Warning: Permanently added '10.128.1.233' (ED25519) to the list of known hosts.
2024/10/08 14:53:17 ignoring optional flag "sandboxArg"="0"
2024/10/08 14:53:17 ignoring optional flag "type"="gce"
2024/10/08 14:53:17 parsed 1 programs
2024/10/08 14:53:17 executed programs: 0
[ 52.271909][ T30] kauditd_printk_skb: 19 callbacks suppressed
[ 52.271923][ T30] audit: type=1400 audit(1728399197.850:95): avc: denied { unlink } for pid=352 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 52.312213][ T352] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 52.368200][ T359] bridge0: port 1(bridge_slave_0) entered blocking state
[ 52.375399][ T359] bridge0: port 1(bridge_slave_0) entered disabled state
[ 52.383050][ T359] device bridge_slave_0 entered promiscuous mode
[ 52.389668][ T359] bridge0: port 2(bridge_slave_1) entered blocking state
[ 52.396576][ T359] bridge0: port 2(bridge_slave_1) entered disabled state
[ 52.403894][ T359] device bridge_slave_1 entered promiscuous mode
[ 52.450402][ T359] bridge0: port 2(bridge_slave_1) entered blocking state
[ 52.457276][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 52.464520][ T359] bridge0: port 1(bridge_slave_0) entered blocking state
[ 52.465132][ T30] audit: type=1400 audit(1728399198.040:96): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 52.471497][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 52.513869][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 52.521168][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 52.529374][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 52.537066][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 52.546989][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 52.555225][ T45] bridge0: port 1(bridge_slave_0) entered blocking state
[ 52.562180][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 52.571144][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 52.579450][ T45] bridge0: port 2(bridge_slave_1) entered blocking state
[ 52.586444][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 52.598640][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 52.608017][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 52.621993][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 52.633740][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 52.642056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 52.649358][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 52.658200][ T359] device veth0_vlan entered promiscuous mode
[ 52.668605][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 52.677880][ T359] device veth1_macvtap entered promiscuous mode
[ 52.687269][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 52.697626][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 52.711090][ T30] audit: type=1400 audit(1728399198.280:97): avc: denied { mounton } for pid=359 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[ 53.060129][ T364] loop0: detected capacity change from 0 to 131072
[ 53.067108][ T30] audit: type=1400 audit(1728399198.640:98): avc: denied { mounton } for pid=363 comm="syz-executor.0" path="/root/syzkaller-testdir2607987030/syzkaller.So0RfS/0/file2" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[ 53.068051][ T364] F2FS-fs (loop0): Invalid log sectors per block(124) log sectorsize(9)
[ 53.102147][ T364] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock
[ 53.111695][ T364] F2FS-fs (loop0): invalid crc value
[ 53.118459][ T364] F2FS-fs (loop0): Disable nat_bits due to incorrect cp_ver (9621037545273099749, 1067266233009637)
