Warning: Permanently added '10.128.1.131' (ED25519) to the list of known hosts.
2025/04/16 06:38:06 ignoring optional flag "sandboxArg"="0"
2025/04/16 06:38:06 ignoring optional flag "type"="gce"
2025/04/16 06:38:06 parsed 1 programs
2025/04/16 06:38:06 executed programs: 0
[ 47.068042][ T30] kauditd_printk_skb: 19 callbacks suppressed
[ 47.068057][ T30] audit: type=1400 audit(1744785486.871:95): avc: denied { unlink } for pid=348 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 47.104844][ T348] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 47.164461][ T355] bridge0: port 1(bridge_slave_0) entered blocking state
[ 47.171474][ T355] bridge0: port 1(bridge_slave_0) entered disabled state
[ 47.178726][ T355] device bridge_slave_0 entered promiscuous mode
[ 47.185362][ T355] bridge0: port 2(bridge_slave_1) entered blocking state
[ 47.192336][ T355] bridge0: port 2(bridge_slave_1) entered disabled state
[ 47.199743][ T355] device bridge_slave_1 entered promiscuous mode
[ 47.207954][ T30] audit: type=1400 audit(1744785487.011:96): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 47.267738][ T355] bridge0: port 2(bridge_slave_1) entered blocking state
[ 47.274688][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 47.282127][ T355] bridge0: port 1(bridge_slave_0) entered blocking state
[ 47.289167][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 47.308227][ T8] bridge0: port 1(bridge_slave_0) entered disabled state
[ 47.315338][ T8] bridge0: port 2(bridge_slave_1) entered disabled state
[ 47.322762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 47.330190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 47.339925][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 47.347993][ T8] bridge0: port 1(bridge_slave_0) entered blocking state
[ 47.354844][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 47.363739][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 47.371854][ T8] bridge0: port 2(bridge_slave_1) entered blocking state
[ 47.379376][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 47.391807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 47.401914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 47.415701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 47.426728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 47.434787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 47.442688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 47.450885][ T355] device veth0_vlan entered promiscuous mode
[ 47.461109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 47.470115][ T355] device veth1_macvtap entered promiscuous mode
[ 47.479998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 47.489770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 47.503932][ T30] audit: type=1400 audit(1744785487.301:97): avc: denied { mounton } for pid=355 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[ 47.852881][ T360] loop0: detected capacity change from 0 to 131072
[ 47.859838][ T30] audit: type=1400 audit(1744785487.661:98): avc: denied { mounton } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir4219571/syzkaller.RVrkZA/0/file2" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[ 47.860772][ T360] F2FS-fs (loop0): Invalid log sectors per block(124) log sectorsize(9)
[ 47.894467][ T360] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock
[ 47.904032][ T360] F2FS-fs (loop0): invalid crc value
[ 47.910847][ T360] F2FS-fs (loop0): Disable nat_bits due to incorrect cp_ver (9621037545273099749, 1067266233009637)
[ 47.923283][ T360] F2FS-fs (loop0): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix.
