Warning: Permanently added '10.128.1.135' (ED25519) to the list of known hosts. 2025/07/29 15:28:41 ignoring optional flag "sandboxArg"="0" 2025/07/29 15:28:41 ignoring optional flag "type"="gce" 2025/07/29 15:28:41 parsed 1 programs [ 45.700925][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 45.700938][ T30] audit: type=1400 audit(1753802921.651:92): avc: denied { unlink } for pid=328 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/07/29 15:28:41 executed programs: 0 [ 45.762655][ T328] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 45.808198][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.815402][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.822734][ T334] device bridge_slave_0 entered promiscuous mode [ 45.829406][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.836481][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.843854][ T334] device bridge_slave_1 entered promiscuous mode [ 45.880097][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.887157][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.894431][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.901459][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.916876][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.924104][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.931413][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.938928][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.948144][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.956339][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.963375][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.972166][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.980312][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.987365][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.998069][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.006969][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.018855][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.029563][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.038249][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.045843][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.053966][ T334] device veth0_vlan entered promiscuous mode [ 46.063229][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.072042][ T334] device veth1_macvtap entered promiscuous mode [ 46.080629][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.090810][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.343961][ T345] loop0: detected capacity change from 0 to 131072 [ 46.392661][ T30] audit: type=1400 audit(1753802922.341:93): avc: denied { mounton } for pid=344 comm="syz-executor.0" path="/root/syzkaller-testdir1362389283/syzkaller.cr279i/0/file0" dev="sda1" ino=2036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 46.420613][ T345] F2FS-fs (loop0): Found nat_bits in checkpoint [ 46.440324][ T345] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 46.448052][ T30] audit: type=1400 audit(1753802922.391:94): avc: denied { mount } for pid=344 comm="syz-executor.0" name="/" dev="loop0" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 46.470118][ T30] audit: type=1400 audit(1753802922.411:95): avc: denied { read } for pid=344 comm="syz-executor.0" name="file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.492383][ T30] audit: type=1400 audit(1753802922.411:96): avc: denied { open } for pid=344 