ci2 starts bisection 2024-06-08 14:03:24.222840857 +0000 UTC m=+72385.912276687 bisecting fixing commit since d30b996835c08018a70dd52c588ba15de1c8378b building syzkaller on c4ac074caa7ae68aef44c619a09b02832cc91f35 ensuring issue is reproducible on original commit d30b996835c08018a70dd52c588ba15de1c8378b testing commit d30b996835c08018a70dd52c588ba15de1c8378b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 0f62c4f125538b2710e5a8165d66d11bc2a426f7ce42850a219c074092059006 run #0: crashed: KASAN: use-after-free Read in check_igot_inode run #1: crashed: KASAN: use-after-free Read in check_igot_inode run #2: crashed: KASAN: use-after-free Read in check_igot_inode run #3: crashed: KASAN: use-after-free Read in check_igot_inode run #4: crashed: KASAN: use-after-free Read in check_igot_inode run #5: crashed: KASAN: use-after-free Read in check_igot_inode run #6: crashed: KASAN: use-after-free Read in check_igot_inode run #7: crashed: KASAN: use-after-free Read in check_igot_inode run #8: crashed: KASAN: use-after-free Read in check_igot_inode run #9: crashed: KASAN: use-after-free Read in check_igot_inode run #10: crashed: KASAN: use-after-free Read in check_igot_inode run #11: crashed: KASAN: use-after-free Read in check_igot_inode run #12: crashed: KASAN: use-after-free Read in check_igot_inode run #13: crashed: KASAN: use-after-free Read in check_igot_inode run #14: crashed: KASAN: use-after-free Read in check_igot_inode run #15: crashed: KASAN: use-after-free Read in check_igot_inode run #16: OK run #17: crashed: KASAN: use-after-free Read in check_igot_inode run #18: OK run #19: OK representative crash: KASAN: use-after-free Read in check_igot_inode, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit d30b996835c08018a70dd52c588ba15de1c8378b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6dd75e2c2067a925024523ed386bc19b3f45506ba954b3ea96aca661a45492e1 run #0: crashed: KASAN: use-after-free Read in check_igot_inode run #1: crashed: KASAN: use-after-free Read in check_igot_inode run #2: crashed: KASAN: use-after-free Read in check_igot_inode run #3: crashed: KASAN: use-after-free Read in check_igot_inode run #4: crashed: KASAN: use-after-free Read in check_igot_inode run #5: crashed: KASAN: use-after-free Read in check_igot_inode run #6: crashed: KASAN: use-after-free Read in check_igot_inode run #7: crashed: KASAN: use-after-free Read in check_igot_inode run #8: OK run #9: OK representative crash: KASAN: use-after-free Read in check_igot_inode, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed kconfig minimization: base=4789 full=6022 leaves diff=238 split chunks (needed=false): <238> split chunk #0 of len 238 into 5 parts testing without sub-chunk 1/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit d30b996835c08018a70dd52c588ba15de1c8378b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ca79035495476a0498daf05b2daf4ac72a5153f2e9cedcd3b57289a2aa71a973 run #0: crashed: KASAN: use-after-free Read in check_igot_inode run #1: crashed: KASAN: use-after-free Read in check_igot_inode run #2: crashed: KASAN: use-after-free Read in check_igot_inode run #3: crashed: KASAN: use-after-free Read in check_igot_inode run #4: crashed: KASAN: use-after-free Read in check_igot_inode run #5: crashed: KASAN: use-after-free Read in check_igot_inode