Warning: Permanently added '10.128.1.233' (ED25519) to the list of known hosts. 2024/10/08 14:53:17 ignoring optional flag "sandboxArg"="0" 2024/10/08 14:53:17 ignoring optional flag "type"="gce" 2024/10/08 14:53:17 parsed 1 programs 2024/10/08 14:53:17 executed programs: 0 [ 52.271909][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 52.271923][ T30] audit: type=1400 audit(1728399197.850:95): avc: denied { unlink } for pid=352 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 52.312213][ T352] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 52.368200][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.375399][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.383050][ T359] device bridge_slave_0 entered promiscuous mode [ 52.389668][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.396576][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.403894][ T359] device bridge_slave_1 entered promiscuous mode [ 52.450402][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.457276][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.464520][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.465132][ T30] audit: type=1400 audit(1728399198.040:96): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 52.471497][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.513869][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.521168][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.529374][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.537066][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.546989][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.555225][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.562180][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.571144][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.579450][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.586444][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.598640][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.608017][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.621993][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.633740][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.642056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.649358][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.658200][ T359] device veth0_vlan entered promiscuous mode [ 52.668605][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.677880][ T359] device veth1_macvtap entered promiscuous mode [ 52.687269][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.697626][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.711090][ T30] audit: type=1400 audit(1728399198.280:97): avc: denied { mounton } for pid=359 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 53.060129][ T364] loop0: detected capacity change from 0 to 131072 [ 53.067108][ T30] audit: type=1400 audit(1728399198.640:98): avc: denied { mounton } for pid=363 comm="syz-executor.0" path="/root/syzkaller-testdir2607987030/syzkaller.So0RfS/0/file2" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 53.068051][ T364] F2FS-fs (loop0): Invalid log sectors per block(124) log sectorsize(9) [ 53.102147][ T364] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 53.111695][ T364] F2FS-fs (loop0): invalid crc value [ 53.118459][ T364] F2FS-fs (loop0): Disable nat_bits due to incorrect cp_ver (9621037545273099749, 1067266233009637) [ 53.130550][ T364] F2FS-fs (loop0): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. [ 53.151838][ T364] F2FS-fs (loop0): Try to