Warning: Permanently added '10.128.0.218' (ECDSA) to the list of known hosts. executing program [ 52.781425] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 53.021362] usb 1-1: Using ep0 maxpacket: 8 [ 53.141438] usb 1-1: config 5 has an invalid interface number: 176 but max is 0 [ 53.149057] usb 1-1: config 5 has an invalid descriptor of length 0, skipping remainder of the config [ 53.158506] usb 1-1: config 5 has no interface number 0 [ 53.163933] usb 1-1: New USB device found, idVendor=2040, idProduct=6502, bcdDevice=ca.4d [ 53.172420] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 53.223970] em28xx 1-1:5.176: New device @ 480 Mbps (2040:6502, interface 176, class 176) [ 53.232694] em28xx 1-1:5.176: Video interface 176 found: executing program [ 53.501346] em28xx 1-1:5.176: unknown em28xx chip ID (0) [ 53.721403] em28xx 1-1:5.176: reading from i2c device at 0xa0 failed (error=-5) [ 53.729152] em28xx 1-1:5.176: board has no eeprom [ 53.841325] em28xx 1-1:5.176: Identified as Hauppauge WinTV HVR 900 (R2) (card=18) [ 53.849076] em28xx 1-1:5.176: analog set to bulk mode. [ 53.855537] em28xx 1-1:5.176: Registering V4L2 extension [ 53.866875] usb 1-1: USB disconnect, device number 2 [ 53.873214] em28xx 1-1:5.176: Disconnecting em28xx [ 53.881868] em28xx 1-1:5.176: reading from i2c device at 0xb8 failed (error=-5) [ 53.898654] em28xx 1-1:5.176: Config register raw data: 0xffffffed [ 53.905248] em28xx 1-1:5.176: AC97 chip type couldn't be determined [ 53.911852] em28xx 1-1:5.176: No AC97 audio processor [ 53.918902] usb 1-1: Decoder not found [ 53.923099] em28xx 1-1:5.176: failed to create media graph [ 53.928785] em28xx 1-1:5.176: V4L2 device video32 deregistered [ 53.936231] em28xx 1-1:5.176: Binding DVB extension [ 53.936517] ================================================================== [ 53.941410] em28xx 1-1:5.176: no endpoint for DVB mode and transfer type 0 [ 53.949035] BUG: KASAN: use-after-free in v4l2_fh_init+0x24c/0x290 [ 53.949043] Read of size 8 at addr ffff8880a4f149d0 by task v4l_id/5313 [ 53.949045] [ 53.949054] CPU: 1 PID: 5313 Comm: v4l_id Not tainted 5.1.0-rc5-319617-gd34f951 #4 [ 53.949063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 53.956367] em28xx 1-1:5.176: failed to pre-allocate USB transfer buffers for DVB. [ 53.962562] Call Trace: [ 53.962584] dump_stack+0xe8/0x16e [ 53.962595] ? v4l2_fh_init+0x24c/0x290 [ 53.962604] ? v4l2_fh_init+0x24c/0x290 [ 53.962619] print_address_description+0x6c/0x236 [ 53.969658] em28xx 1-1:5.176: Registering input extension [ 53.970976] ? v4l2_fh_init+0x24c/0x290 [ 53.970983] ? v4l2_fh_init+0x24c/0x290 [ 53.970989] kasan_report.cold+0x1a/0x3c [ 53.970997] ? memmove+0x10/0x50 [ 53.971003] ? v4l2_fh_init+0x24c/0x290 [ 53.971010] v4l2_fh_init+0x24c/0x290 [ 53.971017] v4l2_fh_open+0x8d/0xd0 [ 53.971026] em28xx_v4l2_open+0x11f/0x470 [ 53.971034] ? refcount_inc_checked+0x1d/0x60 [ 53.971042] ? vidioc_s_std+0x460/0x460 [ 53.971049] v4l2_open+0x1b6/0x360 [ 53.971057] ? v4l2_release+0x390/0x390 [ 53.971064] chrdev_open+0x220/0x5d0 [ 53.971072] ? cdev_put.part.0+0x50/0x50 [ 53.971088] do_dentry_open+0x49c/0x1130 [ 53.971096] ? cdev_put.part.0+0x50/0x50 [ 