run #6: OK run #7: OK run #8: OK run #9: crashed: KASAN: use-after-free Read in check_igot_inode representative crash: KASAN: use-after-free Read in check_igot_inode, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit d30b996835c08018a70dd52c588ba15de1c8378b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 123a7c509af979d760d120cadd5be78d769e356a0f02e6d9ba50720edc1f4ac5 run #0: crashed: KASAN: use-after-free Read in check_igot_inode run #1: crashed: KASAN: use-after-free Read in check_igot_inode run #2: crashed: KASAN: slab-out-of-bounds Read in check_igot_inode run #3: crashed: KASAN: use-after-free Read in check_igot_inode run #4: OK run #5: OK run #6: OK run #7: OK run #8: OK run #9: OK representative crash: KASAN: use-after-free Read in check_igot_inode, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG], they are not needed testing commit d30b996835c08018a70dd52c588ba15de1c8378b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: bd8f375458f3c523438f908f02b9b1aa03a452b3eb4d648ec712c658a5ed096c run #0: crashed: KASAN: use-after-free Read in check_igot_inode run #1: crashed: KASAN: use-after-free Read in check_igot_inode run #2: crashed: KASAN: use-after-free Read in check_igot_inode run #3: crashed: KASAN: use-after-free Read in check_igot_inode run #4: crashed: KASAN: use-after-free Read in check_igot_inode run #5: crashed: KASAN: use-after-free Read in check_igot_inode run #6: crashed: KASAN: use-after-free Read in check_igot_inode run #7: crashed: KASAN: use-after-free Read in check_igot_inode run #8: crashed: KASAN: use-after-free Read in check_igot_inode run #9: crashed: KASAN: use-after-free Read in check_igot_inode run #10: crashed: KASAN: use-after-free Read in check_igot_inode run #11: crashed: KASAN: use-after-free Read in check_igot_inode run #12: OK run #13: OK run #14: OK run #15: OK run #16: crashed: KASAN: use-after-free Read in check_igot_inode run #17: crashed: KASAN: use-after-free Read in check_igot_inode run #18: OK run #19: OK representative crash: KASAN: use-after-free Read in check_igot_inode, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit d30b996835c08018a70dd52c588ba15de1c8378b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 81e06b6a7649b165302ed504f0df5db46940135ccf51d4557eaf6ecea043dee0 run #0: crashed: KASAN: use-after-free Read in check_igot_inode run #1: crashed: KASAN: use-after-free Read in check_igot_inode run #2: crashed: KASAN: use-after-free Read in check_igot_inode run #3: crashed: KASAN: use-after-free Read in check_igot_inode run #4: crashed: KASAN: use-after-free Read in check_igot_inode run #5: crashed: KASAN: use-after-free Read in check_igot_inode run #6: crashed: KASAN: use-after-free Read in check_igot_inode run #7: crashed: KASAN: use-after-free Read in check_igot_inode run #8: crashed: KASAN: use-after-free Read in check_igot_inode run #9: crashed: KASAN: use-after-free Read in check_igot_inode run #10: crashed: KASAN: use-after-free Read in check_igot_inode run #11: crashed: KASAN: use-after-free Read in check_igot_inode run #12: crashed: KASAN: slab-out-of-bounds Read in check_igot_inode run #13: crashed: KASAN: use-after-free Read in check_igot_inode run #14: OK run #15: OK run #16: crashed: KASAN: use-after-free Read in check_igot_inode run #17: OK run #18: OK run #19: OK representative crash: KASAN: use-after-free Read in check_igot_inode, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit d30b996835c08018a70dd52c588ba15de1c8378b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 failed building d30b996835c08018a70dd52c588ba15de1c8378b: net/socket.c:1126: undefined reference to `wext_handle_ioctl' net/socket.c:3395: undefined reference to `compat_wext_handle_ioctl' net/core/net-procfs.c:346: undefined reference to `wext_proc_exit' net/core/net-procfs.c:330: undefined reference to `wext_proc_init' minimized to 46 configs; suspects: [HID_ZEROPLUS USB_NET_GL620A USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_RNDIS_HOST USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD USB_OHCI_HCD_PCI USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_PRINTER USB_SERIAL USB_SERIAL_FTDI_SIO USB_SERIAL_GENERIC USB_SERIAL_PL2303 USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_TRANCEVIBRATOR USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_WDM WLAN WLAN_VENDOR_ATH WLAN_VENDOR_ATMEL WLAN_VENDOR_BROADCOM WLAN_VENDOR_INTERSIL WLAN_VENDOR_MARVELL WLAN_VENDOR_MEDIATEK WLAN_VENDOR_MICROCHIP WLAN_VENDOR_RALINK WLAN_VENDOR_REALTEK WLAN_VENDOR_RSI WLAN_VENDOR_ZYDAS X86_X32 ZEROPLUS_FF] disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing current HEAD d3c4d815bf09ba8042343b32cc182be2aac1b9c2 testing commit d3c4d815bf09ba8042343b32cc182be2aac1b9c2 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f452f201c30c20987c4f4b9860d055dbe0a20c41b2100c010517aba549149381 run #0: crashed: KASAN: use-after-free Read in check_igot_inode run #1: crashed: KASAN: use-after-free Read in check_igot_inode run #2: crashed: KASAN: use-after-free Read in check_igot_inode run #3: crashed: KASAN: use-after-free Read in check_igot_inode run #4: crashed: KASAN: use-after-free Read in check_igot_inode run #5: crashed: KASAN: use-after-free Read in check_igot_inode run #6: crashed: KASAN: slab-out-of-bounds Read in check_igot_inode run #7: crashed: KASAN: use-after-free Read in check_igot_inode run #8: OK run #9: crashed: KASAN: use-after-free Read in check_igot_inode run #10: crashed: KASAN: use-after-free Read in check_igot_inode run #11: crashed: KASAN: use-after-free Read in check_igot_inode run #12: OK run #13: OK run #14: OK run #15: OK run #16: OK run #17: OK run #18: OK run #19: OK representative crash: KASAN: use-after-free Read in check_igot_inode, types: [KASAN] crash still not fixed/happens on the oldest tested release reproducer is flaky (0.75 repro chance estimate) revisions tested: 7, total time: 1h27m7.650302799s (build: 19m55.931318858s, test: 1h5m43.539694954s) crash still not fixed or there were kernel test errors commit msg: Merge d2a970972800 ("btrfs: fix off-by-one chunk length calculation at contains_pending_extent()") into android-mainline crash: KASAN: use-after-free Read in check_igot_inode EXT4-fs (loop0): orphan cleanup on readonly fs ================================================================== BUG: KASAN: use-after-free in check_igot_inode+0x122/0x140 fs/ext4/inode.c:4691 Read of size 8 at addr ffff88812429ec28 by task syz-executor.0/3838 CPU: 1 PID: 3838 Comm: syz-executor.0 Not tainted 5.10.214-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x81/0xac lib/dump_stack.c:118 