Warning: Permanently added '10.128.1.144' (ED25519) to the list of known hosts. 2025/04/16 06:41:05 ignoring optional flag "sandboxArg"="0" 2025/04/16 06:41:05 ignoring optional flag "type"="gce" 2025/04/16 06:41:05 parsed 1 programs [ 47.284245][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 47.284261][ T30] audit: type=1400 audit(1744785665.426:95): avc: denied { unlink } for pid=348 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/04/16 06:41:05 executed programs: 0 [ 47.315951][ T30] audit: type=1400 audit(1744785665.426:96): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 47.318429][ T348] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.395581][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.402485][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.409856][ T355] device bridge_slave_0 entered promiscuous mode [ 47.416752][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.423701][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.431149][ T355] device bridge_slave_1 entered promiscuous mode [ 47.478036][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.485023][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.492275][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.499270][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.518209][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.525372][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.532692][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.540300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.549216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.557329][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.564254][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.573025][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.581236][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.588218][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.599880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.608985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.622847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.633975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.642243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.649726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.657895][ T355] device veth0_vlan entered promiscuous mode [ 47.668108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.677441][ T355] device veth1_macvtap entered promiscuous mode [ 47.686721][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.697727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.711604][ T30] audit: type=1400 audit(1744785665.846:97): avc: denied { mounton } for pid=355 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 48.047767][ T361] loop0: detected capacity change from 0 to 131072 [ 48.106985][ T30] audit: type=1400 audit(1744785666.246:98): avc: denied { mounton } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir3498297393/syzkaller.YxiiMc/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 48.140630][ T361] F2FS-fs (loop0): Found nat_bits in checkpoint [ 48.175279][ T361] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 48.183004][ T30] audit: type=1400 audit(1744785666.316:99): avc: denied { mount } for pid=359 comm="syz-executor.0" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 48.205452][ T30] audit: type=1400 audit(1744785666.326:100): avc: denied { read } for pid=359 comm="syz-executor.0" name="file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.227749][ T30] audit: type=1400 audit(1744785666.326:101): avc: denied { open } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir3498297393/syzkaller.YxiiMc/0/file0/file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.255365][ T30] audit: type=1400 audit(1744785666.326:102): avc: denied { ioctl } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir3498297393/syzkaller.YxiiMc/0/file0/file1" dev="loop0" ino=7 ioctlcmd=0xf519 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.275587][ T355] ------------[ cut here ]------------ [ 48.284451][ T30] audit: type=1400 audit(1744785666.366:103): avc: denied { unmount } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 48.289929][ T355] WARNING: CPU: 1 PID: 355 at fs/f2fs/inode.c:882 f2fs_evict_inode+0x1246/0x1520 [ 48.318874][ T355] Modules linked in: [ 48.322601][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 5.15.180-syzkaller-1080019-g8034ec1338e8 #0 [ 48.332940][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 48.342851][ T355] RIP: 0010:f2fs_evict_inode+0x1246/0x1520 [ 48.348526][ T355] Code: ff ff e8 ad c2 52 ff eb 08 e8 a6 c2 52 ff 4d 89 e5 48 8b 7c 24 10 e8 39 26 03 00 4c 8b 64 24 58 e9 b4 fc ff ff e8 8a c2 52 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 fb 30 95 ff f0 41 80 0e 04 e9 96 [ 48.368278][ T355] RSP: 0018:ffffc900009c78a0 EFLAGS: 00010293 [ 48.374173][ T355] RAX: ffffffff821db536 RBX: 0000000000000002 RCX: ffff888121fa13c0 [ 48.382171][ T355] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 48.389942][ T355] RBP: ffffc900009c7a10 R08: ffffffff821db1d1 R09: ffffed10245b45b1 [ 48.397811][ T355] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888122da2ab0 [ 48.405592][ T355] R13: dffffc0000000000 R14: ffff88810ffca078 R15: 1ffff92000138f28 [ 48.413557][ T355] FS: 0000555582e08480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 48.422581][ T355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.429134][ T355] CR2: 00007ffe33d65d18 CR3: 0000000123003000 CR4: 00000000003506a0 [ 48.437081][ T355] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.445018][ T355] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.453066][ T355] Call Trace: [ 48.456251][ T355] [ 48.458945][ T355] ? _raw_spin_unlock+0x4d/0x70 [ 48.463643][ T355] ? f2fs_write_inode+0x640/0x640 [ 48.468642][ T355] ? bit_waitqueue+0x30/0x30 [ 48.473004][ T355] ? locks_free_lock_context+0x42/0x70 [ 48.478358][ T355] ? __destroy_inode+0x35f/0x4e0 [ 48.483084][ T355] ? f2fs_write_inode+0x640/0x640 [ 48.488022][ T355] evict+0x529/0x930 [ 48.491665][ T355] ? proc_nr_inodes+0x330/0x330 [ 48.496432][ T355] ? __kasan_check_write+0x14/0x20 [ 48.501299][ T355] ? _raw_spin_lock+0xa4/0x1b0 [ 48.505896][ T355] ? _raw_spin_unlock+0x4d/0x70 [ 48.510648][ T355] ? list_lru_del+0x295/0x2d0 [ 48.515186][ T355] evict_inodes+0x642/0x6d0 [ 48.519621][ T355] ? clear_inode+0x150/0x150 [ 48.523954][ T355] generic_shutdown_super+0x97/0x330 [ 48.529308][ T355] kill_block_super+0x7e/0xe0 [ 48.533848][ T355] kill_f2fs_super+0x2f9/0x3c0 [ 48.538654][ T355] ? f2fs_mount+0x40/0x40 [ 48.542903][ T355] ? unregister_shrinker+0x23c/0x2d0 [ 48.548114][ T355] deactivate_locked_super+0xad/0x110 [ 48.553232][ T355] deactivate_super+0xbe/0xf0 [ 48.557821][ T355] cleanup_mnt+0x45c/0x510 [ 48.561996][ T355] __cleanup_mnt+0x19/0x20 [ 48.566315][ T355] task_work_run+0x129/0x190 [ 48.570706][ T355] exit_to_user_mode_loop+0xc4/0xe0 [ 48.575717][ T355] exit_to_user_mode_prepare+0x5a/0xa0 [ 48.581387][ T355] syscall_exit_to_user_mode+0x26/0x160 [ 48.586774][ T355] do_syscall_64+0x47/0xb0 [ 48.591416][ T355] ? clear_bhb_loop+0x35/0x90 [ 48.595939][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.601713][ T355] RIP: 0033:0x7f9604d26197 [ 48.606007][ T355] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 48.625709][ T355] RSP: 002b:00007ffe33d664c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 48.634025][ T355] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f9604d26197 [ 48.641800][ T355] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe33d66580 [ 48.649632][ T355] RBP: 00007ffe33d66580 R08: 0000000000000000 R09: 0000000000000000 [ 48.657438][ T355] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe33d67640 [ 48.665626][ T355] R13: 00007f9604d703b9 R14: 000000000000ba60 R15: 0000000000000003 [ 48.673500][ T355] [ 48.676329][ T355] ---[ end trace 0c2405e45dcd139f ]--- [ 48.716189][ T355] ================================================================== [ 48.724076][ T355] BUG: KASAN: use-after-free in _raw_spin_lock+0x97/0x1b0 [ 48.731013][ T355] Write of size 4 at addr ffff888122da2af8 by task syz-executor.0/355 [ 48.738998][ T355] [ 48.741170][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Tainted: G W 5.15.180-syzkaller-1080019-g8034ec1338e8 #0 [ 48.752796][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 48.762692][ T355] Call Trace: [ 48.765827][ T355] [ 48.768602][ T355] dump_stack_lvl+0x151/0x1c0 [ 48.773211][ T355] ? io_uring_drop_tctx_refs+0x190/0x190 [ 48.778683][ T355] ? __wake_up_klogd+0xd5/0x110 [ 48.783351][ T355] ? panic+0x760/0x760 [ 48.787256][ T355] print_address_description+0x87/0x3b0 [ 48.792667][ T355] kasan_report+0x179/0x1c0 [ 48.797094][ T355] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 48.803077][ T355] ? _raw_spin_lock+0x97/0x1b0 [ 48.807675][ T355] ? _raw_spin_lock+0x97/0x1b0 [ 48.812274][ T355] kasan_check_range+0x293/0x2a0 [ 48.817044][ T355] __kasan_check_write+0x14/0x20 [ 48.821902][ T355] _raw_spin_lock+0x97/0x1b0 [ 48.826329][ T355] ? _raw_spin_trylock_bh+0x190/0x190 [ 48.831675][ T355] ? _raw_spin_lock+0xa4/0x1b0 [ 48.836361][ T355] ? _raw_spin_trylock_bh+0x190/0x190 [ 48.841649][ T355] ? remove_wait_queue+0x140/0x140 [ 48.846609][ T355] igrab+0x20/0xa0 [ 48.850177][ T355] f2fs_sync_inode_meta+0x14d/0x2a0 [ 48.855189][ T355] f2fs_write_checkpoint+0xab4/0x1fb0 [ 48.860396][ T355] ? f2fs_get_sectors_written+0x500/0x500 [ 48.866042][ T355] ? rwsem_write_trylock+0x153/0x340 [ 48.871173][ T355] ? __kasan_check_write+0x14/0x20 [ 48.876103][ T355] ? mutex_unlock+0xb2/0x260 [ 48.880703][ T355] f2fs_issue_checkpoint+0x31b/0x4d0 [ 48.885828][ T355] ? f2fs_destroy_checkpoint_caches+0x30/0x30 [ 48.891723][ T355] ? sync_inodes_sb+0x7cd/0x8b0 [ 48.896412][ T355] ? try_to_writeback_inodes_sb+0xc0/0xc0 [ 48.901966][ T355] f2fs_sync_fs+0x186/0x2f0 [ 48.906303][ T355] sync_filesystem+0x1cf/0x250 [ 48.910907][ T355] f2fs_quota_off_umount+0x20e/0x220 [ 48.916028][ T355] f2fs_put_super+0xbc/0xb80 [ 48.920453][ T355] ? fsnotify_sb_delete+0x480/0x4e0 [ 48.925751][ T355] ? f2fs_drop_inode+0xa20/0xa20 [ 48.930707][ T355] ? __fsnotify_vfsmount_delete+0x20/0x20 [ 48.936248][ T355] ? clear_inode+0x150/0x150 [ 48.940676][ T355] ? fscrypt_destroy_keyring+0x287/0x2a0 [ 48.946143][ T355] ? f2fs_drop_inode+0xa20/0xa20 [ 48.950915][ T355] generic_shutdown_super+0x14f/0x330 [ 48.956133][ T355] kill_block_super+0x7e/0xe0 [ 48.960635][ T355] kill_f2fs_super+0x2f9/0x3c0 [ 48.965237][ T355] ? f2fs_mount+0x40/0x40 [ 48.969585][ T355] ? unregister_shrinker+0x23c/0x2d0 [ 48.974806][ T355] deactivate_locked_super+0xad/0x110 [ 48.979987][ T355] deactivate_super+0xbe/0xf0 [ 48.984592][ T355] cleanup_mnt+0x45c/0x510 [ 48.988853][ T355] __cleanup_mnt+0x19/0x20 [ 48.993186][ T355] task_work_run+0x129/0x190 [ 48.997698][ T355] exit_to_user_mode_loop+0xc4/0xe0 [ 49.002734][ T355] exit_to_user_mode_prepare+0x5a/0xa0 [ 49.008033][ T355] syscall_exit_to_user_mode+0x26/0x160 [ 49.013493][ T355] do_syscall_64+0x47/0xb0 [ 49.017775][ T355] ? clear_bhb_loop+0x35/0x90 [ 49.022286][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 49.027988][ T355] RIP: 0033:0x7f9604d26197 [ 49.032250][ T355] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 49.051692][ T355] RSP: 002b:00007ffe33d664c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 49.059965][ T355] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f9604d26197 [ 49.067747][ T355] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe33d66580 [ 49.075549][ T355] RBP: 00007ffe33d66580 R08: 0000000000000000 R09: 0000000000000000 [ 49.083451][ T355] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe33d67640 [ 49.091261][ T355] R13: 00007f9604d703b9 R14: 000000000000ba60 R15: 0000000000000003 [ 49.099162][ T355] [ 49.102020][ T355] [ 49.104198][ T355] Allocated by task 361: [ 49.108269][ T355] __kasan_slab_alloc+0xb1/0xe0 [ 49.112965][ T355] slab_post_alloc_hook+0x53/0x2c0 [ 49.118029][ T355] kmem_cache_alloc+0xf5/0x250 [ 49.122612][ T355] f2fs_alloc_inode+0x26/0x340 [ 49.127215][ T355] iget_locked+0x174/0x860 [ 49.131465][ T355] f2fs_iget+0x55/0x4fe0 [ 49.135543][ T355] f2fs_lookup+0x3c1/0xb40 [ 49.139797][ T355] path_openat+0x1194/0x2f40 [ 49.144404][ T355] do_filp_open+0x21c/0x460 [ 49.148748][ T355] do_sys_openat2+0x13f/0x820 [ 49.153250][ T355] __x64_sys_openat+0x243/0x290 [ 49.157936][ T355] x64_sys_call+0x6bf/0x9a0 [ 49.162275][ T355] do_syscall_64+0x3b/0xb0 [ 49.166531][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 49.172261][ T355] [ 49.174517][ T355] Freed by task 355: [ 49.178245][ T355] kasan_set_track+0x4b/0x70 [ 49.182672][ T355] kasan_set_free_info+0x23/0x40 [ 49.187447][ T355] ____kasan_slab_free+0x126/0x160 [ 49.192413][ T355] __kasan_slab_free+0x11/0x20 [ 49.196992][ T355] slab_free_freelist_hook+0xbd/0x190 [ 49.202229][ T355] kmem_cache_free+0x115/0x330 [ 49.206800][ T355] f2fs_free_inode+0x24/0x30 [ 49.211227][ T355] i_callback+0x4b/0x70 [ 49.215228][ T355] rcu_do_batch+0x57a/0xc10 [ 49.219560][ T355] rcu_core+0x517/0x1020 [ 49.223726][ T355] rcu_core_si+0x9/0x10 [ 49.227816][ T355] handle_softirqs+0x25e/0x5c0 [ 49.232546][ T355] __irq_exit_rcu+0x52/0xf0 [ 49.237013][ T355] irq_exit_rcu+0x9/0x10 [ 49.241089][ T355] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 49.246585][ T355] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 49.252379][ T355] [ 49.254544][ T355] Last potentially related work creation: [ 49.260280][ T355] kasan_save_stack+0x3b/0x60 [ 49.264787][ T355] __kasan_record_aux_stack+0xd3/0xf0 [ 49.270103][ T355] kasan_record_aux_stack_noalloc+0xb/0x10 [ 49.275730][ T355] call_rcu+0x123/0x10b0 [ 49.279797][ T355] evict+0x87d/0x930 [ 49.283536][ T355] evict_inodes+0x642/0x6d0 [ 49.287874][ T355] generic_shutdown_super+0x97/0x330 [ 49.293286][ T355] kill_block_super+0x7e/0xe0 [ 49.298056][ T355] kill_f2fs_super+0x2f9/0x3c0 [ 49.302657][ T355] deactivate_locked_super+0xad/0x110 [ 49.307901][ T355] deactivate_super+0xbe/0xf0 [ 49.312393][ T355] cleanup_mnt+0x45c/0x510 [ 49.316742][ T355] __cleanup_mnt+0x19/0x20 [ 49.321004][ T355] task_work_run+0x129/0x190 [ 49.325447][ T355] exit_to_user_mode_loop+0xc4/0xe0 [ 49.330466][ T355] exit_to_user_mode_prepare+0x5a/0xa0 [ 49.335761][ T355] syscall_exit_to_user_mode+0x26/0x160 [ 49.341142][ T355] do_syscall_64+0x47/0xb0 [ 49.345401][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 49.351220][ T355] [ 49.353389][ T355] The buggy address belongs to the object at ffff888122da2a70 [ 49.353389][ T355] which belongs to the cache f2fs_inode_cache of size 1424 [ 49.368266][ T355] The buggy address is located 136 bytes inside of [ 49.368266][ T355] 1424-byte region [ffff888122da2a70, ffff888122da3000) [ 49.381536][ T355] The buggy address belongs to the page: [ 49.387008][ T355] page:ffffea00048b6800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x122da0 [ 49.397126][ T355] head:ffffea00048b6800 order:3 compound_mapcount:0 compound_pincount:0 [ 49.405317][ T355] flags: 0x4000000000010200(slab|head|zone=1) [ 49.411238][ T355] raw: 4000000000010200 0000000000000000 dead000000000122 ffff8881003e8900 [ 49.420167][ T355] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000 [ 49.428564][ T355] page dumped because: kasan: bad access detected [ 49.434830][ T355] page_owner tracks the page as allocated [ 49.440385][ T355] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 361, ts 48138332201, free_ts 0 [ 49.460859][ T355] post_alloc_hook+0x1a3/0x1b0 [ 49.465446][ T355] prep_new_page+0x1b/0x110 [ 49.469792][ T355] get_page_from_freelist+0x3550/0x35d0 [ 49.475177][ T355] __alloc_pages+0x27e/0x8f0 [ 49.479597][ T355] new_slab+0x9a/0x4e0 [ 49.483655][ T355] ___slab_alloc+0x39e/0x830 [ 49.488188][ T355] __slab_alloc+0x4a/0x90 [ 49.492424][ T355] kmem_cache_alloc+0x139/0x250 [ 49.497377][ T355] f2fs_alloc_inode+0x26/0x340 [ 49.502062][ T355] iget_locked+0x174/0x860 [ 49.506320][ T355] f2fs_iget+0x55/0x4fe0 [ 49.510392][ T355] f2fs_fill_super+0x4f0f/0x8190 [ 49.515169][ T355] mount_bdev+0x282/0x3b0 [ 49.519478][ T355] f2fs_mount+0x34/0x40 [ 49.523424][ T355] legacy_get_tree+0xf1/0x190 [ 49.528073][ T355] vfs_get_tree+0x88/0x290 [ 49.532326][ T355] page_owner free stack trace missing [ 49.537524][ T355] [ 49.539692][ T355] Memory state around the buggy address: [ 49.545172][ T355] ffff888122da2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.553070][ T355] ffff888122da2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fa fb [ 49.561074][ T355] >ffff888122da2a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.568952][ T355] ^ [ 49.576772][ T355] ffff888122da2b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.584776][ T355] ffff888122da2b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.593117][ T355] ================================================================== [ 49.601201][ T355] Disabling lock debugging due to kernel taint