Warning: Permanently added '10.128.15.210' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 34.156287] ================================================================== [ 34.157673] BUG: KASAN: use-after-free in disk_unblock_events+0x55/0x60 [ 34.159184] Read of size 8 at addr ffff8801cba41660 by task syz-executor531/2164 [ 34.160475] [ 34.160722] CPU: 0 PID: 2164 Comm: syz-executor531 Not tainted 4.9.155+ #27 [ 34.161781] ffff8801cd847730 ffffffff81b47871 0000000000000000 ffffea00072e9000 [ 34.163401] ffff8801cba41660 0000000000000008 ffffffff81b19dd5 ffff8801cd847768 [ 34.165206] ffffffff81502825 0000000000000000 ffff8801cba41660 ffff8801cba41660 [ 34.167046] Call Trace: [ 34.167580] [] dump_stack+0xc1/0x120 [ 34.168786] [] ? disk_unblock_events+0x55/0x60 [ 34.170160] [] print_address_description+0x6f/0x238 [ 34.171631] [] ? disk_unblock_events+0x55/0x60 [ 34.172967] [] kasan_report.cold+0x8c/0x2ba [ 34.174338] [] __asan_report_load8_noabort+0x14/0x20 [ 34.175806] [] disk_unblock_events+0x55/0x60 [ 34.180165] [] __blkdev_get+0x6ba/0xeb0 [ 34.185782] [] ? __blkdev_put+0x840/0x840 [ 34.191576] [] ? __might_sleep+0x95/0x1a0 [ 34.197383] [] blkdev_get+0x2e8/0x920 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.202826] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 34.209575] [] ? bd_may_claim+0xd0/0xd0 [ 34.215194] [] ? bd_acquire+0xf9/0x250 [ 34.220725] [] ? bd_acquire+0x12f/0x250 [ 34.226435] [] ? _raw_spin_unlock+0x2d/0x50 [ 34.232431] [] blkdev_open+0x1aa/0x250 [ 34.237978] [] do_dentry_open+0x3ef/0xc80 [ 34.244032] [] ? blkdev_get_by_dev+0x80/0x80 [ 34.250089] [] vfs_open+0x105/0x230 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.255360] [] ? may_open.isra.0+0x139/0x290 [ 34.261429] [] path_openat+0xbf5/0x2f60 [ 34.267053] [] ? path_mountpoint+0x6d0/0x6d0 [ 34.273111] [] do_filp_open+0x1a1/0x280 [ 34.278728] [] ? may_open_dev+0xe0/0xe0 [ 34.284350] [] ? __alloc_fd+0x1d4/0x490 [ 34.289975] [] ? _raw_spin_unlock+0x2d/0x50 [ 34.295958] [] ? __alloc_fd+0x1d4/0x490 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.301582] [] do_sys_open+0x2f0/0x610 [ 34.307112] [] ? filp_open+0x70/0x70 [ 34.312474] [] ? __do_page_fault+0x545/0xa60 [ 34.318524] [] SyS_open+0x2d/0x40 [ 34.323626] [] ? do_sys_open+0x610/0x610 [ 34.329330] [] do_syscall_64+0x1ad/0x570 [ 34.335050] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 34.341961] [ 34.343585] Allocated by task 2164: [ 34.347206] save_stack_trace+0x16/0x20 [ 34.351173] kasan_kmalloc.part.0+0x62/0xf0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.355492] kasan_kmalloc+0xb7/0xd0 [ 34.359202] kmem_cache_alloc_trace+0x115/0x2d0 [ 34.363867] alloc_disk_node+0x50/0x3c0 [ 34.367832] alloc_disk+0x1b/0x20 [ 34.371292] loop_add+0x37e/0x7b0 [ 34.374773] loop_control_ioctl+0x132/0x2f0 [ 34.379097] do_vfs_ioctl+0xb87/0x11d0 [ 34.382977] SyS_ioctl+0x8f/0xc0 [ 34.386337] do_syscall_64+0x1ad/0x570 [ 34.390219] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 34.395313] [ 34.396933] Freed by task 2164: [ 34.400217] save_stack_trace+0x16/0x20 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.404184] kasan_slab_free+0xb0/0x190 [ 34.408156] kfree+0xfb/0x310 [ 34.411264] disk_release+0x255/0x330 [ 34.415057] device_release+0x7d/0x220 [ 34.418944] kobject_put+0x150/0x260 [ 34.422653] put_disk+0x23/0x30 [ 34.425926] __blkdev_get+0x61a/0xeb0 [ 34.429726] blkdev_get+0x2e8/0x920 [ 34.433344] blkdev_open+0x1aa/0x250 [ 34.437052] do_dentry_open+0x3ef/0xc80 [ 34.441020] vfs_open+0x105/0x230 [ 34.444495] path_openat+0xbf5/0x2f60 [ 34.448292] do_filp_open+0x1a1/0x280 [ 34.452088] do_sys_open+0x2f0/0x610 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.455799] SyS_open+0x2d/0x40 [ 34.459074] do_syscall_64+0x1ad/0x570 [ 34.462965] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 34.468056] [ 34.469680] The buggy address belongs to the object at ffff8801cba41100 [ 34.469680] which belongs to the cache kmalloc-2048 of size 2048 [ 34.482502] The buggy address is located 1376 bytes inside of [ 34.482502] 2048-byte region [ffff8801cba41100, ffff8801cba41900) [ 34.494541] The buggy address belongs to the page: executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.499469] page:ffffea00072e9000 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 34.509694] flags: 0x4000000000004080(slab|head) [ 34.514450] page dumped because: kasan: bad access detected [ 34.520152] [ 34.521767] Memory state around the buggy address: [ 34.526691] ffff8801cba41500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.534047] ffff8801cba41580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.541399] >ffff8801cba41600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.548749] ^ executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.555231] ffff8801cba41680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.562583] ffff8801cba41700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.569934] ================================================================== [ 34.577291] Disabling lock debugging due to kernel taint [ 34.584210] Kernel panic - not syncing: panic_on_warn set ... [ 34.584210] [ 34.591589] CPU: 0 PID: 2164 Comm: syz-executor531 Tainted: G B 4.9.155+ #27 [ 34.599894] ffff8801cd847670 ffffffff81b47871 ffff8801cd847700 ffffffff82e43a22 [ 34.607964] 00000000ffffffff 0000000000000000 ffffffff81b19dd5 ffff8801cd847750 [ 34.616032] ffffffff813f746a 0000000041b58ab3 ffffffff82e35b4a ffffffff813f7291 [ 34.624097] Call Trace: [ 34.626679] [] dump_stack+0xc1/0x120 [ 34.632036] [] ? disk_unblock_events+0x55/0x60 [ 34.638264] [] panic+0x1d9/0x3bd [ 34.643274] [] ? add_taint.cold+0x16/0x16 [ 34.649071] [] ? preempt_schedule_common+0x4f/0xe0 [ 34.655645] [] ? disk_unblock_events+0x55/0x60 [ 34.661871] [] ? preempt_schedule+0x26/0x30 [ 34.667842] [] ? ___preempt_schedule+0x16/0x18 [ 34.674070] [] kasan_end_report+0x47/0x4f [ 34.679865] [] kasan_report.cold+0xa9/0x2ba [ 34.685835] [] __asan_report_load8_noabort+0x14/0x20 [ 34.692582] [] disk_unblock_events+0x55/0x60 [ 34.698638] [] __blkdev_get+0x6ba/0xeb0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.704258] [] ? __blkdev_put+0x840/0x840 [ 34.710050] [] ? __might_sleep+0x95/0x1a0 [ 34.715867] [] blkdev_get+0x2e8/0x920 [ 34.721318] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 34.728064] [] ? bd_may_claim+0xd0/0xd0 [ 34.733682] [] ? bd_acquire+0xf9/0x250 [ 34.739214] [] ? bd_acquire+0x12f/0x250 [ 34.744833] [] ? _raw_spin_unlock+0x2d/0x50 [ 34.750799] [] blkdev_open+0x1aa/0x250 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.756345] [] do_dentry_open+0x3ef/0xc80 [ 34.762136] [] ? blkdev_get_by_dev+0x80/0x80 [ 34.768193] [] vfs_open+0x105/0x230 [ 34.773466] [] ? may_open.isra.0+0x139/0x290 [ 34.779523] [] path_openat+0xbf5/0x2f60 [ 34.785148] [] ? path_mountpoint+0x6d0/0x6d0 [ 34.791207] [] do_filp_open+0x1a1/0x280 [ 34.796828] [] ? may_open_dev+0xe0/0xe0 [ 34.802450] [] ? __alloc_fd+0x1d4/0x490 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 34.808078] [] ? _raw_spin_unlock+0x2d/0x50 [ 34.814050] [] ? __alloc_fd+0x1d4/0x490 [ 34.819669] [] do_sys_open+0x2f0/0x610 [ 34.825203] [] ? filp_open+0x70/0x70 [ 34.830565] [] ? __do_page_fault+0x545/0xa60 [ 34.836622] [] SyS_open+0x2d/0x40 [ 34.841720] [] ? do_sys_open+0x610/0x610 [ 34.847425] [] do_syscall_64+0x1ad/0x570 [ 34.853129] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 34.860308] Kernel Offset: disabled [ 34.863983] Rebooting in 86400 seconds..