Warning: Permanently added '10.128.1.131' (ED25519) to the list of known hosts. 2025/04/16 06:38:06 ignoring optional flag "sandboxArg"="0" 2025/04/16 06:38:06 ignoring optional flag "type"="gce" 2025/04/16 06:38:06 parsed 1 programs 2025/04/16 06:38:06 executed programs: 0 [ 47.068042][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 47.068057][ T30] audit: type=1400 audit(1744785486.871:95): avc: denied { unlink } for pid=348 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 47.104844][ T348] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.164461][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.171474][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.178726][ T355] device bridge_slave_0 entered promiscuous mode [ 47.185362][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.192336][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.199743][ T355] device bridge_slave_1 entered promiscuous mode [ 47.207954][ T30] audit: type=1400 audit(1744785487.011:96): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 47.267738][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.274688][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.282127][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.289167][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.308227][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.315338][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.322762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.330190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.339925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.347993][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.354844][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.363739][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.371854][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.379376][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.391807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.401914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.415701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.426728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.434787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.442688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.450885][ T355] device veth0_vlan entered promiscuous mode [ 47.461109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.470115][ T355] device veth1_macvtap entered promiscuous mode [ 47.479998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.489770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.503932][ T30] audit: type=1400 audit(1744785487.301:97): avc: denied { mounton } for pid=355 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 47.852881][ T360] loop0: detected capacity change from 0 to 131072 [ 47.859838][ T30] audit: type=1400 audit(1744785487.661:98): avc: denied { mounton } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir4219571/syzkaller.RVrkZA/0/file2" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 47.860772][ T360] F2FS-fs (loop0): Invalid log sectors per block(124) log sectorsize(9) [ 47.894467][ T360] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 47.904032][ T360] F2FS-fs (loop0): invalid crc value [ 47.910847][ T360] F2FS-fs (loop0): Disable nat_bits due to incorrect cp_ver (9621037545273099749, 1067266233009637) [ 47.923283][ T360] F2FS-fs (loop0): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. [ 