[ 53.130550][ T364] F2FS-fs (loop0): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix.
[ 53.151838][ T364] F2FS-fs (loop0): Try to recover 1th superblock, ret: 0
[ 53.158816][ T364] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5
[ 53.166352][ T30] audit: type=1400 audit(1728399198.740:99): avc: denied { mount } for pid=363 comm="syz-executor.0" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 53.190308][ T30] audit: type=1400 audit(1728399198.750:100): avc: denied { read } for pid=363 comm="syz-executor.0" name="file2" dev="loop0" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 53.203039][ T359] ------------[ cut here ]------------
[ 53.213094][ T30] audit: type=1400 audit(1728399198.750:101): avc: denied { open } for pid=363 comm="syz-executor.0" path="/root/syzkaller-testdir2607987030/syzkaller.So0RfS/0/file2/file2" dev="loop0" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 53.217745][ T359] WARNING: CPU: 1 PID: 359 at fs/f2fs/inode.c:874 f2fs_evict_inode+0x1191/0x1470
[ 53.246093][ T30] audit: type=1400 audit(1728399198.750:102): avc: denied { ioctl } for pid=363 comm="syz-executor.0" path="/root/syzkaller-testdir2607987030/syzkaller.So0RfS/0/file2/file2" dev="loop0" ino=8 ioctlcmd=0xf519 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 53.254656][ T359] Modules linked in:
[ 53.283506][ T30] audit: type=1400 audit(1728399198.760:103): avc: denied { unmount } for pid=359 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 53.283639][ T359]
[ 53.309062][ T359] CPU: 1 PID: 359 Comm: syz-executor.0 Not tainted 5.15.165-syzkaller-1075277-g80dd36dca275 #0
[ 53.319917][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 53.330240][ T359] RIP: 0010:f2fs_evict_inode+0x1191/0x1470
[ 53.336198][ T359] Code: 53 ff eb 0f e8 c0 34 53 ff 49 bf 00 00 00 00 00 fc ff df 48 8b 5c 24 28 4c 89 ef e8 89 21 03 00 e9 a1 fc ff ff e8 9f 34 53 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 c0 74 95 ff f0 41 80 0e 04 e9 7e
[ 53.355905][ T359] RSP: 0018:ffffc90000cb7960 EFLAGS: 00010293
[ 53.361999][ T359] RAX: ffffffff821d2cf1 RBX: 0000000000000002 RCX: ffff88810ac04f00
[ 53.369776][ T359] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000
[ 53.377711][ T359] RBP: ffffc90000cb7ad0 R08: ffffffff821d2979 R09: ffffed1021256ec9
[ 53.385544][ T359] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881092b7358
[ 53.393700][ T359] R13: ffff8881092b7330 R14: ffff88810ceee078 R15: dffffc0000000000
[ 53.401928][ T359] FS: 000055555730b480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 53.410791][ T359] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 53.417445][ T359] CR2: 00007f1e4d814ed8 CR3: 000000012206d000 CR4: 00000000003506a0
[ 53.425261][ T359] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 53.433695][ T359] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 53.441645][ T359] Call Trace:
[ 53.444981][ T359]
[ 53.447888][ T359] ? show_regs+0x58/0x60
[ 53.452072][ T359] ? __warn+0x160/0x2f0
[ 53.456001][ T359] ? f2fs_evict_inode+0x1191/0x1470
[ 53.461036][ T359] ? report_bug+0x3d9/0x5b0
[ 53.465437][ T359] ? f2fs_evict_inode+0x1191/0x1470
[ 53.470410][ T359] ? handle_bug+0x41/0x70
[ 53.474881][ T359] ? exc_invalid_op+0x1b/0x50
[ 53.479615][ T359] ? asm_exc_invalid_op+0x1b/0x20
[ 53.484911][ T359] ? f2fs_evict_inode+0xe19/0x1470
[ 53.489865][ T359] ? f2fs_evict_inode+0x1191/0x1470
[ 53.495006][ T359] ? f2fs_evict_inode+0x1191/0x1470
[ 53.500049][ T359] ? _raw_spin_unlock+0x4d/0x70
[ 53.504808][ T359] ? f2fs_write_inode+0x5d0/0x5d0
[ 53.509561][ T359] ? bit_waitqueue+0x30/0x30
