasan_report+0xdf/0x130 [ 69.727051][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 69.732313][ T4178] ax25_fillin_cb+0x459/0x640 [ 69.737445][ T4178] ax25_setsockopt+0x8a2/0xa40 [ 69.742493][ T4178] ? ax25_shutdown+0x10/0x10 [ 69.747122][ T4178] ? aa_sock_opt_perm+0x74/0x100 [ 69.752350][ T4178] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 69.758015][ T4178] ? security_socket_setsockopt+0x7a/0xa0 [ 69.763843][ T4178] ? ax25_shutdown+0x10/0x10 [ 69.768572][ T4178] __sys_setsockopt+0x3d6/0x5e0 [ 69.773555][ T4178] ? __ia32_sys_recv+0xb0/0xb0 [ 69.778889][ T4178] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 69.785004][ T4178] ? lock_chain_count+0x20/0x20 [ 69.789882][ T4178] ? vtime_user_exit+0x2dc/0x400 [ 69.794849][ T4178] __x64_sys_setsockopt+0xb1/0xc0 [ 69.799986][ T4178] do_syscall_64+0x4c/0xa0 [ 69.804440][ T4178] ? clear_bhb_loop+0x30/0x80 [ 69.809166][ T4178] ? clear_bhb_loop+0x30/0x80 [ 69.814121][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 69.820413][ T4178] RIP: 0033:0x7f2c9633f619 [ 69.825195][ T4178] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 69.845702][ T4178] RSP: 002b:00007ffc94c5afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 69.854237][ T4178] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f2c9633f619 [ 69.862305][ T4178] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007 [ 69.870717][ T4178] RBP: 00007ffc94c5b020 R08: 0000000000000010 R09: 0000000000000001 [ 69.878786][ T4178] R10: 0000200000000180 R11: 0000000000000246 R12: 00000000000f4240 [ 69.886782][ T4178] R13: 0000000000010fb2 R14: 00007ffc94c5b004 R15: 00007ffc94c5b010 [ 69.894978][ T4178] [ 69.898131][ T4178] [ 69.900513][ T4178] Allocated by task 4176: [ 69.904955][ T4178] __kasan_kmalloc+0xb5/0xf0 [ 69.909569][ T4178] ax25_dev_device_up+0x50/0x580 [ 69.914619][ T4178] ax25_device_event+0x483/0x4f0 [ 69.919866][ T4178] raw_notifier_call_chain+0xcb/0x160 [ 69.925770][ T4178] __dev_notify_flags+0x178/0x2d0 [ 69.930864][ T4178] dev_change_flags+0xe3/0x1a0 [ 69.935930][ T4178] dev_ifsioc+0x147/0xe70 [ 69.940291][ T4178] dev_ioctl+0x55f/0xe50 [ 69.944987][ T4178] sock_do_ioctl+0x222/0x2f0 [ 69.949691][ T4178] sock_ioctl+0x4ed/0x6e0 [ 69.954223][ T4178] __se_sys_ioctl+0xfa/0x170 [ 69.959549][ T4178] do_syscall_64+0x4c/0xa0 [ 69.963991][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 69.969996][ T4178] [ 69.972486][ T4178] Freed by task 4177: [ 69.977091][ T4178] kasan_set_track+0x4b/0x70 [ 69.982447][ T4178] kasan_set_free_info+0x1f/0x40 [ 69.987414][ T4178] ____kasan_slab_free+0xd5/0x110 [ 69.992881][ T4178] slab_free_freelist_hook+0xea/0x170 [ 69.998273][ T4178] kfree+0xef/0x2a0 [ 70.002099][ T4178] ax25_release+0x661/0x870 [ 70.006775][ T4178] sock_close+0xd5/0x240 [ 70.011025][ T4178] __fput+0x234/0x930 [ 70.015014][ T4178] task_work_run+0x125/0x1a0 [ 70.019693][ T4178] exit_to_user_mode_loop+0x10f/0x130 [ 70.025100][ T4178] exit_to_user_mode_prepare+0xb1/0x140 [ 70.031195][ T4178] syscall_exit_to_user_mode+0x16/0x40 [ 70.036733][ T4178] do_syscall_64+0x58/0xa0 [ 70.041176][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 70.047306][ T4178] [ 70.049762][ T4178] The buggy address belongs to the object at ffff888019186e00 [ 70.049762][ T4178] which belongs to the cache kmalloc-192 of size 192 [ 70.064362][ T4178] The buggy address is located 56 bytes inside of [ 70.064362][ T4178] 192-byte region [ffff888019186e00, ffff888019186ec0) [ 70.077573][ T4178] The buggy address belongs to the page: [ 70.083332][ T4178] page:ffffea0000646180 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19186 [ 70.093676][ T4178] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 70.101288][ T4178] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888016841a00 [ 70.110606][ T4178] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 70.119202][ T4178] page dumped because: kasan: bad access detected [ 70.125901][ T4178] page_owner tracks the page as allocated [ 70.131646][ T4178] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2994379177, free_ts 0 [ 70.146508][ T4178] get_page_from_freelist+0x1b77/0x1c60 [ 70.152524][ T4178] __alloc_pages+0x1e1/0x470 [ 70.157153][ T4178] alloc_page_interleave+0x24/0x1e0 [ 70.162365][ T4178] new_slab+0xc0/0x4b0 [ 70.166443][ T4178] ___slab_alloc+0x81e/0xdf0 [ 70.171037][ T4178] kmem_cache_alloc_trace+0x1a5/0x2a0 [ 70.176417][ T4178] call_usermodehelper_setup+0x8a/0x260 [ 70.182070][ T4178] kobject_uevent_env+0x65e/0x890 [ 70.187107][ T4178] kernel_add_sysfs_param+0xfb/0x120 [ 70.192432][ T4178] param_sysfs_builtin+0x164/0x1e0 [ 70.197561][ T4178] param_sysfs_init+0x66/0x70 [ 70.202253][ T4178] do_one_initcall+0x1ee/0x680 [ 70.207130][ T4178] do_initcall_level+0x137/0x1f0 [ 70.213041][ T4178] do_initcalls+0x4b/0x90 [ 70.217842][ T4178] kernel_init_freeable+0x3ce/0x560 [ 70.223129][ T4178] kernel_init+0x19/0x1b0 [ 70.227580][ T4178] page_owner free stack trace missing [ 70.233583][ T4178] [ 70.235923][ T4178] Memory state around the buggy address: [ 70.241575][ T4178] ffff888019186d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 70.250158][ T4178] ffff888019186d80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.258414][ T4178] >ffff888019186e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 70.266475][ T4178] ^ [ 70.272474][ T4178] ffff888019186e80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.280667][ T4178] ffff888019186f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 70.288744][ T4178] ================================================================== [ 70.297086][ T4178] Disabling lock debugging due to kernel taint [ 70.307226][ T4178] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 70.314705][ T4178] CPU: 0 PID: 4178 Comm: syz-executor124 Tainted: G B 5.15.185-syzkaller #0 [ 70.324691][ T4178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 70.335286][ T4178] Call Trace: [ 70.338791][ T4178] [ 70.341733][ T4178] dump_stack_lvl+0x168/0x230 [ 70.346517][ T4178] ? show_regs_print_info+0x20/0x20 [ 70.351748][ T4178] ? load_image+0x3b0/0x3b0 [ 70.356491][ T4178] panic+0x2c9/0x7f0 [ 70.360641][ T4178] ? bpf_jit_dump+0xd0/0xd0 [ 70.365275][ T4178] ? _raw_spin_unlock_irqrestore+0xf6/0x100 [ 70.371185][ T4178] ? _raw_spin_unlock+0x40/0x40 [ 70.376238][ T4178] ? print_memory_metadata+0x314/0x400 [ 70.382100][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 70.386978][ T4178] check_panic_on_warn+0x80/0xa0 [ 70.392101][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 70.397593][ T4178] end_report+0x6d/0xf0 [ 70.401773][ T4178] kasan_report+0x102/0x130 [ 70.406829][ T4178] ? ax25_fillin_cb+0x459/0x640 [ 70.411926][ T4178] ax25_fillin_cb+0x459/0x640 [ 70.416697][ T4178] ax25_setsockopt+0x8a2/0xa40 [ 70.421685][ T4178] ? ax25_shutdown+0x10/0x10 [ 70.426305][ T4178] ? aa_sock_opt_perm+0x74/0x100 [ 70.431245][ T4178] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 70.436959][ T4178] ? security_socket_setsockopt+0x7a/0xa0 [ 70.442732][ T4178] ? ax25_shutdown+0x10/0x10 [ 70.447332][ T4178] __sys_setsockopt+0x3d6/0x5e0 [ 70.452290][ T4178] ? __ia32_sys_recv+0xb0/0xb0 [ 70.457198][ T4178] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 70.463461][ T4178] ? lock_chain_count+0x20/0x20 [ 70.468319][ T4178] ? vtime_user_exit+0x2dc/0x400 [ 70.473268][ T4178] __x64_sys_setsockopt+0xb1/0xc0 [ 70.478321][ T4178] do_syscall_64+0x4c/0xa0 [ 70.482846][ T4178] ? clear_bhb_loop+0x30/0x80 [ 70.487539][ T4178] ? clear_bhb_loop+0x30/0x80 [ 70.492250][ T4178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 70.498164][ T4178] RIP: 0033:0x7f2c9633f619 [ 70.502602][ T4178] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 70.522299][ T4178] RSP: 002b:00007ffc94c5afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 70.530723][ T4178] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f2c9633f619 [ 70.538829][ T4178] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007 [ 70.547143][ T4178] RBP: 00007ffc94c5b020 R08: 0000000000000010 R09: 0000000000000001 [ 70.555153][ T4178] R10: 0000200000000180 R11: 0000000000000246 R12: 00000000000f4240 [ 70.563158][ T4178] R13: 0000000000010fb2 R14: 00007ffc94c5b004 R15: 00007ffc94c5b010 [ 70.571274][ T4178] [ 70.574748][ T4178] Kernel Offset: disabled [ 70.579105][ T4178] Rebooting in 86400 seconds..