47.944347][ T360] F2FS-fs (loop0): Try to recover 1th superblock, ret: 0 [ 47.951319][ T360] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 47.959080][ T30] audit: type=1400 audit(1744785487.761:99): avc: denied { mount } for pid=359 comm="syz-executor.0" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 47.983830][ T30] audit: type=1400 audit(1744785487.781:100): avc: denied { read } for pid=359 comm="syz-executor.0" name="file2" dev="loop0" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.006718][ T30] audit: type=1400 audit(1744785487.781:101): avc: denied { open } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir4219571/syzkaller.RVrkZA/0/file2/file2" dev="loop0" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.009366][ T355] ------------[ cut here ]------------ [ 48.034795][ T30] audit: type=1400 audit(1744785487.781:102): avc: denied { ioctl } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir4219571/syzkaller.RVrkZA/0/file2/file2" dev="loop0" ino=8 ioctlcmd=0xf519 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.039605][ T355] WARNING: CPU: 1 PID: 355 at fs/f2fs/inode.c:882 f2fs_evict_inode+0x1246/0x1520 [ 48.068750][ T30] audit: type=1400 audit(1744785487.801:103): avc: denied { unmount } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 48.077717][ T355] Modules linked in: [ 48.100390][ T355] CPU: 0 PID: 355 Comm: syz-executor.0 Not tainted 5.15.180-syzkaller-1080019-g8034ec1338e8 #0 [ 48.110882][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 48.120838][ T355] RIP: 0010:f2fs_evict_inode+0x1246/0x1520 [ 48.126499][ T355] Code: ff ff e8 ad c2 52 ff eb 08 e8 a6 c2 52 ff 4d 89 e5 48 8b 7c 24 10 e8 39 26 03 00 4c 8b 64 24 58 e9 b4 fc ff ff e8 8a c2 52 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 fb 30 95 ff f0 41 80 0e 04 e9 96 [ 48.146004][ T355] RSP: 0018:ffffc90000b278a0 EFLAGS: 00010293 [ 48.151851][ T355] RAX: ffffffff821db536 RBX: 0000000000000002 RCX: ffff88810f60e2c0 [ 48.159668][ T355] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 48.167823][ T355] RBP: ffffc90000b27a10 R08: ffffffff821db1d1 R09: ffffed10246a6735 [ 48.175598][ T355] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881235336d0 [ 48.183476][ T355] R13: dffffc0000000000 R14: ffff88810ff24078 R15: 1ffff92000164f28 [ 48.191624][ T355] FS: 0000555575a6c480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 48.200798][ T355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.207217][ T355] CR2: 00007fffca474e78 CR3: 000000010cdc5000 CR4: 00000000003506a0 [ 48.215133][ T355] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.223072][ T355] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.231094][ T355] Call Trace: [ 48.234307][ T355] [ 48.237015][ T355] ? _raw_spin_unlock+0x4d/0x70 [ 48.241835][ T355] ? f2fs_write_inode+0x640/0x640 [ 48.246676][ T355] ? bit_waitqueue+0x30/0x30 [ 48.251147][ T355] ? locks_free_lock_context+0x42/0x70 [ 48.256706][ T355] ? __destroy_inode+0x35f/0x4e0 [ 48.261682][ T355] ? f2fs_write_inode+0x640/0x640 [ 48.266728][ T355] evict+0x529/0x930 [ 48.270848][ T355] ? proc_nr_inodes+0x330/0x330 [ 48.275627][ T355] ? __kasan_check_write+0x14/0x20 [ 48.280955][ T355] ? _raw_spin_lock+0xa4/0x1b0 [ 48.285558][ T355] ? _raw_spin_unlock+0x4d/0x70 [ 48.290338][ T355] ? list_lru_del+0x295/0x2d0 [ 48.294762][ T355] evict_inodes+0x642/0x6d0 [ 48.299143][ T355] ? clear_inode+0x150/0x150 [ 48.303530][ T355] generic_shutdown_super+0x97/0x330 [ 