[ 53.514089][ T359] ? locks_free_lock_context+0x42/0x70
[ 53.519376][ T359] ? __destroy_inode+0x35f/0x4e0
[ 53.524209][ T359] ? f2fs_write_inode+0x5d0/0x5d0
[ 53.529004][ T359] evict+0x2a3/0x630
[ 53.532794][ T359] evict_inodes+0x5db/0x660
[ 53.537089][ T359] ? clear_inode+0x150/0x150
[ 53.541568][ T359] generic_shutdown_super+0x9c/0x2e0
[ 53.546707][ T359] kill_block_super+0x7e/0xe0
[ 53.551512][ T359] kill_f2fs_super+0x2f9/0x3c0
[ 53.556105][ T359] ? f2fs_mount+0x40/0x40
[ 53.560269][ T359] ? unregister_shrinker+0x23c/0x2d0
[ 53.565456][ T359] deactivate_locked_super+0xad/0x110
[ 53.570693][ T359] deactivate_super+0xbe/0xf0
[ 53.575637][ T359] cleanup_mnt+0x45c/0x510
[ 53.579821][ T359] __cleanup_mnt+0x19/0x20
[ 53.584221][ T359] task_work_run+0x129/0x190
[ 53.588622][ T359] exit_to_user_mode_loop+0xc4/0xe0
[ 53.593695][ T359] exit_to_user_mode_prepare+0x5a/0xa0
[ 53.599468][ T359] syscall_exit_to_user_mode+0x26/0x160
[ 53.604884][ T359] do_syscall_64+0x47/0xb0
[ 53.609098][ T359] ? clear_bhb_loop+0x35/0x90
[ 53.613665][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 53.619335][ T359] RIP: 0033:0x7ff8bdb6a017
[ 53.623621][ T359] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8
[ 53.643573][ T359] RSP: 002b:00007ffd932a4a98 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 53.652064][ T359] RAX: 0000000000000000 RBX: 00007ff8bdbb43b9 RCX: 00007ff8bdb6a017
[ 53.660225][ T359] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007ffd932a4b50
[ 53.668389][ T359] RBP: 00007ffd932a4b50 R08: 0000000000000000 R09: 0000000000000000
[ 53.676215][ T359] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffd932a5c10
[ 53.684181][ T359] R13: 00007ff8bdbb43b9 R14: 000000000000cded R15: 0000000000000003
[ 53.692210][ T359]
[ 53.694985][ T359] ---[ end trace 347c177f08f8f7bb ]---
[ 53.721378][ T359] ==================================================================
[ 53.729299][ T359] BUG: KASAN: use-after-free in _raw_spin_lock+0x97/0x1b0
[ 53.736221][ T359] Write of size 4 at addr ffff8881092b73b8 by task syz-executor.0/359
[ 53.744563][ T359]
[ 53.746733][ T359] CPU: 0 PID: 359 Comm: syz-executor.0 Tainted: G W 5.15.165-syzkaller-1075277-g80dd36dca275 #0
[ 53.758284][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 53.768271][ T359] Call Trace:
[ 53.771392][ T359]
[ 53.774179][ T359] dump_stack_lvl+0x151/0x1c0
[ 53.778768][ T359] ? io_uring_drop_tctx_refs+0x190/0x190
[ 53.784228][ T359] ? __wake_up_klogd+0xd5/0x110
[ 53.788913][ T359] ? panic+0x760/0x760
[ 53.792819][ T359] ? __schedule+0xcd4/0x1590
[ 53.797253][ T359] print_address_description+0x87/0x3b0
[ 53.802719][ T359] kasan_report+0x179/0x1c0
[ 53.807064][ T359] ? _raw_spin_lock+0x97/0x1b0
[ 53.811752][ T359] ? _raw_spin_lock+0x97/0x1b0
[ 53.816363][ T359] kasan_check_range+0x293/0x2a0
[ 53.821233][ T359] __kasan_check_write+0x14/0x20
[ 53.826088][ T359] _raw_spin_lock+0x97/0x1b0
[ 53.830505][ T359] ? _raw_spin_trylock_bh+0x190/0x190
[ 53.836107][ T359] ? _raw_spin_lock+0xa4/0x1b0
[ 53.840704][ T359] ? _raw_spin_trylock_bh+0x190/0x190
[ 53.846054][ T359] igrab+0x20/0xa0
[ 53.849618][ T359] f2fs_sync_inode_meta+0x14d/0x2a0
[ 53.854729][ T359] f2fs_write_checkpoint+0xab4/0x1fb0
[ 53.860033][ T359] ? f2fs_get_sectors_written+0x500/0x500
[ 53.865663][ T359] ? rwsem_write_trylock+0x153/0x340
[ 53.870870][ T359] ? __kasan_check_write+0x14/0x20
[ 53.875815][ T359] ? mutex_unlock+0xb2/0x260
[ 53.880241][ T359] f2fs_issue_checkpoint+0x31b/0x4d0
[ 53.885676][ T359] ? f2fs_destroy_checkpoint_caches+0x30/0x30
[ 53.891755][ T359] ? sync_inodes_sb+0x7cd/0x8b0
[ 53.896429][ T359] ? try_to_writeback_inodes_sb+0xc0/0xc0
[ 53.902279][ T359] f2fs_sync_fs+0x186/0x2f0
[ 53.906727][ T359] sync_filesystem+0x1cf/0x250
[ 53.911588][ T359] f2fs_quota_off_umount+0x20e/0x220
[ 53.916708][ T359] ? f2fs_drop_inode+0xa20/0xa20
[ 53.921687][ T359] f2fs_put_super+0xb9/0xc10
[ 53.926092][ T359] ? f2fs_drop_inode+0xa20/0xa20
[ 53.930933][ T359] ? __fsnotify_vfsmount_delete+0x20/0x20
[ 53.936529][ T359] ? clear_inode+0x150/0x150
[ 53.941090][ T359] ? fscrypt_destroy_keyring+0x287/0x2a0
[ 53.946641][ T359] ? f2fs_drop_inode+0xa20/0xa20
[ 53.951832][ T359] generic_shutdown_super+0x157/0x2e0
[ 53.957223][ T359] kill_block_super+0x7e/0xe0
[ 53.961727][ T359] kill_f2fs_super+0x2f9/0x3c0
[ 53.966322][ T359] ? f2fs_mount+0x40/0x40
[ 53.970488][ T359] ? unregister_shrinker+0x23c/0x2d0
[ 53.975862][ T359] deactivate_locked_super+0xad/0x110
[ 53.981068][ T359] deactivate_super+0xbe/0xf0
[ 53.985840][ T359] cleanup_mnt+0x45c/0x510
[ 53.990080][ T359] __cleanup_mnt+0x19/0x20
[ 53.994331][ T359] task_work_run+0x129/0x190
[ 53.998768][ T359] exit_to_user_mode_loop+0xc4/0xe0
[ 54.003802][ T359] exit_to_user_mode_prepare+0x5a/0xa0
[ 54.009100][ T359] syscall_exit_to_user_mode+0x26/0x160
[ 54.014476][ T359] do_syscall_64+0x47/0xb0
[ 54.018713][ T359] ? clear_bhb_loop+0x35/0x90
[ 54.023330][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 54.029339][ T359] RIP: 0033:0x7ff8bdb6a017
[ 54.033608][ T359] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8
[ 54.053433][ T359] RSP: 002b:00007ffd932a4a98 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 54.061855][ T359] RAX: 0000000000000000 RBX: 00007ff8bdbb43b9 RCX: 00007ff8bdb6a017
[ 54.069659][ T359] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007ffd932a4b50
[ 54.077545][ T359] RBP: 00007ffd932a4b50 R08: 0000000000000000 R09: 0000000000000000
[ 54.085395][ T359] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffd932a5c10
[ 54.093379][ T359] R13: 00007ff8bdbb43b9 R14: 000000000000cded R15: 0000000000000003
[ 54.101398][ T359]
[ 54.104261][ T359]
[ 54.106420][ T359] Allocated by task 364:
[ 54.110503][ T359] __kasan_slab_alloc+0xb1/0xe0
[ 54.115187][ T359] slab_post_alloc_hook+0x53/0x2c0
[ 54.120566][ T359] kmem_cache_alloc+0xf5/0x200
[ 54.125169][ T359] f2fs_alloc_inode+0x26/0x340
[ 54.129767][ T359] iget_locked+0x174/0x860
[ 54.134018][ T359] f2fs_iget+0x55/0x5290
[ 54.138098][ T359] f2fs_lookup+0x410/0xd80
[ 54.142353][ T359] path_openat+0x1194/0x2f40
[ 54.146779][ T359] do_filp_open+0x21c/0x460
[ 54.151119][ T359] do_sys_openat2+0x13f/0x820
[ 54.155739][ T359] __x64_sys_open+0x221/0x270
[ 54.160333][ T359] x64_sys_call+0x36/0x9a0
[ 54.164664][ T359] do_syscall_64+0x3b/0xb0
[ 54.168925][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 54.174656][ T359]
[ 54.176808][ T359] Freed by task 359:
[ 54.180541][ T359] kasan_set_track+0x4b/0x70
[ 54.184965][ T359] kasan_set_free_info+0x23/0x40
[ 54.189742][ T359] ____kasan_slab_free+0x126/0x160
[ 54.194776][ T359] __kasan_slab_free+0x11/0x20
[ 54.199489][ T359] slab_free_freelist_hook+0xbd/0x190
[ 54.204693][ T359] kmem_cache_free+0x116/0x2e0
[ 54.209288][ T359] f2fs_free_inode+0x24/0x30
[ 54.213872][ T359] i_callback+0x4b/0x70
[ 54.217812][ T359] rcu_do_batch+0x57a/0xc10
[ 54.222143][ T359] rcu_core+0x517/0x1020
[ 54.226220][ T359] rcu_core_si+0x9/0x10
[ 54.230218][ T359] handle_softirqs+0x25e/0x5c0
[ 54.234875][ T359] __irq_exit_rcu+0x52/0xf0
[ 54.239158][ T359] irq_exit_rcu+0x9/0x10
[ 54.243232][ T359] sysvec_apic_timer_interrupt+0x9a/0xc0
[ 54.248875][ T359] asm_sysvec_apic_timer_interrupt+0x1b/0x20
[ 54.254691][ T359]
[ 54.256945][ T359] Last potentially related work creation:
[ 54.262622][ T359] kasan_save_stack+0x3b/0x60
[ 54.267194][ T359] __kasan_record_aux_stack+0xd3/0xf0
[ 54.272482][ T359] kasan_record_aux_stack_noalloc+0xb/0x10
[ 54.278208][ T359] call_rcu+0x135/0x1310
[ 54.282425][ T359] evict+0x5df/0x630
[ 54.286204][ T359] evict_inodes+0x5db/0x660
[ 54.290842][ T359] generic_shutdown_super+0x9c/0x2e0
[ 54.296192][ T359] kill_block_super+0x7e/0xe0
[ 54.300888][ T359] kill_f2fs_super+0x2f9/0x3c0
[ 54.305505][ T359] deactivate_locked_super+0xad/0x110
[ 54.310765][ T359] deactivate_super+0xbe/0xf0
[ 54.315364][ T359] cleanup_mnt+0x45c/0x510
[ 54.319668][ T359] __cleanup_mnt+0x19/0x20
[ 54.323882][ T359] task_work_run+0x129/0x190
[ 54.328308][ T359] exit_to_user_mode_loop+0xc4/0xe0
[ 54.333344][ T359] exit_to_user_mode_prepare+0x5a/0xa0
[ 54.338813][ T359] syscall_exit_to_user_mode+0x26/0x160
[ 54.344188][ T359] do_syscall_64+0x47/0xb0
[ 54.348664][ T359] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 54.354617][ T359]
[ 54.356801][ T359] The buggy address belongs to the object at ffff8881092b7330
[ 54.356801][ T359] which belongs to the cache f2fs_inode_cache of size 1424
[ 54.371359][ T359] The buggy address is located 136 bytes inside of
[ 54.371359][ T359] 1424-byte region [ffff8881092b7330, ffff8881092b78c0)
[ 54.384943][ T359] The buggy address belongs to the page:
[ 54.390509][ T359] page:ffffea000424ac00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092b0
[ 54.400648][ T359] head:ffffea000424ac00 order:3 compound_mapcount:0 compound_pincount:0
[ 54.409155][ T359] flags: 0x4000000000010200(slab|head|zone=1)
[ 54.415157][ T359] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888107fbb380
[ 54.423566][ T359] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[ 54.431988][ T359] page dumped because: kasan: bad access detected
[ 54.438237][ T359] page_owner tracks the page as allocated
[ 54.443965][ T359] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 364, ts 53150257221, free_ts 0
[ 54.464358][ T359] post_alloc_hook+0x1a3/0x1b0
[ 54.468952][ T359] prep_new_page+0x1b/0x110
[ 54.473304][ T359] get_page_from_freelist+0x3550/0x35d0
[ 54.478675][ T359] __alloc_pages+0x27e/0x8f0
[ 54.483196][ T359] new_slab+0x9a/0x4e0
[ 54.487091][ T359] ___slab_alloc+0x39e/0x830
[ 54.491515][ T359] __slab_alloc+0x4a/0x90
[ 54.495690][ T359] kmem_cache_alloc+0x134/0x200
[ 54.500423][ T359] f2fs_alloc_inode+0x26/0x340
[ 54.505147][ T359] iget_locked+0x174/0x860
[ 54.509461][ T359] f2fs_iget+0x55/0x5290
[ 54.513568][ T359] f2fs_fill_super+0x6688/0x8170
[ 54.518336][ T359] mount_bdev+0x282/0x3b0
[ 54.522602][ T359] f2fs_mount+0x34/0x40
[ 54.526593][ T359] legacy_get_tree+0xf1/0x190
[ 54.531685][ T359] vfs_get_tree+0x88/0x290
[ 54.536018][ T359] page_owner free stack trace missing
[ 54.541411][ T359]
[ 54.543562][ T359] Memory state around the buggy address:
[ 54.549035][ T359] ffff8881092b7280: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc
[ 54.557021][ T359] ffff8881092b7300: fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb fb
[ 54.565047][ T359] >ffff8881092b7380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 54.572990][ T359] ^
[ 54.579272][ T359] ffff8881092b7400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 54.587278][ T359] ffff8881092b7480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 54.595320][ T359] ==================================================================
[ 54.603216][ T359] Disabling lock debugging due to kernel taint