[ 47.944347][ T360] F2FS-fs (loop0): Try to recover 1th superblock, ret: 0
[ 47.951319][ T360] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5
[ 47.959080][ T30] audit: type=1400 audit(1744785487.761:99): avc: denied { mount } for pid=359 comm="syz-executor.0" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 47.983830][ T30] audit: type=1400 audit(1744785487.781:100): avc: denied { read } for pid=359 comm="syz-executor.0" name="file2" dev="loop0" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 48.006718][ T30] audit: type=1400 audit(1744785487.781:101): avc: denied { open } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir4219571/syzkaller.RVrkZA/0/file2/file2" dev="loop0" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 48.009366][ T355] ------------[ cut here ]------------
[ 48.034795][ T30] audit: type=1400 audit(1744785487.781:102): avc: denied { ioctl } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir4219571/syzkaller.RVrkZA/0/file2/file2" dev="loop0" ino=8 ioctlcmd=0xf519 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1
[ 48.039605][ T355] WARNING: CPU: 1 PID: 355 at fs/f2fs/inode.c:882 f2fs_evict_inode+0x1246/0x1520
[ 48.068750][ T30] audit: type=1400 audit(1744785487.801:103): avc: denied { unmount } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 48.077717][ T355] Modules linked in:
[ 48.100390][ T355] CPU: 0 PID: 355 Comm: syz-executor.0 Not tainted 5.15.180-syzkaller-1080019-g8034ec1338e8 #0
[ 48.110882][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 48.120838][ T355] RIP: 0010:f2fs_evict_inode+0x1246/0x1520
[ 48.126499][ T355] Code: ff ff e8 ad c2 52 ff eb 08 e8 a6 c2 52 ff 4d 89 e5 48 8b 7c 24 10 e8 39 26 03 00 4c 8b 64 24 58 e9 b4 fc ff ff e8 8a c2 52 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 fb 30 95 ff f0 41 80 0e 04 e9 96
[ 48.146004][ T355] RSP: 0018:ffffc90000b278a0 EFLAGS: 00010293
[ 48.151851][ T355] RAX: ffffffff821db536 RBX: 0000000000000002 RCX: ffff88810f60e2c0
[ 48.159668][ T355] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000
[ 48.167823][ T355] RBP: ffffc90000b27a10 R08: ffffffff821db1d1 R09: ffffed10246a6735
[ 48.175598][ T355] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881235336d0
[ 48.183476][ T355] R13: dffffc0000000000 R14: ffff88810ff24078 R15: 1ffff92000164f28
[ 48.191624][ T355] FS: 0000555575a6c480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 48.200798][ T355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 48.207217][ T355] CR2: 00007fffca474e78 CR3: 000000010cdc5000 CR4: 00000000003506a0
[ 48.215133][ T355] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 48.223072][ T355] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 48.231094][ T355] Call Trace:
[ 48.234307][ T355]
[ 48.237015][ T355] ? _raw_spin_unlock+0x4d/0x70
[ 48.241835][ T355] ? f2fs_write_inode+0x640/0x640
[ 48.246676][ T355] ? bit_waitqueue+0x30/0x30
[ 48.251147][ T355] ? locks_free_lock_context+0x42/0x70
[ 48.256706][ T355] ? __destroy_inode+0x35f/0x4e0
[ 48.261682][ T355] ? f2fs_write_inode+0x640/0x640
[ 48.266728][ T355] evict+0x529/0x930
[ 48.270848][ T355] ? proc_nr_inodes+0x330/0x330
[ 48.275627][ T355] ? __kasan_check_write+0x14/0x20
[ 48.280955][ T355] ? _raw_spin_lock+0xa4/0x1b0
[ 48.285558][ T355] ? _raw_spin_unlock+0x4d/0x70
[ 48.290338][ T355] ? list_lru_del+0x295/0x2d0
[ 48.294762][ T355] evict_inodes+0x642/0x6d0
[ 48.299143][ T355] ? clear_inode+0x150/0x150
[ 48.303530][ T355] generic_shutdown_super+0x97/0x330