53.971104] ? security_inode_permission+0xcf/0x100 [ 53.971110] ? chown_common+0x550/0x550 [ 53.971117] ? inode_permission+0xb4/0x560 [ 53.971126] path_openat+0x147d/0x40b0 [ 53.971137] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 53.971146] ? do_syscall_64+0xcf/0x4f0 [ 53.971155] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.971164] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 53.971172] ? __lock_acquire+0x522/0x37c0 [ 53.971184] do_filp_open+0x1a6/0x280 [ 53.971191] ? may_open_dev+0xf0/0xf0 [ 53.971196] ? find_held_lock+0x2d/0x110 [ 53.971206] ? lock_downgrade+0x640/0x640 [ 53.971216] ? do_raw_spin_unlock+0x55/0x220 [ 53.971223] ? _raw_spin_unlock+0x24/0x30 [ 53.971231] ? __alloc_fd+0x441/0x550 [ 53.971242] do_sys_open+0x3c5/0x590 [ 53.971250] ? filp_open+0x80/0x80 [ 53.971260] ? trace_hardirqs_off_caller+0x55/0x1c0 [ 53.971270] do_syscall_64+0xcf/0x4f0 [ 53.971278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.971286] RIP: 0033:0x7fdb23b8d120 [ 53.971295] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 53.971299] RSP: 002b:00007ffc1aebde18 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 53.971307] RAX: ffffffffffffffda RBX: 00007ffc1aebdf78 RCX: 00007fdb23b8d120 [ 53.971311] RDX: 00007fdb23e42138 RSI: 0000000000000000 RDI: 00007ffc1aebef17 [ 53.971315] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 53.971320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000400884 [ 53.971324] R13: 00007ffc1aebdf70 R14: 0000000000000000 R15: 0000000000000000 [ 53.971332] [ 53.971337] Allocated by task 12: [ 53.971346] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 53.971352] em28xx_v4l2_init.cold+0x93/0x3112 [ 53.971358] em28xx_init_extension+0x13a/0x200 [ 53.971363] request_module_async+0x62/0x70 [ 53.971370] process_one_work+0x90f/0x1580 [ 53.971375] worker_thread+0x9b/0xe20 [ 53.971380] kthread+0x313/0x420 [ 53.971386] ret_from_fork+0x3a/0x50 [ 53.971388] [ 53.971391] Freed by task 12: [ 53.971398] __kasan_slab_free+0x130/0x180 [ 53.971404] slab_free_freelist_hook+0x5e/0x140 [ 53.971409] kfree+0xce/0x280 [ 53.971415] em28xx_v4l2_init.cold+0x2cf/0x3112 [ 53.971420] em28xx_init_extension+0x13a/0x200 [ 53.971426] request_module_async+0x62/0x70 [ 53.971431] process_one_work+0x90f/0x1580 [ 53.971437] worker_thread+0x9b/0xe20 [ 53.971441] kthread+0x313/0x420 [ 53.971447] ret_from_fork+0x3a/0x50 [ 53.971448] [ 53.971454] The buggy address belongs to the object at ffff8880a4f14200 [ 53.971454] which belongs to the cache kmalloc-8k of size 8192 [ 53.971460] The buggy address is located 2000 bytes inside of [ 53.971460] 8192-byte region [ffff8880a4f14200, ffff8880a4f16200) [ 53.971462] The buggy address belongs to the page: [ 53.971468] page:ffffea000293c400 count:1 mapcount:0 mapping:ffff88812c3f4400 index:0x0 compound_mapcount: 0 [ 53.971476] flags: 0xfff00000010200(slab|head) [ 53.971487] raw: 00fff00000010200 dead000000000100 dead000000000200 ffff88812c3f4400 [ 53.971494] raw: 0000000000000000 0000000080030003 00000001ffffffff 0000000000000000 [ 53.971497] page dumped because: kasan: bad access detected [ 53.971498] [ 53.971500] Memory state around the buggy address: [ 