Warning: Permanently added '10.128.0.221' (ED25519) to the list of known hosts. 2026/04/23 21:18:27 parsed 1 programs [ 43.983080][ T28] audit: type=1400 audit(1776979108.158:106): avc: denied { unlink } for pid=387 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 44.023083][ T387] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.762252][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.769404][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.776949][ T396] device bridge_slave_0 entered promiscuous mode [ 44.784073][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.791088][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.798622][ T396] device bridge_slave_1 entered promiscuous mode [ 44.836496][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.843561][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.850790][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.857822][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.875559][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.882923][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.890298][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.897930][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.906760][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.915083][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.922091][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.931494][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.940129][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.947190][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.959088][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.968488][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.981809][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.992778][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.000845][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.008510][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.017701][ T396] device veth0_vlan entered promiscuous mode [ 45.027219][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.036624][ T396] device veth1_macvtap entered promiscuous mode [ 45.045555][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.055391][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.191018][ T28] audit: type=1401 audit(1776979109.358:107): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2026/04/23 21:18:30 executed programs: 0 [ 45.894560][ T43] device bridge_slave_1 left promiscuous mode [ 45.900722][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.908282][ T43] device bridge_slave_0 left promiscuous mode [ 45.915106][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.923283][ T43] device veth1_macvtap left promiscuous mode [ 45.929340][ T43] device veth0_vlan left promiscuous mode [ 45.996602][ T451] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.003964][ T451] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.011294][ T451] device bridge_slave_0 entered promiscuous mode [ 46.018315][ T451] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.025409][ T451] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.033222][ T451] device bridge_slave_1 entered promiscuous mode [ 46.071184][ T451] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.078255][ T451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.085563][ T451] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.092678][ T451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.110638][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.118415][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.126452][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.135440][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.144183][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.151327][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.160491][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.169061][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.176189][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.188234][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.198064][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.214757][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.225558][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.233747][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.241300][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.250110][ T451] device veth0_vlan entered promiscuous mode [ 46.260162][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.269883][ T451] device veth1_macvtap entered promiscuous mode [ 46.280444][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.290682][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.319495][ T457] loop2: detected capacity change from 0 to 1024 [ 46.326905][ T457] ======================================================= [ 46.326905][ T457] WARNING: The mand mount option has been deprecated and [ 46.326905][ T457] and is ignored by this kernel. Remove the mand [ 46.326905][ T457] option from the mount to silence this warning. [ 46.326905][ T457] ======================================================= [ 46.363026][ T457] EXT4-fs: Ignoring removed bh option [ 46.369100][ T457] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 46.384080][ T457] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 46.393357][ T28] audit: type=1400 audit(1776979110.578:108): avc: denied { mount } for pid=456 