comm="syz-executor.0" path="/root/syzkaller-testdir1362389283/syzkaller.cr279i/0/file0/file1" dev="loop0" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.507087][ T334] ------------[ cut here ]------------ [ 46.520092][ T30] audit: type=1400 audit(1753802922.411:97): avc: denied { ioctl } for pid=344 comm="syz-executor.0" path="/root/syzkaller-testdir1362389283/syzkaller.cr279i/0/file0/file1" dev="loop0" ino=7 ioctlcmd=0xf519 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.525192][ T334] WARNING: CPU: 0 PID: 334 at fs/f2fs/inode.c:880 f2fs_evict_inode+0x12b0/0x1560 [ 46.554711][ T30] audit: type=1400 audit(1753802922.421:98): avc: denied { unmount } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 46.563051][ T334] Modules linked in: [ 46.586742][ T334] CPU: 0 PID: 334 Comm: syz-executor.0 Not tainted 5.15.189-syzkaller-1081280-gf32b52534f1d #0 [ 46.597116][ T334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 46.607229][ T334] RIP: 0010:f2fs_evict_inode+0x12b0/0x1560 [ 46.613138][ T334] Code: e9 55 f2 ff ff e8 20 2c 61 ff eb 05 e8 19 2c 61 ff 4c 8b 74 24 28 48 8b 7c 24 18 e8 3a f0 02 00 e9 bc fc ff ff e8 00 2c 61 ff <0f> 0b 4c 89 f7 be 08 00 00 00 e8 d1 a8 9f ff f0 41 80 0e 04 e9 99 [ 46.633051][ T334] RSP: 0018:ffffc90000bb78c0 EFLAGS: 00010293 [ 46.639122][ T334] RAX: ffffffff820783d0 RBX: 1ffff92000176f2c RCX: ffff88811e4b13c0 [ 46.647144][ T334] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 46.655173][ T334] RBP: ffffc90000bb7a30 R08: dffffc0000000000 R09: ffffed102127c735 [ 46.663156][ T334] R10: ffffed102127c735 R11: 1ffff1102127c734 R12: ffff8881093e39a0 [ 46.671203][ T334] R13: dffffc0000000000 R14: ffff88810eed8078 R15: 0000000000000002 [ 46.679150][ T334] FS: 000055556c2f8480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 46.688082][ T334] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 46.694675][ T334] CR2: 00007ffcd8479fe8 CR3: 000000011e757000 CR4: 00000000003506a0 [ 46.702790][ T334] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 46.710778][ T334] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 46.718743][ T334] Call Trace: [ 46.722056][ T334] [ 46.724975][ T334] ? inode_wait_for_writeback+0x1b0/0x200 [ 46.730727][ T334] ? f2fs_write_inode+0x850/0x850 [ 46.735748][ T334] ? bit_waitqueue+0x30/0x30 [ 46.740307][ T334] ? locks_free_lock_context+0x42/0x70 [ 46.745824][ T334] ? f2fs_write_inode+0x850/0x850 [ 46.750912][ T334] evict+0x485/0x870 [ 46.754808][ T334] ? proc_nr_inodes+0x310/0x310 [ 46.759630][ T334] ? _raw_spin_lock+0x8e/0xe0 [ 46.764312][ T334] ? _raw_spin_unlock+0x4d/0x70 [ 46.769153][ T334] evict_inodes+0x5de/0x650 [ 46.773669][ T334] ? clear_inode+0x150/0x150 [ 46.778254][ T334] generic_shutdown_super+0x96/0x330 [ 46.783649][ T334] kill_block_super+0x7f/0xf0 [ 46.788321][ T334] kill_f2fs_super+0x2e7/0x390 [ 46.793231][ T334] ? radix_tree_delete_item+0x2c8/0x410 [ 46.798771][ T334] ? f2fs_mount+0x40/0x40 [ 46.803111][ T334] ? unregister_shrinker+0x201/0x290 [ 46.808385][ T334] deactivate_locked_super+0xa0/0x100 [ 46.813789][ T334] deactivate_super+0xaf/0xe0 [ 46.818450][ T334] cleanup_mnt+0x446/0x500 [ 46.822871][ T334] __cleanup_mnt+0x19/0x20 [ 46.827275][ T334] task_work_run+0x127/0x190 [ 46.831898][ T334] exit_to_user_mode_loop+0xd0/0xe0 [ 46.837090][ T334] exit_to_user_mode_prepare+0x5a/0xa0 [ 46.842598][ T334] syscall_exit_to_user_mode+0x1a/0x30 [ 46.848051][ T334] do_syscall_64+0x58/0xa0 [ 46.852507][ T334] ? clear_bhb_loop+0x50/0xa0 [ 46.857168][ T334] ? clear_bhb_loop+0x50/0xa0 [ 