Warning: Permanently added '10.128.0.161' (ED25519) to the list of known hosts. 2024/04/26 02:41:40 ignoring optional flag "sandboxArg"="0" 2024/04/26 02:41:40 parsed 1 programs [ 40.835667][ T30] audit: type=1400 audit(1714099300.474:157): avc: denied { mounton } for pid=338 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.861602][ T30] audit: type=1400 audit(1714099300.474:158): avc: denied { mount } for pid=338 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2024/04/26 02:41:40 executed programs: 0 [ 40.943270][ T30] audit: type=1400 audit(1714099300.584:159): avc: denied { unlink } for pid=338 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 40.970281][ T338] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 41.029231][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.037247][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.045425][ T344] device bridge_slave_0 entered promiscuous mode [ 41.052148][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.059441][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.067474][ T344] device bridge_slave_1 entered promiscuous mode [ 41.118663][ T30] audit: type=1400 audit(1714099300.754:160): avc: denied { write } for pid=344 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.125530][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.139872][ T30] audit: type=1400 audit(1714099300.754:161): avc: denied { read } for pid=344 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.146789][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.146928][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.183808][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.206575][ T61] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.213868][ T61] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.222180][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.231464][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.243206][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.251448][ T61] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.258861][ T61] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.266885][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.275267][ T61] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.282344][ T61] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.304453][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.313901][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.322041][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.332989][ T344] device veth0_vlan entered promiscuous mode [ 41.343357][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.352261][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.359951][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.369338][ T344] device veth1_macvtap entered promiscuous mode [ 41.377889][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.393095][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.403555][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.417938][ T30] audit: type=1400 audit(1714099301.054:162): avc: denied { mounton } for pid=344 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.786625][ T350] loop0: detected capacity change from 0 to 131072 [ 41.833283][ T30] audit: type=1400 audit(1714099301.474:163): avc: denied { mounton } for pid=349 