Warning: Permanently added '10.128.10.35' (ED25519) to the list of known hosts.
[ 67.844367][ T4163] chnl_net:caif_netlink_parms(): no params data found
[ 67.893571][ T4163] bridge0: port 1(bridge_slave_0) entered blocking state
[ 67.901371][ T4163] bridge0: port 1(bridge_slave_0) entered disabled state
[ 67.910014][ T4163] device bridge_slave_0 entered promiscuous mode
[ 67.920347][ T4163] bridge0: port 2(bridge_slave_1) entered blocking state
[ 67.927979][ T4163] bridge0: port 2(bridge_slave_1) entered disabled state
[ 67.936123][ T4163] device bridge_slave_1 entered promiscuous mode
[ 67.959810][ T4163] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 67.971362][ T4163] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 67.997312][ T4163] team0: Port device team_slave_0 added
[ 68.005163][ T4163] team0: Port device team_slave_1 added
[ 68.025387][ T4163] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 68.032649][ T4163] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 68.060058][ T4163] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 68.072921][ T4163] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 68.080342][ T4163] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 68.107010][ T4163] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 68.141097][ T4163] device hsr_slave_0 entered promiscuous mode
[ 68.148782][ T4163] device hsr_slave_1 entered promiscuous mode
[ 68.255440][ T4163] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 68.267539][ T4163] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 68.277241][ T4163] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 68.286733][ T4163] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 68.312265][ T4163] bridge0: port 2(bridge_slave_1) entered blocking state
[ 68.319749][ T4163] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 68.327931][ T4163] bridge0: port 1(bridge_slave_0) entered blocking state
[ 68.335271][ T4163] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 68.386511][ T4163] 8021q: adding VLAN 0 to HW filter on device bond0
[ 68.403449][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 68.415102][ T144] bridge0: port 1(bridge_slave_0) entered disabled state
[ 68.425163][ T144] bridge0: port 2(bridge_slave_1) entered disabled state
[ 68.434968][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 68.448974][ T4163] 8021q: adding VLAN 0 to HW filter on device team0
[ 68.460445][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 68.469108][ T144] bridge0: port 1(bridge_slave_0) entered blocking state
[ 68.476311][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 68.493336][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 68.503733][ T155] bridge0: port 2(bridge_slave_1) entered blocking state
[ 68.511130][ T155] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 68.527650][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 68.549675][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 68.558776][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 68.567791][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 68.576539][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 68.587218][ T4163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 68.608037][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 68.616040][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 68.631217][ T4163] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 68.651008][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 68.671730][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 68.681684][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 68.690287][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 68.702506][ T4163] device veth0_vlan entered promiscuous mode
[ 68.715376][ T4163] device veth1_vlan entered promiscuous mode
[ 68.736850][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 68.745015][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 68.753731][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 68.764682][ T4163] device veth0_macvtap entered promiscuous mode
[ 68.776393][ T4163] device veth1_macvtap entered promiscuous mode
[ 68.793855][ T4163] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 68.804071][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 68.813476][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 68.826703][ T4163] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 68.835244][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 68.847082][ T4163] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.856598][ T4163] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
