./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2908836342 <...> Warning: Permanently added '10.128.0.111' (ED25519) to the list of known hosts. execve("./syz-executor2908836342", ["./syz-executor2908836342"], 0x7ffca336de00 /* 10 vars */) = 0 brk(NULL) = 0x555589336000 brk(0x555589336d00) = 0x555589336d00 arch_prctl(ARCH_SET_FS, 0x555589336380) = 0 set_tid_address(0x555589336650) = 282 set_robust_list(0x555589336660, 24) = 0 rseq(0x555589336ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2908836342", 4096) = 28 getrandom("\xaa\x88\x1c\x8a\x0d\x9c\x15\xe1", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555589336d00 brk(0x555589357d00) = 0x555589357d00 brk(0x555589358000) = 0x555589358000 mprotect(0x7fabcdfdd000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 mkdir("./syzkaller.QWqoUR", 0700) = 0 chmod("./syzkaller.QWqoUR", 0777) = 0 chdir("./syzkaller.QWqoUR") = 0 mkdir("./0", 0777) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 3 ioctl(3, LOOP_CLR_FD) = -1 ENXIO (No such device or address) close(3) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555589336650) = 284 ./strace-static-x86_64: Process 284 attached [pid 284] set_robust_list(0x555589336660, 24) = 0 [pid 284] chdir("./0") = 0 [pid 284] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 284] setpgid(0, 0) = 0 [pid 284] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 284] write(3, "1000", 4) = 4 [pid 284] close(3) = 0 [pid 284] symlink("/dev/binderfs", "./binderfs") = 0 [pid 284] write(1, "executing program\n", 18executing program ) = 18 [pid 284] memfd_create("syzkaller", 0) = 3 [pid 284] mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fabc5b1a000 [ 23.914829][ T24] audit: type=1400 audit(1750884614.820:64): avc: denied { execmem } for pid=282 comm="syz-executor290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.935423][ T24] audit: type=1400 audit(1750884614.840:65): avc: denied { read write } for pid=282 comm="syz-executor290" name="loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 23.960569][ T24] audit: type=1400 audit(1750884614.840:66): avc: denied { open } for pid=282 comm="syz-executor290" path="/dev/loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 23.984843][ T24] audit: type=1400 audit(1750884614.840:67): avc: denied { ioctl } for pid=282 comm="syz-executor290" path="/dev/loop0" dev="devtmpfs" ino=115 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [pid 284] write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 67108864) = 67108864 [pid 284] munmap(0x7fabc5b1a000, 138412032) = 0 [pid 284] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [pid 284] ioctl(4, LOOP_SET_FD, 3) = 0 [pid 284] close(3) = 0 [pid 284] close(4) = 0 [pid 284] mkdir("./file0", 0777) = 0 [ 24.265947][ T24] audit: type=1400 audit(1750884615.170:68): avc: denied { mounton } for pid=284 comm="syz-executor290" path="/root/syzkaller.QWqoUR/0/file0" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 24.274855][ T284] F2FS-fs (loop0): Wrong CP boundary, start(512) end(198144) blocks(1024) [ 24.299207][ T284] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 24.308173][ T284] F2FS-fs (loop0): invalid crc value [ 24.316238][ T284] F2FS-fs (loop0): Found nat_bits in checkpoint [ 24.336894][ T284] F2FS-fs (loop0): Try to recover 2th superblock, ret: 0 [ 24.344037][ T284] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e4 [pid 284] mount("/dev/loop0", "./file0", "f2fs", 0, "") = 0 [pid 284] openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 [pid 284] chdir("./file0") = 0 [pid 284] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [pid 284] ioctl(4, LOOP_CLR_FD) = 0 [pid 284] close(4) = 0 [pid 284] openat(AT_FDCWD, "./file2", O_RDWR|O_CREAT, 0452) = -1 ENODATA (No data available) [pid 284] rename("./file0", "./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa") = 0 [pid 284] clone(child_stack=NULL, flags=0) = 290 [pid 284] exit_group(0) = ? [pid 284] +++ exited with 0 +++ --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=284, si_uid=0, si_status=0, si_utime=12, si_stime=28} --- restart_syscall(<... resuming interrupted clone ...>./strace-static-x86_64: Process 290 attached [ 24.352383][ T24] audit: type=1400 audit(1750884615.260:69): avc: denied { mount } for pid=284 comm="syz-executor290" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 24.353947][ T284] fscrypt (loop0, inode 8): Error -61 getting encryption context [ 24.385631][ T24] audit: type=1400 audit(1750884615.260:70): avc: denied { write } for pid=284 comm="syz-executor290" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 ) = 0 [pid 282] umount2("./0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 282] openat(AT_FDCWD, "./0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 282] newfstatat(3, "", {st_mode=S_IFDIR|0700, st_size=4096, ...}, AT_EMPTY_PATH) = 0 [pid 282] getdents64(3, 0x5555893376f0 /* 4 entries */, 32768) = 112 [pid 282] umount2("./0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EBUSY (Device or resource busy) [pid 282] newfstatat(AT_FDCWD, "./0/file0", {st_mode=S_IFDIR|0755, st_size=4096, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 282] umount2("./0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EBUSY (Device or resource busy) [pid 282] openat(AT_FDCWD, "./0/file0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 [pid 282] newfstatat(4, "", {st_mode=S_IFDIR|0755, st_size=4096, ...}, AT_EMPTY_PATH) = 0 [pid 282] getdents64(4, 0x55558933f730 /* 7 entries */, 32768) = 448 [pid 282] umount2("./0/file0/file1", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 282] newfstatat(AT_FDCWD, "./0/file0/file1", {st_mode=S_IFREG|0755, st_size=10, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 282] unlink("./0/file0/file1") = 0 [pid 282] umount2("./0/file0/file2", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 282] newfstatat(AT_FDCWD, "./0/file0/file2", {st_mode=S_IFREG|0755, st_size=9000, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 282] unlink("./0/file0/file2") = 0 [pid 282] umount2("./0/file0/file3", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 282] newfstatat(AT_FDCWD, "./0/file0/file3", {st_mode=S_IFREG|0755, st_size=9000, ...}, AT_SYMLINK_NOFOLLOW) = 0 [ 24.408003][ T24] audit: type=1400 audit(1750884615.260:71): avc: denied { add_name } for pid=284 comm="syz-executor290" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 24.410340][ T282] F2FS-fs (loop0): dec_valid_node_count: inconsistent i_blocks, ino:7, iblocks:0 [ 24.429432][ T24] audit: type=1400 audit(1750884615.260:72): avc: denied { create } for pid=284 comm="syz-executor290" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 24.439281][ T282] ------------[ cut here ]------------ [ 24.459387][ T24] audit: type=1400 audit(1750884615.260:73): avc: denied { read write } for pid=284 comm="syz-executor290" name="file2" dev="loop0" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 24.464618][ T282] WARNING: CPU: 0 PID: 282 at fs/f2fs/inode.c:854 f2fs_evict_inode+0x1168/0x1420 [ 24.496278][ T282] Modules linked in: [ 24.500192][ T282] CPU: 0 PID: 282 Comm: syz-executor290 Not tainted 