Warning: Permanently added '10.128.1.99' (ED25519) to the list of known hosts.
2025/07/10 05:52:30 ignoring optional flag "sandboxArg"="0"
2025/07/10 05:52:30 ignoring optional flag "type"="gce"
2025/07/10 05:52:30 parsed 1 programs
2025/07/10 05:52:32 executed programs: 0
[ 69.165142][ T4477] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS
[ 69.290197][ T4513] chnl_net:caif_netlink_parms(): no params data found
[ 69.325515][ T4513] bridge0: port 1(bridge_slave_0) entered blocking state
[ 69.332890][ T4513] bridge0: port 1(bridge_slave_0) entered disabled state
[ 69.341323][ T4513] device bridge_slave_0 entered promiscuous mode
[ 69.349167][ T4513] bridge0: port 2(bridge_slave_1) entered blocking state
[ 69.356407][ T4513] bridge0: port 2(bridge_slave_1) entered disabled state
[ 69.364326][ T4513] device bridge_slave_1 entered promiscuous mode
[ 69.383337][ T4513] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 69.394389][ T4513] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 69.420028][ T4513] team0: Port device team_slave_0 added
[ 69.427860][ T4513] team0: Port device team_slave_1 added
[ 69.443172][ T4513] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 69.450233][ T4513] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 69.476218][ T4513] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 69.488026][ T4513] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 69.495089][ T4513] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 69.521171][ T4513] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 69.548284][ T4513] device hsr_slave_0 entered promiscuous mode
[ 69.554933][ T4513] device hsr_slave_1 entered promiscuous mode
[ 70.086347][ T4513] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 70.097012][ T4513] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 70.107961][ T4513] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 70.128565][ T4513] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 70.153053][ T4513] bridge0: port 2(bridge_slave_1) entered blocking state
[ 70.160178][ T4513] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 70.167578][ T4513] bridge0: port 1(bridge_slave_0) entered blocking state
[ 70.174694][ T4513] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 70.226477][ T4513] 8021q: adding VLAN 0 to HW filter on device bond0
[ 70.243555][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 70.252280][ T1263] bridge0: port 1(bridge_slave_0) entered disabled state
[ 70.261866][ T1263] bridge0: port 2(bridge_slave_1) entered disabled state
[ 70.271292][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 70.288139][ T4513] 8021q: adding VLAN 0 to HW filter on device team0
[ 70.301275][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 70.310800][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 70.321232][ T1263] bridge0: port 1(bridge_slave_0) entered blocking state
[ 70.328359][ T1263] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 70.348784][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 70.359095][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 70.367713][ T1263] bridge0: port 2(bridge_slave_1) entered blocking state
[ 70.374811][ T1263] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 70.385208][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 70.402240][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 70.425132][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 70.435632][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 70.445679][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 70.456379][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 70.465202][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 70.474532][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 70.482819][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 70.491798][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 70.501967][ T4513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 70.512582][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 70.626862][ T3095] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 70.636535][ T3095] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 70.649417][ T4513] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 70.669937][ T3095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 70.679352][ T3095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 70.700709][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 70.710009][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 70.721610][ T4513] device veth0_vlan entered promiscuous mode
[ 70.729092][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 70.738470][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 70.750751][ T4513] device veth1_vlan entered promiscuous mode
[ 70.772815][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 70.782310][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 70.791745][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 70.801253][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 70.814218][ T4513] device veth0_macvtap entered promiscuous mode
[ 70.824906][ T4513] device veth1_macvtap entered promiscuous mode
[ 70.843392][ T4513] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 70.850747][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 70.861711][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 70.870211][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 70.879798][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 70.892217][ T4513] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 70.901096][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 70.910613][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 70.921844][ T4513] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 70.932027][ T4513] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 70.941875][ T4513] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 70.951337][ T4513] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 71.014376][ T1263] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 71.022304][ T1263] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 71.039462][ T3095] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 71.048018][ T3095] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 71.055902][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 71.065183][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 71.135933][ T4612] syz-executor.0 (pid 4612) is setting deprecated v1 encryption policy; recommend upgrading to v2.
[ 71.187720][ T1423] ieee802154 phy0 wpan0: encryption failed: -22
[ 71.194557][ T1423] ieee802154 phy1 wpan1: encryption failed: -22
[ 71.264824][ T1326] Bluetooth: hci0: command 0x0409 tx timeout
[ 71.277529][ T4612] fscrypt: AES-128-CTS-CBC using implementation "cts-cbc-aes-aesni"
[ 71.325883][ T4632] FAULT_INJECTION: forcing a failure.
[ 71.325883][ T4632] name failslab, interval 1, probability 0, space 0, times 1
[ 71.339260][ T4632] CPU: 1 PID: 4632 Comm: syz-executor.0 Not tainted 5.15.186-syzkaller #0
[ 71.347785][ T4632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 71.357862][ T4632] Call Trace:
[ 71.361159][ T4632]
[ 71.364102][ T4632] dump_stack_lvl+0x168/0x230
[ 71.368825][ T4632] ? show_regs_print_info+0x20/0x20
[ 71.374053][ T4632] ? load_image+0x3b0/0x3b0
[ 71.378576][ T4632] ? __lock_acquire+0x7c60/0x7c60
[ 71.383619][ T4632] should_fail+0x38c/0x4c0
[ 71.388057][ T4632] should_failslab+0x5/0x20
[ 71.392575][ T4632] slab_pre_alloc_hook+0x51/0xc0
[ 71.397521][ T4632] __kmalloc+0x6b/0x330
[ 71.401684][ T4632] ? __fscrypt_encrypt_symlink+0x11b/0x3b0
[ 71.407499][ T4632] __fscrypt_encrypt_symlink+0x11b/0x3b0
[ 71.413141][ T4632] ? fscrypt_prepare_symlink+0x150/0x150
[ 71.418793][ T4632] ext4_symlink+0x541/0xcc0
[ 71.423308][ T4632] ? ext4_unlink+0x500/0x500
[ 71.427908][ T4632] ? inode_permission+0xef/0x480
[ 71.432902][ T4632] ? bpf_lsm_inode_symlink+0x5/0x10
[ 71.438108][ T4632] ? security_inode_symlink+0xb2/0x100
[ 71.443584][ T4632] vfs_symlink+0x247/0x3d0
[ 71.448019][ T4632] do_symlinkat+0x1be/0x6c0
[ 71.452623][ T4632] ? __check_object_size+0x30c/0x410
[ 71.457919][ T4632] ? vfs_symlink+0x3d0/0x3d0
[ 71.462523][ T4632] ? getname_flags+0x1fe/0x500
[ 71.467295][ T4632] __x64_sys_symlink+0x7a/0x90
[ 71.472053][ T4632] do_syscall_64+0x4c/0xa0
[ 71.476456][ T4632] ? clear_bhb_loop+0x30/0x80
[ 71.481112][ T4632] ? clear_bhb_loop+0x30/0x80
[ 71.485944][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 71.491851][ T4632] RIP: 0033:0x7fd99e8ceba9
[ 71.496257][ T4632] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 71.516016][ T4632] RSP: 002b:00007fd99dc500c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000058
[ 71.524417][ T4632] RAX: ffffffffffffffda RBX: 00007fd99e9edf80 RCX: 00007fd99e8ceba9
[ 71.532632][ T4632] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000020000140
[ 71.540674][ T4632] RBP: 00007fd99dc50120 R08: 0000000000000000 R09: 0000000000000000
[ 71.548627][ T4632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 71.556673][ T4632] R13: 000000000000000b R14: 00007fd99e9edf80 R15: 00007ffc53fe8a68
[ 71.564643][ T4632]
[ 71.571378][ T4632] ==================================================================
[ 71.579853][ T4632] BUG: KASAN: use-after-free in jbd2_journal_get_write_access+0x136/0x140
[ 71.588373][ T4632] Read of size 4 at addr ffff88801cda8acc by task syz-executor.0/4632
[ 71.596534][ T4632]
[ 71.598868][ T4632] CPU: 0 PID: 4632 Comm: syz-executor.0 Not tainted 5.15.186-syzkaller #0
[ 71.607370][ T4632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 71.617431][ T4632] Call Trace:
[ 71.620713][ T4632]
[ 71.623825][ T4632] dump_stack_lvl+0x168/0x230
[ 71.628731][ T4632] ? show_regs_print_info+0x20/0x20
[ 71.634284][ T4632] ? _printk+0xcc/0x110
[ 71.638465][ T4632] ? jbd2_journal_get_write_access+0x136/0x140
[ 71.644644][ T4632] ? load_image+0x3b0/0x3b0
[ 71.649162][ T4632] ? _raw_spin_lock_irqsave+0xb0/0xf0
[ 71.654548][ T4632] print_address_description+0x60/0x2d0
[ 71.660111][ T4632] ? jbd2_journal_get_write_access+0x136/0x140
[ 71.666281][ T4632] kasan_report+0xdf/0x130
[ 71.670708][ T4632] ? jbd2_journal_get_write_access+0x136/0x140
[ 71.676878][ T4632] jbd2_journal_get_write_access+0x136/0x140
[ 71.682869][ T4632] __ext4_journal_get_write_access+0x22e/0x6d0
[ 71.689040][ T4632] ? __ext4_journal_ensure_credits+0x450/0x450
[ 71.695205][ T4632] ? jbd2_journal_stop+0x8c2/0xd20
[ 71.700350][ T4632] ext4_reserve_inode_write+0x203/0x2e0
[ 71.705910][ T4632] __ext4_mark_inode_dirty+0x142/0x700
[ 71.711376][ T4632] ? fscrypt_prepare_symlink+0x150/0x150
[ 71.717205][ T4632] ext4_symlink+0xaa4/0xcc0
[ 71.721727][ T4632] ? ext4_unlink+0x500/0x500
[ 71.726342][ T4632] ? inode_permission+0xef/0x480
[ 71.731286][ T4632] ? bpf_lsm_inode_symlink+0x5/0x10
[ 71.736490][ T4632] ? security_inode_symlink+0xb2/0x100
[ 71.741977][ T4632] vfs_symlink+0x247/0x3d0
[ 71.746408][ T4632] do_symlinkat+0x1be/0x6c0
[ 71.750920][ T4632] ? __check_object_size+0x30c/0x410
[ 71.756215][ T4632] ? vfs_symlink+0x3d0/0x3d0
[ 71.760819][ T4632] ? getname_flags+0x1fe/0x500
[ 71.765602][ T4632] __x64_sys_symlink+0x7a/0x90
[ 71.770377][ T4632] do_syscall_64+0x4c/0xa0
[ 71.774799][ T4632] ? clear_bhb_loop+0x30/0x80
[ 71.779620][ T4632] ? clear_bhb_loop+0x30/0x80
[ 71.784322][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 71.790228][ T4632] RIP: 0033:0x7fd99e8ceba9
[ 71.794650][ T4632] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 71.814473][ T4632] RSP: 002b:00007fd99dc500c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000058
[ 71.822951][ T4632] RAX: ffffffffffffffda RBX: 00007fd99e9edf80 RCX: 00007fd99e8ceba9
[ 71.830929][ T4632] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000020000140
[ 71.838908][ T4632] RBP: 00007fd99dc50120 R08: 0000000000000000 R09: 0000000000000000
[ 71.846886][ T4632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 71.854863][ T4632] R13: 000000000000000b R14: 00007fd99e9edf80 R15: 00007ffc53fe8a68
[ 71.862941][ T4632]
[ 71.865967][ T4632]
[ 71.868289][ T4632] Allocated by task 4632:
[ 71.872609][ T4632] __kasan_slab_alloc+0x9c/0xd0
[ 71.877466][ T4632] slab_post_alloc_hook+0x4c/0x380
[ 71.882590][ T4632] kmem_cache_alloc+0x100/0x290
[ 71.887446][ T4632] jbd2__journal_start+0x13c/0x5a0
[ 71.892565][ T4632] __ext4_journal_start_sb+0x167/0x360
[ 71.898035][ T4632] __ext4_new_inode+0x119c/0x39e0
[ 71.903072][ T4632] ext4_symlink+0x471/0xcc0
[ 71.907583][ T4632] vfs_symlink+0x247/0x3d0
[ 71.912119][ T4632] do_symlinkat+0x1be/0x6c0
[ 71.916630][ T4632] __x64_sys_symlink+0x7a/0x90
[ 71.921416][ T4632] do_syscall_64+0x4c/0xa0
[ 71.925842][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 71.931744][ T4632]
[ 71.934066][ T4632] Freed by task 4632:
[ 71.938045][ T4632] kasan_set_track+0x4b/0x70
[ 71.942638][ T4632] kasan_set_free_info+0x1f/0x40
[ 71.947580][ T4632] ____kasan_slab_free+0xd5/0x110
[ 71.952613][ T4632] slab_free_freelist_hook+0xea/0x170
[ 71.957987][ T4632] kmem_cache_free+0x8f/0x210
[ 71.962666][ T4632] jbd2_journal_stop+0x8c2/0xd20
[ 71.967612][ T4632] __ext4_journal_stop+0xf2/0x190
[ 71.972648][ T4632] ext4_symlink+0x581/0xcc0
[ 71.977153][ T4632] vfs_symlink+0x247/0x3d0
[ 71.981690][ T4632] do_symlinkat+0x1be/0x6c0
[ 71.986193][ T4632] __x64_sys_symlink+0x7a/0x90
[ 71.990954][ T4632] do_syscall_64+0x4c/0xa0
[ 71.995370][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 72.001266][ T4632]
[ 72.003610][ T4632] The buggy address belongs to the object at ffff88801cda8aa8
[ 72.003610][ T4632] which belongs to the cache jbd2_journal_handle of size 56
[ 72.018287][ T4632] The buggy address is located 36 bytes inside of
[ 72.018287][ T4632] 56-byte region [ffff88801cda8aa8, ffff88801cda8ae0)
[ 72.031495][ T4632] The buggy address belongs to the page:
[ 72.037147][ T4632] page:ffffea0000736a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1cda8
[ 72.047302][ T4632] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 72.054860][ T4632] raw: 00fff00000000200 ffffea0000828e80 0000000200000002 ffff88801d7ae000
[ 72.063448][ T4632] raw: 0000000000000000 00000000802e002e 00000001ffffffff 0000000000000000
[ 72.072036][ T4632] page dumped because: kasan: bad access detected
[ 72.078490][ T4632] page_owner tracks the page as allocated
[ 72.084202][ T4632] page last allocated via order 0, migratetype Reclaimable, gfp_mask 0x12c50(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY|__GFP_RECLAIMABLE), pid 3529, ts 13300066967, free_ts 0
[ 72.100975][ T4632] get_page_from_freelist+0x1b77/0x1c60
[ 72.106533][ T4632] __alloc_pages+0x1e1/0x470
[ 72.111148][ T4632] new_slab+0xc0/0x4b0
[ 72.115221][ T4632] ___slab_alloc+0x81e/0xdf0
[ 72.119838][ T4632] kmem_cache_alloc+0x195/0x290
[ 72.124696][ T4632] jbd2__journal_start+0x13c/0x5a0
[ 72.129812][ T4632] __ext4_journal_start_sb+0x167/0x360
[ 72.135373][ T4632] ext4_dirty_inode+0x8b/0x100
[ 72.140145][ T4632] __mark_inode_dirty+0x2b0/0xc60
[ 72.145177][ T4632] touch_atime+0x3a7/0x620
[ 72.149691][ T4632] filemap_read+0x22c2/0x2480
[ 72.154375][ T4632] __kernel_read+0x4eb/0x910
[ 72.159072][ T4632] bprm_execve+0x9d7/0x17d0
[ 72.163587][ T4632] do_execveat_common+0x51e/0x6d0
[ 72.168627][ T4632] __x64_sys_execve+0x8e/0xa0
[ 72.173331][ T4632] do_syscall_64+0x4c/0xa0
[ 72.177752][ T4632] page_owner free stack trace missing
[ 72.183119][ T4632]
[ 72.185454][ T4632] Memory state around the buggy address:
[ 72.191184][ T4632] ffff88801cda8980: fc fc fc fc fa fb fb fb fb fb fb fc fc fc fc fa
[ 72.199257][ T4632] ffff88801cda8a00: fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb fb
[ 72.207326][ T4632] >ffff88801cda8a80: fb fc fc fc fc fa fb fb fb fb fb fb fc fc fc fc
[ 72.215388][ T4632] ^
[ 72.221902][ T4632] ffff88801cda8b00: fb fb fb fb fb fb fb fc fc fc fc fb fb fb fb fb
[ 72.229964][ T4632] ffff88801cda8b80: fb fb fc fc fc fc fb fb fb fb fb fb fb fc fc fc
