Warning: Permanently added '10.128.1.43' (ED25519) to the list of known hosts. 2024/08/18 13:56:24 ignoring optional flag "sandboxArg"="0" 2024/08/18 13:56:24 parsed 1 programs 2024/08/18 13:56:24 executed programs: 0 [ 47.051347][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 47.051362][ T30] audit: type=1400 audit(1723989384.419:95): avc: denied { unlink } for pid=350 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 47.088697][ T350] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.143089][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.150078][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.157448][ T356] device bridge_slave_0 entered promiscuous mode [ 47.164142][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.171316][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.178646][ T356] device bridge_slave_1 entered promiscuous mode [ 47.223857][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.230850][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.237941][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.244726][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.263799][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.271749][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.278996][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.286727][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.295426][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.303733][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.310893][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.319512][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.327641][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.334862][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.346603][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.361113][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.369454][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.381465][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.389628][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.397128][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.405937][ T356] device veth0_vlan entered promiscuous mode [ 47.415686][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.425001][ T356] device veth1_macvtap entered promiscuous mode [ 47.434297][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.445999][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.657612][ T30] audit: type=1400 audit(1723989385.019:96): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 47.782240][ T362] loop0: detected capacity change from 0 to 131072 [ 47.831458][ T30] audit: type=1400 audit(1723989385.199:97): avc: denied { mounton } for pid=360 comm="syz-executor.0" path="/root/syzkaller-testdir3816019806/syzkaller.2jlu4k/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 47.875544][ T362] F2FS-fs (loop0): Found nat_bits in checkpoint [ 47.910747][ T362] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 47.918591][ T30] audit: type=1400 audit(1723989385.279:98): avc: denied { mount } for pid=360 comm="syz-executor.0" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 47.941919][ T30] audit: type=1400 audit(1723989385.309:99): avc: denied { read } for pid=360 comm="syz-executor.0" name="file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 