Warning: Permanently added '10.128.10.45' (ED25519) to the list of known hosts.
[ 53.052245][ T4167] chnl_net:caif_netlink_parms(): no params data found
[ 53.095482][ T4167] bridge0: port 1(bridge_slave_0) entered blocking state
[ 53.102883][ T4167] bridge0: port 1(bridge_slave_0) entered disabled state
[ 53.110870][ T4167] device bridge_slave_0 entered promiscuous mode
[ 53.119409][ T4167] bridge0: port 2(bridge_slave_1) entered blocking state
[ 53.126830][ T4167] bridge0: port 2(bridge_slave_1) entered disabled state
[ 53.134659][ T4167] device bridge_slave_1 entered promiscuous mode
[ 53.155681][ T4167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 53.166647][ T4167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 53.189751][ T4167] team0: Port device team_slave_0 added
[ 53.197279][ T4167] team0: Port device team_slave_1 added
[ 53.214228][ T4167] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 53.221266][ T4167] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 53.247241][ T4167] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 53.259641][ T4167] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 53.266716][ T4167] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 53.292717][ T4167] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 53.321563][ T4167] device hsr_slave_0 entered promiscuous mode
[ 53.328381][ T4167] device hsr_slave_1 entered promiscuous mode
[ 53.411417][ T4167] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 53.420872][ T4167] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 53.429212][ T4167] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 53.438460][ T4167] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 53.458410][ T4167] bridge0: port 2(bridge_slave_1) entered blocking state
[ 53.465537][ T4167] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 53.473153][ T4167] bridge0: port 1(bridge_slave_0) entered blocking state
[ 53.480203][ T4167] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 53.521741][ T4167] 8021q: adding VLAN 0 to HW filter on device bond0
[ 53.534838][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 53.544478][ T145] bridge0: port 1(bridge_slave_0) entered disabled state
[ 53.552851][ T145] bridge0: port 2(bridge_slave_1) entered disabled state
[ 53.561634][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 53.573445][ T4167] 8021q: adding VLAN 0 to HW filter on device team0
[ 53.584454][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 53.592925][ T145] bridge0: port 1(bridge_slave_0) entered blocking state
[ 53.599977][ T145] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 53.620719][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 53.629299][ T145] bridge0: port 2(bridge_slave_1) entered blocking state
[ 53.636378][ T145] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 53.644797][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 53.653729][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 53.662578][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 53.673103][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 53.684411][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 53.694755][ T4167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 53.711623][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 53.719092][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 53.732019][ T4167] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 53.748587][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 53.766315][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 53.774888][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 53.783213][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 53.792680][ T4167] device veth0_vlan entered promiscuous mode
[ 53.803377][ T4167] device veth1_vlan entered promiscuous mode
[ 53.821603][ T1266] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 53.829642][ T1266] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 53.838840][ T1266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 53.848907][ T4167] device veth0_macvtap entered promiscuous mode
[ 53.858970][ T4167] device veth1_macvtap entered promiscuous mode
[ 53.875370][ T4167] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 53.882851][ T1266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 53.892055][ T1266] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 53.903896][ T4167] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 53.911554][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[ 53.922818][ T4167] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 53.932499][ T4167] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 53.941471][ T4167] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 53.950628][ T4167] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