print_address_description.constprop.0+0x24/0x160 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:435 [inline] kasan_report.cold+0x82/0xdb mm/kasan/report.c:452 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:309 check_igot_inode+0x122/0x140 fs/ext4/inode.c:4691 __ext4_iget+0x27f/0x5b20 fs/ext4/inode.c:4738 ext4_quota_enable fs/ext4/super.c:6411 [inline] ext4_enable_quotas+0x425/0x8a0 fs/ext4/super.c:6447 ext4_orphan_cleanup fs/ext4/super.c:3046 [inline] ext4_fill_super+0x8506/0xb7d0 fs/ext4/super.c:5075 mount_bdev+0x2b7/0x390 fs/super.c:1429 ext4_mount+0x10/0x20 fs/ext4/super.c:6626 legacy_get_tree+0xf5/0x1d0 fs/fs_context.c:593 vfs_get_tree+0x81/0x1b0 fs/super.c:1559 do_new_mount fs/namespace.c:2910 [inline] path_mount+0x4d9/0x1e30 fs/namespace.c:3240 do_mount fs/namespace.c:3253 [inline] __do_sys_mount fs/namespace.c:3461 [inline] __se_sys_mount fs/namespace.c:3438 [inline] __x64_sys_mount+0x20e/0x280 fs/namespace.c:3438 do_syscall_64+0x32/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xc6 RIP: 0033:0x7f9c23f201ea Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f9c23aa0ee8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f9c23aa0f80 RCX: 00007f9c23f201ea RDX: 0000000020000040 RSI: 0000000020000500 RDI: 00007f9c23aa0f40 RBP: 0000000020000040 R08: 00007f9c23aa0f80 R09: 0000000002000007 R10: 0000000002000007 R11: 0000000000000246 R12: 0000000020000500 R13: 00007f9c23aa0f40 R14: 00000000000004c7 R15: 00000000200000c0 Allocated by task 3543: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:45 [inline] set_alloc_info mm/kasan/common.c:430 [inline] __kasan_slab_alloc+0x94/0xc0 mm/kasan/common.c:463 kasan_slab_alloc include/linux/kasan.h:244 [inline] slab_post_alloc_hook mm/slab.h:583 [inline] slab_alloc_node mm/slub.c:2947 [inline] slab_alloc mm/slub.c:2955 [inline] kmem_cache_alloc+0x15d/0x4f0 mm/slub.c:2960 f2fs_kmem_cache_alloc fs/f2fs/f2fs.h:2776 [inline] f2fs_alloc_inode+0x1d/0x4a0 fs/f2fs/super.c:1373 alloc_inode+0x5c/0x1e0 fs/inode.c:233 iget_locked+0x12e/0x5e0 fs/inode.c:1236 f2fs_iget+0x53/0x4910 fs/f2fs/inode.c:489 f2fs_fill_super+0x3e5d/0x6360 fs/f2fs/super.c:4308 mount_bdev+0x2b7/0x390 fs/super.c:1429 f2fs_mount+0x10/0x20 fs/f2fs/super.c:4555 legacy_get_tree+0xf5/0x1d0 fs/fs_context.c:593 vfs_get_tree+0x81/0x1b0 fs/super.c:1559 do_new_mount fs/namespace.c:2910 [inline] path_mount+0x4d9/0x1e30 fs/namespace.c:3240 do_mount fs/namespace.c:3253 [inline] __do_sys_mount fs/namespace.c:3461 [inline] __se_sys_mount fs/namespace.c:3438 [inline] __x64_sys_mount+0x20e/0x280 fs/namespace.c:3438 do_syscall_64+0x32/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xc6 Freed by task 3567: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 kasan_set_track+0x25/0x30 mm/kasan/common.c:45 kasan_set_free_info+0x24/0x40 mm/kasan/generic.c:370 ____kasan_slab_free mm/kasan/common.c:362 [inline] ____kasan_slab_free mm/kasan/common.c:324 [inline] __kasan_slab_free+0x111/0x150 mm/kasan/common.c:370 kasan_slab_free include/linux/kasan.h:220 [inline] slab_free_hook mm/slub.c:1595 [inline] slab_free_freelist_hook+0x9b/0x1a0 mm/slub.c:1621 slab_free mm/slub.c:3203 [inline] kmem_cache_free+0x106/0x440 mm/slub.c:3219 f2fs_free_inode+0x1d/0x30 fs/f2fs/super.c:1528 i_callback+0x3a/0x60 fs/inode.c:222 rcu_do_batch+0x34e/0xb90 kernel/rcu/tree.c:2494 