recover 1th superblock, ret: 0 [ 53.158816][ T364] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 53.166352][ T30] audit: type=1400 audit(1728399198.740:99): avc: denied { mount } for pid=363 comm="syz-executor.0" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 53.190308][ T30] audit: type=1400 audit(1728399198.750:100): avc: denied { read } for pid=363 comm="syz-executor.0" name="file2" dev="loop0" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 53.203039][ T359] ------------[ cut here ]------------ [ 53.213094][ T30] audit: type=1400 audit(1728399198.750:101): avc: denied { open } for pid=363 comm="syz-executor.0" path="/root/syzkaller-testdir2607987030/syzkaller.So0RfS/0/file2/file2" dev="loop0" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 53.217745][ T359] WARNING: CPU: 1 PID: 359 at fs/f2fs/inode.c:874 f2fs_evict_inode+0x1191/0x1470 [ 53.246093][ T30] audit: type=1400 audit(1728399198.750:102): avc: denied { ioctl } for pid=363 comm="syz-executor.0" path="/root/syzkaller-testdir2607987030/syzkaller.So0RfS/0/file2/file2" dev="loop0" ino=8 ioctlcmd=0xf519 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 53.254656][ T359] Modules linked in: [ 53.283506][ T30] audit: type=1400 audit(1728399198.760:103): avc: denied { unmount } for pid=359 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 53.283639][ T359] [ 53.309062][ T359] CPU: 1 PID: 359 Comm: syz-executor.0 Not tainted 5.15.165-syzkaller-1075277-g80dd36dca275 #0 [ 53.319917][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 53.330240][ T359] RIP: 0010:f2fs_evict_inode+0x1191/0x1470 [ 53.336198][ T359] Code: 53 ff eb 0f e8 c0 34 53 ff 49 bf 00 00 00 00 00 fc ff df 48 8b 5c 24 28 4c 89 ef e8 89 21 03 00 e9 a1 fc ff ff e8 9f 34 53 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 c0 74 95 ff f0 41 80 0e 04 e9 7e [ 53.355905][ T359] RSP: 0018:ffffc90000cb7960 EFLAGS: 00010293 [ 53.361999][ T359] RAX: ffffffff821d2cf1 RBX: 0000000000000002 RCX: ffff88810ac04f00 [ 53.369776][ T359] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 53.377711][ T359] RBP: ffffc90000cb7ad0 R08: ffffffff821d2979 R09: ffffed1021256ec9 [ 53.385544][ T359] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881092b7358 [ 53.393700][ T359] R13: ffff8881092b7330 R14: ffff88810ceee078 R15: dffffc0000000000 [ 53.401928][ T359] FS: 000055555730b480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 53.410791][ T359] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.417445][ T359] CR2: 00007f1e4d814ed8 CR3: 000000012206d000 CR4: 00000000003506a0 [ 53.425261][ T359] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.433695][ T359] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 53.441645][ T359] Call Trace: [ 53.444981][ T359] [ 53.447888][ T359] ? show_regs+0x58/0x60 [ 53.452072][ T359] ? __warn+0x160/0x2f0 [ 53.456001][ T359] ? f2fs_evict_inode+0x1191/0x1470 [ 53.461036][ T359] ? report_bug+0x3d9/0x5b0 [ 53.465437][ T359] ? f2fs_evict_inode+0x1191/0x1470 [ 53.470410][ T359] ? handle_bug+0x41/0x70 [ 53.474881][ T359] ? exc_invalid_op+0x1b/0x50 [ 53.479615][ T359] ? asm_exc_invalid_op+0x1b/0x20 [ 53.484911][ T359] ? f2fs_evict_inode+0xe19/0x1470 [ 53.489865][ T359] ? f2fs_evict_inode+0x1191/0x1470 [ 53.495006][ T359] ? f2fs_evict_inode+0x1191/0x1470 [ 53.500049][ T359] ? _raw_spin_unlock+0x4d/0x70 [ 53.504808][ T359] ? f2fs_write_inode+0x5d0/0x5d0 [ 53.509561][ T359] ? bit_waitqueue+0x30/0x30 [ 53.514089][ T359] ? locks_free_lock_context+0x42/0x70 [ 53.519376][ T359] ? __destroy_inode+0x35f/0x4e0 [ 