5.10.238-syzkaller-00008-g59e9a7228857 #0 [pid 282] unlink("./0/file0/file3" [pid 290] exit(0) = ? [pid 290] +++ exited with 0 +++ [ 24.510737][ T282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 24.520820][ T282] RIP: 0010:f2fs_evict_inode+0x1168/0x1420 [ 24.527019][ T282] Code: 24 58 4c 8b 64 24 18 eb 0a e8 b4 78 67 ff 4c 8b 7c 24 58 4c 8b 74 24 20 48 89 df e8 92 de 02 00 e9 b1 fc ff ff e8 98 78 67 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 e9 6a a1 ff f0 41 80 0e 04 e9 89 [ 24.547004][ T282] RSP: 0018:ffffc90000b77ae0 EFLAGS: 00010293 [ 24.553855][ T282] RAX: ffffffff81fc1b78 RBX: ffff888120c06090 RCX: ffff88810719e2c0 [ 24.561889][ T282] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 24.569892][ T282] RBP: ffffc90000b77c50 R08: dffffc0000000000 R09: ffffed1024180c6f [ 24.578004][ T282] R10: ffffed1024180c6f R11: 1ffff11024180c6e R12: ffff8881055c0000 [ 24.586010][ T282] R13: dffffc0000000000 R14: ffff8881055c0078 R15: 0000000000000002 [ 24.594136][ T282] FS: 0000555589336380(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 24.603083][ T282] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.610103][ T282] CR2: 0000555589347738 CR3: 00000001065e8000 CR4: 00000000003506b0 [ 24.618092][ T282] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.626078][ T282] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.634258][ T282] Call Trace: [ 24.637680][ T282] ? f2fs_write_inode+0x7f0/0x7f0 [ 24.642741][ T282] ? bit_waitqueue+0x30/0x30 [ 24.647338][ T282] ? inode_io_list_del_locked+0x1b3/0x210 [ 24.653077][ T282] ? _raw_spin_unlock+0x4d/0x70 [ 24.657936][ T282] ? f2fs_write_inode+0x7f0/0x7f0 [ 24.662996][ T282] evict+0x478/0x910 [ 24.666899][ T282] ? mode_strip_sgid+0x160/0x160 [ 24.671849][ T282] ? _raw_spin_lock+0x8e/0xe0 [ 24.676524][ T282] ? _raw_spin_trylock_bh+0x130/0x130 [ 24.681945][ T282] ? iput+0x291/0x7c0 [ 24.685943][ T282] ? __kasan_check_read+0x11/0x20 [ 24.690987][ T282] iput+0x638/0x7c0 [ 24.694850][ T282] do_unlinkat+0x33f/0x670 [ 24.699289][ T282] ? __check_object_size+0x2f4/0x3c0 [ 24.704623][ T282] ? fsnotify_link_count+0x90/0x90 [ 24.709909][ T282] ? getname_flags+0x206/0x500 [ 24.714692][ T282] __x64_sys_unlink+0x49/0x50 [ 24.719376][ T282] do_syscall_64+0x31/0x40 [ 24.723809][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 24.729726][ T282] RIP: 0033:0x7fabcdf58b97 [ 24.734157][ T282] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 24.753789][ T282] RSP: 002b:00007fff1091aec8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 <... unlink resumed>) = 0 umount2("./0/file0/file.cold", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) newfstatat(AT_FDCWD, "./0/file0/file.cold", {st_mode=S_IFREG|0755, st_size=100, ...}, AT_SYMLINK_NOFOLLOW) = 0 [ 24.762219][ T282] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fabcdf58b97 [ 24.770190][ T282] RDX: 00007fff1091aef0 RSI: 00007fff1091af80 RDI: 00007fff1091af80 [ 24.778181][ T282] RBP: 00007fff1091af80 R08: 0000000000000000 R09: 0000000000000000 [ 24.786229][ T282] R10: 0000000000000100 R11: 0000000000000206 R12: 00007fff1091c070 [ 24.794316][ T282] R13: 000055558933f700 R14: 0000000000000001 R15: 431bde82d7b634db [ 24.802437][ T282] ---[ end trace 7f1cee6c2f8e56f0 ]--- [ 24.808768][ T282] ------------[ cut here ]------------ [ 24.814383][ T282] WARNING: CPU: 1 PID: 282 at fs/inode.c:304 drop_nlink+0xc5/0x110 [ 24.822546][ T282] Modules linked in: [ 24.826448][ T282] CPU: 1 PID: 282 Comm: syz-executor290 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 24.838079][ T282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 