[ 48.308685][ T355] kill_block_super+0x7e/0xe0
[ 48.313311][ T355] kill_f2fs_super+0x2f9/0x3c0
[ 48.317964][ T355] ? f2fs_mount+0x40/0x40
[ 48.322124][ T355] ? unregister_shrinker+0x23c/0x2d0
[ 48.327276][ T355] deactivate_locked_super+0xad/0x110
[ 48.332692][ T355] deactivate_super+0xbe/0xf0
[ 48.337139][ T355] cleanup_mnt+0x45c/0x510
[ 48.341421][ T355] __cleanup_mnt+0x19/0x20
[ 48.345640][ T355] task_work_run+0x129/0x190
[ 48.350485][ T355] exit_to_user_mode_loop+0xc4/0xe0
[ 48.355522][ T355] exit_to_user_mode_prepare+0x5a/0xa0
[ 48.361313][ T355] syscall_exit_to_user_mode+0x26/0x160
[ 48.366699][ T355] do_syscall_64+0x47/0xb0
[ 48.371041][ T355] ? clear_bhb_loop+0x35/0x90
[ 48.375467][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 48.381429][ T355] RIP: 0033:0x7f8975996017
[ 48.385619][ T355] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8
[ 48.405357][ T355] RSP: 002b:00007fffca475628 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 48.413601][ T355] RAX: 0000000000000000 RBX: 00007f89759e03b9 RCX: 00007f8975996017
[ 48.421420][ T355] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007fffca4756e0
[ 48.429460][ T355] RBP: 00007fffca4756e0 R08: 0000000000000000 R09: 0000000000000000
[ 48.437453][ T355] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fffca4767a0
[ 48.445764][ T355] R13: 00007f89759e03b9 R14: 000000000000b98f R15: 0000000000000003
[ 48.453743][ T355]
[ 48.456598][ T355] ---[ end trace b160959a9416967b ]---
[ 48.508938][ T355] ==================================================================
[ 48.516837][ T355] BUG: KASAN: use-after-free in _raw_spin_lock+0x97/0x1b0
[ 48.523775][ T355] Write of size 4 at addr ffff888123533718 by task syz-executor.0/355
[ 48.531778][ T355]
[ 48.534017][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Tainted: G W 5.15.180-syzkaller-1080019-g8034ec1338e8 #0
[ 48.545907][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 48.555940][ T355] Call Trace:
[ 48.559054][ T355]
[ 48.561847][ T355] dump_stack_lvl+0x151/0x1c0
[ 48.566399][ T355] ? io_uring_drop_tctx_refs+0x190/0x190
[ 48.571990][ T355] ? __wake_up_klogd+0xd5/0x110
[ 48.576699][ T355] ? panic+0x760/0x760
[ 48.580582][ T355] print_address_description+0x87/0x3b0
[ 48.585965][ T355] kasan_report+0x179/0x1c0
[ 48.590407][ T355] ? _raw_spin_lock+0x97/0x1b0
[ 48.595007][ T355] ? _raw_spin_lock+0x97/0x1b0
[ 48.599601][ T355] kasan_check_range+0x293/0x2a0
[ 48.604452][ T355] __kasan_check_write+0x14/0x20
[ 48.609153][ T355] _raw_spin_lock+0x97/0x1b0
[ 48.613580][ T355] ? _raw_spin_trylock_bh+0x190/0x190
[ 48.618789][ T355] ? _raw_spin_lock+0xa4/0x1b0
[ 48.623390][ T355] ? _raw_spin_trylock_bh+0x190/0x190
[ 48.628591][ T355] ? remove_wait_queue+0x140/0x140
[ 48.633540][ T355] igrab+0x20/0xa0
[ 48.637185][ T355] f2fs_sync_inode_meta+0x14d/0x2a0
[ 48.642243][ T355] f2fs_write_checkpoint+0xab4/0x1fb0
[ 48.647426][ T355] ? f2fs_get_sectors_written+0x500/0x500
[ 48.652980][ T355] ? rwsem_write_trylock+0x153/0x340
[ 48.658113][ T355] ? __kasan_check_write+0x14/0x20
[ 48.663054][ T355] ? mutex_unlock+0xb2/0x260
[ 48.667482][ T355] f2fs_issue_checkpoint+0x31b/0x4d0
[ 48.672599][ T355] ? f2fs_destroy_checkpoint_caches+0x30/0x30
[ 48.678502][ T355] ? sync_inodes_sb+0x7cd/0x8b0
[ 48.683184][ T355] ? try_to_writeback_inodes_sb+0xc0/0xc0
[ 48.688825][ T355] f2fs_sync_fs+0x186/0x2f0
[ 48.693255][ T355] sync_filesystem+0x1cf/0x250
[ 48.697878][ T355] f2fs_quota_off_umount+0x20e/0x220