executing program
executing program
executing program
[ 53.994942][ T4176] IPv6: ADDRCONF(NETDEV_CHANGE): bpq0: link becomes ready
[ 54.036741][ T4179] ==================================================================
[ 54.044882][ T4179] BUG: KASAN: use-after-free in ax25_fillin_cb+0x459/0x640
[ 54.052068][ T4179] Read of size 4 at addr ffff88801b836838 by task syz-executor374/4179
[ 54.060282][ T4179]
[ 54.062589][ T4179] CPU: 1 PID: 4179 Comm: syz-executor374 Not tainted 5.15.184-syzkaller #0
[ 54.071155][ T4179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 54.081192][ T4179] Call Trace:
[ 54.084451][ T4179]
[ 54.087365][ T4179] dump_stack_lvl+0x168/0x230
[ 54.092047][ T4179] ? show_regs_print_info+0x20/0x20
[ 54.097237][ T4179] ? _printk+0xcc/0x110
[ 54.101389][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 54.106254][ T4179] ? load_image+0x3b0/0x3b0
[ 54.110753][ T4179] print_address_description+0x60/0x2d0
[ 54.116284][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 54.121121][ T4179] kasan_report+0xdf/0x130
[ 54.125521][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 54.130354][ T4179] ax25_fillin_cb+0x459/0x640
[ 54.135013][ T4179] ax25_setsockopt+0x8a2/0xa40
[ 54.139759][ T4179] ? ax25_shutdown+0x10/0x10
[ 54.144334][ T4179] ? aa_sock_opt_perm+0x74/0x100
[ 54.149259][ T4179] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 54.154784][ T4179] ? security_socket_setsockopt+0x7a/0xa0
[ 54.160482][ T4179] ? ax25_shutdown+0x10/0x10
[ 54.165050][ T4179] __sys_setsockopt+0x3d6/0x5e0
[ 54.169883][ T4179] ? __ia32_sys_recv+0xb0/0xb0
[ 54.174640][ T4179] ? lockdep_hardirqs_on_prepare+0x3fc/0x760
[ 54.180602][ T4179] ? lock_chain_count+0x20/0x20
[ 54.185431][ T4179] ? vtime_user_exit+0x2dc/0x400
[ 54.190357][ T4179] __x64_sys_setsockopt+0xb1/0xc0
[ 54.195406][ T4179] do_syscall_64+0x4c/0xa0
[ 54.199810][ T4179] ? clear_bhb_loop+0x30/0x80
[ 54.204484][ T4179] ? clear_bhb_loop+0x30/0x80
[ 54.209143][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 54.215015][ T4179] RIP: 0033:0x7f2a39eda5d9
[ 54.219423][ T4179] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 54.239008][ T4179] RSP: 002b:00007ffebf458858 EFLAGS: 00000206 ORIG_RAX: 0000000000000036
[ 54.247433][ T4179] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f2a39eda5d9
[ 54.255406][ T4179] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000004
[ 54.263355][ T4179] RBP: 00007ffebf458890 R08: 0000000000000010 R09: 0000000000000001
[ 54.271305][ T4179] R10: 0000200000000000 R11: 0000000000000206 R12: 00000000000f4240
[ 54.279260][ T4179] R13: 000000000000d2ea R14: 00007ffebf458874 R15: 00007ffebf458880
[ 54.287233][ T4179]
[ 54.290248][ T4179]
[ 54.292570][ T4179] Allocated by task 4176:
[ 54.296890][ T4179] __kasan_kmalloc+0xb5/0xf0
[ 54.301474][ T4179] ax25_dev_device_up+0x50/0x580
[ 54.306394][ T4179] ax25_device_event+0x483/0x4f0
[ 54.311318][ T4179] raw_notifier_call_chain+0xcb/0x160
[ 54.316675][ T4179] __dev_notify_flags+0x178/0x2d0
[ 54.321689][ T4179] dev_change_flags+0xe3/0x1a0
[ 54.326437][ T4179] dev_ifsioc+0x147/0xe70
[ 54.330748][ T4179] dev_ioctl+0x55f/0xe50
[ 54.334967][ T4179] sock_do_ioctl+0x222/0x2f0
[ 54.339541][ T4179] sock_ioctl+0x4ed/0x6e0
[ 54.343865][ T4179] __se_sys_ioctl+0xfa/0x170
[ 54.348439][ T4179] do_syscall_64+0x4c/0xa0
[ 54.352838][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 54.358719][ T4179]
[ 54.361027][ T4179] Freed by task 4178:
[ 54.364982][ T4179] kasan_set_track+0x4b/0x70
[ 54.369571][ T4179] kasan_set_free_info+0x1f/0x40
[ 54.374501][ T4179] ____kasan_slab_free+0xd5/0x110
[ 54.379515][ T4179] slab_free_freelist_hook+0xea/0x170
[ 54.384868][ T4179] kfree+0xef/0x2a0
[ 54.388662][ T4179] ax25_release+0x661/0x870
[ 54.393144][ T4179] sock_close+0xd5/0x240
[ 54.397378][ T4179] __fput+0x234/0x930
[ 54.401354][ T4179] task_work_run+0x125/0x1a0
[ 54.405924][ T4179] exit_to_user_mode_loop+0x10f/0x130
[ 54.411278][ T4179] exit_to_user_mode_prepare+0xb1/0x140
[ 54.416815][ T4179] syscall_exit_to_user_mode+0x16/0x40
[ 54.422258][ T4179] do_syscall_64+0x58/0xa0
[ 54.426652][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 54.432531][ T4179]
[ 54.434833][ T4179] The buggy address belongs to the object at ffff88801b836800
[ 54.434833][ T4179] which belongs to the cache kmalloc-192 of size 192
[ 54.448861][ T4179] The buggy address is located 56 bytes inside of
[ 54.448861][ T4179] 192-byte region [ffff88801b836800, ffff88801b8368c0)
[ 54.462028][ T4179] The buggy address belongs to the page:
[ 54.467643][ T4179] page:ffffea00006e0d80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b836
