./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2209520617 <...> Warning: Permanently added '10.128.1.39' (ED25519) to the list of known hosts. execve("./syz-executor2209520617", ["./syz-executor2209520617"], 0x7ffd2be75e30 /* 10 vars */) = 0 brk(NULL) = 0x55556438b000 brk(0x55556438bd00) = 0x55556438bd00 arch_prctl(ARCH_SET_FS, 0x55556438b380) = 0 set_tid_address(0x55556438b650) = 282 set_robust_list(0x55556438b660, 24) = 0 rseq(0x55556438bca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2209520617", 4096) = 28 getrandom("\xe3\xdc\x7f\xbd\x77\x57\x17\x8f", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55556438bd00 brk(0x5555643acd00) = 0x5555643acd00 brk(0x5555643ad000) = 0x5555643ad000 mprotect(0x7f57626de000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 [ 20.480040][ T24] audit: type=1400 audit(1752214206.529:64): avc: denied { execmem } for pid=282 comm="syz-executor220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 getrandom("\x86\x93\x47\x0f\x83\x25\xed\x91\xa4\x98\xeb\x00\xa6\x92\xda\x41\x83\xd2\xbd\xef\x13\x0b\x1a\xa4\x90\x14\xa1\x67\xcf\xa4\x03\x2e\xe7\x05\xa0\x61\xc1\x7e\xf5\x64\xeb\xee\x4e\xf3\xd5\x68\x26\x6d\x88\xd1\xac\xee\x67\x67\xc3\x8b\x6c\xa4\x91\x33\x31\xea\xc7\xc5\x2c\xc5\x03\x33\x2a\xd4\x84\x6c\xc0\xa5\x3d\x6d\x84\x03\x4c\x09\xe2\xaf\x99\x22\x01\x1f\x1c\x2f\x09\x05\x4e\x8c\xea\xd3\x2c\x3c\x95\x5d\xc2\xc9"..., 4294967194, 0) = 16776640 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f575a22e000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 262144) = 262144 munmap(0x7f575a22e000, 138412032) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 [ 20.622330][ T24] audit: type=1400 audit(1752214206.679:65): avc: denied { read write } for pid=282 comm="syz-executor220" name="loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 20.646774][ T24] audit: type=1400 audit(1752214206.679:66): avc: denied { open } for pid=282 comm="syz-executor220" path="/dev/loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 20.670838][ T24] audit: type=1400 audit(1752214206.679:67): avc: denied { ioctl } for pid=282 comm="syz-executor220" path="/dev/loop0" dev="devtmpfs" ino=115 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 close(4) = 0 mkdir("./file1", 0777) = 0 [ 20.761909][ T282] ====================================================== [ 20.761909][ T282] WARNING: the mand mount option is being deprecated and [ 20.761909][ T282] will be removed in v5.15! [ 20.761909][ T282] ====================================================== [ 20.761936][ T24] audit: type=1400 audit(1752214206.819:68): avc: denied { mounton } for pid=282 comm="syz-executor220" path="/root/file1" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 mount("/dev/loop0", "./file1", "ext4", MS_MANDLOCK|MS_REC|MS_LAZYTIME, "errors=remount-ro,dioread_lock,noquota,init_itable,debug,resgid=0x0000000000000000,sysvgroups,discar"...) = 0 openat(AT_FDCWD, "./file1", O_RDONLY|O_DIRECTORY) = 3 chdir("./file1") = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 openat(AT_FDCWD, "hugetlb.2MB.usage_in_bytes", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 4 write(4, "\x23\x21\x20\x0a\x83\x25\xed\x91\xa4\x98\xeb\x00\xa6\x92\xda\x41\x83\xd2\xbd\xef\x13\x0b\x1a\xa4\x90\x14\xa1\x67\xcf\xa4\x03\x2e\xe7\x05\xa0\x61\xc1\x7e\xf5\x64\xeb\xee\x4e\xf3\xd5\x68\x26\x6d\x88\xd1\xac\xee\x67\x67\xc3\x8b\x6c\xa4\x91\x33\x31\xea\xc7\xc5\x2c\xc5\x03\x33\x2a\xd4\x84\x6c\xc0\xa5\x3d\x6d\x84\x03\x4c\x09\xe2\xaf\x99\x22\x01\x1f\x1c\x2f\x09\x05\x4e\x8c\xea\xd3\x2c\x3c\x95\x5d\xc2\xc9"..., 