[ 48.702994][ T355] f2fs_put_super+0xbc/0xb80
[ 48.707422][ T355] ? fsnotify_sb_delete+0x480/0x4e0
[ 48.712558][ T355] ? f2fs_drop_inode+0xa20/0xa20
[ 48.717332][ T355] ? __fsnotify_vfsmount_delete+0x20/0x20
[ 48.722910][ T355] ? clear_inode+0x150/0x150
[ 48.727346][ T355] ? fscrypt_destroy_keyring+0x287/0x2a0
[ 48.732779][ T355] ? f2fs_drop_inode+0xa20/0xa20
[ 48.737728][ T355] generic_shutdown_super+0x14f/0x330
[ 48.742937][ T355] kill_block_super+0x7e/0xe0
[ 48.747460][ T355] kill_f2fs_super+0x2f9/0x3c0
[ 48.752209][ T355] ? f2fs_mount+0x40/0x40
[ 48.756399][ T355] ? unregister_shrinker+0x23c/0x2d0
[ 48.761704][ T355] deactivate_locked_super+0xad/0x110
[ 48.767008][ T355] deactivate_super+0xbe/0xf0
[ 48.771503][ T355] cleanup_mnt+0x45c/0x510
[ 48.775754][ T355] __cleanup_mnt+0x19/0x20
[ 48.780009][ T355] task_work_run+0x129/0x190
[ 48.784520][ T355] exit_to_user_mode_loop+0xc4/0xe0
[ 48.789554][ T355] exit_to_user_mode_prepare+0x5a/0xa0
[ 48.795012][ T355] syscall_exit_to_user_mode+0x26/0x160
[ 48.800353][ T355] do_syscall_64+0x47/0xb0
[ 48.804612][ T355] ? clear_bhb_loop+0x35/0x90
[ 48.809111][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 48.814952][ T355] RIP: 0033:0x7f8975996017
[ 48.819316][ T355] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8
[ 48.839241][ T355] RSP: 002b:00007fffca475628 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 48.847495][ T355] RAX: 0000000000000000 RBX: 00007f89759e03b9 RCX: 00007f8975996017
[ 48.855377][ T355] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007fffca4756e0
[ 48.863358][ T355] RBP: 00007fffca4756e0 R08: 0000000000000000 R09: 0000000000000000
[ 48.871173][ T355] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fffca4767a0
[ 48.878985][ T355] R13: 00007f89759e03b9 R14: 000000000000b98f R15: 0000000000000003
[ 48.886806][ T355]
[ 48.889744][ T355]
[ 48.891913][ T355] Allocated by task 360:
[ 48.895992][ T355] __kasan_slab_alloc+0xb1/0xe0
[ 48.900680][ T355] slab_post_alloc_hook+0x53/0x2c0
[ 48.905645][ T355] kmem_cache_alloc+0xf5/0x250
[ 48.910229][ T355] f2fs_alloc_inode+0x26/0x340
[ 48.914835][ T355] iget_locked+0x174/0x860
[ 48.919093][ T355] f2fs_iget+0x55/0x4fe0
[ 48.923158][ T355] f2fs_lookup+0x3c1/0xb40
[ 48.927508][ T355] path_openat+0x1194/0x2f40
[ 48.932023][ T355] do_filp_open+0x21c/0x460
[ 48.936485][ T355] do_sys_openat2+0x13f/0x820
[ 48.941155][ T355] __x64_sys_open+0x221/0x270
[ 48.945756][ T355] x64_sys_call+0x36/0x9a0
[ 48.950005][ T355] do_syscall_64+0x3b/0xb0
[ 48.954255][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 48.960073][ T355]
[ 48.962244][ T355] Freed by task 0:
[ 48.965800][ T355] kasan_set_track+0x4b/0x70
[ 48.970227][ T355] kasan_set_free_info+0x23/0x40
[ 48.974998][ T355] ____kasan_slab_free+0x126/0x160
[ 48.979944][ T355] __kasan_slab_free+0x11/0x20
[ 48.984545][ T355] slab_free_freelist_hook+0xbd/0x190
[ 48.989843][ T355] kmem_cache_free+0x115/0x330
[ 48.994526][ T355] f2fs_free_inode+0x24/0x30
[ 48.998954][ T355] i_callback+0x4b/0x70
[ 49.003003][ T355] rcu_do_batch+0x57a/0xc10
[ 49.007287][ T355] rcu_core+0x517/0x1020
[ 49.011363][ T355] rcu_core_si+0x9/0x10
[ 49.015359][ T355] handle_softirqs+0x25e/0x5c0
[ 49.019963][ T355] __irq_exit_rcu+0x52/0xf0
[ 49.024499][ T355] irq_exit_rcu+0x9/0x10
[ 49.028659][ T355] sysvec_apic_timer_interrupt+0xa9/0xc0
[ 49.034137][ T355] asm_sysvec_apic_timer_interrupt+0x1b/0x20
[ 49.039952][ T355]
[ 49.042201][ T355] Last potentially related work creation:
[ 49.047756][ T355] kasan_save_stack+0x3b/0x60
[ 49.052273][ T355] __kasan_record_aux_stack+0xd3/0xf0
[ 49.057607][ T355] kasan_record_aux_stack_noalloc+0xb/0x10
[ 49.063261][ T355] call_rcu+0x123/0x10b0
[ 49.067316][ T355] evict+0x87d/0x930
[ 49.071307][ T355] evict_inodes+0x642/0x6d0
[ 49.075644][ T355] generic_shutdown_super+0x97/0x330
[ 49.080774][ T355] kill_block_super+0x7e/0xe0
[ 49.085283][ T355] kill_f2fs_super+0x2f9/0x3c0
[ 49.090006][ T355] deactivate_locked_super+0xad/0x110
[ 49.095174][ T355] deactivate_super+0xbe/0xf0
[ 49.099803][ T355] cleanup_mnt+0x45c/0x510
[ 49.104087][ T355] __cleanup_mnt+0x19/0x20
[ 49.108304][ T355] task_work_run+0x129/0x190
[ 49.112730][ T355] exit_to_user_mode_loop+0xc4/0xe0
[ 49.117782][ T355] exit_to_user_mode_prepare+0x5a/0xa0
[ 49.123071][ T355] syscall_exit_to_user_mode+0x26/0x160
[ 49.128448][ T355] do_syscall_64+0x47/0xb0
[ 49.132694][ T355] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 49.138419][ T355]
[ 49.140589][ T355] The buggy address belongs to the object at ffff888123533690
[ 49.140589][ T355] which belongs to the cache f2fs_inode_cache of size 1424
[ 49.155008][ T355] The buggy address is located 136 bytes inside of
[ 49.155008][ T355] 1424-byte region [ffff888123533690, ffff888123533c20)
[ 49.168404][ T355] The buggy address belongs to the page:
[ 49.173865][ T355] page:ffffea00048d4c00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x123530
[ 49.184309][ T355] head:ffffea00048d4c00 order:3 compound_mapcount:0 compound_pincount:0
[ 49.192441][ T355] flags: 0x4000000000010200(slab|head|zone=1)
[ 49.198355][ T355] raw: 4000000000010200 0000000000000000 dead000000000122 ffff888107fb3800
[ 49.206862][ T355] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[ 49.215264][ T355] page dumped because: kasan: bad access detected
[ 49.221532][ T355] page_owner tracks the page as allocated
[ 49.227187][ T355] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 360, ts 47903400032, free_ts 0
[ 49.247747][ T355] post_alloc_hook+0x1a3/0x1b0
[ 49.252360][ T355] prep_new_page+0x1b/0x110
[ 49.256669][ T355] get_page_from_freelist+0x3550/0x35d0
[ 49.262081][ T355] __alloc_pages+0x27e/0x8f0
[ 49.266479][ T355] new_slab+0x9a/0x4e0
[ 49.270392][ T355] ___slab_alloc+0x39e/0x830
[ 49.274819][ T355] __slab_alloc+0x4a/0x90
[ 49.278990][ T355] kmem_cache_alloc+0x139/0x250
[ 49.283665][ T355] f2fs_alloc_inode+0x26/0x340
[ 49.288269][ T355] iget_locked+0x174/0x860
[ 49.292516][ T355] f2fs_iget+0x55/0x4fe0
[ 49.296733][ T355] f2fs_fill_super+0x4f0f/0x8190
[ 49.301482][ T355] mount_bdev+0x282/0x3b0
[ 49.305645][ T355] f2fs_mount+0x34/0x40
[ 49.309648][ T355] legacy_get_tree+0xf1/0x190
[ 49.314150][ T355] vfs_get_tree+0x88/0x290
[ 49.318402][ T355] page_owner free stack trace missing
[ 49.323613][ T355]
[ 49.325890][ T355] Memory state around the buggy address:
[ 49.331364][ T355] ffff888123533600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 49.339263][ T355] ffff888123533680: fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.347158][ T355] >ffff888123533700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.355063][ T355] ^
[ 49.359883][ T355] ffff888123533780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.368579][ T355] ffff888123533800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.376549][ T355] ==================================================================
[ 49.384547][ T355] Disabling lock debugging due to kernel taint