48.308685][ T355] kill_block_super+0x7e/0xe0 [ 48.313311][ T355] kill_f2fs_super+0x2f9/0x3c0 [ 48.317964][ T355] ? f2fs_mount+0x40/0x40 [ 48.322124][ T355] ? unregister_shrinker+0x23c/0x2d0 [ 48.327276][ T355] deactivate_locked_super+0xad/0x110 [ 48.332692][ T355] deactivate_super+0xbe/0xf0 [ 48.337139][ T355] cleanup_mnt+0x45c/0x510 [ 48.341421][ T355] __cleanup_mnt+0x19/0x20 [ 48.345640][ T355] task_work_run+0x129/0x190 [ 48.350485][ T355] exit_to_user_mode_loop+0xc4/0xe0 [ 48.355522][ T355] exit_to_user_mode_prepare+0x5a/0xa0 [ 48.361313][ T355] syscall_exit_to_user_mode+0x26/0x160 [ 48.366699][ T355] do_syscall_64+0x47/0xb0 [ 48.371041][ T355] ? clear_bhb_loop+0x35/0x90 [ 48.375467][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.381429][ T355] RIP: 0033:0x7f8975996017 [ 48.385619][ T355] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 48.405357][ T355] RSP: 002b:00007fffca475628 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 48.413601][ T355] RAX: 0000000000000000 RBX: 00007f89759e03b9 RCX: 00007f8975996017 [ 48.421420][ T355] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007fffca4756e0 [ 48.429460][ T355] RBP: 00007fffca4756e0 R08: 0000000000000000 R09: 0000000000000000 [ 48.437453][ T355] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fffca4767a0 [ 48.445764][ T355] R13: 00007f89759e03b9 R14: 000000000000b98f R15: 0000000000000003 [ 48.453743][ T355] [ 48.456598][ T355] ---[ end trace b160959a9416967b ]--- [ 48.508938][ T355] ================================================================== [ 48.516837][ T355] BUG: KASAN: use-after-free in _raw_spin_lock+0x97/0x1b0 [ 48.523775][ T355] Write of size 4 at addr ffff888123533718 by task syz-executor.0/355 [ 48.531778][ T355] [ 48.534017][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Tainted: G W 5.15.180-syzkaller-1080019-g8034ec1338e8 #0 [ 48.545907][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 48.555940][ T355] Call Trace: [ 48.559054][ T355] [ 48.561847][ T355] dump_stack_lvl+0x151/0x1c0 [ 48.566399][ T355] ? io_uring_drop_tctx_refs+0x190/0x190 [ 48.571990][ T355] ? __wake_up_klogd+0xd5/0x110 [ 48.576699][ T355] ? panic+0x760/0x760 [ 48.580582][ T355] print_address_description+0x87/0x3b0 [ 48.585965][ T355] kasan_report+0x179/0x1c0 [ 48.590407][ T355] ? _raw_spin_lock+0x97/0x1b0 [ 48.595007][ T355] ? _raw_spin_lock+0x97/0x1b0 [ 48.599601][ T355] kasan_check_range+0x293/0x2a0 [ 48.604452][ T355] __kasan_check_write+0x14/0x20 [ 48.609153][ T355] _raw_spin_lock+0x97/0x1b0 [ 48.613580][ T355] ? _raw_spin_trylock_bh+0x190/0x190 [ 48.618789][ T355] ? _raw_spin_lock+0xa4/0x1b0 [ 48.623390][ T355] ? _raw_spin_trylock_bh+0x190/0x190 [ 48.628591][ T355] ? remove_wait_queue+0x140/0x140 [ 48.633540][ T355] igrab+0x20/0xa0 [ 48.637185][ T355] f2fs_sync_inode_meta+0x14d/0x2a0 [ 48.642243][ T355] f2fs_write_checkpoint+0xab4/0x1fb0 [ 48.647426][ T355] ? f2fs_get_sectors_written+0x500/0x500 [ 48.652980][ T355] ? rwsem_write_trylock+0x153/0x340 [ 48.658113][ T355] ? __kasan_check_write+0x14/0x20 [ 48.663054][ T355] ? mutex_unlock+0xb2/0x260 [ 48.667482][ T355] f2fs_issue_checkpoint+0x31b/0x4d0 [ 48.672599][ T355] ? f2fs_destroy_checkpoint_caches+0x30/0x30 [ 48.678502][ T355] ? sync_inodes_sb+0x7cd/0x8b0 [ 48.683184][ T355] ? try_to_writeback_inodes_sb+0xc0/0xc0 [ 48.688825][ T355] f2fs_sync_fs+0x186/0x2f0 [ 48.693255][ T355] sync_filesystem+0x1cf/0x250 [ 48.697878][ T355] f2fs_quota_off_umount+0x20e/0x220 [ 48.702994][ T355] f2fs_put_super+0xbc/0xb80 [ 48.707422][ T355] ? fsnotify_sb_delete+0x480/0x4e0 [ 48.712558][ T355] ? f2fs_drop_inode+0xa20/0xa20 [ 48.717332][ T355] ? __fsnotify_vfsmount_delete+0x20/0x20 [ 48.722910][ T355] ? clear_inode+0x150/0x150 [ 48.727346][ T355] ? fscrypt_destroy_keyring+0x287/0x2a0 [ 48.732779][ T355] ? f2fs_drop_inode+0xa20/0xa20 [ 48.737728][ T355] generic_shutdown_super+0x14f/0x330 [ 48.742937][ T355] kill_block_super+0x7e/0xe0 [ 48.747460][ T355] kill_f2fs_super+0x2f9/0x3c0 [ 48.752209][ T355] ? f2fs_mount+0x40/0x40 [ 48.756399][ T355] ? unregister_shrinker+0x23c/0x2d0 [ 48.761704][ T355] deactivate_locked_super+0xad/0x110 [ 48.767008][ T355] deactivate_super+0xbe/0xf0 [ 48.771503][ T355] cleanup_mnt+0x45c/0x510 [ 48.775754][ T355] __cleanup_mnt+0x19/0x20 [ 48.780009][ T355] task_work_run+0x129/0x190 [ 48.784520][ T355] exit_to_user_mode_loop+0xc4/0xe0 [ 48.789554][ T355] exit_to_user_mode_prepare+0x5a/0xa0 [ 48.795012][ T355] syscall_exit_to_user_mode+0x26/0x160 [ 48.800353][ T355] do_syscall_64+0x47/0xb0 [ 48.804612][ T355] ? clear_bhb_loop+0x35/0x90 [ 48.809111][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.814952][ T355] RIP: 0033:0x7f8975996017 [ 48.819316][ T355] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 48.839241][ T355] RSP: 002b:00007fffca475628 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 48.847495][ T355] RAX: 0000000000000000 RBX: 00007f89759e03b9 RCX: 00007f8975996017 [ 48.855377][ T355] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007fffca4756e0 [ 48.863358][ T355] RBP: 00007fffca4756e0 R08: 0000000000000000 R09: 0000000000000000 [ 48.871173][ T355] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fffca4767a0 [ 48.878985][ T355] R13: 00007f89759e03b9 R14: 000000000000b98f R15: 0000000000000003 [ 48.886806][ T355] [ 48.889744][ T355] [ 48.891913][ T355] Allocated by task 360: [ 48.895992][ T355] __kasan_slab_alloc+0xb1/0xe0 [ 48.900680][ T355] slab_post_alloc_hook+0x53/0x2c0 [ 48.905645][ T355] kmem_cache_alloc+0xf5/0x250 [ 48.910229][ T355] f2fs_alloc_inode+0x26/0x340 [ 48.914835][ T355] iget_locked+0x174/0x860 [ 48.919093][ T355] f2fs_iget+0x55/0x4fe0 [ 48.923158][ T355] f2fs_lookup+0x3c1/0xb40 [ 48.927508][ T355] path_openat+0x1194/0x2f40 [ 48.932023][ T355] do_filp_open+0x21c/0x460 [ 48.936485][ T355] do_sys_openat2+0x13f/0x820 [ 48.941155][ T355] __x64_sys_open+0x221/0x270 [ 48.945756][ T355] x64_sys_call+0x36/0x9a0 [ 48.950005][ T355] do_syscall_64+0x3b/0xb0 [ 48.954255][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.960073][ T355] [ 48.962244][ T355] Freed by task 0: [ 48.965800][ T355] kasan_set_track+0x4b/0x70 [ 48.970227][ T355] kasan_set_free_info+0x23/0x40 [ 48.974998][ T355] ____kasan_slab_free+0x126/0x160 [ 48.979944][ T355] __kasan_slab_free+0x11/0x20 [ 48.984545][ T355] slab_free_freelist_hook+0xbd/0x190 [ 48.989843][ T355] kmem_cache_free+0x115/0x330 [ 48.994526][ T355] f2fs_free_inode+0x24/0x30 [ 48.998954][ T355] i_callback+0x4b/0x70 [ 49.003003][ T355] rcu_do_batch+0x57a/0xc10 [ 49.007287][ T355] rcu_core+0x517/0x1020 [ 49.011363][ T355] rcu_core_si+0x9/0x10 [ 49.015359][ T355] handle_softirqs+0x25e/0x5c0 [ 49.019963][ T355] __irq_exit_rcu+0x52/0xf0 [ 49.024499][ T355] irq_exit_rcu+0x9/0x10 [ 49.028659][ T355] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 49.034137][ T355] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 49.039952][ T355] [ 49.042201][ T355] Last potentially related work