53.524209][ T359] ? f2fs_write_inode+0x5d0/0x5d0 [ 53.529004][ T359] evict+0x2a3/0x630 [ 53.532794][ T359] evict_inodes+0x5db/0x660 [ 53.537089][ T359] ? clear_inode+0x150/0x150 [ 53.541568][ T359] generic_shutdown_super+0x9c/0x2e0 [ 53.546707][ T359] kill_block_super+0x7e/0xe0 [ 53.551512][ T359] kill_f2fs_super+0x2f9/0x3c0 [ 53.556105][ T359] ? f2fs_mount+0x40/0x40 [ 53.560269][ T359] ? unregister_shrinker+0x23c/0x2d0 [ 53.565456][ T359] deactivate_locked_super+0xad/0x110 [ 53.570693][ T359] deactivate_super+0xbe/0xf0 [ 53.575637][ T359] cleanup_mnt+0x45c/0x510 [ 53.579821][ T359] __cleanup_mnt+0x19/0x20 [ 53.584221][ T359] task_work_run+0x129/0x190 [ 53.588622][ T359] exit_to_user_mode_loop+0xc4/0xe0 [ 53.593695][ T359] exit_to_user_mode_prepare+0x5a/0xa0 [ 53.599468][ T359] syscall_exit_to_user_mode+0x26/0x160 [ 53.604884][ T359] do_syscall_64+0x47/0xb0 [ 53.609098][ T359] ? clear_bhb_loop+0x35/0x90 [ 53.613665][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.619335][ T359] RIP: 0033:0x7ff8bdb6a017 [ 53.623621][ T359] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 53.643573][ T359] RSP: 002b:00007ffd932a4a98 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 53.652064][ T359] RAX: 0000000000000000 RBX: 00007ff8bdbb43b9 RCX: 00007ff8bdb6a017 [ 53.660225][ T359] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007ffd932a4b50 [ 53.668389][ T359] RBP: 00007ffd932a4b50 R08: 0000000000000000 R09: 0000000000000000 [ 53.676215][ T359] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffd932a5c10 [ 53.684181][ T359] R13: 00007ff8bdbb43b9 R14: 000000000000cded R15: 0000000000000003 [ 53.692210][ T359] [ 53.694985][ T359] ---[ end trace 347c177f08f8f7bb ]--- [ 53.721378][ T359] ================================================================== [ 53.729299][ T359] BUG: KASAN: use-after-free in _raw_spin_lock+0x97/0x1b0 [ 53.736221][ T359] Write of size 4 at addr ffff8881092b73b8 by task syz-executor.0/359 [ 53.744563][ T359] [ 53.746733][ T359] CPU: 0 PID: 359 Comm: syz-executor.0 Tainted: G W 5.15.165-syzkaller-1075277-g80dd36dca275 #0 [ 53.758284][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 53.768271][ T359] Call Trace: [ 53.771392][ T359] [ 53.774179][ T359] dump_stack_lvl+0x151/0x1c0 [ 53.778768][ T359] ? io_uring_drop_tctx_refs+0x190/0x190 [ 53.784228][ T359] ? __wake_up_klogd+0xd5/0x110 [ 53.788913][ T359] ? panic+0x760/0x760 [ 53.792819][ T359] ? __schedule+0xcd4/0x1590 [ 53.797253][ T359] print_address_description+0x87/0x3b0 [ 53.802719][ T359] kasan_report+0x179/0x1c0 [ 53.807064][ T359] ? _raw_spin_lock+0x97/0x1b0 [ 53.811752][ T359] ? _raw_spin_lock+0x97/0x1b0 [ 53.816363][ T359] kasan_check_range+0x293/0x2a0 [ 53.821233][ T359] __kasan_check_write+0x14/0x20 [ 53.826088][ T359] _raw_spin_lock+0x97/0x1b0 [ 53.830505][ T359] ? _raw_spin_trylock_bh+0x190/0x190 [ 53.836107][ T359] ? _raw_spin_lock+0xa4/0x1b0 [ 53.840704][ T359] ? _raw_spin_trylock_bh+0x190/0x190 [ 53.846054][ T359] igrab+0x20/0xa0 [ 53.849618][ T359] f2fs_sync_inode_meta+0x14d/0x2a0 [ 53.854729][ T359] f2fs_write_checkpoint+0xab4/0x1fb0 [ 53.860033][ T359] ? f2fs_get_sectors_written+0x500/0x500 [ 53.865663][ T359] ? rwsem_write_trylock+0x153/0x340 [ 53.870870][ T359] ? __kasan_check_write+0x14/0x20 [ 53.875815][ T359] ? mutex_unlock+0xb2/0x260 [ 53.880241][ T359] f2fs_issue_checkpoint+0x31b/0x4d0 [ 53.885676][ T359] ? f2fs_destroy_checkpoint_caches+0x30/0x30 [ 53.891755][ T359] ? sync_inodes_sb+0x7cd/0x8b0 [ 53.896429][ T359] ? try_to_writeback_inodes_sb+0xc0/0xc0 [ 53.902279][ T359] f2fs_sync_fs+0x186/0x2f0 [ 53.906727][ T359] sync_filesystem+0x1cf/0x250 [ 53.911588][ T359] f2fs_quota_off_umount+0x20e/0x220 [ 53.916708][ T359] ? f2fs_drop_inode+0xa20/0xa20 [ 53.921687][ T359] f2fs_put_super+0xb9/0xc10 [ 53.926092][ T359] ? f2fs_drop_inode+0xa20/0xa20 [ 53.930933][ T359] ? __fsnotify_vfsmount_delete+0x20/0x20 [ 53.936529][ T359] ? clear_inode+0x150/0x150 [ 53.941090][ T359] ? fscrypt_destroy_keyring+0x287/0x2a0 [ 53.946641][ T359] ? f2fs_drop_inode+0xa20/0xa20 [ 53.951832][ T359] generic_shutdown_super+0x157/0x2e0 [ 53.957223][ T359] kill_block_super+0x7e/0xe0 [ 53.961727][ T359] kill_f2fs_super+0x2f9/0x3c0 [ 53.966322][ T359] ? f2fs_mount+0x40/0x40 [ 53.970488][ T359] ? unregister_shrinker+0x23c/0x2d0 [ 53.975862][ T359] deactivate_locked_super+0xad/0x110 [ 53.981068][ T359] deactivate_super+0xbe/0xf0 [ 53.985840][ T359] cleanup_mnt+0x45c/0x510 [ 53.990080][ T359] __cleanup_mnt+0x19/0x20 [ 53.994331][ T359] task_work_run+0x129/0x190 [ 53.998768][ T359] exit_to_user_mode_loop+0xc4/0xe0 [ 54.003802][ T359] exit_to_user_mode_prepare+0x5a/0xa0 [ 54.009100][ T359] syscall_exit_to_user_mode+0x26/0x160 [ 54.014476][ T359] do_syscall_64+0x47/0xb0 [ 54.018713][ T359] ? clear_bhb_loop+0x35/0x90 [ 54.023330][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.029339][ T359] RIP: 0033:0x7ff8bdb6a017 [ 54.033608][ T359] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 54.053433][ T359] RSP: 002b:00007ffd932a4a98 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 54.061855][ T359] RAX: 0000000000000000 RBX: 00007ff8bdbb43b9 RCX: 00007ff8bdb6a017 [ 54.069659][ T359] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007ffd932a4b50 [ 54.077545][ T359] RBP: 00007ffd932a4b50 R08: 0000000000000000 R09: 0000000000000000 [ 54.085395][ T359] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffd932a5c10 [ 54.093379][ T359] R13: 00007ff8bdbb43b9 R14: 000000000000cded R15: 0000000000000003 [ 54.101398][ T359] [ 54.104261][ T359] [ 54.106420][ T359] Allocated by task 364: [ 54.110503][ T359] __kasan_slab_alloc+0xb1/0xe0 [ 54.115187][ T359] slab_post_alloc_hook+0x53/0x2c0 [ 54.120566][ T359] kmem_cache_alloc+0xf5/0x200 [ 54.125169][ T359] f2fs_alloc_inode+0x26/0x340 [ 54.129767][ T359] iget_locked+0x174/0x860 [ 54.134018][ T359] f2fs_iget+0x55/0x5290 [ 54.138098][ T359] f2fs_lookup+0x410/0xd80 [ 54.142353][ T359] path_openat+0x1194/0x2f40 [ 54.146779][ T359] do_filp_open+0x21c/0x460 [ 54.151119][ T359] do_sys_openat2+0x13f/0x820 [ 54.155739][ T359] __x64_sys_open+0x221/0x270 [ 54.160333][ T359] x64_sys_call+0x36/0x9a0 [ 54.164664][ T359] do_syscall_64+0x3b/0xb0 [ 54.168925][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.174656][ T359] [ 54.176808][ T359] Freed by task 359: [ 54.180541][ T359] kasan_set_track+0x4b/0x70 [ 54.184965][ T359] kasan_set_free_info+0x23/0x40 [ 54.189742][ T359] ____kasan_slab_free+0x126/0x160 [ 54.194776][ T359] __kasan_slab_free+0x11/0x20 [ 54.199489][ T359] slab_free_freelist_hook+0xbd/0x190 [ 54.204693][ T359] kmem_cache_free+0x116/0x2e0 [ 54.209288][ T359] f2fs_free_inode+0x24/0x30 [ 54.213872][ T359] i_callback+0x4b/0x70 [ 54.217812][ T359] rcu_do_batch+0x57a/0xc10 [ 54.222143][ T359] rcu_core+0x517/0x1020 [ 54.226220][ T359] rcu_core_si+0x9/0x10 [ 54.230218][ T359] handle_softirqs+0x25e/0x5c0 [ 54.234875][ T359] __irq_exit_rcu+0x52/0xf0 [ 54.239158][ T359] irq_exit_rcu+0x9/0x10 [ 54.243232][ T359] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 54.248875][ T359] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 