executing program
[ 68.865316][ T4163] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.874605][ T4163] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
executing program
executing program
[ 68.929289][ T4171] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready
[ 68.962813][ T4173] ==================================================================
[ 68.971038][ T4173] BUG: KASAN: use-after-free in ax25_fillin_cb+0x460/0x660
[ 68.978259][ T4173] Read of size 4 at addr ffff88801c1e4338 by task syz-executor398/4173
[ 68.987566][ T4173]
[ 68.990686][ T4173] CPU: 1 PID: 4173 Comm: syz-executor398 Not tainted 5.15.178-syzkaller #0
[ 68.999286][ T4173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 69.009617][ T4173] Call Trace:
[ 69.012903][ T4173]
[ 69.015839][ T4173] dump_stack_lvl+0x1e3/0x2d0
[ 69.020544][ T4173] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 69.026290][ T4173] ? _printk+0xd1/0x120
[ 69.030480][ T4173] ? __wake_up_klogd+0xcc/0x100
[ 69.035332][ T4173] ? panic+0x860/0x860
[ 69.039441][ T4173] ? _raw_spin_lock_irqsave+0xdd/0x120
[ 69.044923][ T4173] ? __lock_acquire+0x1ff0/0x1ff0
[ 69.050074][ T4173] print_address_description+0x63/0x3b0
[ 69.055670][ T4173] ? ax25_fillin_cb+0x460/0x660
[ 69.060792][ T4173] kasan_report+0x16b/0x1c0
[ 69.065486][ T4173] ? ax25_fillin_cb+0x460/0x660
[ 69.070616][ T4173] ax25_fillin_cb+0x460/0x660
[ 69.075521][ T4173] ax25_setsockopt+0xab7/0xe70
[ 69.080498][ T4173] ? ax25_shutdown+0x10/0x10
[ 69.085379][ T4173] ? aa_sock_opt_perm+0x79/0x110
[ 69.094273][ T4173] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 69.100956][ T4173] ? security_socket_setsockopt+0x7d/0xa0
[ 69.107039][ T4173] ? ax25_shutdown+0x10/0x10
[ 69.111881][ T4173] __sys_setsockopt+0x57e/0x990
[ 69.119623][ T4173] ? __ia32_sys_recv+0xb0/0xb0
[ 69.124447][ T4173] ? syscall_enter_from_user_mode+0x2e/0x240
[ 69.130490][ T4173] __x64_sys_setsockopt+0xb1/0xc0
[ 69.136399][ T4173] do_syscall_64+0x3b/0xb0
[ 69.140826][ T4173] ? clear_bhb_loop+0x15/0x70
[ 69.145503][ T4173] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.151415][ T4173] RIP: 0033:0x7f42dac0c619
[ 69.155832][ T4173] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 69.176566][ T4173] RSP: 002b:00007ffd05c669d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 69.184998][ T4173] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f42dac0c619
[ 69.192996][ T4173] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 69.200985][ T4173] RBP: 00007ffd05c66a10 R08: 0000000000000010 R09: 0000000000000001
[ 69.209062][ T4173] R10: 00004000000000c0 R11: 0000000000000246 R12: 00000000000f4240
[ 69.217052][ T4173] R13: 0000000000010d31 R14: 00007ffd05c669f4 R15: 00007ffd05c66a00
[ 69.225720][ T4173]
[ 69.228783][ T4173]
[ 69.231124][ T4173] Allocated by task 4171:
[ 69.235916][ T4173] ____kasan_kmalloc+0xba/0xf0
[ 69.240838][ T4173] kmem_cache_alloc_trace+0x143/0x290
[ 69.246219][ T4173] ax25_dev_device_up+0x51/0x5a0
[ 69.251156][ T4173] ax25_device_event+0x49b/0x500
[ 69.256111][ T4173] raw_notifier_call_chain+0xd0/0x170
[ 69.261487][ T4173] __dev_notify_flags+0x304/0x610
[ 69.266830][ T4173] dev_change_flags+0xe7/0x190
[ 69.271729][ T4173] dev_ifsioc+0x147/0x10c0
[ 69.276182][ T4173] dev_ioctl+0x504/0xf60
[ 69.280539][ T4173] sock_do_ioctl+0x34f/0x5a0
[ 69.285162][ T4173] sock_ioctl+0x47f/0x770
[ 69.289609][ T4173] __se_sys_ioctl+0xf1/0x160
[ 69.294217][ T4173] do_syscall_64+0x3b/0xb0
[ 69.298657][ T4173] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.304577][ T4173]
[ 69.306985][ T4173] Freed by task 4172:
[ 69.311754][ T4173] kasan_set_track+0x4b/0x80
[ 69.316357][ T4173] kasan_set_free_info+0x1f/0x40
[ 69.321427][ T4173] ____kasan_slab_free+0xd8/0x120
[ 69.326471][ T4173] slab_free_freelist_hook+0xdd/0x160
[ 69.332002][ T4173] kfree+0xf1/0x270
[ 69.335823][ T4173] ax25_release+0x3b3/0x840
[ 69.340330][ T4173] sock_close+0xcd/0x230
[ 69.344587][ T4173] __fput+0x3fe/0x8e0
[ 69.348669][ T4173] task_work_run+0x129/0x1a0
[ 69.353257][ T4173] exit_to_user_mode_loop+0x106/0x130
[ 69.358649][ T4173] exit_to_user_mode_prepare+0xb1/0x140
[ 69.364203][ T4173] syscall_exit_to_user_mode+0x5d/0x240
[ 69.369775][ T4173] do_syscall_64+0x47/0xb0
[ 69.374236][ T4173] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.380283][ T4173]
[ 69.382734][ T4173] The buggy address belongs to the object at ffff88801c1e4300
[ 69.382734][ T4173] which belongs to the cache kmalloc-192 of size 192
[ 69.396930][ T4173] The buggy address is located 56 bytes inside of
[ 69.396930][ T4173] 192-byte region [ffff88801c1e4300, ffff88801c1e43c0)
[ 69.410281][ T4173] The buggy address belongs to the page:
[ 69.416084][ T4173] page:ffffea0000707900 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1c1e4
[ 69.426518][ T4173] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 69.434082][ T4173] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888017441a00
[ 69.442765][ T4173] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 69.451362][ T4173] page dumped because: kasan: bad access detected
[ 69.457774][ T4173] page_owner tracks the page as allocated
[ 69.463477][ T4173] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2323401925, free_ts 0
[ 69.478338][ T4173] get_page_from_freelist+0x3b78/0x3d40
[ 69.483979][ T4173] __alloc_pages+0x272/0x700
[ 69.488684][ T4173] alloc_page_interleave+0x22/0x1c0
[ 69.494036][ T4173] new_slab+0xbb/0x4b0
[ 69.498115][ T4173] ___slab_alloc+0x6f6/0xe10
[ 69.502722][ T4173] kmem_cache_alloc_trace+0x1a0/0x290
[ 69.508115][ T4173] kset_create_and_add+0x57/0x160
[ 69.513160][ T4173] bus_register+0x38e/0x690
[ 69.517661][ T4173] vdpa_init+0x13/0x70
[ 69.521838][ T4173] do_one_initcall+0x22b/0x7a0
[ 69.526611][ T4173] do_initcall_level+0x157/0x210
[ 69.531557][ T4173] do_initcalls+0x49/0x90
[ 69.535890][ T4173] kernel_init_freeable+0x425/0x5c0
[ 69.541090][ T4173] kernel_init+0x19/0x290
[ 69.545646][ T4173] ret_from_fork+0x1f/0x30
[ 69.550089][ T4173] page_owner free stack trace missing
[ 69.555462][ T4173]
[ 69.557785][ T4173] Memory state around the buggy address:
[ 69.563408][ T4173] ffff88801c1e4200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 69.571466][ T4173] ffff88801c1e4280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 69.579531][ T4173] >ffff88801c1e4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 69.587710][ T4173] ^
[ 69.593615][ T4173] ffff88801c1e4380: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 69.601954][ T4173] ffff88801c1e4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 69.610029][ T4173] ==================================================================
[ 69.618119][ T4173] Disabling lock debugging due to kernel taint
[ 69.628082][ T4173] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 69.635396][ T4173] CPU: 1 PID: 4173 Comm: syz-executor398 Tainted: G B 5.15.178-syzkaller #0
[ 69.645381][ T4173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 69.655435][ T4173] Call Trace:
[ 69.658712][ T4173]
[ 69.661635][ T4173] dump_stack_lvl+0x1e3/0x2d0
[ 69.666307][ T4173] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 69.671935][ T4173] ? panic+0x860/0x860
[ 69.675997][ T4173] ? preempt_schedule_common+0xa6/0xd0
[ 69.681459][ T4173] ? preempt_schedule+0xd9/0xe0
[ 69.686332][ T4173] panic+0x318/0x860
[ 69.690400][ T4173] ? check_panic_on_warn+0x1d/0xa0
[ 69.695525][ T4173] ? fb_is_primary_device+0xd0/0xd0
[ 69.701179][ T4173] ? _raw_spin_unlock_irqrestore+0x128/0x130
[ 69.707189][ T4173] ? _raw_spin_unlock+0x40/0x40
[ 69.712089][ T4173] check_panic_on_warn+0x7e/0xa0
[ 69.717026][ T4173] ? ax25_fillin_cb+0x460/0x660
[ 69.722004][ T4173] end_report+0x6d/0xf0
[ 69.726164][ T4173] kasan_report+0x18e/0x1c0
[ 69.730663][ T4173] ? ax25_fillin_cb+0x460/0x660
[ 69.735511][ T4173] ax25_fillin_cb+0x460/0x660
[ 69.740194][ T4173] ax25_setsockopt+0xab7/0xe70
[ 69.745087][ T4173] ? ax25_shutdown+0x10/0x10
[ 69.749721][ T4173] ? aa_sock_opt_perm+0x79/0x110
[ 69.754660][ T4173] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 69.760298][ T4173] ? security_socket_setsockopt+0x7d/0xa0
[ 69.766027][ T4173] ? ax25_shutdown+0x10/0x10
[ 69.770622][ T4173] __sys_setsockopt+0x57e/0x990
[ 69.775498][ T4173] ? __ia32_sys_recv+0xb0/0xb0
[ 69.780279][ T4173] ? syscall_enter_from_user_mode+0x2e/0x240
[ 69.786313][ T4173] __x64_sys_setsockopt+0xb1/0xc0
[ 69.791351][ T4173] do_syscall_64+0x3b/0xb0
[ 69.795765][ T4173] ? clear_bhb_loop+0x15/0x70
[ 69.800444][ T4173] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.806336][ T4173] RIP: 0033:0x7f42dac0c619
[ 69.810924][ T4173] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 69.830552][ T4173] RSP: 002b:00007ffd05c669d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 69.838981][ T4173] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f42dac0c619
[ 69.846953][ T4173] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000007
[ 69.854924][ T4173] RBP: 00007ffd05c66a10 R08: 0000000000000010 R09: 0000000000000001
[ 69.863009][ T4173] R10: 00004000000000c0 R11: 0000000000000246 R12: 00000000000f4240
[ 69.870999][ T4173] R13: 0000000000010d31 R14: 00007ffd05c669f4 R15: 00007ffd05c66a00
[ 69.879069][ T4173]
[ 69.882432][ T4173] Kernel Offset: disabled
[ 69.887211][ T4173] Rebooting in 86400 seconds..