[ 72.238025][ T4632] ==================================================================
[ 72.246175][ T4632] Disabling lock debugging due to kernel taint
[ 72.259725][ T4632] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 72.266940][ T4632] CPU: 0 PID: 4632 Comm: syz-executor.0 Tainted: G B 5.15.186-syzkaller #0
[ 72.276830][ T4632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 72.286882][ T4632] Call Trace:
[ 72.290164][ T4632]
[ 72.293093][ T4632] dump_stack_lvl+0x168/0x230
[ 72.297850][ T4632] ? show_regs_print_info+0x20/0x20
[ 72.303152][ T4632] ? load_image+0x3b0/0x3b0
[ 72.307670][ T4632] panic+0x2c9/0x7f0
[ 72.311578][ T4632] ? asm_sysvec_apic_timer_interrupt+0x16/0x20
[ 72.317833][ T4632] ? bpf_jit_dump+0xd0/0xd0
[ 72.322351][ T4632] ? _raw_spin_unlock_irqrestore+0xf6/0x100
[ 72.328250][ T4632] ? _raw_spin_unlock+0x40/0x40
[ 72.333106][ T4632] ? jbd2_journal_get_write_access+0x136/0x140
[ 72.339264][ T4632] check_panic_on_warn+0x80/0xa0
[ 72.344208][ T4632] ? jbd2_journal_get_write_access+0x136/0x140
[ 72.350368][ T4632] end_report+0x6d/0xf0
[ 72.354534][ T4632] kasan_report+0x102/0x130
[ 72.359064][ T4632] ? jbd2_journal_get_write_access+0x136/0x140
[ 72.365225][ T4632] jbd2_journal_get_write_access+0x136/0x140
[ 72.371327][ T4632] __ext4_journal_get_write_access+0x22e/0x6d0
[ 72.377491][ T4632] ? __ext4_journal_ensure_credits+0x450/0x450
[ 72.383659][ T4632] ? jbd2_journal_stop+0x8c2/0xd20
[ 72.388782][ T4632] ext4_reserve_inode_write+0x203/0x2e0
[ 72.394341][ T4632] __ext4_mark_inode_dirty+0x142/0x700
[ 72.399807][ T4632] ? fscrypt_prepare_symlink+0x150/0x150
[ 72.405454][ T4632] ext4_symlink+0xaa4/0xcc0
[ 72.409969][ T4632] ? ext4_unlink+0x500/0x500
[ 72.414571][ T4632] ? inode_permission+0xef/0x480
[ 72.419527][ T4632] ? bpf_lsm_inode_symlink+0x5/0x10
[ 72.424732][ T4632] ? security_inode_symlink+0xb2/0x100
[ 72.430200][ T4632] vfs_symlink+0x247/0x3d0
[ 72.434721][ T4632] do_symlinkat+0x1be/0x6c0
[ 72.439242][ T4632] ? __check_object_size+0x30c/0x410
[ 72.444534][ T4632] ? vfs_symlink+0x3d0/0x3d0
[ 72.449142][ T4632] ? getname_flags+0x1fe/0x500
[ 72.453905][ T4632] __x64_sys_symlink+0x7a/0x90
[ 72.458673][ T4632] do_syscall_64+0x4c/0xa0
[ 72.463091][ T4632] ? clear_bhb_loop+0x30/0x80
[ 72.467773][ T4632] ? clear_bhb_loop+0x30/0x80
[ 72.472454][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 72.478377][ T4632] RIP: 0033:0x7fd99e8ceba9
[ 72.482809][ T4632] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 72.502411][ T4632] RSP: 002b:00007fd99dc500c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000058
[ 72.510830][ T4632] RAX: ffffffffffffffda RBX: 00007fd99e9edf80 RCX: 00007fd99e8ceba9
[ 72.518808][ T4632] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000020000140
[ 72.526790][ T4632] RBP: 00007fd99dc50120 R08: 0000000000000000 R09: 0000000000000000
[ 72.534859][ T4632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 72.542846][ T4632] R13: 000000000000000b R14: 00007fd99e9edf80 R15: 00007ffc53fe8a68
[ 72.550835][ T4632]
[ 72.554061][ T4632] Kernel Offset: disabled
[ 72.558381][ T4632] Rebooting in 86400 seconds..