54.254691][ T359] [ 54.256945][ T359] Last potentially related work creation: [ 54.262622][ T359] kasan_save_stack+0x3b/0x60 [ 54.267194][ T359] __kasan_record_aux_stack+0xd3/0xf0 [ 54.272482][ T359] kasan_record_aux_stack_noalloc+0xb/0x10 [ 54.278208][ T359] call_rcu+0x135/0x1310 [ 54.282425][ T359] evict+0x5df/0x630 [ 54.286204][ T359] evict_inodes+0x5db/0x660 [ 54.290842][ T359] generic_shutdown_super+0x9c/0x2e0 [ 54.296192][ T359] kill_block_super+0x7e/0xe0 [ 54.300888][ T359] kill_f2fs_super+0x2f9/0x3c0 [ 54.305505][ T359] deactivate_locked_super+0xad/0x110 [ 54.310765][ T359] deactivate_super+0xbe/0xf0 [ 54.315364][ T359] cleanup_mnt+0x45c/0x510 [ 54.319668][ T359] __cleanup_mnt+0x19/0x20 [ 54.323882][ T359] task_work_run+0x129/0x190 [ 54.328308][ T359] exit_to_user_mode_loop+0xc4/0xe0 [ 54.333344][ T359] exit_to_user_mode_prepare+0x5a/0xa0 [ 54.338813][ T359] syscall_exit_to_user_mode+0x26/0x160 [ 54.344188][ T359] do_syscall_64+0x47/0xb0 [ 54.348664][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.354617][ T359] [ 54.356801][ T359] The buggy address belongs to the object at ffff8881092b7330 [ 54.356801][ T359] which belongs to the cache f2fs_inode_cache of size 1424 [ 54.371359][ T359] The buggy address is located 136 bytes inside of [ 54.371359][ T359] 1424-byte region [ffff8881092b7330, ffff8881092b78c0) [ 54.384943][ T359] The buggy address belongs to the page: [ 54.390509][ T359] page:ffffea000424ac00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092b0 [ 54.400648][ T359] head:ffffea000424ac00 order:3 compound_mapcount:0 compound_pincount:0 [ 54.409155][ T359] flags: 0x4000000000010200(slab|head|zone=1) [ 54.415157][ T359] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888107fbb380 [ 54.423566][ T359] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000 [ 54.431988][ T359] page dumped because: kasan: bad access detected [ 54.438237][ T359] page_owner tracks the page as allocated [ 54.443965][ T359] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 364, ts 53150257221, free_ts 0 [ 54.464358][ T359] post_alloc_hook+0x1a3/0x1b0 [ 54.468952][ T359] prep_new_page+0x1b/0x110 [ 54.473304][ T359] get_page_from_freelist+0x3550/0x35d0 [ 54.478675][ T359] __alloc_pages+0x27e/0x8f0 [ 54.483196][ T359] new_slab+0x9a/0x4e0 [ 54.487091][ T359] ___slab_alloc+0x39e/0x830 [ 54.491515][ T359] __slab_alloc+0x4a/0x90 [ 54.495690][ T359] kmem_cache_alloc+0x134/0x200 [ 54.500423][ T359] f2fs_alloc_inode+0x26/0x340 [ 54.505147][ T359] iget_locked+0x174/0x860 [ 54.509461][ T359] f2fs_iget+0x55/0x5290 [ 54.513568][ T359] f2fs_fill_super+0x6688/0x8170 [ 54.518336][ T359] mount_bdev+0x282/0x3b0 [ 54.522602][ T359] f2fs_mount+0x34/0x40 [ 54.526593][ T359] legacy_get_tree+0xf1/0x190 [ 54.531685][ T359] vfs_get_tree+0x88/0x290 [ 54.536018][ T359] page_owner free stack trace missing [ 54.541411][ T359] [ 54.543562][ T359] Memory state around the buggy address: [ 54.549035][ T359] ffff8881092b7280: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc [ 54.557021][ T359] ffff8881092b7300: fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb fb [ 54.565047][ T359] >ffff8881092b7380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.572990][ T359] ^ [ 54.579272][ T359] ffff8881092b7400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.587278][ T359] ffff8881092b7480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.595320][ T359] ================================================================== [ 54.603216][ T359] Disabling lock debugging due to kernel taint