creation: [ 49.047756][ T355] kasan_save_stack+0x3b/0x60 [ 49.052273][ T355] __kasan_record_aux_stack+0xd3/0xf0 [ 49.057607][ T355] kasan_record_aux_stack_noalloc+0xb/0x10 [ 49.063261][ T355] call_rcu+0x123/0x10b0 [ 49.067316][ T355] evict+0x87d/0x930 [ 49.071307][ T355] evict_inodes+0x642/0x6d0 [ 49.075644][ T355] generic_shutdown_super+0x97/0x330 [ 49.080774][ T355] kill_block_super+0x7e/0xe0 [ 49.085283][ T355] kill_f2fs_super+0x2f9/0x3c0 [ 49.090006][ T355] deactivate_locked_super+0xad/0x110 [ 49.095174][ T355] deactivate_super+0xbe/0xf0 [ 49.099803][ T355] cleanup_mnt+0x45c/0x510 [ 49.104087][ T355] __cleanup_mnt+0x19/0x20 [ 49.108304][ T355] task_work_run+0x129/0x190 [ 49.112730][ T355] exit_to_user_mode_loop+0xc4/0xe0 [ 49.117782][ T355] exit_to_user_mode_prepare+0x5a/0xa0 [ 49.123071][ T355] syscall_exit_to_user_mode+0x26/0x160 [ 49.128448][ T355] do_syscall_64+0x47/0xb0 [ 49.132694][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 49.138419][ T355] [ 49.140589][ T355] The buggy address belongs to the object at ffff888123533690 [ 49.140589][ T355] which belongs to the cache f2fs_inode_cache of size 1424 [ 49.155008][ T355] The buggy address is located 136 bytes inside of [ 49.155008][ T355] 1424-byte region [ffff888123533690, ffff888123533c20) [ 49.168404][ T355] The buggy address belongs to the page: [ 49.173865][ T355] page:ffffea00048d4c00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x123530 [ 49.184309][ T355] head:ffffea00048d4c00 order:3 compound_mapcount:0 compound_pincount:0 [ 49.192441][ T355] flags: 0x4000000000010200(slab|head|zone=1) [ 49.198355][ T355] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888107fb3800 [ 49.206862][ T355] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000 [ 49.215264][ T355] page dumped because: kasan: bad access detected [ 49.221532][ T355] page_owner tracks the page as allocated [ 49.227187][ T355] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 360, ts 47903400032, free_ts 0 [ 49.247747][ T355] post_alloc_hook+0x1a3/0x1b0 [ 49.252360][ T355] prep_new_page+0x1b/0x110 [ 49.256669][ T355] get_page_from_freelist+0x3550/0x35d0 [ 49.262081][ T355] __alloc_pages+0x27e/0x8f0 [ 49.266479][ T355] new_slab+0x9a/0x4e0 [ 49.270392][ T355] ___slab_alloc+0x39e/0x830 [ 49.274819][ T355] __slab_alloc+0x4a/0x90 [ 49.278990][ T355] kmem_cache_alloc+0x139/0x250 [ 49.283665][ T355] f2fs_alloc_inode+0x26/0x340 [ 49.288269][ T355] iget_locked+0x174/0x860 [ 49.292516][ T355] f2fs_iget+0x55/0x4fe0 [ 49.296733][ T355] f2fs_fill_super+0x4f0f/0x8190 [ 49.301482][ T355] mount_bdev+0x282/0x3b0 [ 49.305645][ T355] f2fs_mount+0x34/0x40 [ 49.309648][ T355] legacy_get_tree+0xf1/0x190 [ 49.314150][ T355] vfs_get_tree+0x88/0x290 [ 49.318402][ T355] page_owner free stack trace missing [ 49.323613][ T355] [ 49.325890][ T355] Memory state around the buggy address: [ 49.331364][ T355] ffff888123533600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.339263][ T355] ffff888123533680: fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.347158][ T355] >ffff888123533700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.355063][ T355] ^ [ 49.359883][ T355] ffff888123533780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.368579][ T355] ffff888123533800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.376549][ T355] ================================================================== [ 49.384547][ T355] Disabling lock debugging due to kernel taint