[ 54.477768][ T4179] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 54.485301][ T4179] raw: 00fff00000000200 dead000000000100 dead000000000122 ffff888016841a00
[ 54.493870][ T4179] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 54.502433][ T4179] page dumped because: kasan: bad access detected
[ 54.508824][ T4179] page_owner tracks the page as allocated
[ 54.514515][ T4179] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 2674742592, free_ts 0
[ 54.529335][ T4179] get_page_from_freelist+0x1b77/0x1c60
[ 54.534886][ T4179] __alloc_pages+0x1e1/0x470
[ 54.539463][ T4179] alloc_page_interleave+0x24/0x1e0
[ 54.544643][ T4179] new_slab+0xc0/0x4b0
[ 54.548689][ T4179] ___slab_alloc+0x81e/0xdf0
[ 54.553256][ T4179] kmem_cache_alloc_trace+0x1a5/0x2a0
[ 54.558607][ T4179] call_usermodehelper_setup+0x8a/0x260
[ 54.564131][ T4179] kobject_uevent_env+0x65e/0x890
[ 54.569134][ T4179] net_rx_queue_update_kobjects+0x221/0x490
[ 54.575005][ T4179] netdev_register_kobject+0x223/0x310
[ 54.580443][ T4179] register_netdevice+0x1019/0x16b0
[ 54.585624][ T4179] register_netdev+0x37/0x50
[ 54.590200][ T4179] loopback_net_init+0x71/0x140
[ 54.595043][ T4179] ops_init+0x357/0x600
[ 54.599195][ T4179] register_pernet_operations+0x2a3/0x5f0
[ 54.604893][ T4179] register_pernet_device+0x26/0x70
[ 54.610071][ T4179] page_owner free stack trace missing
[ 54.615411][ T4179]
[ 54.617709][ T4179] Memory state around the buggy address:
[ 54.623312][ T4179] ffff88801b836700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 54.631347][ T4179] ffff88801b836780: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 54.639382][ T4179] >ffff88801b836800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 54.647427][ T4179] ^
[ 54.653298][ T4179] ffff88801b836880: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 54.661332][ T4179] ffff88801b836900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 54.669363][ T4179] ==================================================================
[ 54.677407][ T4179] Disabling lock debugging due to kernel taint
[ 54.684380][ T4179] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 54.691584][ T4179] CPU: 0 PID: 4179 Comm: syz-executor374 Tainted: G B 5.15.184-syzkaller #0
[ 54.701548][ T4179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 54.711578][ T4179] Call Trace:
[ 54.714836][ T4179]
[ 54.717741][ T4179] dump_stack_lvl+0x168/0x230
[ 54.722399][ T4179] ? show_regs_print_info+0x20/0x20
[ 54.727570][ T4179] ? load_image+0x3b0/0x3b0
[ 54.732053][ T4179] panic+0x2c9/0x7f0
[ 54.735936][ T4179] ? bpf_jit_dump+0xd0/0xd0
[ 54.740437][ T4179] ? _raw_spin_unlock_irqrestore+0xf6/0x100
[ 54.746327][ T4179] ? _raw_spin_unlock+0x40/0x40
[ 54.751161][ T4179] ? print_memory_metadata+0x314/0x400
[ 54.756600][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 54.761431][ T4179] check_panic_on_warn+0x80/0xa0
[ 54.766349][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 54.771180][ T4179] end_report+0x6d/0xf0
[ 54.775314][ T4179] kasan_report+0x102/0x130
[ 54.779797][ T4179] ? ax25_fillin_cb+0x459/0x640
[ 54.784637][ T4179] ax25_fillin_cb+0x459/0x640
[ 54.789381][ T4179] ax25_setsockopt+0x8a2/0xa40
[ 54.794124][ T4179] ? ax25_shutdown+0x10/0x10
[ 54.798696][ T4179] ? aa_sock_opt_perm+0x74/0x100
[ 54.803610][ T4179] ? bpf_lsm_socket_setsockopt+0x5/0x10
[ 54.809132][ T4179] ? security_socket_setsockopt+0x7a/0xa0
[ 54.814830][ T4179] ? ax25_shutdown+0x10/0x10
[ 54.819400][ T4179] __sys_setsockopt+0x3d6/0x5e0
[ 54.824234][ T4179] ? __ia32_sys_recv+0xb0/0xb0
[ 54.828982][ T4179] ? lockdep_hardirqs_on_prepare+0x3fc/0x760
[ 54.834945][ T4179] ? lock_chain_count+0x20/0x20
[ 54.839773][ T4179] ? vtime_user_exit+0x2dc/0x400
[ 54.844693][ T4179] __x64_sys_setsockopt+0xb1/0xc0
[ 54.849698][ T4179] do_syscall_64+0x4c/0xa0
[ 54.854095][ T4179] ? clear_bhb_loop+0x30/0x80
[ 54.858753][ T4179] ? clear_bhb_loop+0x30/0x80
[ 54.863414][ T4179] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 54.869318][ T4179] RIP: 0033:0x7f2a39eda5d9
[ 54.873720][ T4179] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 31 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 54.893311][ T4179] RSP: 002b:00007ffebf458858 EFLAGS: 00000206 ORIG_RAX: 0000000000000036
[ 54.901712][ T4179] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f2a39eda5d9
[ 54.909667][ T4179] RDX: 0000000000000019 RSI: 0000000000000101 RDI: 0000000000000004
[ 54.917637][ T4179] RBP: 00007ffebf458890 R08: 0000000000000010 R09: 0000000000000001
[ 54.925584][ T4179] R10: 0000200000000000 R11: 0000000000000206 R12: 00000000000f4240
[ 54.933532][ T4179] R13: 000000000000d2ea R14: 00007ffebf458874 R15: 00007ffebf458880
[ 54.941487][ T4179]
[ 54.944857][ T4179] Kernel Offset: disabled
[ 54.949175][ T4179] Rebooting in 86400 seconds..