46.862122][ T334] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.868018][ T334] RIP: 0033:0x7f83bc43b197 [ 46.872636][ T334] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 46.892322][ T334] RSP: 002b:00007ffcd847a1b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 46.900860][ T334] RAX: 0000000000000000 RBX: 00007f83bc4853b9 RCX: 00007f83bc43b197 [ 46.908825][ T334] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcd847a270 [ 46.916951][ T334] RBP: 00007ffcd847a270 R08: 0000000000000000 R09: 0000000000000000 [ 46.924970][ T334] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcd847b330 [ 46.932943][ T334] R13: 00007f83bc4853b9 R14: 000000000000b407 R15: 0000000000000003 [ 46.941020][ T334] [ 46.944032][ T334] ---[ end trace 6a4b02bbeac38d08 ]--- [ 46.990480][ T334] ================================================================== [ 46.998549][ T334] BUG: KASAN: use-after-free in _raw_spin_lock+0x81/0xe0 [ 47.005548][ T334] Write of size 4 at addr ffff8881093e3718 by task syz-executor.0/334 [ 47.013665][ T334] [ 47.015974][ T334] CPU: 0 PID: 334 Comm: syz-executor.0 Tainted: G W 5.15.189-syzkaller-1081280-gf32b52534f1d #0 [ 47.027915][ T334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 47.037945][ T334] Call Trace: [ 47.041197][ T334] [ 47.044195][ T334] __dump_stack+0x21/0x30 [ 47.048497][ T334] dump_stack_lvl+0xee/0x150 [ 47.053146][ T334] ? show_regs_print_info+0x20/0x20 [ 47.058336][ T334] ? load_image+0x3a0/0x3a0 [ 47.062812][ T334] ? finish_task_switch+0x209/0x780 [ 47.067989][ T334] ? __switch_to_asm+0x3a/0x60 [ 47.072723][ T334] print_address_description+0x7f/0x2c0 [ 47.078239][ T334] ? _raw_spin_lock+0x81/0xe0 [ 47.082906][ T334] kasan_report+0xf1/0x140 [ 47.087302][ T334] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 47.092816][ T334] ? _raw_spin_lock+0x81/0xe0 [ 47.097551][ T334] kasan_check_range+0x280/0x290 [ 47.102491][ T334] __kasan_check_write+0x14/0x20 [ 47.107400][ T334] _raw_spin_lock+0x81/0xe0 [ 47.111872][ T334] ? _raw_spin_trylock_bh+0x130/0x130 [ 47.117212][ T334] ? __kasan_check_write+0x14/0x20 [ 47.122295][ T334] ? _raw_spin_lock+0x8e/0xe0 [ 47.126942][ T334] ? _raw_spin_trylock_bh+0x130/0x130 [ 47.132285][ T334] igrab+0x20/0xa0 [ 47.135980][ T334] f2fs_sync_inode_meta+0x153/0x2a0 [ 47.141158][ T334] f2fs_write_checkpoint+0xa7d/0x1f00 [ 47.146522][ T334] ? __kasan_check_write+0x14/0x20 [ 47.151608][ T334] ? f2fs_get_sectors_written+0x4e0/0x4e0 [ 47.157322][ T334] ? rwsem_write_trylock+0x130/0x300 [ 47.162582][ T334] ? __kasan_check_read+0x11/0x20 [ 47.167762][ T334] ? wb_wait_for_completion+0x1d8/0x270 [ 47.173278][ T334] f2fs_issue_checkpoint+0x2e5/0x470 [ 47.178531][ T334] ? f2fs_destroy_checkpoint_caches+0x30/0x30 [ 47.184580][ T334] ? try_to_writeback_inodes_sb+0xc0/0xc0 [ 47.190275][ T334] f2fs_sync_fs+0x16f/0x2c0 [ 47.194758][ T334] sync_filesystem+0x1cb/0x240 [ 47.199493][ T334] f2fs_quota_off_umount+0x217/0x230 [ 47.204818][ T334] f2fs_put_super+0xb7/0xc00 [ 47.209389][ T334] ? fsnotify_destroy_marks+0x14f/0x400 [ 47.214902][ T334] ? fsnotify_sb_delete+0x471/0x4e0 [ 47.220071][ T334] ? f2fs_drop_inode+0x980/0x980 [ 47.224978][ T334] ? __fsnotify_vfsmount_delete+0x20/0x20 [ 47.230666][ T334] ? clear_inode+0x150/0x150 [ 47.235226][ T334] ? fscrypt_destroy_keyring+0x27f/0x290 [ 47.240828][ T334] ? f2fs_drop_inode+0x980/0x980 [ 47.245755][ T334] generic_shutdown_super+0x151/0x330 [ 47.251097][ T334] kill_block_super+0x7f/0xf0 [ 47.255747][ T334] kill_f2fs_super+0x2e7/0x390 [ 47.260479][ T334] ? radix_tree_delete_item+0x2c8/0x410 [ 47.266004][ T334] ? f2fs_mount+0x40/0x40 [ 47.270302][ T334] ? unregister_shrinker+0x201/0x290 [ 47.275559][ T334] deactivate_locked_super+0xa0/0x100 [ 47.280910][ T334] deactivate_super+0xaf/0xe0 [ 47.285566][ T334] cleanup_mnt+0x446/0x500 [ 47.289961][ T334] __cleanup_mnt+0x19/0x20 [ 47.294365][ T334] task_work_run+0x127/0x190 [ 47.298938][ T334] exit_to_user_mode_loop+0xd0/0xe0 [ 47.304114][ T334] exit_to_user_mode_prepare+0x5a/0xa0 [ 47.309549][ T334] syscall_exit_to_user_mode+0x1a/0x30 [ 47.314987][ T334] do_syscall_64+0x58/0xa0 [ 47.319389][ T334] ? clear_bhb_loop+0x50/0xa0 [ 47.324052][ T334] ? clear_bhb_loop+0x50/0xa0 [ 47.328706][ T334] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.334579][ T334] RIP: 0033:0x7f83bc43b197 [ 47.338970][ T334] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 [ 47.358549][ T334] RSP: 002b:00007ffcd847a1b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 47.366937][ T334] RAX: 0000000000000000 RBX: 00007f83bc4853b9 RCX: 00007f83bc43b197 [ 47.374886][ T334] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcd847a270 [ 47.382836][ T334] RBP: 00007ffcd847a270 R08: 0000000000000000 R09: 0000000000000000 [ 47.390782][ T334] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcd847b330 [ 47.398740][ T334] R13: 00007f83bc4853b9 R14: 000000000000b407 R15: 0000000000000003 [ 47.406692][ T334] [ 47.409698][ T334] [ 47.411999][ T334] Allocated by task 345: [ 47.416210][ T334] __kasan_slab_alloc+0xbd/0xf0 [ 47.421043][ T334] slab_post_alloc_hook+0x4f/0x2b0 [ 47.426192][ T334] kmem_cache_alloc+0xf7/0x260 [ 47.430931][ T334] f2fs_alloc_inode+0x26/0x330 [ 47.435669][ T334] iget_locked+0x16c/0x7e0 [ 47.440063][ T334] f2fs_iget+0x55/0x5130 [ 47.444280][ T334] f2fs_lookup+0x366/0xab0 [ 47.448675][ T334] path_openat+0xfcf/0x2f10 [ 47.453154][ T334] do_filp_open+0x1b3/0x3e0 [ 47.457660][ T334] do_sys_openat2+0x14c/0x7b0 [ 47.462312][ T334] __x64_sys_openat+0x136/0x160 [ 47.467141][ T334] x64_sys_call+0x219/0x9a0 [ 47.471621][ T334] do_syscall_64+0x4c/0xa0 [ 47.476016][ T334] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.481888][ T334] [ 47.484189][ T334] Freed by task 0: [ 47.487883][ T334] kasan_set_track+0x4a/0x70 [ 47.492453][ T334] kasan_set_free_info+0x23/0x40 [ 47.497465][ T334] ____kasan_slab_free+0x125/0x160 [ 47.502566][ T334] __kasan_slab_free+0x11/0x20 [ 47.507316][ T334] slab_free_freelist_hook+0xc2/0x190 [ 47.512672][ T334] kmem_cache_free+0x100/0x320 [ 47.517418][ T334] f2fs_free_inode+0x24/0x30 [ 47.521992][ T334] i_callback+0x4c/0x70 [ 47.526129][ T334] rcu_do_batch+0x51d/0xba0 [ 47.530612][ T334] rcu_core+0x5e4/0xf80 [ 47.534746][ T334] rcu_core_si+0x9/0x10 [ 47.538878][ T334] handle_softirqs+0x250/0x560 [ 47.543618][ T334] __irq_exit_rcu+0x52/0xf0 [ 47.548105][ T334] irq_exit_rcu+0x9/0x10 [ 47.552325][ T334] sysvec_call_function_single+0xa6/0xc0 [ 47.557936][ T334] asm_sysvec_call_function_single+0x1b/0x20 [ 47.563893][ T334] [ 47.566194][ T334] Last potentially related work creation: [ 47.571881][ T334] kasan_save_stack+0x3a/0x60 [ 47.576544][ T334] __kasan_record_aux_stack+0xd2/0x100 [ 47.581980][ T334] kasan_record_aux_stack_noalloc+0xb/0x10 [ 47.587763][ T334] call_rcu+0x105/0xfe0 [ 47.591896][ T334] evict+0x7da/0x870 [ 47.595769][ T334] evict_inodes+0x5de/0x650 [ 47.600247][ T334] generic_shutdown_super+0x96/0x330 [ 47.605510][ T334] kill_block_super+0x7f/0xf0 [ 