34136651) = 167936 creat("./bus", 000) = 5 [ 20.861375][ T282] [EXT4 FS bs=4096, gc=1, bpg=71, ipg=32, mo=e80ec028, mo2=0000] [ 20.869130][ T282] System zones: 0-2, 18-18, 34-34 [ 20.875365][ T282] EXT4-fs (loop0): 1 orphan inode deleted [ 20.881138][ T282] EXT4-fs (loop0): mounted filesystem without journal. Opts: errors=remount-ro,dioread_lock,noquota,init_itable,debug,resgid=0x0000000000000000,sysvgroups,discard,usrquota, mount("/dev/loop0", "./bus", NULL, MS_BIND, NULL) = 0 open("./bus", O_RDWR|O_NOCTTY|O_SYNC|O_NOATIME|0x3c) = 6 write(6, "\x23\x21\x20\x0a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x65\x72\x72\x6f\x72\x73\x3d\x72\x65\x6d\x6f\x75\x6e\x74\x2d\x72\x6f\x2c\x64\x69\x6f\x72\x65\x61\x64\x5f\x6c\x6f\x63\x6b\x2c\x6e\x6f\x71\x75\x6f"..., 34136651) = 262144 mmap(0x200000000000, 11755520, PROT_READ|PROT_WRITE|PROT_SEM|PROT_GROWSUP|0x800000, MAP_SHARED|MAP_FIXED|MAP_POPULATE|MAP_STACK, 4, 0) = 0x200000000000 [ 20.898465][ T24] audit: type=1400 audit(1752214206.959:69): avc: denied { mount } for pid=282 comm="syz-executor220" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 20.898481][ T282] ext4 filesystem being mounted at /root/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 20.929087][ T282] ================================================================== [ 20.931671][ T24] audit: type=1400 audit(1752214206.959:70): avc: denied { write } for pid=282 comm="syz-executor220" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 20.938892][ T282] BUG: KASAN: use-after-free in ext4_find_extent+0xbeb/0xe20 [ 20.960665][ T24] audit: type=1400 audit(1752214206.959:71): avc: denied { add_name } for pid=282 comm="syz-executor220" name="hugetlb.2MB.usage_in_bytes" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 20.967953][ T282] Read of size 4 at addr ffff8881227d86f4 by task syz-executor220/282 [ 20.967962][ T282] [ 20.990601][ T24] audit: type=1400 audit(1752214206.959:72): avc: denied { create } for pid=282 comm="syz-executor220" name="hugetlb.2MB.usage_in_bytes" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 20.998712][ T282] CPU: 1 PID: 282 Comm: syz-executor220 Not tainted 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 21.001023][ T24] audit: type=1400 audit(1752214206.959:73): avc: denied { read append open } for pid=282 comm="syz-executor220" path="/root/file1/hugetlb.2MB.usage_in_bytes" dev="loop0" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 21.023177][ T282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 21.023197][ T282] Call Trace: [ 21.072418][ T282] __dump_stack+0x21/0x24 [ 21.076712][ T282] dump_stack_lvl+0x169/0x1d8 [ 21.081361][ T282] ? show_regs_print_info+0x18/0x18 [ 21.086521][ T282] ? thaw_kernel_threads+0x220/0x220 [ 21.091775][ T282] print_address_description+0x7f/0x2c0 [ 21.097284][ T282] ? ext4_find_extent+0xbeb/0xe20 [ 21.102270][ T282] kasan_report+0xe2/0x130 [ 21.106649][ T282] ? __read_extent_tree_block+0x1e8/0x790 [ 21.112331][ T282] ? ext4_find_extent+0xbeb/0xe20 [ 21.117319][ T282] __asan_report_load4_noabort+0x14/0x20 [ 21.122912][ T282] ext4_find_extent+0xbeb/0xe20 [ 21.127740][ T282] ext4_ext_remove_space+0x306/0x4910 [ 21.133080][ T282] ? __kasan_slab_free+0x11/0x20 [ 21.137982][ T282] ? ext4_es_free_extent+0x3de/0x4c0 [ 21.143231][ T282] ? __es_remove_extent+0xa77/0x16f0 [ 21.148607][ T282] ? ext4_ext_index_trans_blocks+0x120/0x120 [ 21.154554][ T282] ? ext4_es_remove_extent+0x1d9/0x330 [ 21.159990][ T282] ext4_punch_hole+0x6f8/0xad0 [ 21.164717][ T282] ext4_fallocate+0x271/0x1a70 [ 21.169446][ T282] ? selinux_file_permission+0x2a5/0x510 [ 21.175044][ T282] ? preempt_count_add+0x90/0x1b0 [ 21.180032][ T282] vfs_fallocate+0x4b4/0x590 [ 21.184588][ T282] do_madvise+0x12cf/0x1df0 [ 21.189055][ T282] ? madvise_set_anon_name+0x460/0x460 [ 21.194528][ T282] ? _raw_spin_unlock_irq+0x4e/0x70 [ 21.199691][ T282] ? finish_task_switch+0x12e/0x5a0 [ 21.205290][ T282] ? switch_mm_irqs_off+0x763/0x9a0 [ 21.210454][ T282] ? __switch_to_asm+0x34/0x60 [ 21.215182][ T282] ? __schedule+0xb4f/0x1310 [ 21.219735][ T282] ? __kasan_check_write+0x14/0x20 [ 21.224812][ T282] ? _raw_spin_lock_irq+0x8f/0xe0 [ 21.229801][ T282] ? __kasan_check_write+0x14/0x20 [ 21.234878][ T282] ? _raw_spin_lock_irq+0x8f/0xe0 [ 21.239867][ T282] ? _raw_spin_lock_irqsave+0x110/0x110 [ 21.245381][ T282] ? _raw_spin_unlock_irq+0x4e/0x70 [ 21.250543][ T282] ? cgroup_leave_frozen+0x166/0x2b0 [ 21.255797][ T282] ? ptrace_stop+0x51e/0x9c0 [ 21.260348][ T282] ? ptrace_stop+0x69f/0x9c0 [ 21.264909][ T282] ? _raw_spin_unlock_irq+0x4e/0x70 [ 21.270075][ T282] ? ptrace_notify+0x1c4/0x250 [ 21.274803][ T282] ? do_notify_parent+0x7e0/0x7e0 [ 21.279790][ T282] ? fpu__clear+0x271/0x2d0 [ 21.284260][ T282] __x64_sys_madvise+0xa9/0xc0 [ 21.288986][ T282] do_syscall_64+0x31/0x40 [ 21.293388][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 21.299253][ T282] RIP: 0033:0x7f576266bbb9 [ 21.303634][ T282] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 21.323210][ T282] RSP: 002b:00007ffc91a9fee8 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 21.331683][ T282] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f576266bbb9 [ 21.339625][ T282] RDX: 0000000000000009 RSI: 0000000000600002 RDI: 0000200000000000 [ 21.347568][ T282] RBP: 00007f57626de610 R08: 0000000000000000 R09: 0000000000000000 [ 21.355511][ T282] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 21.363456][ T282] R13: 00007ffc91aa00c8 R14: 0000000000000001 R15: 0000000000000001 [ 21.371442][ T282] [ 21.373741][ T282] The buggy address belongs to the page: [ 21.379361][ T282] page:ffffea000489f600 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x1 pfn:0x1227d8 [ 21.389822][ T282] flags: 0x4000000000000000() [ 21.394472][ T282] raw: 4000000000000000 ffffea0004804108 ffffea0004831308 0000000000000000 [ 21.403027][ T282] raw: 0000000000000001 0000000000000002 00000000ffffff7f 0000000000000000 [ 21.411581][ T282] page dumped because: kasan: bad access detected [ 21.417971][ T282] page_owner tracks the page as freed [ 21.423319][ T282] page last allocated via order 0, migratetype Movable, gfp_mask 0x8100dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|0x8000000), pid 284, ts 20910812020, free_ts 20911291023 [ 21.439603][ T282] prep_new_page+0x179/0x180 [ 21.444164][ T282] get_page_from_freelist+0x2235/0x23d0 [ 21.449678][ T282] __alloc_pages_nodemask+0x268/0x5f0 [ 21.455019][ T282] handle_pte_fault+0x1719/0x3750 [ 21.460027][ T282] handle_mm_fault+0xf3f/0x16a0 [ 21.464855][ T282] do_user_addr_fault+0x5a2/0xc80 [ 21.469860][ T282] exc_page_fault+0x5a/0xc0 [ 21.474346][ T282] asm_exc_page_fault+0x1e/0x30 [ 21.479169][ T282] page last free stack trace: [ 21.483827][ T282] free_unref_page_prepare+0x2b7/0x2d0 [ 21.489254][ T282] free_unref_page_list+0x12e/0x9b0 [ 21.494420][ T282] release_pages+0xe38/0xe80 [ 21.498980][ T282] free_pages_and_swap_cache+0x86/0xa0 [ 21.504404][ T282] tlb_finish_mmu+0x175/0x300 [ 21.509049][ T282] unmap_region+0x32c/0x380 [ 21.513518][ T282] __do_munmap+0x63c/0x850 [ 21.517902][ T282] __se_sys_munmap+0x127/0x1b0 [ 21.522634][ T282] __x64_sys_munmap+0x5b/0x70 [ 21.527280][ T282] do_syscall_64+0x31/0x40 [ 21.531668][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 21.537522][ T282] [ 21.539819][ T282] Memory state around the buggy address: [ 21.545419][ T282] ffff8881227d8580: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.553447][ T282] ffff8881227d8600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.561477][ T282] >ffff8881227d8680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.569501][ T282] ^ [ 21.577186][ T282] ffff8881227d8700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.585215][ T282] ffff8881227d8780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.593251][ T282] ================================================================== [ 21.601276][ T282] Disabling lock debugging due to kernel taint [ 21.607641][ T282] ------------[ cut here ]------------ [ 21.613241][ T282] kernel BUG at fs/ext4/extents.c:3180! [ 21.618779][ T282] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 21.624811][ T282] CPU: 1 PID: 282 Comm: syz-executor220 Tainted: G B 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 21.636394][ T282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 21.646424][ T282] RIP: 0010:ext4_split_extent_at+0xe6e/0xe90 [ 21.652370][ T282] Code: 48 89 df 48 89 74 24 68 e8 2f 8c d3 ff 48 8b 74 24 68 e9 5a fb ff ff e8 00 9c 99 ff 0f 0b e8 f9 9b 99 ff 0f 0b e8 f2 9b 99 ff <0f> 0b e8 eb 9b 99 ff 0f 0b e8 e4 9b 99 ff 0f 0b e8 dd 9b 99 ff 0f [ 21.671942][ T282] RSP: 0018:ffffc90000b774a0 EFLAGS: 00010293 [ 21.677975][ T282] RAX: ffffffff81c9f81e RBX: 0000000000000000 RCX: ffff888106dee2c0 [ 21.685911][ T282] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000002a [ 21.693849][ T282] RBP: ffffc90000b77610 R08: 0000000000000000 R09: 0000000050000028 [ 21.701788][ T282] R10: fffffbfff0d8e448 R11: 1ffffffff0d8e448 R12: 0000000000000000 [ 21.709723][ T282] R13: 0000000000000000 R14: 1ffff110244fbbff R15: 0000000000000000 [ 21.717671][ T282] FS: 000055556438b380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 21.726574][ T282] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.733137][ T282] CR2: 00007f256175f000 CR3: 00000001213c2000 CR4: 00000000003506a0 [ 21.741084][ T282] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.749025][ T282] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.756971][ T282] Call Trace: [ 21.760331][ T282] ? __kasan_check_write+0x14/0x20 [ 21.765417][ T282] ? __asan_report_load2_noabort+0x14/0x20 [ 21.771194][ T282] ? ext4_ext_try_to_merge_right+0x820/0x820 [ 21.777146][ T282] ext4_ext_remove_space+0x677/0x4910 [ 21.782572][ T282] ? __kasan_slab_free+0x11/0x20 [ 21.787475][ T282] ? ext4_es_free_extent+0x3de/0x4c0 [ 21.792758][ T282] ? __es_remove_extent+0xa77/0x16f0 [ 21.798013][ T282] ? ext4_ext_index_trans_blocks+0x120/0x120 [ 21.803957][ T282] ? ext4_es_remove_extent+0x1d9/0x330 [ 21.809381][ T282] ext4_punch_hole+0x6f8/0xad0 [ 21.814115][ T282] ext4_fallocate+0x271/0x1a70 [ 21.818844][ T282] ? selinux_file_permission+0x2a5/0x510 [ 21.824457][ T282] ? preempt_count_add+0x90/0x1b0 [ 21.829448][ T282] vfs_fallocate+0x4b4/0x590 [ 21.834006][ T282] do_madvise+0x12cf/0x1df0 [ 21.838477][ T282] ? madvise_set_anon_name+0x460/0x460 [ 21.843907][ T282] ? _raw_spin_unlock_irq+0x4e/0x70 [ 21.849072][ T282] ? finish_task_switch+0x12e/0x5a0 [ 21.854237][ T282] ? switch_mm_irqs_off+0x763/0x9a0 [ 21.859402][ T282] ? __switch_to_asm+0x34/0x60 [ 21.864130][ T282] ? __schedule+0xb4f/0x1310 [ 21.868688][ T282] ? __kasan_check_write+0x14/0x20 [ 21.873765][ T282] ? _raw_spin_lock_irq+0x8f/0xe0 [ 21.878754][ T282] ? __kasan_check_write+0x14/0x20 [ 21.883828][ T282] ? _raw_spin_lock_irq+0x8f/0xe0 [ 21.888819][ T282] ? _raw_spin_lock_irqsave+0x110/0x110 [ 21.894332][ T282] ? _raw_spin_unlock_irq+0x4e/0x70 [ 21.899497][ T282] ? cgroup_leave_frozen+0x166/0x2b0 [ 21.904745][ T282] ? ptrace_stop+0x51e/0x9c0 [ 21.909304][ T282] ? ptrace_stop+0x69f/0x9c0 [ 21.913862][ T282] ? _raw_spin_unlock_irq+0x4e/0x70 [ 21.919168][ T282] ? ptrace_notify+0x1c4/0x250 [ 21.923920][ T282] ? do_notify_parent+0x7e0/0x7e0 [ 21.928922][ T282] ? fpu__clear+0x271/0x2d0 [ 21.933396][ T282] __x64_sys_madvise+0xa9/0xc0 [ 21.938131][ T282] do_syscall_64+0x31/0x40 [ 21.942515][ T282] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 21.948372][ T282] RIP: 0033:0x7f576266bbb9 [ 21.952757][ T282] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 21.972333][ T282] RSP: 002b:00007ffc91a9fee8 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 21.980716][ T282] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f576266bbb9 [ 21.988655][ T282] RDX: 0000000000000009 RSI: 0000000000600002 RDI: 0000200000000000 [ 21.996594][ T282] RBP: 00007f57626de610 R08: 0000000000000000 R09: 0000000000000000 [ 22.004536][ T282] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 22.012475][ T282] R13: 00007ffc91aa00c8 R14: 0000000000000001 R15: 0000000000000001 [ 22.020414][ T282] Modules linked in: [ 22.024494][ T282] ---[ end trace 2d7c96c617f901c8 ]--- [ 22.029972][ T282] RIP: 0010:ext4_split_extent_at+0xe6e/0xe90 [ 22.036119][ T282] Code: 48 89 df 48 89 74 24 68 e8 2f 8c d3 ff 48 8b 74 24 68 e9 5a fb ff ff e8 00 9c 99 ff 0f 0b e8 f9 9b 99 ff 0f 0b e8 f2 9b 99 ff <0f> 0b e8 eb 9b 99 ff 0f 0b e8 e4 9b 99 ff 0f 0b e8 dd 9b 99 ff 0f [ 22.055728][ T282] RSP: 0018:ffffc90000b774a0 EFLAGS: 00010293 [ 22.061799][ T282] RAX: ffffffff81c9f81e RBX: 0000000000000000 RCX: ffff888106dee2c0 [ 22.069743][ T282] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000002a [ 22.077706][ T282] RBP: ffffc90000b77610 R08: 0000000000000000 R09: 0000000050000028 [ 22.085674][ T282] R10: fffffbfff0d8e448 R11: 1ffffffff0d8e448 R12: 0000000000000000 [ 22.093637][ T282] R13: 0000000000000000 R14: 1ffff110244fbbff R15: 0000000000000000 [ 22.101599][ T282] FS: 000055556438b380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 22.110494][ T282] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.117128][ T282] CR2: 00007f256175f000 CR3: 00000001213c2000 CR4: 00000000003506a0 [ 22.125109][ T282] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.133089][ T282] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.141062][ T282] Kernel panic - not syncing: Fatal exception [ 22.147294][ T282] Kernel Offset: disabled [ 22.151600][ T282] Rebooting in 86400 seconds..