Warning: Permanently added '10.128.1.99' (ED25519) to the list of known hosts. 2025/07/10 05:52:30 ignoring optional flag "sandboxArg"="0" 2025/07/10 05:52:30 ignoring optional flag "type"="gce" 2025/07/10 05:52:30 parsed 1 programs 2025/07/10 05:52:32 executed programs: 0 [ 69.165142][ T4477] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS [ 69.290197][ T4513] chnl_net:caif_netlink_parms(): no params data found [ 69.325515][ T4513] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.332890][ T4513] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.341323][ T4513] device bridge_slave_0 entered promiscuous mode [ 69.349167][ T4513] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.356407][ T4513] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.364326][ T4513] device bridge_slave_1 entered promiscuous mode [ 69.383337][ T4513] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.394389][ T4513] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.420028][ T4513] team0: Port device team_slave_0 added [ 69.427860][ T4513] team0: Port device team_slave_1 added [ 69.443172][ T4513] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.450233][ T4513] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.476218][ T4513] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.488026][ T4513] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.495089][ T4513] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.521171][ T4513] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.548284][ T4513] device hsr_slave_0 entered promiscuous mode [ 69.554933][ T4513] device hsr_slave_1 entered promiscuous mode [ 70.086347][ T4513] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 70.097012][ T4513] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 70.107961][ T4513] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 70.128565][ T4513] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 70.153053][ T4513] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.160178][ T4513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.167578][ T4513] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.174694][ T4513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.226477][ T4513] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.243555][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.252280][ T1263] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.261866][ T1263] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.271292][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 70.288139][ T4513] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.301275][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.310800][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.321232][ T1263] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.328359][ T1263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.348784][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.359095][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.367713][ T1263] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.374811][ T1263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.385208][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.402240][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.425132][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.435632][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.445679][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.456379][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.465202][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.474532][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.482819][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.491798][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.501967][ T4513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.512582][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.626862][ T3095] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 70.636535][ T3095] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 70.649417][ T4513] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.669937][ T3095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 70.679352][ T3095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 70.700709][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 70.710009][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.721610][ T4513] device veth0_vlan entered promiscuous mode [ 70.729092][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.738470][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.750751][ T4513] device veth1_vlan entered promiscuous mode [ 70.772815][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 70.782310][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 70.791745][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 70.801253][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 70.814218][ T4513] device veth0_macvtap entered promiscuous mode [ 70.824906][ T4513] device veth1_macvtap entered promiscuous mode [ 70.843392][ T4513] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 70.850747][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 70.861711][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 70.870211][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 70.879798][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 70.892217][ T4513] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 70.901096][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 70.910613][ T1263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 70.921844][ T4513] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.932027][ T4513] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.941875][ T4513] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.951337][ T4513] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.014376][ T1263] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 71.022304][ T1263] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 71.039462][ T3095] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 71.048018][ T3095] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 71.055902][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 71.065183][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 71.135933][ T4612] syz-executor.0 (pid 4612) is setting deprecated v1 encryption policy; recommend upgrading to v2. [ 71.187720][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.194557][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.264824][ T1326] Bluetooth: hci0: command 0x0409 tx timeout [ 71.277529][ T4612] fscrypt: AES-128-CTS-CBC using implementation "cts-cbc-aes-aesni" [ 71.325883][ T4632] FAULT_INJECTION: forcing a failure. [ 71.325883][ T4632] name failslab, interval 1, probability 0, space 0, times 1 [ 71.339260][ T4632] CPU: 1 PID: 4632 Comm: syz-executor.0 Not tainted 5.15.186-syzkaller #0 [ 71.347785][ T4632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 71.357862][ T4632] Call Trace: [ 71.361159][ T4632] [ 71.364102][ T4632] dump_stack_lvl+0x168/0x230 [ 71.368825][ T4632] ? show_regs_print_info+0x20/0x20 [ 71.374053][ T4632] ? load_image+0x3b0/0x3b0 [ 71.378576][ T4632] ? __lock_acquire+0x7c60/0x7c60 [ 71.383619][ T4632] should_fail+0x38c/0x4c0 [ 71.388057][ T4632] should_failslab+0x5/0x20 [ 71.392575][ T4632] slab_pre_alloc_hook+0x51/0xc0 [ 71.397521][ T4632] __kmalloc+0x6b/0x330 [ 71.401684][ T4632] ? __fscrypt_encrypt_symlink+0x11b/0x3b0 [ 71.407499][ T4632] __fscrypt_encrypt_symlink+0x11b/0x3b0 [ 71.413141][ T4632] ? fscrypt_prepare_symlink+0x150/0x150 [ 71.418793][ T4632] ext4_symlink+0x541/0xcc0 [ 71.423308][ T4632] ? ext4_unlink+0x500/0x500 [ 71.427908][ T4632] ? inode_permission+0xef/0x480 [ 71.432902][ T4632] ? bpf_lsm_inode_symlink+0x5/0x10 [ 71.438108][ T4632] ? security_inode_symlink+0xb2/0x100 [ 71.443584][ T4632] vfs_symlink+0x247/0x3d0 [ 71.448019][ T4632] do_symlinkat+0x1be/0x6c0 [ 71.452623][ T4632] ? __check_object_size+0x30c/0x410 [ 71.457919][ T4632] ? vfs_symlink+0x3d0/0x3d0 [ 71.462523][ T4632] ? getname_flags+0x1fe/0x500 [ 71.467295][ T4632] __x64_sys_symlink+0x7a/0x90 [ 71.472053][ T4632] do_syscall_64+0x4c/0xa0 [ 71.476456][ T4632] ? clear_bhb_loop+0x30/0x80 [ 71.481112][ T4632] ? clear_bhb_loop+0x30/0x80 [ 71.485944][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 71.491851][ T4632] RIP: 0033:0x7fd99e8ceba9 [ 71.496257][ T4632] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 71.516016][ T4632] RSP: 002b:00007fd99dc500c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 71.524417][ T4632] RAX: ffffffffffffffda RBX: 00007fd99e9edf80 RCX: 00007fd99e8ceba9 [ 71.532632][ T4632] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000020000140 [ 71.540674][ T4632] RBP: 00007fd99dc50120 R08: 0000000000000000 R09: 0000000000000000 [ 71.548627][ T4632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 71.556673][ T4632] R13: 000000000000000b R14: 00007fd99e9edf80 R15: 00007ffc53fe8a68 [ 71.564643][ T4632] [ 71.571378][ T4632] ================================================================== [ 71.579853][ T4632] BUG: KASAN: use-after-free in jbd2_journal_get_write_access+0x136/0x140 [ 71.588373][ T4632] Read of size 4 at addr ffff88801cda8acc by task syz-executor.0/4632 [ 71.596534][ T4632] [ 71.598868][ T4632] CPU: 0 PID: 4632 Comm: syz-executor.0 Not tainted 5.15.186-syzkaller #0 [ 71.607370][ T4632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 71.617431][ T4632] Call Trace: [ 71.620713][ T4632] [ 71.623825][ T4632] dump_stack_lvl+0x168/0x230 [ 71.628731][ T4632] ? show_regs_print_info+0x20/0x20 [ 71.634284][ T4632] ? _printk+0xcc/0x110 [ 71.638465][ T4632] ? jbd2_journal_get_write_access+0x136/0x140 [ 71.644644][ T4632] ? load_image+0x3b0/0x3b0 [ 71.649162][ T4632] ? _raw_spin_lock_irqsave+0xb0/0xf0 [ 71.654548][ T4632] print_address_description+0x60/0x2d0 [ 71.660111][ T4632] ? jbd2_journal_get_write_access+0x136/0x140 [ 71.666281][ T4632] kasan_report+0xdf/0x130 [ 71.670708][ T4632] ? jbd2_journal_get_write_access+0x136/0x140 [ 71.676878][ T4632] jbd2_journal_get_write_access+0x136/0x140 [ 71.682869][ T4632] __ext4_journal_get_write_access+0x22e/0x6d0 [ 71.689040][ T4632] ? __ext4_journal_ensure_credits+0x450/0x450 [ 71.695205][ T4632] ? jbd2_journal_stop+0x8c2/0xd20 [ 71.700350][ T4632] ext4_reserve_inode_write+0x203/0x2e0 [ 71.705910][ T4632] __ext4_mark_inode_dirty+0x142/0x700 [ 71.711376][ T4632] ? fscrypt_prepare_symlink+0x150/0x150 [ 71.717205][ T4632] ext4_symlink+0xaa4/0xcc0 [ 71.721727][ T4632] ? ext4_unlink+0x500/0x500 [ 71.726342][ T4632] ? inode_permission+0xef/0x480 [ 71.731286][ T4632] ? bpf_lsm_inode_symlink+0x5/0x10 [ 71.736490][ T4632] ? security_inode_symlink+0xb2/0x100 [ 71.741977][ T4632] vfs_symlink+0x247/0x3d0 [ 71.746408][ T4632] do_symlinkat+0x1be/0x6c0 [ 71.750920][ T4632] ? __check_object_size+0x30c/0x410 [ 71.756215][ T4632] ? vfs_symlink+0x3d0/0x3d0 [ 71.760819][ T4632] ? getname_flags+0x1fe/0x500 [ 71.765602][ T4632] __x64_sys_symlink+0x7a/0x90 [ 71.770377][ T4632] do_syscall_64+0x4c/0xa0 [ 71.774799][ T4632] ? clear_bhb_loop+0x30/0x80 [ 71.779620][ T4632] ? clear_bhb_loop+0x30/0x80 [ 71.784322][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 71.790228][ T4632] RIP: 0033:0x7fd99e8ceba9 [ 71.794650][ T4632] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 71.814473][ T4632] RSP: 002b:00007fd99dc500c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 71.822951][ T4632] RAX: ffffffffffffffda RBX: 00007fd99e9edf80 RCX: 00007fd99e8ceba9 [ 71.830929][ T4632] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000020000140 [ 71.838908][ T4632] RBP: 00007fd99dc50120 R08: 0000000000000000 R09: 0000000000000000 [ 71.846886][ T4632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 71.854863][ T4632] R13: 000000000000000b R14: 00007fd99e9edf80 R15: 00007ffc53fe8a68 [ 71.862941][ T4632] [ 71.865967][ T4632] [ 71.868289][ T4632] Allocated by task 4632: [ 71.872609][ T4632] __kasan_slab_alloc+0x9c/0xd0 [ 71.877466][ T4632] slab_post_alloc_hook+0x4c/0x380 [ 71.882590][ T4632] kmem_cache_alloc+0x100/0x290 [ 71.887446][ T4632] jbd2__journal_start+0x13c/0x5a0 [ 71.892565][ T4632] __ext4_journal_start_sb+0x167/0x360 [ 71.898035][ T4632] __ext4_new_inode+0x119c/0x39e0 [ 71.903072][ T4632] ext4_symlink+0x471/0xcc0 [ 71.907583][ T4632] vfs_symlink+0x247/0x3d0 [ 71.912119][ T4632] do_symlinkat+0x1be/0x6c0 [ 71.916630][ T4632] __x64_sys_symlink+0x7a/0x90 [ 71.921416][ T4632] do_syscall_64+0x4c/0xa0 [ 71.925842][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 71.931744][ T4632] [ 71.934066][ T4632] Freed by task 4632: [ 71.938045][ T4632] kasan_set_track+0x4b/0x70 [ 71.942638][ T4632] kasan_set_free_info+0x1f/0x40 [ 71.947580][ T4632] ____kasan_slab_free+0xd5/0x110 [ 71.952613][ T4632] slab_free_freelist_hook+0xea/0x170 [ 71.957987][ T4632] kmem_cache_free+0x8f/0x210 [ 71.962666][ T4632] jbd2_journal_stop+0x8c2/0xd20 [ 71.967612][ T4632] __ext4_journal_stop+0xf2/0x190 [ 71.972648][ T4632] ext4_symlink+0x581/0xcc0 [ 71.977153][ T4632] vfs_symlink+0x247/0x3d0 [ 71.981690][ T4632] do_symlinkat+0x1be/0x6c0 [ 71.986193][ T4632] __x64_sys_symlink+0x7a/0x90 [ 71.990954][ T4632] do_syscall_64+0x4c/0xa0 [ 71.995370][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.001266][ T4632] [ 72.003610][ T4632] The buggy address belongs to the object at ffff88801cda8aa8 [ 72.003610][ T4632] which belongs to the cache jbd2_journal_handle of size 56 [ 72.018287][ T4632] The buggy address is located 36 bytes inside of [ 72.018287][ T4632] 56-byte region [ffff88801cda8aa8, ffff88801cda8ae0) [ 72.031495][ T4632] The buggy address belongs to the page: [ 72.037147][ T4632] page:ffffea0000736a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1cda8 [ 72.047302][ T4632] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 72.054860][ T4632] raw: 00fff00000000200 ffffea0000828e80 0000000200000002 ffff88801d7ae000 [ 72.063448][ T4632] raw: 0000000000000000 00000000802e002e 00000001ffffffff 0000000000000000 [ 72.072036][ T4632] page dumped because: kasan: bad access detected [ 72.078490][ T4632] page_owner tracks the page as allocated [ 72.084202][ T4632] page last allocated via order 0, migratetype Reclaimable, gfp_mask 0x12c50(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY|__GFP_RECLAIMABLE), pid 3529, ts 13300066967, free_ts 0 [ 72.100975][ T4632] get_page_from_freelist+0x1b77/0x1c60 [ 72.106533][ T4632] __alloc_pages+0x1e1/0x470 [ 72.111148][ T4632] new_slab+0xc0/0x4b0 [ 72.115221][ T4632] ___slab_alloc+0x81e/0xdf0 [ 72.119838][ T4632] kmem_cache_alloc+0x195/0x290 [ 72.124696][ T4632] jbd2__journal_start+0x13c/0x5a0 [ 72.129812][ T4632] __ext4_journal_start_sb+0x167/0x360 [ 72.135373][ T4632] ext4_dirty_inode+0x8b/0x100 [ 72.140145][ T4632] __mark_inode_dirty+0x2b0/0xc60 [ 72.145177][ T4632] touch_atime+0x3a7/0x620 [ 72.149691][ T4632] filemap_read+0x22c2/0x2480 [ 72.154375][ T4632] __kernel_read+0x4eb/0x910 [ 72.159072][ T4632] bprm_execve+0x9d7/0x17d0 [ 72.163587][ T4632] do_execveat_common+0x51e/0x6d0 [ 72.168627][ T4632] __x64_sys_execve+0x8e/0xa0 [ 72.173331][ T4632] do_syscall_64+0x4c/0xa0 [ 72.177752][ T4632] page_owner free stack trace missing [ 72.183119][ T4632] [ 72.185454][ T4632] Memory state around the buggy address: [ 72.191184][ T4632] ffff88801cda8980: fc fc fc fc fa fb fb fb fb fb fb fc fc fc fc fa [ 72.199257][ T4632] ffff88801cda8a00: fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb fb [ 72.207326][ T4632] >ffff88801cda8a80: fb fc fc fc fc fa fb fb fb fb fb fb fc fc fc fc [ 72.215388][ T4632] ^ [ 72.221902][ T4632] ffff88801cda8b00: fb fb fb fb fb fb fb fc fc fc fc fb fb fb fb fb [ 72.229964][ T4632] ffff88801cda8b80: fb fb fc fc fc fc fb fb fb fb fb fb fb fc fc fc [ 72.238025][ T4632] ================================================================== [ 72.246175][ T4632] Disabling lock debugging due to kernel taint [ 72.259725][ T4632] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 72.266940][ T4632] CPU: 0 PID: 4632 Comm: syz-executor.0 Tainted: G B 5.15.186-syzkaller #0 [ 72.276830][ T4632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 72.286882][ T4632] Call Trace: [ 72.290164][ T4632] [ 72.293093][ T4632] dump_stack_lvl+0x168/0x230 [ 72.297850][ T4632] ? show_regs_print_info+0x20/0x20 [ 72.303152][ T4632] ? load_image+0x3b0/0x3b0 [ 72.307670][ T4632] panic+0x2c9/0x7f0 [ 72.311578][ T4632] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 72.317833][ T4632] ? bpf_jit_dump+0xd0/0xd0 [ 72.322351][ T4632] ? _raw_spin_unlock_irqrestore+0xf6/0x100 [ 72.328250][ T4632] ? _raw_spin_unlock+0x40/0x40 [ 72.333106][ T4632] ? jbd2_journal_get_write_access+0x136/0x140 [ 72.339264][ T4632] check_panic_on_warn+0x80/0xa0 [ 72.344208][ T4632] ? jbd2_journal_get_write_access+0x136/0x140 [ 72.350368][ T4632] end_report+0x6d/0xf0 [ 72.354534][ T4632] kasan_report+0x102/0x130 [ 72.359064][ T4632] ? jbd2_journal_get_write_access+0x136/0x140 [ 72.365225][ T4632] jbd2_journal_get_write_access+0x136/0x140 [ 72.371327][ T4632] __ext4_journal_get_write_access+0x22e/0x6d0 [ 72.377491][ T4632] ? __ext4_journal_ensure_credits+0x450/0x450 [ 72.383659][ T4632] ? jbd2_journal_stop+0x8c2/0xd20 [ 72.388782][ T4632] ext4_reserve_inode_write+0x203/0x2e0 [ 72.394341][ T4632] __ext4_mark_inode_dirty+0x142/0x700 [ 72.399807][ T4632] ? fscrypt_prepare_symlink+0x150/0x150 [ 72.405454][ T4632] ext4_symlink+0xaa4/0xcc0 [ 72.409969][ T4632] ? ext4_unlink+0x500/0x500 [ 72.414571][ T4632] ? inode_permission+0xef/0x480 [ 72.419527][ T4632] ? bpf_lsm_inode_symlink+0x5/0x10 [ 72.424732][ T4632] ? security_inode_symlink+0xb2/0x100 [ 72.430200][ T4632] vfs_symlink+0x247/0x3d0 [ 72.434721][ T4632] do_symlinkat+0x1be/0x6c0 [ 72.439242][ T4632] ? __check_object_size+0x30c/0x410 [ 72.444534][ T4632] ? vfs_symlink+0x3d0/0x3d0 [ 72.449142][ T4632] ? getname_flags+0x1fe/0x500 [ 72.453905][ T4632] __x64_sys_symlink+0x7a/0x90 [ 72.458673][ T4632] do_syscall_64+0x4c/0xa0 [ 72.463091][ T4632] ? clear_bhb_loop+0x30/0x80 [ 72.467773][ T4632] ? clear_bhb_loop+0x30/0x80 [ 72.472454][ T4632] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.478377][ T4632] RIP: 0033:0x7fd99e8ceba9 [ 72.482809][ T4632] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 72.502411][ T4632] RSP: 002b:00007fd99dc500c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 72.510830][ T4632] RAX: ffffffffffffffda RBX: 00007fd99e9edf80 RCX: 00007fd99e8ceba9 [ 72.518808][ T4632] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000020000140 [ 72.526790][ T4632] RBP: 00007fd99dc50120 R08: 0000000000000000 R09: 0000000000000000 [ 72.534859][ T4632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 72.542846][ T4632] R13: 000000000000000b R14: 00007fd99e9edf80 R15: 00007ffc53fe8a68 [ 72.550835][ T4632] [ 72.554061][ T4632] Kernel Offset: disabled [ 72.558381][ T4632] Rebooting in 86400 seconds..