comm="syz-executor.0" path="/root/syzkaller-testdir2385912628/syzkaller.aPjjYv/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.899240][ T350] F2FS-fs (loop0): Found nat_bits in checkpoint [ 41.935656][ T350] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 41.944471][ T30] audit: type=1400 audit(1714099301.584:164): avc: denied { mount } for pid=349 comm="syz-executor.0" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 41.969920][ T30] audit: type=1400 audit(1714099301.604:165): avc: denied { read } for pid=349 comm="syz-executor.0" name="file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 41.993732][ T30] audit: type=1400 audit(1714099301.604:166): avc: denied { open } for pid=349 comm="syz-executor.0" path="/root/syzkaller-testdir2385912628/syzkaller.aPjjYv/0/file0/file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 42.035517][ T344] ------------[ cut here ]------------ [ 42.041077][ T344] WARNING: CPU: 1 PID: 344 at fs/f2fs/inode.c:850 f2fs_evict_inode+0x1191/0x1470 [ 42.050555][ T344] Modules linked in: [ 42.054444][ T344] CPU: 1 PID: 344 Comm: syz-executor.0 Not tainted 5.15.149-syzkaller-1069109-g5d96939590c0 #0 [ 42.064837][ T344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 42.074990][ T344] RIP: 0010:f2fs_evict_inode+0x1191/0x1470 [ 42.080753][ T344] Code: 53 ff eb 0f e8 f0 94 53 ff 49 bf 00 00 00 00 00 fc ff df 48 8b 5c 24 28 4c 89 ef e8 89 21 03 00 e9 a1 fc ff ff e8 cf 94 53 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 b0 a5 95 ff f0 41 80 0e 04 e9 7e [ 42.100929][ T344] RSP: 0018:ffffc90000987960 EFLAGS: 00010293 [ 42.107481][ T344] RAX: ffffffff821c8f31 RBX: 0000000000000002 RCX: ffff88810c6913c0 [ 42.115453][ T344] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 42.124143][ T344] RBP: ffffc90000987ad0 R08: ffffffff821c8bb9 R09: ffffed1021f4df8b [ 42.132255][ T344] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810fa6f968 [ 42.141082][ T344] R13: ffff88810fa6f940 R14: ffff88810d614078 R15: dffffc0000000000 [ 42.150633][ T344] FS: 0000555555893480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 42.160098][ T344] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.167647][ T344] CR2: 000055555589c818 CR3: 000000011c27f000 CR4: 00000000003506a0 [ 42.176202][ T344] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 42.184717][ T344] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 42.193741][ T344] Call Trace: [ 42.197120][ T344] [ 42.199892][ T344] ? show_regs+0x58/0x60 [ 42.204106][ T344] ? __warn+0x160/0x2f0 [ 42.208113][ T344] ? f2fs_evict_inode+0x1191/0x1470 [ 42.213959][ T344] ? report_bug+0x3d9/0x5b0 [ 42.218319][ T344] ? f2fs_evict_inode+0x1191/0x1470 [ 42.223694][ T344] ? handle_bug+0x41/0x70 [ 42.227771][ T344] ? exc_invalid_op+0x1b/0x50 [ 42.233298][ T344] ? asm_exc_invalid_op+0x1b/0x20 [ 42.238588][ T344] ? f2fs_evict_inode+0xe19/0x1470 [ 42.243884][ T344] ? f2fs_evict_inode+0x1191/0x1470 [ 42.249348][ T344] ? f2fs_evict_inode+0x1191/0x1470 [ 42.255730][ T344] ? _raw_spin_unlock+0x4d/0x70 [ 42.260853][ T344] ? f2fs_write_inode+0x5d0/0x5d0 [ 42.266539][ T344] ? bit_waitqueue+0x30/0x30 [ 42.271556][ T344] ? locks_free_lock_context+0x42/0x70 [ 42.277360][ T344] ? __destroy_inode+0x35f/0x4e0 [ 42.282667][ T344] ? f2fs_write_inode+0x5d0/0x5d0 [ 42.287810][ T344] evict+0x2a3/0x630 [ 42.291958][ T344] evict_inodes+0x5db/0x660 [ 42.296911][ T344] ? clear_inode+0x150/0x150 [ 42.301502][ T344] generic_shutdown_super+0x9c/0x2e0 [ 42.306754][ T344] kill_block_super+0x7e/0xe0 [ 42.311205][ T344] kill_f2fs_super+0x2f9/0x3c0 [ 42.316043][ T344] ? f2fs_mount+0x40/0x40 [ 42.320224][ T344] ? unregister_shrinker+0x23c/0x2d0 [ 42.325385][ T344] deactivate_locked_super+0xad/0x110 [ 42.330546][ T344] deactivate_super+0xbe/0xf0 [ 42.335125][ T344] cleanup_mnt+0x45c/0x510 [ 42.339437][ T344] __cleanup_mnt+0x19/0x20 [ 42.344222][ T344] task_work_run+0x129/0x190 [ 42.349027][ T344] exit_to_user_mode_loop+0xc4/0xe0 [ 42.354633][ T344] exit_to_user_mode_prepare+0x5a/0xa0 [ 42.360073][ T344] syscall_exit_to_user_mode+0x26/0x160 [ 42.365727][ T344] do_syscall_64+0x49/0xb0 [ 42.370071][ T344] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.376147][ T344] RIP: 0033:0x7f586f254197 [ 42.380407][ T344] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 42.400000][ T344] RSP: 002b:00007ffe3dc45ff8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 42.408208][ T344] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f586f254197 [ 42.416477][ T344] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe3dc460b0 [ 42.424860][ T344] RBP: 00007ffe3dc460b0 R08: 0000000000000000 R09: 0000000000000000 [ 42.433269][ T344] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe3dc47170 [ 42.441096][ T344] R13: 00007f586f29e3b9 R14: 000000000000a1dd R15: 0000000000000003 [ 42.449027][ T344] [ 42.452304][ T344] ---[ end trace fbb3a568c6a7b776 ]--- [ 42.492578][ T344] ================================================================== [ 42.500671][ T344] BUG: KASAN: use-after-free in _raw_spin_lock+0x97/0x1b0 [ 42.508513][ T344] Write of size 4 at addr ffff88810fa6f9c8 by task syz-executor.0/344 [ 42.516495][ T344] [ 42.518677][ T344] CPU: 1 PID: 344 Comm: syz-executor.0 Tainted: G W 5.15.149-syzkaller-1069109-g5d96939590c0 #0 [ 42.530419][ T344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 42.540401][ T344] Call Trace: [ 42.543632][ T344] [ 42.546674][ T344] dump_stack_lvl+0x151/0x1b7 [ 42.551360][ T344] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.557125][ T344] ? __wake_up_klogd+0xd5/0x110 [ 42.562233][ T344] ? panic+0x751/0x751 [ 42.566249][ T344] ? __schedule+0xcd4/0x1590 [ 42.570852][ T344] print_address_description+0x87/0x3b0 [ 42.576364][ T344] kasan_report+0x179/0x1c0 [ 42.581028][ T344] ? _raw_spin_lock+0x97/0x1b0 [ 42.585618][ T344] ? _raw_spin_lock+0x97/0x1b0 [ 42.590452][ T344] kasan_check_range+0x293/0x2a0 [ 42.595364][ T344] __kasan_check_write+0x14/0x20 [ 42.600115][ T344] _raw_spin_lock+0x97/0x1b0 [ 42.604785][ T344] ? _raw_spin_trylock_bh+0x190/0x190 [ 42.610220][ T344] ? _raw_spin_lock+0xa4/0x1b0 [ 42.614811][ T344] ? _raw_spin_trylock_bh+0x190/0x190 [ 42.620426][ T344] ? remove_wait_queue+0x140/0x140 [ 42.625366][ T344] igrab+0x20/0xa0 [ 42.629411][ T344] f2fs_sync_inode_meta+0x14d/0x2a0 [ 42.634961][ T344] f2fs_write_checkpoint+0xab4/0x1fb0 [ 42.640404][ T344] ? f2fs_get_sectors_written+0x500/0x500 [ 42.646032][ T344] ? rwsem_write_trylock+0x15b/0x290 [ 42.651325][ T344] ? __kasan_check_write+0x14/0x20 [ 42.656357][ T344] ? mutex_unlock+0xb2/0x260 [ 42.660993][ T344] f2fs_issue_checkpoint+0x31b/0x4d0 [ 42.666399][ T344] ? f2fs_destroy_checkpoint_caches+0x30/0x30 [ 42.672387][ T344] ? sync_inodes_sb+0x7cd/0x8b0 [ 42.677171][ T344] ? try_to_writeback_inodes_sb+0xc0/0xc0 [ 42.682712][ T344] f2fs_sync_fs+0x186/0x2f0 [ 42.687443][ T344] sync_filesystem+0x1cf/0x250 [ 42.692013][ T344] f2fs_quota_off_umount+0x20e/0x220 [ 42.697220][ T344] ? f2fs_drop_inode+0xa20/0xa20 [ 42.702016][ T344] f2fs_put_super+0xb9/0xc10 [ 42.706508][ T344] ? f2fs_drop_inode+0xa20/0xa20 [ 42.711392][ T344] ? __fsnotify_vfsmount_delete+0x20/0x20 [ 42.717046][ T344] ? clear_inode+0x150/0x150 [ 42.721462][ T344] ? fscrypt_destroy_keyring+0x287/0x2a0 [ 42.727103][ T344] ? f2fs_drop_inode+0xa20/0xa20 [ 42.731876][ T344] generic_shutdown_super+0x157/0x2e0 [ 42.737084][ T344] kill_block_super+0x7e/0xe0 [ 42.741873][ T344] kill_f2fs_super+0x2f9/0x3c0 [ 42.746470][ T344] ? f2fs_mount+0x40/0x40 [ 42.750633][ T344] ? unregister_shrinker+0x23c/0x2d0 [ 42.755835][ T344] deactivate_locked_super+0xad/0x110 [ 42.761048][ T344] deactivate_super+0xbe/0xf0 [ 42.765657][ T344] cleanup_mnt+0x45c/0x510 [ 42.770000][ T344] __cleanup_mnt+0x19/0x20 [ 42.774243][ T344] task_work_run+0x129/0x190 [ 42.778664][ T344] exit_to_user_mode_loop+0xc4/0xe0 [ 42.783944][ T344] exit_to_user_mode_prepare+0x5a/0xa0 [ 42.789242][ T344] syscall_exit_to_user_mode+0x26/0x160 [ 42.794625][ T344] do_syscall_64+0x49/0xb0 [ 42.798917][ T344] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.804606][ T344] RIP: 0033:0x7f586f254197 [ 42.809113][ T344] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 42.828940][ T344] RSP: 002b:00007ffe3dc45ff8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 42.837353][ T344] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f586f254197 [ 42.845278][ T344] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe3dc460b0 [ 42.853179][ T344] RBP: 00007ffe3dc460b0 R08: 0000000000000000 R09: 0000000000000000 [ 42.861210][ T344] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe3dc47170 [ 42.869332][ T344] R13: 00007f586f29e3b9 R14: 000000000000a1dd R15: 0000000000000003 [ 42.877573][ T344] [ 42.880395][ T344] [ 42.882651][ T344] Allocated by task 350: [ 42.886902][ T344] __kasan_slab_alloc+0xb1/0xe0 [ 42.891587][ T344] slab_post_alloc_hook+0x53/0x2c0 [ 42.896533][ T344] kmem_cache_alloc+0xf5/0x200 [ 42.901131][ T344] f2fs_alloc_inode+0x26/0x340 [ 42.906002][ T344] iget_locked+0x174/0x860 [ 42.910358][ T344] f2fs_iget+0x55/0x4de0 [ 42.914426][ T344] f2fs_lookup+0x410/0xd80 [ 42.918992][ T344] path_openat+0x1194/0x2f40 [ 42.923508][ T344] do_filp_open+0x21c/0x460 [ 42.927859][ T344] do_sys_openat2+0x13f/0x830 [ 42.932804][ T344] __x64_sys_openat+0x243/0x290 [ 42.937664][ T344] do_syscall_64+0x3d/0xb0 [ 42.942198][ T344] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.947956][ T344] [ 42.950087][ T344] Freed by task 344: [ 42.954187][ T344] kasan_set_track+0x4b/0x70 [ 42.959124][ T344] kasan_set_free_info+0x23/0x40 [ 42.963906][ T344] ____kasan_slab_free+0x126/0x160 [ 42.968833][ T344] __kasan_slab_free+0x11/0x20 [ 42.973599][ T344] slab_free_freelist_hook+0xbd/0x190 [ 42.978904][ T344] kmem_cache_free+0x116/0x2e0 [ 42.983721][ T344] f2fs_free_inode+0x24/0x30 [ 42.988314][ T344] i_callback+0x4b/0x70 [ 42.992421][ T344] rcu_do_batch+0x57a/0xc10 [ 42.996764][ T344] rcu_core+0x517/0x1020 [ 43.000840][ T344] rcu_core_si+0x9/0x10 [ 43.004834][ T344] __do_softirq+0x26d/0x5bf [ 43.009347][ T344] [ 43.011640][ T344] Last potentially related work creation: [ 43.017344][ T344] kasan_save_stack+0x3b/0x60 [ 43.021845][ T344] __kasan_record_aux_stack+0xd3/0xf0 [ 43.027578][ T344] kasan_record_aux_stack_noalloc+0xb/0x10 [ 43.033224][ T344] call_rcu+0x133/0x12a0 [ 43.037642][ T344] evict+0x5df/0x630 [ 43.041373][ T344] evict_inodes+0x5db/0x660 [ 43.045718][ T344] generic_shutdown_super+0x9c/0x2e0 [ 43.050831][ T344] kill_block_super+0x7e/0xe0 [ 43.055433][ T344] kill_f2fs_super+0x2f9/0x3c0 [ 43.060134][ T344] deactivate_locked_super+0xad/0x110 [ 43.065510][ T344] deactivate_super+0xbe/0xf0 [ 43.070147][ T344] cleanup_mnt+0x45c/0x510 [ 43.074385][ T344] __cleanup_mnt+0x19/0x20 [ 43.078647][ T344] task_work_run+0x129/0x190 [ 43.083069][ T344] exit_to_user_mode_loop+0xc4/0xe0 [ 43.088106][ T344] exit_to_user_mode_prepare+0x5a/0xa0 [ 43.093832][ T344] syscall_exit_to_user_mode+0x26/0x160 [ 43.099900][ T344] do_syscall_64+0x49/0xb0 [ 43.104680][ T344] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.110662][ T344] [ 43.112838][ T344] The buggy address belongs to the object at ffff88810fa6f940 [ 43.112838][ T344] which belongs to the cache f2fs_inode_cache of size 1424 [ 43.128017][ T344] The buggy address is located 136 bytes inside of [ 43.128017][ T344] 1424-byte region [ffff88810fa6f940, ffff88810fa6fed0) [ 43.142703][ T344] The buggy address belongs to the page: [ 43.148976][ T344] page:ffffea00043e9a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10fa68 [ 43.159286][ T344] head:ffffea00043e9a00 order:3 compound_mapcount:0 compound_pincount:0 [ 43.167809][ T344] flags: 0x4000000000010200(slab|head|zone=1) [ 43.173709][ T344] raw: 4000000000010200 0000000000000000 dead000000000122 ffff8881003e3080 [ 43.182298][ T344] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000 [ 43.190914][ T344] page dumped because: kasan: bad access detected [ 43.197217][ T344] page_owner tracks the page as allocated [ 43.202763][ T344] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 350, ts 41969444416, free_ts 0 [ 43.224537][ T344] post_alloc_hook+0x1a3/0x1b0 [ 43.229212][ T344] prep_new_page+0x1b/0x110 [ 43.233733][ T344] get_page_from_freelist+0x3550/0x35d0 [ 43.239209][ T344] __alloc_pages+0x27e/0x8f0 [ 43.243715][ T344] new_slab+0x9a/0x4e0 [ 43.247621][ T344] ___slab_alloc+0x39e/0x830 [ 43.252362][ T344] __slab_alloc+0x4a/0x90 [ 43.256472][ T344] kmem_cache_alloc+0x134/0x200 [ 43.261333][ T344] f2fs_alloc_inode+0x26/0x340 [ 43.266285][ T344] iget_locked+0x174/0x860 [ 43.271229][ T344] f2fs_iget+0x55/0x4de0 [ 43.275475][ T344] f2fs_lookup+0x410/0xd80 [ 43.279993][ T344] path_openat+0x1194/0x2f40 [ 43.284415][ T344] do_filp_open+0x21c/0x460 [ 43.289013][ T344] do_sys_openat2+0x13f/0x830 [ 43.293699][ T344] __x64_sys_openat+0x243/0x290 [ 43.298563][ T344] page_owner free stack trace missing [ 43.304234][ T344] [ 43.306385][ T344] Memory state around the buggy address: [ 43.312193][ T344] ffff88810fa6f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.320420][ T344] ffff88810fa6f900: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 43.328427][ T344] >ffff88810fa6f980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.336408][ T344] ^ [ 43.342670][ T344] ffff88810fa6fa00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.350750][ T344] ffff88810fa6fa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.358693][ T344] ================================================================== [ 43.366719][ T344] Disabling lock debugging due to kernel taint