rcu_core+0x3fa/0xa40 kernel/rcu/tree.c:2735 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2748 __do_softirq+0x1bc/0x5f3 kernel/softirq.c:309 Last potentially related work creation: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 __kasan_record_aux_stack+0xd8/0xf0 mm/kasan/generic.c:348 kasan_record_aux_stack_noalloc+0xb/0x10 mm/kasan/generic.c:358 __call_rcu kernel/rcu/tree.c:2976 [inline] call_rcu+0xe4/0x12d0 kernel/rcu/tree.c:3050 destroy_inode+0x11f/0x190 fs/inode.c:288 evict+0x44a/0x6a0 fs/inode.c:594 iput_final fs/inode.c:1697 [inline] iput.part.0+0x33b/0x640 fs/inode.c:1723 iput+0x3f/0x50 fs/inode.c:1713 f2fs_fill_super+0x4499/0x6360 fs/f2fs/super.c:4491 mount_bdev+0x2b7/0x390 fs/super.c:1429 f2fs_mount+0x10/0x20 fs/f2fs/super.c:4555 legacy_get_tree+0xf5/0x1d0 fs/fs_context.c:593 vfs_get_tree+0x81/0x1b0 fs/super.c:1559 do_new_mount fs/namespace.c:2910 [inline] path_mount+0x4d9/0x1e30 fs/namespace.c:3240 do_mount fs/namespace.c:3253 [inline] __do_sys_mount fs/namespace.c:3461 [inline] __se_sys_mount fs/namespace.c:3438 [inline] __x64_sys_mount+0x20e/0x280 fs/namespace.c:3438 do_syscall_64+0x32/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xc6 Second to last potentially related work creation: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 __kasan_record_aux_stack+0xd8/0xf0 mm/kasan/generic.c:348 kasan_record_aux_stack_noalloc+0xb/0x10 mm/kasan/generic.c:358 __call_rcu kernel/rcu/tree.c:2976 [inline] call_rcu+0xe4/0x12d0 kernel/rcu/tree.c:3050 destroy_inode+0x11f/0x190 fs/inode.c:288 evict+0x44a/0x6a0 fs/inode.c:594 iput_final fs/inode.c:1697 [inline] iput.part.0+0x33b/0x640 fs/inode.c:1723 iput+0x3f/0x50 fs/inode.c:1713 f2fs_put_super+0x3f4/0xd60 fs/f2fs/super.c:1613 generic_shutdown_super+0x135/0x330 fs/super.c:465 kill_block_super+0x9a/0xd0 fs/super.c:1456 kill_f2fs_super+0x24d/0x360 fs/f2fs/super.c:4587 deactivate_locked_super+0x8b/0x130 fs/super.c:335 deactivate_super+0x71/0x80 fs/super.c:366 cleanup_mnt+0x2c5/0x400 fs/namespace.c:1118 __cleanup_mnt+0xd/0x10 fs/namespace.c:1125 task_work_run+0xc2/0x140 kernel/task_work.c:165 tracehook_notify_resume include/linux/tracehook.h:188 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x112/0x120 kernel/entry/common.c:199 syscall_exit_to_user_mode+0x27/0x160 kernel/entry/common.c:274 do_syscall_64+0x3f/0x80 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x61/0xc6 The buggy address belongs to the object at ffff88812429e700 which belongs to the cache f2fs_inode_cache of size 1520 The buggy address is located 1320 bytes inside of 1520-byte region [ffff88812429e700, ffff88812429ecf0) The buggy address belongs to the page: page:ffffea000490a600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x124298 head:ffffea000490a600 order:3 compound_mapcount:0 compound_pincount:0 flags: 0x4000000000010200(slab|head) raw: 4000000000010200 ffffea0004684600 0000000500000005 ffff8881047c0600 raw: 0000000000000000 0000000000130013 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 1915, ts 85617655109, free_ts 53180583893 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook mm/page_alloc.c:2456 [inline] prep_new_page mm/page_alloc.c:2462 [inline] get_page_from_freelist+0x1fee/0x2ad0 mm/page_alloc.c:4254 __alloc_pages_nodemask+0x2ae/0x2360 mm/page_alloc.c:5346 __alloc_pages