24.848154][ T282] RIP: 0010:drop_nlink+0xc5/0x110 [ 24.853187][ T282] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 a3 23 f2 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 2b 31 b8 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c [ 24.872804][ T282] RSP: 0018:ffffc90000b77b58 EFLAGS: 00010293 [ 24.878852][ T282] RAX: ffffffff81ab62e5 RBX: ffff88811c7f0ce0 RCX: ffff88810719e2c0 [ 24.886850][ T282] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 24.894834][ T282] RBP: ffffc90000b77b80 R08: dffffc0000000000 R09: ffffc90000b77b00 [ 24.902818][ T282] R10: fffff5200016ef62 R11: 1ffff9200016ef60 R12: dffffc0000000000 [ 24.910786][ T282] R13: 1ffff110238fe1a5 R14: ffff88811c7f0d28 R15: 0000000000000000 [ 24.918771][ T282] FS: 0000555589336380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 24.927706][ T282] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.934343][ T282] CR2: 000055fee0b30388 CR3: 00000001065e8000 CR4: 00000000003506a0 [ 24.942344][ T282] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.950391][ T282] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.958481][ T282] Call Trace: [ 24.961782][ T282] f2fs_drop_nlink+0x148/0x3c0 [ 24.966530][ T282] ? f2fs_mark_inode_dirty_sync+0x110/0x140 [ 24.972428][ T282] f2fs_delete_entry+0x9d5/0xb30 [ 24.977369][ T282] ? _raw_spin_unlock+0x4d/0x70 [ 24.982231][ T282] f2fs_unlink+0x422/0x800 [ 24.986647][ T282] ? f2fs_link+0x8e0/0x8e0 [ 24.991057][ T282] ? __kasan_check_write+0x14/0x20 [ 24.996199][ T282] ? down_write+0xac/0x110 [ 25.000610][ T282] ? selinux_inode_unlink+0x22/0x30 [ 25.005822][ T282] ? security_inode_unlink+0xd0/0x120 [ 25.011192][ T282] vfs_unlink+0x321/0x540 [ 25.015556][ T282] do_unlinkat+0x2e9/0x670 [ 25.019974][ T282] ? __check_object_size+0x2f4/0x3c0 [ 25.025276][ T282] ? fsnotify_link_count+0x90/0x90 [ 25.030397][ T282] ? getname_flags+0x206/0x500 [ 25.035188][ T282] __x64_sys_unlink+0x49/0x50 [ 25.039861][ T282] do_syscall_64+0x31/0x40 [ 25.044395][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 25.050303][ T282] RIP: 0033:0x7fabcdf58b97 [ 25.054810][ T282] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 25.074472][ T282] RSP: 002b:00007fff1091aec8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 25.082970][ T282] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fabcdf58b97 [ 25.091086][ T282] RDX: 00007fff1091aef0 RSI: 00007fff1091af80 RDI: 00007fff1091af80 [ 25.099126][ T282] RBP: 00007fff1091af80 R08: 0000000000000000 R09: 0000000000000000 [ 25.107320][ T282] R10: 0000000000000100 R11: 0000000000000206 R12: 00007fff1091c070 [ 25.115341][ T282] R13: 000055558933f700 R14: 0000000000000001 R15: 431bde82d7b634db [ 25.123341][ T282] ---[ end trace 7f1cee6c2f8e56f1 ]--- [ 25.128791][ T282] ================================================================== [ 25.137283][ T282] BUG: KASAN: use-after-free in __list_add_valid+0x6b/0xf0 [ 25.144464][ T282] Read of size 8 at addr ffff888120c06440 by task syz-executor290/282 [ 25.152593][ T282] [ 25.154909][ T282] CPU: 1 PID: 282 Comm: syz-executor290 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 25.166506][ T282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 25.176551][ T282] Call Trace: [ 25.179843][ T282] __dump_stack+0x21/0x24 [ 25.184176][ T282] dump_stack_lvl+0x169/0x1d8 [ 25.188840][ T282] ? show_regs_print_info+0x18/0x18 [ 25.194045][ T282] ? thaw_kernel_threads+0x220/0x220 [ 25.199323][ T282] print_address_description+0x7f/0x2c0 [ 25.204947][ T282] ? __list_add_valid+0x6b/0xf0 [ 25.209801][ T282] kasan_report+0xe2/0x130 [ 25.214199][ T282] ? __list_add_valid+0x6b/0xf0 [ 25.219266][ T282] __asan_report_load8_noabort+0x14/0x20 [ 25.224912][ T282] __list_add_valid+0x6b/0xf0 [ 25.229572][ T282] f2fs_inode_dirtied+0x199/0x2a0 [ 25.234597][ T282] f2fs_mark_inode_dirty_sync+0xfa/0x140 [ 25.240219][ T282] f2fs_drop_nlink+0x155/0x3c0 [ 25.244975][ T282] ? f2fs_mark_inode_dirty_sync+0x110/0x140 [ 25.250892][ T282] f2fs_delete_entry+0x9d5/0xb30 [ 25.255837][ T282] ? _raw_spin_unlock+0x4d/0x70 [ 25.260763][ T282] f2fs_unlink+0x422/0x800 [ 25.265180][ T282] ? f2fs_link+0x8e0/0x8e0 [ 25.269581][ T282] ? __kasan_check_write+0x14/0x20 [ 25.274852][ T282] ? down_write+0xac/0x110 [ 25.279249][ T282] ? selinux_inode_unlink+0x22/0x30 [ 25.284467][ T282] ? security_inode_unlink+0xd0/0x120 [ 25.289818][ T282] vfs_unlink+0x321/0x540 [ 25.294133][ T282] do_unlinkat+0x2e9/0x670 [ 25.298538][ T282] ? __check_object_size+0x2f4/0x3c0 [ 25.303909][ T282] ? fsnotify_link_count+0x90/0x90 [ 25.309003][ T282] ? getname_flags+0x206/0x500 [ 25.313769][ T282] __x64_sys_unlink+0x49/0x50 [ 25.318435][ T282] do_syscall_64+0x31/0x40 [ 25.322833][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 25.328859][ T282] RIP: 0033:0x7fabcdf58b97 [ 25.333287][ T282] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 25.352905][ T282] RSP: 002b:00007fff1091aec8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 25.361330][ T282] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fabcdf58b97 [ 25.369286][ T282] RDX: 00007fff1091aef0 RSI: 00007fff1091af80 RDI: 00007fff1091af80 [ 25.377238][ T282] RBP: 00007fff1091af80 R08: 0000000000000000 R09: 0000000000000000 [ 25.385191][ T282] R10: 0000000000000100 R11: 0000000000000206 R12: 00007fff1091c070 [ 25.393152][ T282] R13: 000055558933f700 R14: 0000000000000001 R15: 431bde82d7b634db [ 25.401106][ T282] [ 25.403439][ T282] Allocated by task 284: [ 25.407673][ T282] __kasan_slab_alloc+0xbd/0xf0 [ 25.412606][ T282] slab_post_alloc_hook+0x5d/0x2f0 [ 25.417717][ T282] kmem_cache_alloc+0x165/0x2e0 [ 25.422548][ T282] f2fs_alloc_inode+0x26/0x410 [ 25.427292][ T282] iget_locked+0x146/0x7d0 [ 25.431774][ T282] f2fs_iget+0x55/0x4dc0 [ 25.436012][ T282] f2fs_lookup+0x3ee/0xce0 [ 25.440425][ T282] path_openat+0x1127/0x3160 [ 25.445012][ T282] do_filp_open+0x1b3/0x3e0 [ 25.449503][ T282] do_sys_openat2+0x14c/0x6d0 [ 25.454175][ T282] __x64_sys_openat+0x136/0x160 [ 25.459004][ T282] do_syscall_64+0x31/0x40 [ 25.463405][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 25.469273][ T282] [ 25.471587][ T282] Freed by task 12: [ 25.475378][ T282] kasan_set_track+0x4a/0x70 [ 25.479944][ T282] kasan_set_free_info+0x23/0x40 [ 25.484884][ T282] ____kasan_slab_free+0x125/0x160 [ 25.489990][ T282] __kasan_slab_free+0x11/0x20 [ 25.494748][ T282] slab_free_freelist_hook+0xc5/0x190 [ 25.500112][ T282] kmem_cache_free+0x100/0x2d0 [ 25.504884][ T282] f2fs_free_inode+0x24/0x30 [ 25.509463][ T282] i_callback+0x4c/0x70 [ 25.513602][ T282] rcu_do_batch+0x4df/0xa80 [ 25.518083][ T282] rcu_core+0x55f/0xd60 [ 25.522218][ T282] rcu_core_si+0x9/0x10 [ 25.526808][ T282] __do_softirq+0x255/0x563 [ 25.531285][ T282] [ 25.533596][ T282] Last potentially related work creation: [ 25.539297][ T282] kasan_save_stack+0x3a/0x60 [ 25.543952][ T282] __kasan_record_aux_stack+0xd2/0x100 [ 25.549418][ T282] kasan_record_aux_stack_noalloc+0xb/0x10 [ 25.555210][ T282] call_rcu+0x105/0x1040 [ 25.559457][ T282] evict+0x857/0x910 [ 25.563426][ T282] iput+0x638/0x7c0 [ 25.567213][ T282] do_unlinkat+0x33f/0x670 [ 25.571609][ T282] __x64_sys_unlink+0x49/0x50 [ 25.576265][ T282] do_syscall_64+0x31/0x40 [ 25.580667][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 25.586537][ T282] [ 25.588974][ T282] The buggy address belongs to the object at ffff888120c06090 [ 25.588974][ T282] which belongs to the cache f2fs_inode_cache of size 1520 [ 25.603528][ T282] The buggy address is located 944 bytes inside of [ 25.603528][ T282] 1520-byte region [ffff888120c06090, ffff888120c06680) [ 25.616862][ T282] The buggy address belongs to the page: [ 25.622480][ T282] page:ffffea0004830000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x120c00 [ 25.632691][ T282] head:ffffea0004830000 order:3 compound_mapcount:0 compound_pincount:0 [ 25.640994][ T282] flags: 0x4000000000010200(slab|head) [ 25.646449][ T282] raw: 4000000000010200 dead000000000100 dead000000000122 ffff8881029d3800 [ 25.655028][ T282] raw: 0000000000000000 0000000080130013 00000001ffffffff 0000000000000000 [ 25.663709][ T282] page dumped because: kasan: bad access detected [ 25.670096][ T282] page_owner tracks the page as allocated [ 25.675799][ T282] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0xd2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_RECLAIMABLE), pid 284, ts 24307849543, free_ts 0 [ 25.694868][ T282] prep_new_page+0x179/0x180 [ 25.699443][ T282] get_page_from_freelist+0x2235/0x23d0 [ 25.704965][ T282] __alloc_pages_nodemask+0x268/0x5f0 [ 25.710313][ T282] new_slab+0x84/0x3f0 [ 25.714369][ T282] ___slab_alloc+0x2a6/0x450 [ 25.718945][ T282] __slab_alloc+0x63/0xa0 [ 25.723272][ T282] kmem_cache_alloc+0x1af/0x2e0 [ 25.728106][ T282] f2fs_alloc_inode+0x26/0x410 [ 25.732851][ T282] iget_locked+0x146/0x7d0 [ 25.737245][ T282] f2fs_iget+0x55/0x4dc0 [ 25.741472][ T282] f2fs_fill_super+0x39f0/0x6c70 [ 25.746441][ T282] mount_bdev+0x28b/0x3a0 [ 25.750770][ T282] f2fs_mount+0x34/0x40 [ 25.754915][ T282] legacy_get_tree+0xed/0x190 [ 25.759753][ T282] vfs_get_tree+0x89/0x260 [ 25.764149][ T282] do_new_mount+0x25a/0xa20 [ 25.768629][ T282] page_owner free stack trace missing [ 25.774179][ T282] [ 25.776485][ T282] Memory state around the buggy address: [ 25.782098][ T282] ffff888120c06300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.790313][ T282] ffff888120c06380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.798354][ T282] >ffff888120c06400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.806396][ T282] ^ [ 25.812534][ T282] ffff888120c06480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb unlink("./0/file0/file.cold") = 0 umount2("./0/file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) newfstatat(AT_FDCWD, "./0/file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", {st_mode=S_IFDIR|0755, st_size=3488, ...}, AT_SYMLINK_NOFOLLOW) = 0 umount2("./0/file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) openat(AT_FDCWD, "./0/file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 5 newfstatat(5, "", {st_mode=S_IFDIR|0755, st_size=3488, ...}, AT_EMPTY_PATH) = 0 getdents64(5, 0x555589347770 /* 4 entries */, 32768) = 112 umount2("./0/file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 ENOENT (No such file or directory) newfstatat(AT_FDCWD, "./0/file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0", 0x7fff10919e00, AT_SYMLINK_NOFOLLOW) = -1 ENOENT (No such file or directory) exit_group(1) = ? +++ exited with 1 +++ [ 25.820592][ T282] ffff888120c06500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.828631][ T282] ================================================================== [ 25.836778][ T282] Disabling lock debugging due to kernel taint