47.610347][ T334] kill_f2fs_super+0x2e7/0x390 [ 47.615094][ T334] deactivate_locked_super+0xa0/0x100 [ 47.620459][ T334] deactivate_super+0xaf/0xe0 [ 47.625112][ T334] cleanup_mnt+0x446/0x500 [ 47.629507][ T334] __cleanup_mnt+0x19/0x20 [ 47.633899][ T334] task_work_run+0x127/0x190 [ 47.638469][ T334] exit_to_user_mode_loop+0xd0/0xe0 [ 47.643650][ T334] exit_to_user_mode_prepare+0x5a/0xa0 [ 47.649172][ T334] syscall_exit_to_user_mode+0x1a/0x30 [ 47.654610][ T334] do_syscall_64+0x58/0xa0 [ 47.659007][ T334] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.664973][ T334] [ 47.667284][ T334] The buggy address belongs to the object at ffff8881093e3690 [ 47.667284][ T334] which belongs to the cache f2fs_inode_cache of size 1424 [ 47.681841][ T334] The buggy address is located 136 bytes inside of [ 47.681841][ T334] 1424-byte region [ffff8881093e3690, ffff8881093e3c20) [ 47.695192][ T334] The buggy address belongs to the page: [ 47.700816][ T334] page:ffffea000424f800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1093e0 [ 47.711052][ T334] head:ffffea000424f800 order:3 compound_mapcount:0 compound_pincount:0 [ 47.719370][ T334] flags: 0x4000000000010200(slab|head|zone=1) [ 47.725477][ T334] raw: 4000000000010200 0000000000000000 dead000000000122 ffff8881081eaa80 [ 47.734130][ T334] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000 [ 47.742703][ T334] page dumped because: kasan: bad access detected [ 47.749089][ T334] page_owner tracks the page as allocated [ 47.754787][ T334] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0x1d2050(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 345, ts 46462793972, free_ts 0 [ 47.775341][ T334] post_alloc_hook+0x192/0x1b0 [ 47.780093][ T334] prep_new_page+0x1c/0x110 [ 47.784606][ T334] get_page_from_freelist+0x2cc5/0x2d50 [ 47.790130][ T334] __alloc_pages+0x18f/0x440 [ 47.794694][ T334] new_slab+0xa1/0x4d0 [ 47.798753][ T334] ___slab_alloc+0x381/0x810 [ 47.803334][ T334] __slab_alloc+0x49/0x90 [ 47.807642][ T334] kmem_cache_alloc+0x138/0x260 [ 47.812556][ T334] f2fs_alloc_inode+0x26/0x330 [ 47.817297][ T334] iget_locked+0x16c/0x7e0 [ 47.821690][ T334] f2fs_iget+0x55/0x5130 [ 47.825908][ T334] f2fs_lookup+0x366/0xab0 [ 47.830300][ T334] path_openat+0xfcf/0x2f10 [ 47.834778][ T334] do_filp_open+0x1b3/0x3e0 [ 47.839256][ T334] do_sys_openat2+0x14c/0x7b0 [ 47.843908][ T334] __x64_sys_openat+0x136/0x160 [ 47.848736][ T334] page_owner free stack trace missing [ 47.854076][ T334] [ 47.856373][ T334] Memory state around the buggy address: [ 47.861979][ T334] ffff8881093e3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.870016][ T334] ffff8881093e3680: fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.878054][ T334] >ffff8881093e3700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.886086][ T334] ^ [ 47.890910][ T334] ffff8881093e3780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.898942][ T334] ffff8881093e3800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.906979][ T334] ================================================================== [ 47.915010][ T334] Disabling lock debugging due to kernel taint [ 47.930907][ T30] audit: type=1400 audit(1753802923.881:99): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 47.952764][ T30] audit: type=1400 audit(1753802923.881:100): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 47.974537][ T30] audit: type=1400 audit(1753802923.881:101): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1