47.964578][ T30] audit: type=1400 audit(1723989385.309:100): avc: denied { open } for pid=360 comm="syz-executor.0" path="/root/syzkaller-testdir3816019806/syzkaller.2jlu4k/0/file0/file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 47.992109][ T30] audit: type=1400 audit(1723989385.309:101): avc: denied { ioctl } for pid=360 comm="syz-executor.0" path="/root/syzkaller-testdir3816019806/syzkaller.2jlu4k/0/file0/file1" dev="loop0" ino=7 ioctlcmd=0xf519 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.011134][ T356] ------------[ cut here ]------------ [ 48.021659][ T30] audit: type=1400 audit(1723989385.329:102): avc: denied { unmount } for pid=356 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 48.026954][ T356] WARNING: CPU: 0 PID: 356 at fs/f2fs/inode.c:865 f2fs_evict_inode+0x1191/0x1470 [ 48.055521][ T356] Modules linked in: [ 48.059223][ T356] CPU: 0 PID: 356 Comm: syz-executor.0 Not tainted 5.15.153-syzkaller-1070600-gda92e689a0c3 #0 [ 48.069523][ T356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 48.079468][ T356] RIP: 0010:f2fs_evict_inode+0x1191/0x1470 [ 48.085516][ T356] Code: 53 ff eb 0f e8 c0 6a 53 ff 49 bf 00 00 00 00 00 fc ff df 48 8b 5c 24 28 4c 89 ef e8 89 21 03 00 e9 a1 fc ff ff e8 9f 6a 53 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 d0 97 95 ff f0 41 80 0e 04 e9 7e [ 48.105201][ T356] RSP: 0018:ffffc900009a7960 EFLAGS: 00010293 [ 48.111162][ T356] RAX: ffffffff821cde11 RBX: 0000000000000002 RCX: ffff88810aefe2c0 [ 48.119007][ T356] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 48.126967][ T356] RBP: ffffc900009a7ad0 R08: ffffffff821cda99 R09: ffffed1021bf11e7 [ 48.135104][ T356] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810df88c48 [ 48.143199][ T356] R13: ffff88810df88c20 R14: ffff88810c458078 R15: dffffc0000000000 [ 48.151168][ T356] FS: 0000555557393480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 48.159898][ T356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.166357][ T356] CR2: 000000c0015ca000 CR3: 000000010bc40000 CR4: 00000000003506a0 [ 48.174275][ T356] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.182058][ T356] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.190028][ T356] Call Trace: [ 48.193369][ T356] [ 48.196104][ T356] ? show_regs+0x58/0x60 [ 48.200265][ T356] ? __warn+0x160/0x2f0 [ 48.204327][ T356] ? f2fs_evict_inode+0x1191/0x1470 [ 48.209304][ T356] ? report_bug+0x3d9/0x5b0 [ 48.214079][ T356] ? f2fs_evict_inode+0x1191/0x1470 [ 48.219778][ T356] ? handle_bug+0x41/0x70 [ 48.224313][ T356] ? exc_invalid_op+0x1b/0x50 [ 48.229053][ T356] ? asm_exc_invalid_op+0x1b/0x20 [ 48.233961][ T356] ? f2fs_evict_inode+0xe19/0x1470 [ 48.238966][ T356] ? f2fs_evict_inode+0x1191/0x1470 [ 48.244259][ T356] ? f2fs_evict_inode+0x1191/0x1470 [ 48.249284][ T356] ? _raw_spin_unlock+0x4d/0x70 [ 48.254149][ T356] ? f2fs_write_inode+0x5d0/0x5d0 [ 48.259202][ T356] ? bit_waitqueue+0x30/0x30 [ 48.263684][ T356] ? locks_free_lock_context+0x42/0x70 [ 48.269009][ T356] ? __destroy_inode+0x35f/0x4e0 [ 48.273883][ T356] ? f2fs_write_inode+0x5d0/0x5d0 [ 48.278643][ T356] evict+0x2a3/0x630 [ 48.282402][ T356] evict_inodes+0x5db/0x660 [ 48.286719][ T356] ? clear_inode+0x150/0x150 [ 48.291413][ T356] generic_shutdown_super+0x9c/0x2e0 [ 48.296530][ T356] kill_block_super+0x7e/0xe0 [ 48.301310][ T356] kill_f2fs_super+0x2f9/0x3c0 [ 48.305965][ T356] ? f2fs_mount+0x40/0x40 [ 48.310242][ T356] ? unregister_shrinker+0x23c/0x2d0 [ 48.315497][ T356] deactivate_locked_super+0xad/0x110 [ 48.320700][ T356] deactivate_super+0xbe/0xf0 [ 48.325264][ T356] cleanup_mnt+0x45c/0x510 [ 48.329492][ T356] __cleanup_mnt+0x19/0x20 [ 48.333775][ T356] task_work_run+0x129/0x190 [ 48.338145][ T356] exit_to_user_mode_loop+0xc4/0xe0 [ 48.343271][ T356] exit_to_user_mode_prepare+0x5a/0xa0 [ 48.348470][ T356] syscall_exit_to_user_mode+0x26/0x160 [ 48.353923][ T356] do_syscall_64+0x49/0xb0 [ 48.358191][ T356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 48.363957][ T356] RIP: 0033:0x7f408923e197 [ 48.368181][ T356] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 48.387869][ T356] RSP: 002b:00007ffd62400e48 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 48.396350][ T356] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f408923e197 [ 48.404180][ T356] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffd62400f00 [ 48.411986][ T356] RBP: 00007ffd62400f00 R08: 0000000000000000 R09: 0000000000000000 [ 48.419974][ T356] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffd62401fc0 [ 48.427934][ T356] R13: 00007f40892883b9 R14: 000000000000b95d R15: 0000000000000003 [ 48.435780][ T356] [ 48.438606][ T356] ---[ end trace acb8bd7280213152 ]--- [ 48.480821][ T356] ================================================================== [ 48.488704][ T356] BUG: KASAN: use-after-free in _raw_spin_lock+0x97/0x1b0 [ 48.495823][ T356] Write of size 4 at addr ffff88810df88ca8 by task syz-executor.0/356 [ 48.503804][ T356] [ 48.505978][ T356] CPU: 0 PID: 356 Comm: syz-executor.0 Tainted: G W 5.15.153-syzkaller-1070600-gda92e689a0c3 #0 [ 48.517534][ T356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 48.527570][ T356] Call Trace: [ 48.530622][ T356] [ 48.533401][ T356] dump_stack_lvl+0x151/0x1c0 [ 48.537949][ T356] ? io_uring_drop_tctx_refs+0x190/0x190 [ 48.543388][ T356] ? __wake_up_klogd+0xd5/0x110 [ 48.548158][ T356] ? panic+0x760/0x760 [ 48.552071][ T356] print_address_description+0x87/0x3b0 [ 48.557526][ T356] kasan_report+0x179/0x1c0 [ 48.561873][ T356] ? _raw_spin_lock+0x97/0x1b0 [ 48.566465][ T356] ? _raw_spin_lock+0x97/0x1b0 [ 48.571194][ T356] kasan_check_range+0x293/0x2a0 [ 48.575968][ T356] __kasan_check_write+0x14/0x20 [ 48.580743][ T356] _raw_spin_lock+0x97/0x1b0 [ 48.585283][ T356] ? _raw_spin_trylock_bh+0x190/0x190 [ 48.590493][ T356] ? _raw_spin_lock+0xa4/0x1b0 [ 48.595087][ T356] ? _raw_spin_trylock_bh+0x190/0x190 [ 48.600307][ T356] ? remove_wait_queue+0x140/0x140 [ 48.605253][ T356] igrab+0x20/0xa0 [ 48.608928][ T356] f2fs_sync_inode_meta+0x14d/0x2a0 [ 48.614049][ T356] f2fs_write_checkpoint+0xab4/0x1fb0 [ 48.619249][ T356] ? f2fs_get_sectors_written+0x500/0x500 [ 48.624850][ T356] ? rwsem_write_trylock+0x153/0x340 [ 48.629929][ T356] ? __kasan_check_write+0x14/0x20 [ 48.634963][ T356] ? mutex_unlock+0xb2/0x260 [ 48.639556][ T356] f2fs_issue_checkpoint+0x31b/0x4d0 [ 48.644678][ T356] ? f2fs_destroy_checkpoint_caches+0x30/0x30 [ 48.650752][ T356] ? sync_inodes_sb+0x7cd/0x8b0 [ 48.655461][ T356] ? try_to_writeback_inodes_sb+0xc0/0xc0 [ 48.661051][ T356] f2fs_sync_fs+0x186/0x2f0 [ 48.665333][ T356] sync_filesystem+0x1cf/0x250 [ 48.669938][ T356] f2fs_quota_off_umount+0x20e/0x220 [ 48.675187][ T356] ? f2fs_drop_inode+0xa20/0xa20 [ 48.679940][ T356] f2fs_put_super+0xb9/0xc10 [ 48.684548][ T356] ? f2fs_drop_inode+0xa20/0xa20 [ 48.689505][ T356] ? __fsnotify_vfsmount_delete+0x20/0x20 [ 48.695330][ T356] ? clear_inode+0x150/0x150 [ 48.699758][ T356] ? fscrypt_destroy_keyring+0x287/0x2a0 [ 48.705215][ T356] ? f2fs_drop_inode+0xa20/0xa20 [ 48.710113][ T356] generic_shutdown_super+0x157/0x2e0 [ 48.715326][ T356] kill_block_super+0x7e/0xe0 [ 48.719872][ T356] kill_f2fs_super+0x2f9/0x3c0 [ 48.724702][ T356] ? f2fs_mount+0x40/0x40 [ 48.728873][ T356] ? unregister_shrinker+0x23c/0x2d0 [ 48.733988][ T356] deactivate_locked_super+0xad/0x110 [ 48.739280][ T356] deactivate_super+0xbe/0xf0 [ 48.743801][ T356] cleanup_mnt+0x45c/0x510 [ 48.748228][ T356] __cleanup_mnt+0x19/0x20 [ 48.752477][ T356] task_work_run+0x129/0x190 [ 48.756920][ T356] exit_to_user_mode_loop+0xc4/0xe0 [ 48.761945][ T356] exit_to_user_mode_prepare+0x5a/0xa0 [ 48.767312][ T356] syscall_exit_to_user_mode+0x26/0x160 [ 48.772957][ T356] do_syscall_64+0x49/0xb0 [ 48.777220][ T356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 48.782950][ T356] RIP: 0033:0x7f408923e197 [ 48.787533][ T356] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 48.807597][ T356] RSP: 002b:00007ffd62400e48 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 48.815833][ T356] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f408923e197 [ 48.823648][ T356] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffd62400f00 [ 48.831456][ T356] RBP: 00007ffd62400f00 R08: 0000000000000000 R09: 0000000000000000 [ 48.839272][ T356] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffd62401fc0 [ 48.847083][ T356] R13: 00007f40892883b9 R14: 000000000000b95d R15: 0000000000000003 [ 48.854908][ T356] [ 48.857864][ T356] [ 48.860034][ T356] Allocated by task 362: [ 48.864112][ T356] __kasan_slab_alloc+0xb1/0xe0 [ 48.868918][ T356] slab_post_alloc_hook+0x53/0x2c0 [ 48.873833][ T356] kmem_cache_alloc+0xf5/0x200 [ 48.878440][ T356] f2fs_alloc_inode+0x26/0x340 [ 48.883300][ T356] iget_locked+0x174/0x860 [ 48.887572][ T356] f2fs_iget+0x55/0x5040 [ 48.891745][ T356] f2fs_lookup+0x410/0xd80 [ 48.896106][ T356] path_openat+0x1194/0x2f40 [ 48.900513][ T356] do_filp_open+0x21c/0x460 [ 48.904896][ T356] do_sys_openat2+0x13f/0x830 [ 48.909362][ T356] __x64_sys_openat+0x243/0x290 [ 48.914054][ T356] do_syscall_64+0x3d/0xb0 [ 48.918428][ T356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 48.924147][ T356] [ 48.926404][ T356] Freed by task 356: [ 48.930166][ T356] kasan_set_track+0x4b/0x70 [ 48.934844][ T356] kasan_set_free_info+0x23/0x40 [ 48.939684][ T356] ____kasan_slab_free+0x126/0x160 [ 48.944635][ T356] __kasan_slab_free+0x11/0x20 [ 48.949231][ T356] slab_free_freelist_hook+0xbd/0x190 [ 48.954483][ T356] kmem_cache_free+0x116/0x2e0 [ 48.959040][ T356] f2fs_free_inode+0x24/0x30 [ 48.963472][ T356] i_callback+0x4b/0x70 [ 48.967460][ T356] rcu_do_batch+0x57a/0xc10 [ 48.971795][ T356] rcu_core+0x517/0x1020 [ 48.975962][ T356] rcu_core_si+0x9/0x10 [ 48.980041][ T356] __do_softirq+0x26d/0x5bf [ 48.984386][ T356] [ 48.986742][ T356] Last potentially related work creation: [ 48.992473][ T356] kasan_save_stack+0x3b/0x60 [ 48.996992][ T356] __kasan_record_aux_stack+0xd3/0xf0 [ 49.002366][ T356] kasan_record_aux_stack_noalloc+0xb/0x10 [ 49.008011][ T356] call_rcu+0x135/0x1310 [ 49.012087][ T356] evict+0x5df/0x630 [ 49.015904][ T356] evict_inodes+0x5db/0x660 [ 49.020247][ T356] generic_shutdown_super+0x9c/0x2e0 [ 49.025552][ T356] kill_block_super+0x7e/0xe0 [ 49.030049][ T356] kill_f2fs_super+0x2f9/0x3c0 [ 49.034745][ T356] deactivate_locked_super+0xad/0x110 [ 49.039945][ T356] deactivate_super+0xbe/0xf0 [ 49.044458][ T356] cleanup_mnt+0x45c/0x510 [ 49.048713][ T356] __cleanup_mnt+0x19/0x20 [ 49.053052][ T356] task_work_run+0x129/0x190 [ 49.057495][ T356] exit_to_user_mode_loop+0xc4/0xe0 [ 49.062545][ T356] exit_to_user_mode_prepare+0x5a/0xa0 [ 49.067808][ T356] syscall_exit_to_user_mode+0x26/0x160 [ 49.073285][ T356] do_syscall_64+0x49/0xb0 [ 49.077799][ T356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.083618][ T356] [ 49.086121][ T356] The buggy address belongs to the object at ffff88810df88c20 [ 49.086121][ T356] which belongs to the cache f2fs_inode_cache of size 1424 [ 49.100962][ T356] The buggy address is located 136 bytes inside of [ 49.100962][ T356] 1424-byte region [ffff88810df88c20, ffff88810df891b0) [ 49.114405][ T356] The buggy address belongs to the page: [ 49.119989][ T356] page:ffffea000437e200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10df88 [ 49.130488][ T356] head:ffffea000437e200 order:3 compound_mapcount:0 compound_pincount:0 [ 49.138639][ T356] flags: 0x4000000000010200(slab|head|zone=1) [ 49.144649][ T356] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888107fba300 [ 49.153313][ T356] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000 [ 49.161891][ T356] page dumped because: kasan: bad access detected [ 49.168083][ T356] page_owner tracks the page as allocated [ 49.173721][ T356] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 362, ts 47872969043, free_ts 0 [ 49.194375][ T356] post_alloc_hook+0x1a3/0x1b0 [ 49.198966][ T356] prep_new_page+0x1b/0x110 [ 49.203394][ T356] get_page_from_freelist+0x3550/0x35d0 [ 49.208779][ T356] __alloc_pages+0x27e/0x8f0 [ 49.213221][ T356] new_slab+0x9a/0x4e0 [ 49.217206][ T356] ___slab_alloc+0x39e/0x830 [ 49.221805][ T356] __slab_alloc+0x4a/0x90 [ 49.225992][ T356] kmem_cache_alloc+0x134/0x200 [ 49.230648][ T356] f2fs_alloc_inode+0x26/0x340 [ 49.235302][ T356] iget_locked+0x174/0x860 [ 49.239767][ T356] f2fs_iget+0x55/0x5040 [ 49.243927][ T356] f2fs_fill_super+0x4eed/0x8170 [ 49.248726][ T356] mount_bdev+0x282/0x3b0 [ 49.252865][ T356] f2fs_mount+0x34/0x40 [ 49.256856][ T356] legacy_get_tree+0xf1/0x190 [ 49.262265][ T356] vfs_get_tree+0x88/0x290 [ 49.266661][ T356] page_owner free stack trace missing [ 49.271860][ T356] [ 49.274026][ T356] Memory state around the buggy address: [ 49.279498][ T356] ffff88810df88b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.287395][ T356] ffff88810df88c00: fc fc fc fc fa fb fb fb fb fb fb fb fb fb fb fb [ 49.295378][ T356] >ffff88810df88c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.303390][ T356] ^ [ 49.308568][ T356] ffff88810df88d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.316471][ T356] ffff88810df88d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.324536][ T356] ================================================================== [ 49.332730][ T356] Disabling lock debugging due to kernel taint