include/linux/gfp.h:544 [inline] __alloc_pages_node include/linux/gfp.h:557 [inline] alloc_pages_node include/linux/gfp.h:571 [inline] alloc_pages include/linux/gfp.h:590 [inline] alloc_slab_page mm/slub.c:1665 [inline] allocate_slab+0x30f/0x460 mm/slub.c:1808 new_slab mm/slub.c:1869 [inline] new_slab_objects mm/slub.c:2627 [inline] ___slab_alloc.constprop.0+0x32b/0x730 mm/slub.c:2791 __slab_alloc mm/slub.c:2831 [inline] slab_alloc_node mm/slub.c:2913 [inline] slab_alloc mm/slub.c:2955 [inline] kmem_cache_alloc+0x491/0x4f0 mm/slub.c:2960 f2fs_kmem_cache_alloc fs/f2fs/f2fs.h:2776 [inline] f2fs_alloc_inode+0x1d/0x4a0 fs/f2fs/super.c:1373 alloc_inode+0x5c/0x1e0 fs/inode.c:233 iget_locked+0x12e/0x5e0 fs/inode.c:1236 f2fs_iget+0x53/0x4910 fs/f2fs/inode.c:489 f2fs_fill_super+0x3e5d/0x6360 fs/f2fs/super.c:4308 mount_bdev+0x2b7/0x390 fs/super.c:1429 f2fs_mount+0x10/0x20 fs/f2fs/super.c:4555 legacy_get_tree+0xf5/0x1d0 fs/fs_context.c:593 vfs_get_tree+0x81/0x1b0 fs/super.c:1559 do_new_mount fs/namespace.c:2910 [inline] path_mount+0x4d9/0x1e30 fs/namespace.c:3240 do_mount fs/namespace.c:3253 [inline] __do_sys_mount fs/namespace.c:3461 [inline] __se_sys_mount fs/namespace.c:3438 [inline] __x64_sys_mount+0x20e/0x280 fs/namespace.c:3438 page last free stack trace: reset_page_owner include/linux/page_owner.h:28 [inline] free_pages_prepare mm/page_alloc.c:1349 [inline] free_pcp_prepare+0x1a7/0x230 mm/page_alloc.c:1421 free_unref_page_prepare mm/page_alloc.c:3336 [inline] free_unref_page_list+0x18a/0xae0 mm/page_alloc.c:3443 release_pages+0x374/0xb00 mm/swap.c:1103 __pagevec_release+0x5e/0xe0 mm/swap.c:1123 pagevec_release include/linux/pagevec.h:88 [inline] shmem_undo_range+0x56a/0xe50 mm/shmem.c:965 shmem_truncate_range mm/shmem.c:1069 [inline] shmem_evict_inode+0x30d/0xa00 mm/shmem.c:1169 evict+0x2ab/0x6a0 fs/inode.c:577 iput_final fs/inode.c:1697 [inline] iput.part.0+0x33b/0x640 fs/inode.c:1723 iput+0x3f/0x50 fs/inode.c:1713 dentry_unlink_inode+0x284/0x390 fs/dcache.c:374 __dentry_kill+0x326/0x620 fs/dcache.c:579 dentry_kill fs/dcache.c:705 [inline] dput+0x3ec/0x8c0 fs/dcache.c:879 __fput+0x306/0x760 fs/file_table.c:294 ____fput+0x9/0x10 fs/file_table.c:314 task_work_run+0xc2/0x140 kernel/task_work.c:165 tracehook_notify_resume include/linux/tracehook.h:188 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x112/0x120 kernel/entry/common.c:199 Memory state around the buggy address: ffff88812429eb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88812429eb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff88812429ec00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88812429ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc ffff88812429ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc 00 00 ================================================================== EXT4-fs warning (device loop0): ext4_enable_quotas:6451: Failed to enable quota tracking (type=0, err=-13, ino=3). Please run e2fsck to fix. EXT4-fs (loop0): Cannot turn on quotas: error -13 EXT4-fs error (device loop0): ext4_validate_block_bitmap:437: comm syz-executor.0: bg 0: block 64: padding at end of block bitmap is not set EXT4-fs error (device loop0) in ext4_mb_clear_bb:5643: Corrupt filesystem EXT4-fs (loop0): 1 orphan inode deleted EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue