Warning: Permanently added '10.128.1.144' (ED25519) to the list of known hosts.
2025/04/16 06:41:05 ignoring optional flag "sandboxArg"="0"
2025/04/16 06:41:05 ignoring optional flag "type"="gce"
2025/04/16 06:41:05 parsed 1 programs
[ 47.284245][ T30] kauditd_printk_skb: 19 callbacks suppressed
[ 47.284261][ T30] audit: type=1400 audit(1744785665.426:95): avc: denied { unlink } for pid=348 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
2025/04/16 06:41:05 executed programs: 0
[ 47.315951][ T30] audit: type=1400 audit(1744785665.426:96): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 47.318429][ T348] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 47.395581][ T355] bridge0: port 1(bridge_slave_0) entered blocking state
[ 47.402485][ T355] bridge0: port 1(bridge_slave_0) entered disabled state
[ 47.409856][ T355] device bridge_slave_0 entered promiscuous mode
[ 47.416752][ T355] bridge0: port 2(bridge_slave_1) entered blocking state
[ 47.423701][ T355] bridge0: port 2(bridge_slave_1) entered disabled state
[ 47.431149][ T355] device bridge_slave_1 entered promiscuous mode
[ 47.478036][ T355] bridge0: port 2(bridge_slave_1) entered blocking state
[ 47.485023][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 47.492275][ T355] bridge0: port 1(bridge_slave_0) entered blocking state
[ 47.499270][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 47.518209][ T8] bridge0: port 1(bridge_slave_0) entered disabled state
[ 47.525372][ T8] bridge0: port 2(bridge_slave_1) entered disabled state
[ 47.532692][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 47.540300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 47.549216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 47.557329][ T8] bridge0: port 1(bridge_slave_0) entered blocking state
[ 47.564254][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 47.573025][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 47.581236][ T8] bridge0: port 2(bridge_slave_1) entered blocking state
[ 47.588218][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 47.599880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 47.608985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 47.622847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 47.633975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 47.642243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 47.649726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 47.657895][ T355] device veth0_vlan entered promiscuous mode
[ 47.668108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 47.677441][ T355] device veth1_macvtap entered promiscuous mode
[ 47.686721][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 47.697727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 47.711604][ T30] audit: type=1400 audit(1744785665.846:97): avc: denied { mounton } for pid=355 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[ 48.047767][ T361] loop0: detected capacity change from 0 to 131072
[ 48.106985][ T30] audit: type=1400 audit(1744785666.246:98): avc: denied { mounton } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir3498297393/syzkaller.YxiiMc/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[ 48.140630][ T361] F2FS-fs (loop0): Found nat_bits in checkpoint
[ 48.175279][ T361] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5
[ 48.183004][ T30] audit: type=1400 audit(1744785666.316:99): avc: denied { mount } for pid=359 comm="syz-executor.0" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 48.205452][ T30] audit: type=1400 audit(1744785666.326:100): avc: denied { read } for pid=359 comm="syz-executor.0" name="file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 48.227749][ T30] audit: type=1400 audit(1744785666.326:101): avc: denied { open } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir3498297393/syzkaller.YxiiMc/0/file0/file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 48.255365][ T30] audit: type=1400 audit(1744785666.326:102): avc: denied { ioctl } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir3498297393/syzkaller.YxiiMc/0/file0/file1" dev="loop0" ino=7 ioctlcmd=0xf519 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 48.275587][ T355] ------------[ cut here ]------------
[ 48.284451][ T30] audit: type=1400 audit(1744785666.366:103): avc: denied { unmount } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 48.289929][ T355] WARNING: CPU: 1 PID: 355 at fs/f2fs/inode.c:882 f2fs_evict_inode+0x1246/0x1520
[ 48.318874][ T355] Modules linked in:
[ 48.322601][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 5.15.180-syzkaller-1080019-g8034ec1338e8 #0
[ 48.332940][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 48.342851][ T355] RIP: 0010:f2fs_evict_inode+0x1246/0x1520
[ 48.348526][ T355] Code: ff ff e8 ad c2 52 ff eb 08 e8 a6 c2 52 ff 4d 89 e5 48 8b 7c 24 10 e8 39 26 03 00 4c 8b 64 24 58 e9 b4 fc ff ff e8 8a c2 52 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 fb 30 95 ff f0 41 80 0e 04 e9 96
[ 48.368278][ T355] RSP: 0018:ffffc900009c78a0 EFLAGS: 00010293
[ 48.374173][ T355] RAX: ffffffff821db536 RBX: 0000000000000002 RCX: ffff888121fa13c0
[ 48.382171][ T355] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000
[ 48.389942][ T355] RBP: ffffc900009c7a10 R08: ffffffff821db1d1 R09: ffffed10245b45b1
[ 48.397811][ T355] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888122da2ab0
[ 48.405592][ T355] R13: dffffc0000000000 R14: ffff88810ffca078 R15: 1ffff92000138f28
[ 48.413557][ T355] FS: 0000555582e08480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 48.422581][ T355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 48.429134][ T355] CR2: 00007ffe33d65d18 CR3: 0000000123003000 CR4: 00000000003506a0
[ 48.437081][ T355] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 48.445018][ T355] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 48.453066][ T355] Call Trace:
[ 48.456251][ T355]
[ 48.458945][ T355] ? _raw_spin_unlock+0x4d/0x70
[ 48.463643][ T355] ? f2fs_write_inode+0x640/0x640
[ 48.468642][ T355] ? bit_waitqueue+0x30/0x30
[ 48.473004][ T355] ? locks_free_lock_context+0x42/0x70
[ 48.478358][ T355] ? __destroy_inode+0x35f/0x4e0
[ 48.483084][ T355] ? f2fs_write_inode+0x640/0x640
[ 48.488022][ T355] evict+0x529/0x930
[ 48.491665][ T355] ? proc_nr_inodes+0x330/0x330
[ 48.496432][ T355] ? __kasan_check_write+0x14/0x20
[ 48.501299][ T355] ? _raw_spin_lock+0xa4/0x1b0
[ 48.505896][ T355] ? _raw_spin_unlock+0x4d/0x70
[ 48.510648][ T355] ? list_lru_del+0x295/0x2d0
[ 48.515186][ T355] evict_inodes+0x642/0x6d0
[ 48.519621][ T355] ? clear_inode+0x150/0x150
[ 48.523954][ T355] generic_shutdown_super+0x97/0x330
[ 48.529308][ T355] kill_block_super+0x7e/0xe0
[ 48.533848][ T355] kill_f2fs_super+0x2f9/0x3c0
[ 48.538654][ T355] ? f2fs_mount+0x40/0x40
[ 48.542903][ T355] ? unregister_shrinker+0x23c/0x2d0
[ 48.548114][ T355] deactivate_locked_super+0xad/0x110
[ 48.553232][ T355] deactivate_super+0xbe/0xf0
[ 48.557821][ T355] cleanup_mnt+0x45c/0x510
[ 48.561996][ T355] __cleanup_mnt+0x19/0x20
[ 48.566315][ T355] task_work_run+0x129/0x190
[ 48.570706][ T355] exit_to_user_mode_loop+0xc4/0xe0
[ 48.575717][ T355] exit_to_user_mode_prepare+0x5a/0xa0
[ 48.581387][ T355] syscall_exit_to_user_mode+0x26/0x160
[ 48.586774][ T355] do_syscall_64+0x47/0xb0
[ 48.591416][ T355] ? clear_bhb_loop+0x35/0x90
[ 48.595939][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 48.601713][ T355] RIP: 0033:0x7f9604d26197
[ 48.606007][ T355] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8
[ 48.625709][ T355] RSP: 002b:00007ffe33d664c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 48.634025][ T355] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f9604d26197
[ 48.641800][ T355] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe33d66580
[ 48.649632][ T355] RBP: 00007ffe33d66580 R08: 0000000000000000 R09: 0000000000000000
[ 48.657438][ T355] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe33d67640
[ 48.665626][ T355] R13: 00007f9604d703b9 R14: 000000000000ba60 R15: 0000000000000003
[ 48.673500][ T355]
[ 48.676329][ T355] ---[ end trace 0c2405e45dcd139f ]---
[ 48.716189][ T355] ==================================================================
[ 48.724076][ T355] BUG: KASAN: use-after-free in _raw_spin_lock+0x97/0x1b0
[ 48.731013][ T355] Write of size 4 at addr ffff888122da2af8 by task syz-executor.0/355
[ 48.738998][ T355]
[ 48.741170][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Tainted: G W 5.15.180-syzkaller-1080019-g8034ec1338e8 #0
[ 48.752796][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 48.762692][ T355] Call Trace:
[ 48.765827][ T355]
[ 48.768602][ T355] dump_stack_lvl+0x151/0x1c0
[ 48.773211][ T355] ? io_uring_drop_tctx_refs+0x190/0x190
[ 48.778683][ T355] ? __wake_up_klogd+0xd5/0x110
[ 48.783351][ T355] ? panic+0x760/0x760
[ 48.787256][ T355] print_address_description+0x87/0x3b0
[ 48.792667][ T355] kasan_report+0x179/0x1c0
[ 48.797094][ T355] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[ 48.803077][ T355] ? _raw_spin_lock+0x97/0x1b0
[ 48.807675][ T355] ? _raw_spin_lock+0x97/0x1b0
[ 48.812274][ T355] kasan_check_range+0x293/0x2a0
[ 48.817044][ T355] __kasan_check_write+0x14/0x20
[ 48.821902][ T355] _raw_spin_lock+0x97/0x1b0
[ 48.826329][ T355] ? _raw_spin_trylock_bh+0x190/0x190
[ 48.831675][ T355] ? _raw_spin_lock+0xa4/0x1b0
[ 48.836361][ T355] ? _raw_spin_trylock_bh+0x190/0x190
[ 48.841649][ T355] ? remove_wait_queue+0x140/0x140
[ 48.846609][ T355] igrab+0x20/0xa0
[ 48.850177][ T355] f2fs_sync_inode_meta+0x14d/0x2a0
[ 48.855189][ T355] f2fs_write_checkpoint+0xab4/0x1fb0
[ 48.860396][ T355] ? f2fs_get_sectors_written+0x500/0x500
[ 48.866042][ T355] ? rwsem_write_trylock+0x153/0x340
[ 48.871173][ T355] ? __kasan_check_write+0x14/0x20
[ 48.876103][ T355] ? mutex_unlock+0xb2/0x260
[ 48.880703][ T355] f2fs_issue_checkpoint+0x31b/0x4d0
[ 48.885828][ T355] ? f2fs_destroy_checkpoint_caches+0x30/0x30
[ 48.891723][ T355] ? sync_inodes_sb+0x7cd/0x8b0
[ 48.896412][ T355] ? try_to_writeback_inodes_sb+0xc0/0xc0
[ 48.901966][ T355] f2fs_sync_fs+0x186/0x2f0
[ 48.906303][ T355] sync_filesystem+0x1cf/0x250
[ 48.910907][ T355] f2fs_quota_off_umount+0x20e/0x220
[ 48.916028][ T355] f2fs_put_super+0xbc/0xb80
[ 48.920453][ T355] ? fsnotify_sb_delete+0x480/0x4e0
[ 48.925751][ T355] ? f2fs_drop_inode+0xa20/0xa20
[ 48.930707][ T355] ? __fsnotify_vfsmount_delete+0x20/0x20
[ 48.936248][ T355] ? clear_inode+0x150/0x150
[ 48.940676][ T355] ? fscrypt_destroy_keyring+0x287/0x2a0
[ 48.946143][ T355] ? f2fs_drop_inode+0xa20/0xa20
[ 48.950915][ T355] generic_shutdown_super+0x14f/0x330
[ 48.956133][ T355] kill_block_super+0x7e/0xe0
[ 48.960635][ T355] kill_f2fs_super+0x2f9/0x3c0
[ 48.965237][ T355] ? f2fs_mount+0x40/0x40
[ 48.969585][ T355] ? unregister_shrinker+0x23c/0x2d0
[ 48.974806][ T355] deactivate_locked_super+0xad/0x110
[ 48.979987][ T355] deactivate_super+0xbe/0xf0
[ 48.984592][ T355] cleanup_mnt+0x45c/0x510
[ 48.988853][ T355] __cleanup_mnt+0x19/0x20
[ 48.993186][ T355] task_work_run+0x129/0x190
[ 48.997698][ T355] exit_to_user_mode_loop+0xc4/0xe0
[ 49.002734][ T355] exit_to_user_mode_prepare+0x5a/0xa0
[ 49.008033][ T355] syscall_exit_to_user_mode+0x26/0x160
[ 49.013493][ T355] do_syscall_64+0x47/0xb0
[ 49.017775][ T355] ? clear_bhb_loop+0x35/0x90
[ 49.022286][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 49.027988][ T355] RIP: 0033:0x7f9604d26197
[ 49.032250][ T355] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8
[ 49.051692][ T355] RSP: 002b:00007ffe33d664c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 49.059965][ T355] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f9604d26197
[ 49.067747][ T355] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe33d66580
[ 49.075549][ T355] RBP: 00007ffe33d66580 R08: 0000000000000000 R09: 0000000000000000
[ 49.083451][ T355] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe33d67640
[ 49.091261][ T355] R13: 00007f9604d703b9 R14: 000000000000ba60 R15: 0000000000000003
[ 49.099162][ T355]
[ 49.102020][ T355]
[ 49.104198][ T355] Allocated by task 361:
[ 49.108269][ T355] __kasan_slab_alloc+0xb1/0xe0
[ 49.112965][ T355] slab_post_alloc_hook+0x53/0x2c0
[ 49.118029][ T355] kmem_cache_alloc+0xf5/0x250
[ 49.122612][ T355] f2fs_alloc_inode+0x26/0x340
[ 49.127215][ T355] iget_locked+0x174/0x860
[ 49.131465][ T355] f2fs_iget+0x55/0x4fe0
[ 49.135543][ T355] f2fs_lookup+0x3c1/0xb40
[ 49.139797][ T355] path_openat+0x1194/0x2f40
[ 49.144404][ T355] do_filp_open+0x21c/0x460
[ 49.148748][ T355] do_sys_openat2+0x13f/0x820
[ 49.153250][ T355] __x64_sys_openat+0x243/0x290
[ 49.157936][ T355] x64_sys_call+0x6bf/0x9a0
[ 49.162275][ T355] do_syscall_64+0x3b/0xb0
[ 49.166531][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 49.172261][ T355]
[ 49.174517][ T355] Freed by task 355:
[ 49.178245][ T355] kasan_set_track+0x4b/0x70
[ 49.182672][ T355] kasan_set_free_info+0x23/0x40
[ 49.187447][ T355] ____kasan_slab_free+0x126/0x160
[ 49.192413][ T355] __kasan_slab_free+0x11/0x20
[ 49.196992][ T355] slab_free_freelist_hook+0xbd/0x190
[ 49.202229][ T355] kmem_cache_free+0x115/0x330
[ 49.206800][ T355] f2fs_free_inode+0x24/0x30
[ 49.211227][ T355] i_callback+0x4b/0x70
[ 49.215228][ T355] rcu_do_batch+0x57a/0xc10
[ 49.219560][ T355] rcu_core+0x517/0x1020
[ 49.223726][ T355] rcu_core_si+0x9/0x10
[ 49.227816][ T355] handle_softirqs+0x25e/0x5c0
[ 49.232546][ T355] __irq_exit_rcu+0x52/0xf0
[ 49.237013][ T355] irq_exit_rcu+0x9/0x10
[ 49.241089][ T355] sysvec_apic_timer_interrupt+0xa9/0xc0
[ 49.246585][ T355] asm_sysvec_apic_timer_interrupt+0x1b/0x20
[ 49.252379][ T355]
[ 49.254544][ T355] Last potentially related work creation:
[ 49.260280][ T355] kasan_save_stack+0x3b/0x60
[ 49.264787][ T355] __kasan_record_aux_stack+0xd3/0xf0
[ 49.270103][ T355] kasan_record_aux_stack_noalloc+0xb/0x10
[ 49.275730][ T355] call_rcu+0x123/0x10b0
[ 49.279797][ T355] evict+0x87d/0x930
[ 49.283536][ T355] evict_inodes+0x642/0x6d0
[ 49.287874][ T355] generic_shutdown_super+0x97/0x330
[ 49.293286][ T355] kill_block_super+0x7e/0xe0
[ 49.298056][ T355] kill_f2fs_super+0x2f9/0x3c0
[ 49.302657][ T355] deactivate_locked_super+0xad/0x110
[ 49.307901][ T355] deactivate_super+0xbe/0xf0
[ 49.312393][ T355] cleanup_mnt+0x45c/0x510
[ 49.316742][ T355] __cleanup_mnt+0x19/0x20
[ 49.321004][ T355] task_work_run+0x129/0x190
[ 49.325447][ T355] exit_to_user_mode_loop+0xc4/0xe0
[ 49.330466][ T355] exit_to_user_mode_prepare+0x5a/0xa0
[ 49.335761][ T355] syscall_exit_to_user_mode+0x26/0x160
[ 49.341142][ T355] do_syscall_64+0x47/0xb0
[ 49.345401][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 49.351220][ T355]
[ 49.353389][ T355] The buggy address belongs to the object at ffff888122da2a70
[ 49.353389][ T355] which belongs to the cache f2fs_inode_cache of size 1424
[ 49.368266][ T355] The buggy address is located 136 bytes inside of
[ 49.368266][ T355] 1424-byte region [ffff888122da2a70, ffff888122da3000)
[ 49.381536][ T355] The buggy address belongs to the page:
[ 49.387008][ T355] page:ffffea00048b6800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x122da0
[ 49.397126][ T355] head:ffffea00048b6800 order:3 compound_mapcount:0 compound_pincount:0
[ 49.405317][ T355] flags: 0x4000000000010200(slab|head|zone=1)
[ 49.411238][ T355] raw: 4000000000010200 0000000000000000 dead000000000122 ffff8881003e8900
[ 49.420167][ T355] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[ 49.428564][ T355] page dumped because: kasan: bad access detected
[ 49.434830][ T355] page_owner tracks the page as allocated
[ 49.440385][ T355] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 361, ts 48138332201, free_ts 0
[ 49.460859][ T355] post_alloc_hook+0x1a3/0x1b0
[ 49.465446][ T355] prep_new_page+0x1b/0x110
[ 49.469792][ T355] get_page_from_freelist+0x3550/0x35d0
[ 49.475177][ T355] __alloc_pages+0x27e/0x8f0
[ 49.479597][ T355] new_slab+0x9a/0x4e0
[ 49.483655][ T355] ___slab_alloc+0x39e/0x830
[ 49.488188][ T355] __slab_alloc+0x4a/0x90
[ 49.492424][ T355] kmem_cache_alloc+0x139/0x250
[ 49.497377][ T355] f2fs_alloc_inode+0x26/0x340
[ 49.502062][ T355] iget_locked+0x174/0x860
[ 49.506320][ T355] f2fs_iget+0x55/0x4fe0
[ 49.510392][ T355] f2fs_fill_super+0x4f0f/0x8190
[ 49.515169][ T355] mount_bdev+0x282/0x3b0
[ 49.519478][ T355] f2fs_mount+0x34/0x40
[ 49.523424][ T355] legacy_get_tree+0xf1/0x190
[ 49.528073][ T355] vfs_get_tree+0x88/0x290
[ 49.532326][ T355] page_owner free stack trace missing
[ 49.537524][ T355]
[ 49.539692][ T355] Memory state around the buggy address:
[ 49.545172][ T355] ffff888122da2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.553070][ T355] ffff888122da2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fa fb
[ 49.561074][ T355] >ffff888122da2a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.568952][ T355] ^
[ 49.576772][ T355] ffff888122da2b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.584776][ T355] ffff888122da2b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.593117][ T355] ==================================================================
[ 49.601201][ T355] Disabling lock debugging due to kernel taint