comm="syz.2.17" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 46.414979][ T28] audit: type=1400 audit(1776979110.578:109): avc: denied { write } for pid=456 comm="syz.2.17" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 46.416785][ T457] EXT4-fs error (device loop2): ext4_mb_mark_diskspace_used:3850: comm syz.2.17: Allocating blocks 497-513 which overlap fs metadata [ 46.436669][ T28] audit: type=1400 audit(1776979110.578:110): avc: denied { add_name } for pid=456 comm="syz.2.17" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 46.452135][ T457] EXT4-fs (loop2): pa ffff888122fe1c78: logic 64, phys. 193, len 20 [ 46.471177][ T28] audit: type=1400 audit(1776979110.578:111): avc: denied { create } for pid=456 comm="syz.2.17" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 46.478881][ T457] EXT4-fs error (device loop2): ext4_mb_release_inode_pa:4890: group 0, free 0, pa_free 1 [ 46.498856][ T28] audit: type=1400 audit(1776979110.578:112): avc: denied { read write } for pid=456 comm="syz.2.17" name="file1" dev="loop2" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.531755][ T458] ================================================================== [ 46.539834][ T458] BUG: KASAN: slab-out-of-bounds in ext4_find_extent+0xbeb/0xe20 [ 46.547646][ T458] Read of size 4 at addr ffff88812efe7c94 by task kworker/u4:4/458 [ 46.555519][ T458] [ 46.557842][ T458] CPU: 0 PID: 458 Comm: kworker/u4:4 Not tainted syzkaller #0 [ 46.565273][ T458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 46.572855][ T28] audit: type=1400 audit(1776979110.578:113): avc: denied { open } for pid=456 comm="syz.2.17" path="/0/file1/file1" dev="loop2" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.575306][ T458] Workqueue: writeback wb_workfn (flush-7:2) [ 46.597839][ T28] audit: type=1400 audit(1776979110.628:114): avc: denied { setattr } for pid=456 comm="syz.2.17" name="file1" dev="loop2" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.603744][ T458] Call Trace: [ 46.603751][ T458] [ 46.631836][ T458] __dump_stack+0x21/0x24 [ 46.636150][ T458] dump_stack_lvl+0x110/0x170 [ 46.640910][ T458] ? __cfi_dump_stack_lvl+0x8/0x8 [ 46.645920][ T458] ? ext4_find_extent+0xbeb/0xe20 [ 46.650944][ T458] print_address_description+0x71/0x200 [ 46.656657][ T458] print_report+0x4a/0x60 [ 46.660977][ T458] kasan_report+0x122/0x150 [ 46.665469][ T458] ? ext4_find_extent+0xbeb/0xe20 [ 46.670470][ T458] __asan_report_load4_noabort+0x14/0x20 [ 46.676077][ T458] ext4_find_extent+0xbeb/0xe20 [ 46.680978][ T458] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 46.686943][ T458] ext4_ext_map_blocks+0x207/0x61d0 [ 46.692149][ T458] ? kasan_set_track+0x60/0x70 [ 46.696932][ T458] ? kasan_set_track+0x4b/0x70 [ 46.701710][ T458] ? kasan_save_alloc_info+0x25/0x30 [ 46.707175][ T458] ? __kasan_slab_alloc+0x72/0x80 [ 46.712186][ T458] ? slab_post_alloc_hook+0x4f/0x2d0 [ 46.717457][ T458] ? kmem_cache_alloc+0x16e/0x330 [ 46.722485][ T458] ? ext4_alloc_io_end_vec+0x2a/0x160 [ 46.727849][ T458] ? ext4_writepages+0x10e9/0x30e0 [ 46.732950][ T458] ? do_writepages+0x3a4/0x5f0 [ 46.737697][ T458] ? __writeback_single_inode+0xc6/0xad0 [ 46.743313][ T458] ? writeback_sb_inodes+0xa10/0x15d0 [ 46.748682][ T458] ? wb_writeback+0x40b/0x9d0 [ 46.753338][ T458] ? wb_workfn+0x378/0xeb0 [ 46.757732][ T458] ? process_one_work+0x71f/0xc40 [ 46.762737][ T458] ? worker_thread+0xa29/0x11e0 [ 46.767570][ T458] ? kthread+0x281/0x320 [ 46.771794][ T458] ? ret_from_fork+0x1f/0x30 [ 46.776469][ T458] ? __cfi_ext4_ext_map_blocks+0x10/0x10 [ 46.782089][ T458] ? ext4_es_lookup_extent+0x54c/0x900 [ 46.787528][ T458] ext4_map_blocks+0x9d8/0x1b70 [ 46.792375][ T458] ? __cfi_ext4_map_blocks+0x10/0x10 [ 46.797637][ T458] ? ext4_inode_journal_mode+0x19a/0x480 [ 46.803338][ T458] ext4_writepages+0x1409/0x30e0 [ 46.808260][ T458] ? __cfi_ext4_writepages+0x10/0x10 [ 46.813578][ T458] ? xas_start+0x317/0x3e0 [ 46.817976][ T458] ? __kasan_check_write+0x14/0x20 [ 46.823085][ T458] ? __cfi_ext4_writepages+0x10/0x10 [ 46.828351][ T458] do_writepages+0x3a4/0x5f0 [ 46.832924][ T458] ? __update_load_avg_cfs_rq+0xaf/0x2f0 [ 46.838540][ T458] ? __cfi_do_writepages+0x10/0x10 [ 46.843630][ T458] ? __kasan_check_write+0x14/0x20 [ 46.848735][ T458] ? _raw_spin_lock+0x94/0xf0 [ 46.853398][ T458] __writeback_single_inode+0xc6/0xad0 [ 46.858843][ T458] ? inode_io_list_move_locked+0x366/0x3d0 [ 46.864632][ T458] writeback_sb_inodes+0xa10/0x15d0 [ 46.869815][ T458] ? queue_io+0x4c0/0x4c0 [ 46.874144][ T458] ? __kasan_check_read+0x11/0x20 [ 46.879158][ T458] ? queue_io+0x382/0x4c0 [ 46.883472][ T458] wb_writeback+0x40b/0x9d0 [ 46.887977][ T458] ? inode_cgwb_move_to_attached+0x3e0/0x3e0 [ 46.893952][ T458] ? set_worker_desc+0x1ba/0x1f0 [ 46.898871][ T458] ? __kasan_check_write+0x14/0x20 [ 46.903960][ T458] ? kvm_sched_clock_read+0x18/0x40 [ 46.909142][ T458] ? sched_clock+0x9/0x10 [ 46.913457][ T458] ? sched_clock_cpu+0x6e/0x260 [ 46.918314][ T458] wb_workfn+0x378/0xeb0 [ 46.922544][ T458] ? __cfi_wb_workfn+0x10/0x10 [ 46.927299][ T458] ? kthread_data+0x50/0xc0 [ 46.931779][ T458] ? _raw_spin_unlock+0x4c/0x70 [ 46.936615][ T458] ? finish_task_switch+0x16b/0x7b0 [ 46.941900][ T458] ? __switch_to_asm+0x3a/0x60 [ 46.946674][ T458] ? __schedule+0xbae/0x1500 [ 46.951452][ T458] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 46.957052][ T458] process_one_work+0x71f/0xc40 [ 46.961902][ T458] worker_thread+0xa29/0x11e0 [ 46.966561][ T458] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 46.972002][ T458] ? __kthread_parkme+0x142/0x180 [ 46.977005][ T458] kthread+0x281/0x320 [ 46.981163][ T458] ? __cfi_worker_thread+0x10/0x10 [ 46.986312][ T458] ? __cfi_kthread+0x10/0x10 [ 46.990899][ T458] ret_from_fork+0x1f/0x30 [ 46.995312][ T458] [ 46.998318][ T458] [ 47.000634][ T458] Allocated by task 357: [ 47.004875][ T458] kasan_set_track+0x4b/0x70 [ 47.009455][ T458] kasan_save_alloc_info+0x25/0x30 [ 47.014553][ T458] __kasan_kmalloc+0x95/0xb0 [ 47.019130][ T458] __kmalloc_node+0xb2/0x1e0 [ 47.023713][ T458] kvmalloc_node+0x28a/0x460 [ 47.028286][ T458] pfifo_fast_init+0x260/0x7a0 [ 47.033062][ T458] qdisc_create_dflt+0x150/0x3b0 [ 47.037984][ T458] dev_activate+0x2cf/0x1040 [ 47.042567][ T458] __dev_open+0x40e/0x520 [ 47.046878][ T458] __dev_change_flags+0x21e/0x6b0 [ 47.051883][ T458] dev_change_flags+0x88/0x1a0 [ 47.056626][ T458] do_setlink+0xbad/0x3f70 [ 47.061019][ T458] rtnl_newlink+0x177f/0x20b0 [ 47.065675][ T458] rtnetlink_rcv_msg+0xb3b/0xe00 [ 47.070598][ T458] netlink_rcv_skb+0x20f/0x460 [ 47.075358][ T458] rtnetlink_rcv+0x1c/0x20 [ 47.079757][ T458] netlink_unicast+0x8ab/0xa30 [ 47.084500][ T458] netlink_sendmsg+0x8b9/0xbd0 [ 47.089248][ T458] __sys_sendto+0x4ac/0x660 [ 47.093727][ T458] __x64_sys_sendto+0xe5/0x100 [ 47.098472][ T458] x64_sys_call+0x83/0x9a0 [ 47.102868][ T458] do_syscall_64+0x4c/0xa0 [ 47.107264][ T458] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 47.113138][ T458] [ 47.115439][ T458] Freed by task 357: [ 47.119310][ T458] kasan_set_track+0x4b/0x70 [ 47.123939][ T458] kasan_save_free_info+0x31/0x50 [ 47.129190][ T458] ____kasan_slab_free+0x132/0x180 [ 47.134281][ T458] __kasan_slab_free+0x11/0x20 [ 47.139026][ T458] slab_free_freelist_hook+0xc2/0x190 [ 47.144374][ T458] __kmem_cache_free+0xb7/0x1b0 [ 47.149207][ T458] kfree+0x6f/0xf0 [ 47.152906][ T458] kvfree+0x35/0x40 [ 47.156693][ T458] pfifo_fast_destroy+0x86/0xd0 [ 47.161528][ T458] __qdisc_destroy+0xae/0x290 [ 47.166186][ T458] dev_shutdown+0x459/0x580 [ 47.170680][ T458] unregister_netdevice_many+0x9a6/0x18e0 [ 47.176404][ T458] unregister_netdevice_queue+0x324/0x370 [ 47.182123][ T458] __tun_detach+0xca6/0x1460 [ 47.186717][ T458] tun_chr_close+0x92/0x140 [ 47.191207][ T458] __fput+0x1fc/0x8f0 [ 47.195176][ T458] ____fput+0x15/0x20 [ 47.199257][ T458] task_work_run+0x1e1/0x250 [ 47.203830][ T458] do_exit+0xa35/0x2660 [ 47.207992][ T458] do_group_exit+0x210/0x2d0 [ 47.212578][ T458] get_signal+0x13b5/0x1520 [ 47.217172][ T458] arch_do_signal_or_restart+0xd1/0x1140 [ 47.222873][ T458] exit_to_user_mode_loop+0x7a/0xb0 [ 47.228072][ T458] exit_to_user_mode_prepare+0x87/0xd0 [ 47.233542][ T458] syscall_exit_to_user_mode+0x1a/0x30 [ 47.239002][ T458] do_syscall_64+0x58/0xa0 [ 47.243419][ T458] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 47.249303][ T458] [ 47.251622][ T458] The buggy address belongs to the object at ffff88812efe4000 [ 47.251622][ T458] which belongs to the cache kmalloc-8k of size 8192 [ 47.265656][ T458] The buggy address is located 7316 bytes to the right of [ 47.265656][ T458] 8192-byte region [ffff88812efe4000, ffff88812efe6000) [ 47.279698][ T458] [ 47.282005][ T458] The buggy address belongs to the physical page: [ 47.288391][ T458] page:ffffea0004bbf800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12efe0 [ 47.298699][ T458] head:ffffea0004bbf800 order:3 compound_mapcount:0 compound_pincount:0 [ 47.307263][ T458] flags: 0x4000000000010200(slab|head|zone=1) [ 47.313326][ T458] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888100043500 [ 47.321909][ T458] raw: 0000000000000000 0000000000020002 00000001ffffffff 0000000000000000 [ 47.330467][ T458] page dumped because: kasan: bad access detected [ 47.336864][ T458] page_owner tracks the page as allocated [ 47.342552][ T458] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 357, tgid 357 (syz-executor), ts 24659212187, free_ts 24460556427 [ 47.365449][ T458] post_alloc_hook+0x1f5/0x210 [ 47.370209][ T458] prep_new_page+0x1c/0x110 [ 47.374697][ T458] get_page_from_freelist+0x2d12/0x2d80 [ 47.380221][ T458] __alloc_pages+0x1fa/0x610 [ 47.384792][ T458] alloc_slab_page+0x6e/0xf0 [ 47.389454][ T458] new_slab+0x98/0x3d0 [ 47.393675][ T458] ___slab_alloc+0x6bd/0xb20 [ 47.398251][ T458] __slab_alloc+0x5e/0xa0 [ 47.402566][ T458] __kmem_cache_alloc_node+0x203/0x2c0 [ 47.408011][ T458] __kmalloc_node+0xa1/0x1e0 [ 47.412574][ T458] kvmalloc_node+0x28a/0x460 [ 47.417150][ T458] pfifo_fast_init+0x112/0x7a0 [ 47.421987][ T458] qdisc_create_dflt+0x150/0x3b0 [ 47.426901][ T458] dev_activate+0x2cf/0x1040 [ 47.431465][ T458] __dev_open+0x40e/0x520 [ 47.435768][ T458] __dev_change_flags+0x21e/0x6b0 [ 47.440771][ T458] page last free stack trace: [ 47.445425][ T458] free_unref_page_prepare+0x7f8/0x800 [ 47.451041][ T458] free_unref_page+0x95/0x540 [ 47.455786][ T458] __free_pages+0x67/0x100 [ 47.460179][ T458] __vunmap+0x9c0/0xb80 [ 47.464341][ T458] vfree+0x61/0x90 [ 47.468126][ T458] kcov_close+0x2b/0x50 [ 47.472260][ T458] __fput+0x1fc/0x8f0 [ 47.476220][ T458] ____fput+0x15/0x20 [ 47.480178][ T458] task_work_run+0x1e1/0x250 [ 47.484750][ T458] do_exit+0xa35/0x2660 [ 47.488897][ T458] do_group_exit+0x210/0x2d0 [ 47.493477][ T458] get_signal+0x13b5/0x1520 [ 47.497972][ T458] arch_do_signal_or_restart+0xd1/0x1140 [ 47.503586][ T458] exit_to_user_mode_loop+0x7a/0xb0 [ 47.508762][ T458] exit_to_user_mode_prepare+0x87/0xd0 [ 47.514201][ T458] syscall_exit_to_user_mode+0x1a/0x30 [ 47.519649][ T458] [ 47.521955][ T458] Memory state around the buggy address: [ 47.527559][ T458] ffff88812efe7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.535613][ T458] ffff88812efe7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.543649][ T458] >ffff88812efe7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.551735][ T458] ^ [ 47.556313][ T458] ffff88812efe7d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.564390][ T458] ffff88812efe7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.572443][ T458] ================================================================== [ 47.587437][ T458] Disabling lock debugging due to kernel taint [ 47.593137][ T28] audit: type=1400 audit(1776979111.758:115): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 47.594508][ T458] EXT4-fs (loop2): Delayed block allocation failed for inode 15 at logical offset 36 with max blocks 1 with error 117 [ 47.628666][ T458] EXT4-fs (loop2): This should not happen!! Data will be lost [ 47.628666][ T458] [ 47.640470][ T451] EXT4-fs (loop2): unmounting filesystem. [ 47.657027][ T463] loop2: detected capacity change from 0 to 1024 [ 47.663930][ T463] EXT4-fs: Ignoring removed bh option [ 47.669885][ T463] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 47.683647][ T463] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 47.703846][ T463] EXT4-fs error (device loop2): ext4_mb_mark_diskspace_used:3850: comm syz.2.18: Allocating blocks 497-513 which overlap fs metadata [ 47.718634][ T463] EXT4-fs (loop2): pa ffff888122f98c78: logic 64, phys. 193, len 20 [ 47.726809][ T463] EXT4-fs error (device loop2): ext4_mb_release_inode_pa:4890: group 0, free 0, pa_free 1 [ 47.739085][ T458] EXT4-fs error (device loop2): ext4_map_blocks:745: inode #15: block 677: comm kworker/u4:4: lblock 37 mapped to illegal pblock 677 (length 3) [ 47.739208][ T387] general protection fault, probably for non-canonical address 0xe2982b5b00000005: 0000 [#1] PREEMPT SMP KASAN [ 47.754053][ T458] EXT4-fs (loop2): Delayed block allocation failed for inode 15 at logical offset 37 with max blocks 3 with error 117 [ 47.765539][ T387] KASAN: maybe wild-memory-access in range [0x14c17ad800000028-0x14c17ad80000002f] [ 47.765553][ T387] CPU: 1 PID: 387 Comm: syz-executor Tainted: G B syzkaller #0 [ 47.765567][ T387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 47.765576][ T387] RIP: 0010:vfs_write+0x759/0xce0 [ 47.777893][ T458] EXT4-fs (loop2): This should not happen!! Data will be lost [ 47.777893][ T458] [ 47.787131][ T387] Code: 3c 28 00 74 08 4c 89 f7 e8 f4 ac f7 ff 49 8b 06 48 89 44 24 18 4c 8d 68 28 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 c9 ac f7 ff 41 be c0 04 00 00 4d 03 [ 47.787156][ T387] RSP: 0018:ffffc900009e7ca0 EFLAGS: 00010206 [ 47.787171][ T387] RAX: 02982f5b00000005 RBX: ffff88812486a900 RCX: dffffc0000000000 [ 47.787181][ T387] RDX: ffff8881224cbcc0 RSI: 0000000000000000 RDI: 0000000000000000 [ 47.787190][ T387] RBP: ffffc900009e7e10 R08: ffffc900009e7d97 R09: 1ffff9200013cfb2 [ 47.798151][ T458] EXT4-fs error (device loop2): ext4_map_blocks:635: inode #15: block 676: comm kworker/u4:4: lblock 36 mapped to illegal pblock 676 (length 1) [ 47.806508][ T387] R10: dffffc0000000000 R11: fffff5200013cfb3 R12: 1ffff9200013cfa0 [ 47.806523][ T387] R13: 14c17ad80000002b R14: ffff888114c17ad0 R15: ffff888114c17aa0 [ 47.806531][ T387] FS: 0000555566d53500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 47.806543][ T387] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.806553][ T387] CR2: 0000200000054000 CR3: 000000012c009000 CR4: 00000000003506a0 [ 47.806565][ T387] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.811990][ T458] EXT4-fs warning (device loop2): ext4_convert_unwritten_extents:4878: inode #15: block 36: len 1: ext4_ext_map_blocks returned -117 [ 47.821685][ T387] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.821698][ T387] Call Trace: [ 47.821702][ T387] [ 47.821732][ T387] ? __kasan_check_read+0x11/0x20 [ 47.843310][ T451] EXT4-fs (loop2): unmounting filesystem. [ 47.847634][ T387] ? __cfi_vfs_write+0x10/0x10 [ 47.976794][ T387] ? sched_clock_cpu+0x6e/0x260 [ 47.981638][ T387] ? __kasan_check_read+0x11/0x20 [ 47.986664][ T387] ? __fdget_pos+0x1f2/0x380 [ 47.991234][ T387] ksys_write+0x149/0x250 [ 47.995548][ T387] ? __cfi_ksys_write+0x10/0x10 [ 48.000397][ T387] ? debug_smp_processor_id+0x17/0x20 [ 48.005760][ T387] __x64_sys_write+0x7b/0x90 [ 48.010598][ T387] x64_sys_call+0x27b/0x9a0 [ 48.015180][ T387] do_syscall_64+0x4c/0xa0 [ 48.019588][ T387] ? clear_bhb_loop+0x30/0x80 [ 48.024252][ T387] ? clear_bhb_loop+0x30/0x80 [ 48.028931][ T387] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 48.034888][ T387] RIP: 0033:0x7f168d355897 [ 48.039297][ T387] Code: 48 89 fa 4c 89 df e8 a8 56 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 48.058890][ T387] RSP: 002b:00007ffdb64c1b80 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 [ 48.067301][ T387] RAX: ffffffffffffffda RBX: 0000555566d53500 RCX: 00007f168d355897 [ 48.075429][ T387] RDX: 0000000000000038 RSI: 0000555566d6c398 RDI: 0000000000000003 [ 48.083387][ T387] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 48.091433][ T387] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000038 [ 48.099386][ T387] R13: 0000555566d6c398 R14: ffffffffffffffe8 R15: 00007ffdb64c2120 [ 48.107367][ T387] [ 48.110397][ T387] Modules linked in: [ 48.115905][ T386] general protection fault, probably for non-canonical address 0xe2982d3900000005: 0000 [#2] PREEMPT SMP KASAN [ 48.116022][ T387] ---[ end trace 0000000000000000 ]--- [ 48.127633][ T386] KASAN: maybe wild-memory-access in range [0x14c189c800000028-0x14c189c80000002f] [ 48.127649][ T386] CPU: 0 PID: 386 Comm: syz-execprog Tainted: G B D syzkaller #0 [ 48.127663][ T386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 48.127671][ T386] RIP: 0010:fsnotify_perm+0x179/0x5b0 [ 48.133264][ T387] RIP: 0010:vfs_write+0x759/0xce0 [ 48.142400][ T386] Code: 24 30 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 19 b6 7d ff 49 8b 07 48 89 45 d0 4c 8d 78 28 4c 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 ff e8 f8 b5 7d ff 41 bd c0 04 00 00 4d [ 48.142421][ T386] RSP: 0018:ffffc900009d7c48 EFLAGS: 00010207 [ 48.151797][ T387] Code: 3c 28 00 74 08 4c 89 f7 e8 f4 ac f7 ff 49 8b 06 48 89 44 24 18 4c 8d 68 28 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 c9 ac f7 ff 41 be c0 04 00 00 4d 03 [ 48.161530][ T386] RAX: 0298313900000005 RBX: ffff88812486b800 RCX: 0000000000000000 [ 48.161548][ T386] RDX: ffff88811829d100 RSI: 0000000000000000 RDI: 0000000000000000 [ 48.161556][ T386] RBP: ffffc900009d7c78 R08: 0000000000000003 R09: 0000000000000004 [ 48.161564][ T386] R10: dffffc0000000000 R11: fffff5200013af56 R12: ffff888114c18990 [ 48.161573][ T386] R13: dffffc0000000000 R14: 0000000000020000 R15: 14c189c80000002d [ 48.161583][ T386] FS: 00002e00e2fbc890(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 48.266183][ T386] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.273133][ T386] CR2: 00007ffdf4e85ff8 CR3: 000000012b96c000 CR4: 00000000003506b0 [ 48.281085][ T386] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.289066][ T386] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.297021][ T386] Call Trace: [ 48.300280][ T386] [ 48.303217][ T386] security_file_permission+0x94/0xb0 [ 48.308670][ T386] vfs_read+0x1c4/0x910 [ 48.312806][ T386] ? __cfi_vfs_read+0x10/0x10 [ 48.317457][ T386] ? __fget_files+0x2d5/0x330 [ 48.322113][ T386] ? __fdget_pos+0x1f2/0x380 [ 48.326677][ T386] ? ksys_read+0x71/0x250 [ 48.330984][ T386] ksys_read+0x149/0x250 [ 48.335202][ T386] ? __cfi_ksys_read+0x10/0x10 [ 48.339945][ T386] ? fpregs_restore_userregs+0x128/0x260 [ 48.345561][ T386] __x64_sys_read+0x7b/0x90 [ 48.350056][ T386] x64_sys_call+0x2f/0x9a0 [ 48.354549][ T386] do_syscall_64+0x4c/0xa0 [ 48.359035][ T386] ? clear_bhb_loop+0x30/0x80 [ 48.363702][ T386] ? clear_bhb_loop+0x30/0x80 [ 48.368362][ T386] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 48.374496][ T386] RIP: 0033:0x40d3ce [ 48.378412][ T386] Code: ff cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 49 89 f2 48 89 fa 48 89 ce 48 89 df 0f 05 <48> 3d 01 f0 ff ff 76 15 48 f7 d8 48 89 c1 48 c7 c0 ff ff ff ff 48 [ 48.398184][ T386] RSP: 002b:00002e00e32e53d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000000 [ 48.406656][ T386] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000040d3ce [ 48.414637][ T386] RDX: 0000000000afd484 RSI: 00002e00e3300000 RDI: 0000000000000006 [ 48.422613][ T386] RBP: 00002e00e32e5418 R08: 0000000000000000 R09: 0000000000000000 [ 48.430934][ T386] R10: 0000000000000000 R11: 0000000000000202 R12: 00002e00e2fd7d30 [ 48.439165][ T386] R13: 0000000000000001 R14: 00002e00e2fbe960 R15: 0000000000000001 [ 48.447270][ T386] [ 48.450295][ T386] Modules linked in: [ 48.454611][ T387] RSP: 0018:ffffc900009e7ca0 EFLAGS: 00010206 [ 48.454630][ T380] general protection fault, probably for non-canonical address 0xe2982a4b00000006: 0000 [#3] PREEMPT SMP KASAN [ 48.460699][ T380] KASAN: maybe wild-memory-access in range [0x14c1725800000030-0x14c1725800000037] [ 48.472596][ T387] RAX: 02982f5b00000005 RBX: ffff88812486a900 RCX: dffffc0000000000 [ 48.481785][ T380] CPU: 1 PID: 380 Comm: syz-execprog Tainted: G B D syzkaller #0 [ 48.489818][ T387] RDX: ffff8881224cbcc0 RSI: 0000000000000000 RDI: 0000000000000000 [ 48.498678][ T380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 48.498694][ T380] RIP: 0010:vfs_write+0x759/0xce0 [ 48.498722][ T380] Code: 3c 28 00 74 08 4c 89 f7 e8 f4 ac f7 ff 49 8b 06 48 89 44 24 18 4c 8d 68 28 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 c9 ac f7 ff 41 be c0 04 00 00 4d 03 [ 48.506696][ T387] RBP: ffffc900009e7e10 R08: ffffc900009e7d97 R09: 1ffff9200013cfb2 [ 48.516699][ T380] RSP: 0018:ffffc90000967ca0 EFLAGS: 00010206 [ 48.516716][ T380] RAX: 02982e4b00000006 RBX: ffff88812efcec00 RCX: dffffc0000000000 [ 48.516727][ T380] RDX: ffff88811f1b2880 RSI: 0000000000000000 RDI: 0000000000000000 [ 48.521811][ T387] R10: dffffc0000000000 R11: fffff5200013cfb3 R12: 1ffff9200013cfa0 [ 48.541383][ T380] RBP: ffffc90000967e10 R08: ffff88811f1b2887 R09: 1ffff11023e36510 [ 48.541396][ T380] R10: dffffc0000000000 R11: ffffed1023e36511 R12: 1ffff9200012cfa0 [ 48.541404][ T380] R13: 14c1725800000031 R14: ffff888114c17250 R15: ffff888114c17220 [ 48.541414][ T380] FS: 00002e00df5a4890(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 48.549435][ T387] R13: 14c17ad80000002b R14: ffff888114c17ad0 R15: ffff888114c17aa0 [ 48.555421][ T380] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.555433][ T380] CR2: 0000200000054000 CR3: 000000012b96c000 CR4: 00000000003506a0 [ 48.555447][ T380] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.563688][ T387] FS: 0000555566d53500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 48.571350][ T380] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.579562][ T387] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.587603][ T380] Call Trace: [ 48.587610][ T380] [ 48.587618][ T380] ? __cfi_vfs_write+0x10/0x10 [ 48.595828][ T387] CR2: 00007ffdf4e85ff8 CR3: 000000012c009000 CR4: 00000000003506b0 [ 48.603747][ T380] ? __fget_files+0x2d5/0x330 [ 48.603782][ T380] ? __fdget_pos+0x1f2/0x380 [ 48.603794][ T380] ? ksys_write+0x71/0x250 [ 48.603806][ T380] ksys_write+0x149/0x250 [ 48.603818][ T380] ? __cfi_ksys_write+0x10/0x10 [ 48.603829][ T380] ? fpregs_restore_userregs+0x128/0x260 [ 48.603845][ T380] __x64_sys_write+0x7b/0x90 [ 48.718561][ T380] x64_sys_call+0x27b/0x9a0 [ 48.723067][ T380] do_syscall_64+0x4c/0xa0 [ 48.727464][ T380] ? clear_bhb_loop+0x30/0x80 [ 48.732124][ T380] ? clear_bhb_loop+0x30/0x80 [ 48.736797][ T380] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 48.742708][ T380] RIP: 0033:0x493795 [ 48.746603][ T380] Code: 48 3d 01 f0 ff ff 76 05 b8 ff ff ff ff 89 44 24 10 c3 cc cc cc 48 8b 7c 24 08 48 8b 74 24 10 8b 54 24 18 b8 01 00 00 00 0f 05 <89> 44 24 20 c3 cc cc cc cc cc cc 8b 7c 24 08 48 8b 74 24 10 8b 54 [ 48.766415][ T380] RSP: 002b:00002e00df5bfce0 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 48.774847][ T380] RAX: ffffffffffffffda RBX: 00002e00df5bfd38 RCX: 0000000000493795 [ 48.782911][ T380] RDX: 0000000000000008 RSI: 00002e00df5bfd38 RDI: 0000000000000005 [ 48.790880][ T380] RBP: 00002e00df5bfd08 R08: 0000000c2eee97ca R09: 0000000b7c65a006 [ 48.798926][ T380] R10: a0761d6478bd642f R11: 0000000000000246 R12: 00002e00df594008 [ 48.806878][ T380] R13: 0000000000000001 R14: 00002e00df534b40 R15: 0000000000000001 [ 48.814833][ T380] [ 48.817831][ T380] Modules linked in: [ 48.821747][ T384] general protection fault, probably for non-canonical address 0xe2982a4b00000006: 0000 [#4] PREEMPT SMP KASAN [ 48.826070][ T380] ---[ end trace 0000000000000000 ]--- [ 48.833453][ T384] KASAN: maybe wild-memory-access in range [0x14c1725800000030-0x14c1725800000037] [ 48.833469][ T384] CPU: 0 PID: 384 Comm: syz-execprog Tainted: G B D syzkaller #0 [ 48.833485][ T384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 48.838915][ T380] RIP: 0010:vfs_write+0x759/0xce0 [ 48.848165][ T384] RIP: 0010:fsnotify_perm+0x179/0x5b0 [ 48.848192][ T384] Code: 24 30 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 ff e8 19 b6 7d ff 49 8b 07 48 89 45 d0 4c 8d 78 28 4c 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 ff e8 f8 b5 7d ff 41 bd c0 04 00 00 4d [ 48.848203][ T384] RSP: 0018:ffffc900009b7c48 EFLAGS: 00010206 [ 48.848217][ T384] RAX: 02982e4b00000006 RBX: ffff88812efcec00 RCX: 0000000000000000 [ 48.857605][ T380] Code: 3c 28 00 74 08 4c 89 f7 e8 f4 ac f7 ff 49 8b 06 48 89 44 24 18 4c 8d 68 28 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 c9 ac f7 ff 41 be c0 04 00 00 4d 03 [ 48.867143][ T384] RDX: ffff888118299440 RSI: 0000000000000000 RDI: 0000000000000000 [ 48.867154][ T384] RBP: ffffc900009b7c78 R08: ffffc900009b7b9f R09: ffffc900009b7b80 [ 48.867163][ T384] R10: dffffc0000000000 R11: fffff52000136f74 R12: ffff888114c17220 [ 48.867172][ T384] R13: dffffc0000000000 R14: 0000000000020000 R15: 14c1725800000031 [ 48.867182][ T384] FS: 00002e00e2fbc090(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 48.867193][ T384] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.867202][ T384] CR2: 00007ffdf4e85ff8 CR3: 000000012b96c000 CR4: 00000000003506b0 [ 48.867214][ T384] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.867223][ T384] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.867234][ T384] Call Trace: [ 48.867239][ T384] [ 48.867245][ T384] security_file_permission+0x94/0xb0 [ 48.867279][ T384] vfs_read+0x1c4/0x910 [ 48.867294][ T384] ? __cfi_vfs_read+0x10/0x10 [ 48.867307][ T384] ? __fget_files+0x2d5/0x330 [ 48.867323][ T384] ? __fdget_pos+0x1f2/0x380 [ 48.867335][ T384] ? ksys_read+0x71/0x250 [ 48.867346][ T384] ksys_read+0x149/0x250 [ 48.867357][ T384] ? __cfi_ksys_read+0x10/0x10 [ 48.867368][ T384] ? fpregs_restore_userregs+0x128/0x260 [ 48.879120][ T380] RSP: 0018:ffffc900009e7ca0 EFLAGS: 00010206 [ 48.897483][ T384] __x64_sys_read+0x7b/0x90 [ 48.897512][ T384] x64_sys_call+0x2f/0x9a0 [ 48.897529][ T384] do_syscall_64+0x4c/0xa0 [ 48.903994][ T380] [ 48.911699][ T384] ? clear_bhb_loop+0x30/0x80 [ 48.931687][ T380] RAX: 02982f5b00000005 RBX: ffff88812486a900 RCX: dffffc0000000000 [ 48.939405][ T384] ? clear_bhb_loop+0x30/0x80 [ 48.939430][ T384] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 48.939447][ T384] RIP: 0033:0x4937b4 [ 48.939459][ T384] Code: 8b 54 24 18 b8 01 00 00 00 0f 05 89 44 24 20 c3 cc cc cc cc cc cc 8b 7c 24 08 48 8b 74 24 10 8b 54 24 18 b8 00 00 00 00 0f 05 <89> 44 24 20 c3 cc cc cc cc cc cc cc 55 48 89 e5 48 83 ec 10 ba 00 [ 48.939471][ T384] RSP: 002b:00002e00e2fb76b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000000 [ 48.939485][ T384] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004937b4 [ 48.939494][ T384] RDX: 0000000000000008 RSI: 00002e00e2fb7d20 RDI: 0000000000000005 [ 48.939502][ T384] RBP: 00002e00e2fb7d40 R08: 0000000000000000 R09: 0000000000000000 [ 49.152832][ T384] R10: 0000000000000f37 R11: 0000000000000206 R12: 00002e00e2fb7740 [ 49.160797][ T384] R13: 0000000000000001 R14: 00002e00e2fbe1e0 R15: 0000000000000001 [ 49.168756][ T384] [ 49.171753][ T384] Modules linked in: [ 49.175670][ T103] general protection fault, probably for non-canonical address 0xe003fc0080000003: 0000 [#5] PREEMPT SMP KASAN [ 49.187383][ T103] KASAN: maybe wild-memory-access in range [0x0020000400000018-0x002000040000001f] [ 49.196679][ T103] CPU: 1 PID: 103 Comm: udevd Tainted: G B D syzkaller #0 [ 49.204981][ T103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 49.215108][ T103] RIP: 0010:__d_lookup+0x101/0x5b0 [ 49.220216][ T103] Code: 70 ff ff ff 48 89 95 78 ff ff ff 48 c1 ea 03 48 89 55 80 4c 8b 75 c8 4c 89 7d b0 48 89 5d d0 48 83 c3 18 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 30 03 00 00 8b 1b 89 df 44 89 f6 e8 66 [ 49.240104][ T103] RSP: 0018:ffffc90000997920 EFLAGS: 00010206 [ 49.246162][ T103] RAX: 0004000080000003 RBX: 0020000400000018 RCX: ffff888110200000 [ 49.254122][ T103] RDX: 0000000000000000 RSI: 000000006ce38a23 RDI: 00000000ffff8881 [ 49.262081][ T103] RBP: ffffc900009979b8 R08: ffff888110200000 R09: 0000000000000002 [ 49.270061][ T103] R10: 000000000000002f R11: 0000000000000000 R12: ffffc90000997c30 [ 49.278133][ T103] R13: dffffc0000000000 R14: 000000006ce38a23 R15: ffff88810c455dd0 [ 49.286117][ T103] FS: 00007f0b7c65a880(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 49.295073][ T103] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.301636][ T103] CR2: 00007f64bdbce198 CR3: 00000001104cc000 CR4: 00000000003506a0 [ 49.309583][ T103] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.317542][ T103] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.325505][ T103] Call Trace: [ 49.328775][ T103] [ 49.331696][ T103] lookup_fast+0x7f/0x510 [ 49.336011][ T103] ? inode_permission+0xef/0x4b0 [ 49.340920][ T103] link_path_walk+0x5f5/0xe80 [ 49.345576][ T103] ? handle_lookup_down+0x130/0x130 [ 49.350954][ T103] path_lookupat+0x95/0x490 [ 49.355447][ T103] filename_lookup+0x224/0x560 [ 49.360365][ T103] ? __cfi_filename_lookup+0x10/0x10 [ 49.365631][ T103] ? strncpy_from_user+0x17a/0x2d0 [ 49.370727][ T103] user_path_at_empty+0x47/0x1c0 [ 49.375640][ T103] do_readlinkat+0xd9/0x490 [ 49.380466][ T103] ? cp_old_stat+0x4a0/0x4a0 [ 49.385225][ T103] ? __cfi_ksys_read+0x10/0x10 [ 49.390277][ T103] ? debug_smp_processor_id+0x17/0x20 [ 49.395670][ T103] __x64_sys_readlink+0x7f/0x90 [ 49.400608][ T103] x64_sys_call+0x87f/0x9a0 [ 49.405127][ T103] do_syscall_64+0x4c/0xa0 [ 49.409532][ T103] ? clear_bhb_loop+0x30/0x80 [ 49.414218][ T103] ? clear_bhb_loop+0x30/0x80 [ 49.418973][ T103] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 49.424858][ T103] RIP: 0033:0x7f0b7bf153a7 [ 49.429251][ T103] Code: 00 00 90 48 83 ec 10 48 63 ff 45 31 c9 45 31 c0 6a 00 31 c9 e8 8a 20 f9 ff 48 83 c4 18 c3 0f 1f 44 00 00 b8 59 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 21 ba 0d 00 f7 d8 64 89 02 48 [ 49.448948][ T103] RSP: 002b:00007ffe0b10f2a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 49.458234][ T103] RAX: ffffffffffffffda RBX: 00007ffe0b10f780 RCX: 00007f0b7bf153a7 [ 49.466305][ T103] RDX: 0000000000000400 RSI: 00007ffe0b10f2b0 RDI: 00007ffe0b10f780 [ 49.474285][ T103] RBP: 00007ffe0b10f2b0 R08: 0000000000000000 R09: 0000000000000000 [ 49.482260][ T103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000400 [ 49.490320][ T103] R13: 00005654a14cb100 R14: 00005654c21e3d30 R15: 00007ffe0b111080 [ 49.498404][ T103] [ 49.501420][ T103] Modules linked in: [ 49.505386][ T393] general protection fault, probably for non-canonical address 0xe003fc0080000003: 0000 [#6] PREEMPT SMP KASAN [ 49.505708][ T380] RDX: ffff8881224cbcc0 RSI: 0000000000000000 RDI: 0000000000000000 [ 49.517103][ T393] KASAN: maybe wild-memory-access in range [0x0020000400000018-0x002000040000001f] [ 49.517127][ T393] CPU: 0 PID: 393 Comm: udevd Tainted: G B D syzkaller #0 [ 49.517142][ T393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 49.517151][ T393] RIP: 0010:__d_lookup+0x101/0x5b0 [ 49.525141][ T380] RBP: ffffc900009e7e10 R08: ffffc900009e7d97 R09: 1ffff9200013cfb2 [ 49.534551][ T393] Code: 70 ff ff ff 48 89 95 78 ff ff ff 48 c1 ea 03 48 89 55 80 4c 8b 75 c8 4c 89 7d b0 48 89 5d d0 48 83 c3 18 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 30 03 00 00 8b 1b 89 df 44 89 f6 e8 66 [ 49.534577][ T393] RSP: 0018:ffffc90000e27720 EFLAGS: 00010206 [ 49.534592][ T393] RAX: 0004000080000003 RBX: 0020000400000018 RCX: ffff8881224ca880 [ 49.534603][ T393] RDX: 0000000000000000 RSI: 000000006ce38a23 RDI: 00000000ffff8881 [ 49.534612][ T393] RBP: ffffc90000e277b8 R08: ffff8881224ca880 R09: 0000000000000002 [ 49.542940][ T380] R10: dffffc0000000000 R11: fffff5200013cfb3 R12: 1ffff9200013cfa0 [ 49.552968][ T393] R10: 000000000000002f R11: 0000000000000000 R12: ffffc90000e27bf0 [ 49.552992][ T393] R13: dffffc0000000000 R14: 000000006ce38a23 R15: ffff88810c455dd0 [ 49.553001][ T393] FS: 00007f0b7c65a880(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 49.553013][ T393] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.553023][ T393] CR2: 00007ffdf4e85ff8 CR3: 000000011674a000 CR4: 00000000003506b0 [ 49.553034][ T393] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.553042][ T393] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.553050][ T393] Call Trace: [ 49.553056][ T393] [ 49.553064][ T393] lookup_fast+0x7f/0x510 [ 49.553092][ T393] ? inode_permission+0xef/0x4b0 [ 49.553107][ T393] link_path_walk+0x5f5/0xe80 [ 49.553126][ T393] ? handle_lookup_down+0x130/0x130 [ 49.553144][ T393] path_openat+0x27c/0x2f80 [ 49.553158][ T393] ? __kasan_slab_alloc+0x72/0x80 [ 49.553175][ T393] ? slab_post_alloc_hook+0x4f/0x2d0 [ 49.561793][ T380] R13: 14c17ad80000002b R14: ffff888114c17ad0 R15: ffff888114c17aa0 [ 49.566315][ T393] ? kmem_cache_alloc+0x16e/0x330 [ 49.566342][ T393] ? getname_flags+0xb9/0x500 [ 49.586383][ T380] FS: 00002e00df5a4890(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 49.592153][ T393] ? getname+0x19/0x20 [ 49.600390][ T380] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.608138][ T393] ? do_syscall_64+0x4c/0xa0 [ 49.608163][ T393] ? do_filp_open+0x430/0x430 [ 49.768590][ T393] do_filp_open+0x1f1/0x430 [ 49.773297][ T393] ? __cfi_do_filp_open+0x10/0x10 [ 49.778326][ T393] ? alloc_fd+0x4e6/0x590 [ 49.782652][ T393] do_sys_openat2+0x15e/0x810 [ 49.787377][ T393] ? __cfi_lo_ioctl+0x10/0x10 [ 49.792064][ T393] ? blkdev_ioctl+0x367/0x720 [ 49.796741][ T393] ? do_sys_open+0xe0/0xe0 [ 49.801170][ T393] ? security_file_ioctl+0x95/0xc0 [ 49.806283][ T393] __x64_sys_openat+0x136/0x160 [ 49.811166][ T393] x64_sys_call+0x783/0x9a0 [ 49.815793][ T393] do_syscall_64+0x4c/0xa0 [ 49.820225][ T393] ? clear_bhb_loop+0x30/0x80 [ 49.824915][ T393] ? clear_bhb_loop+0x30/0x80 [ 49.829580][ T393] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 49.835474][ T393] RIP: 0033:0x7f0b7bea7407 [ 49.839979][ T393] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 49.859600][ T393] RSP: 002b:00007ffe0b10a6d0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 49.868001][ T393] RAX: ffffffffffffffda RBX: 00007f0b7c65a880 RCX: 00007f0b7bea7407 [ 49.875950][ T393] RDX: 0000000000080000 RSI: 00005654c2100620 RDI: ffffffffffffff9c [ 49.883922][ T393] RBP: 00005654c2100620 R08: 0000000000000000 R09: 0000000000000000 [ 49.891894][ T393] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 49.900048][ T393] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000009 [ 49.908020][ T393] [ 49.911039][ T393] Modules linked in: [ 49.914975][ T66] general protection fault, probably for non-canonical address 0xe023080220000000: 0000 [#7] PREEMPT SMP KASAN [ 49.919150][ T387] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.926681][ T66] KASAN: maybe wild-memory-access in range [0x0118601100000000-0x0118601100000007] [ 49.926699][ T66] CPU: 1 PID: 66 Comm: jbd2/sda1-8 Tainted: G B D syzkaller #0 [ 49.926713][ T66] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 49.926721][ T66] RIP: 0010:__find_get_block+0x395/0xeb0 [ 49.926748][ T66] Code: 89 df e8 5e 33 e8 ff 4c 8b 33 48 c7 44 24 28 00 00 00 00 4c 89 f3 48 89 df be 08 00 00 00 e8 b2 35 e8 ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 2c 33 e8 ff 4c 8b 23 4c 89 e6 48 [ 49.926759][ T66] RSP: 0018:ffffc900009477e0 EFLAGS: 00010206 [ 49.926774][ T66] RAX: 00230c0220000000 RBX: 0118601100000000 RCX: ffffffff81ced32e [ 49.926784][ T66] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0118601100000000 [ 49.926792][ T66] RBP: ffffc900009478f0 R08: 0000000000000230 R09: 1ffff11022982b26 [ 49.926801][ T66] R10: dffffc0000000000 R11: ffffed1022982b27 R12: dffffc0000000000 [ 49.926812][ T66] R13: ffffea00049c63c0 R14: ffff888114c15930 R15: 000000000000168d [ 49.926822][ T66] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 49.935162][ T387] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.944163][ T66] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.944177][ T66] CR2: 00007f64bdbce198 CR3: 000000010fe16000 CR4: 00000000003506a0 [ 49.944189][ T66] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.944197][ T66] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.944206][ T66] Call Trace: [ 49.944211][ T66] [ 49.944219][ T66] ? kmem_cache_free+0x12d/0x300 [ 49.952993][ T387] Kernel panic - not syncing: Fatal exception [ 49.963081][ T66] ? __find_get_block+0x461/0xeb0 [ 49.963108][ T66] ? __cfi___find_get_block+0x10/0x10 [ 49.963123][ T66] ? __jbd2_journal_remove_checkpoint+0x404/0x5a0 [ 49.963147][ T66] jbd2_clear_buffer_revoked_flags+0x148/0x250 [ 49.963170][ T66] jbd2_journal_commit_transaction+0xa3f/0x5490 [ 49.963190][ T66] ? sched_clock+0x9/0x10 [ 49.963209][ T66] ? sched_clock_cpu+0x6e/0x260 [ 49.963226][ T66] ? __cfi_sched_clock_cpu+0x10/0x10 [ 49.963240][ T66] ? dequeue_task_fair+0x500/0x1d80 [ 49.963255][ T66] ? psi_group_change+0xb73/0x12b0 [ 49.963270][ T66] ? __cfi_jbd2_journal_commit_transaction+0x10/0x10 [ 49.963290][ T66] ? __cfi___switch_to+0x10/0x10 [ 49.963307][ T66] ? _raw_spin_unlock+0x4c/0x70 [ 49.963325][ T66] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 49.963340][ T66] ? __schedule+0xbae/0x1500 [ 49.963355][ T66] ? __kasan_check_write+0x14/0x20 [ 49.963371][ T66] ? __kasan_check_write+0x14/0x20 [ 49.963385][ T66] ? detach_if_pending+0x18d/0x300 [ 49.963402][ T66] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 49.963417][ T66] ? del_timer_sync+0x144/0x1a0 [ 49.963433][ T66] kjournald2+0x3f9/0x770 [ 49.963450][ T66] ? __cfi_kjournald2+0x10/0x10 [ 49.963469][ T66] ? __cfi_autoremove_wake_function+0x10/0x10 [ 49.963488][ T66] ? __kasan_check_read+0x11/0x20 [ 49.963502][ T66] ? __kthread_parkme+0x142/0x180 [ 49.963518][ T66] kthread+0x281/0x320 [ 49.963532][ T66] ? __cfi_kjournald2+0x10/0x10 [ 49.963544][ T66] ? __cfi_kthread+0x10/0x10 [ 49.963559][ T66] ret_from_fork+0x1f/0x30 [ 49.963577][ T66] [ 49.963582][ T66] Modules linked in: [ 49.969520][ T387] Kernel Offset: disabled [ 50.261302][ T387] Rebooting in 86400 seconds..