53.971506] ffff8880a4f14880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.971511] ffff8880a4f14900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.971516] >ffff8880a4f14980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.971518] ^ [ 53.971523] ffff8880a4f14a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.971528] ffff8880a4f14a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.971530] ================================================================== [ 53.971533] Disabling lock debugging due to kernel taint [ 53.971592] Kernel panic - not syncing: panic_on_warn set ... [ 53.971601] CPU: 1 PID: 5313 Comm: v4l_id Tainted: G B 5.1.0-rc5-319617-gd34f951 #4 [ 53.971605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 53.971606] Call Trace: [ 53.971615] dump_stack+0xe8/0x16e [ 53.971623] panic+0x29d/0x5f2 [ 53.971630] ? __warn_printk+0xf8/0xf8 [ 53.971635] ? retint_kernel+0x10/0x10 [ 53.971644] ? trace_hardirqs_on+0x55/0x1c0 [ 53.971650] ? v4l2_fh_init+0x24c/0x290 [ 53.971655] end_report+0x48/0x4e [ 53.971660] ? v4l2_fh_init+0x24c/0x290 [ 53.971665] kasan_report.cold+0xd/0x3c [ 53.971671] ? memmove+0x10/0x50 [ 53.971676] ? v4l2_fh_init+0x24c/0x290 [ 53.971682] v4l2_fh_init+0x24c/0x290 [ 53.971688] v4l2_fh_open+0x8d/0xd0 [ 53.971694] em28xx_v4l2_open+0x11f/0x470 [ 53.971700] ? refcount_inc_checked+0x1d/0x60 [ 53.971706] ? vidioc_s_std+0x460/0x460 [ 53.971712] v4l2_open+0x1b6/0x360 [ 53.971718] ? v4l2_release+0x390/0x390 [ 53.971724] chrdev_open+0x220/0x5d0 [ 53.971731] ? cdev_put.part.0+0x50/0x50 [ 53.971739] do_dentry_open+0x49c/0x1130 [ 53.971745] ? cdev_put.part.0+0x50/0x50 [ 53.971751] ? security_inode_permission+0xcf/0x100 [ 53.971757] ? chown_common+0x550/0x550 [ 53.971762] ? inode_permission+0xb4/0x560 [ 53.971769] path_openat+0x147d/0x40b0 [ 53.971778] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 53.971784] ? do_syscall_64+0xcf/0x4f0 [ 53.971791] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.971797] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 53.971803] ? __lock_acquire+0x522/0x37c0 [ 53.971811] do_filp_open+0x1a6/0x280 [ 53.971818] ? may_open_dev+0xf0/0xf0 [ 53.971822] ? find_held_lock+0x2d/0x110 [ 53.971829] ? lock_downgrade+0x640/0x640 [ 53.971837] ? do_raw_spin_unlock+0x55/0x220 [ 53.971843] ? _raw_spin_unlock+0x24/0x30 [ 53.971849] ? __alloc_fd+0x441/0x550 [ 53.971857] do_sys_open+0x3c5/0x590 [ 53.971864] ? filp_open+0x80/0x80 [ 53.971871] ? trace_hardirqs_off_caller+0x55/0x1c0 [ 53.971879] do_syscall_64+0xcf/0x4f0 [ 53.971886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.971890] RIP: 0033:0x7fdb23b8d120 [ 53.971896] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 53.971899] RSP: 002b:00007ffc1aebde18 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 53.971905] RAX: ffffffffffffffda RBX: 00007ffc1aebdf78 RCX: 00007fdb23b8d120 [ 53.971909] RDX: 00007fdb23e42138 RSI: 0000000000000000 RDI: 00007ffc1aebef17 [ 53.971912] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 53.971923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000400884 [ 53.971926] R13: 00007ffc1aebdf70 R14: 0000000000000000 R15: 0000000000000000 [ 53.973780] Kernel Offset: disabled [ 54.729261] Rebooting in 86400 seconds..