Warning: Permanently added '10.128.10.43' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 33.751719] ================================================================== [ 33.759151] BUG: KASAN: use-after-free in disk_unblock_events+0x51/0x60 [ 33.765888] Read of size 8 at addr ffff8800b64fa768 by task syz-executor311/2099 [ 33.773404] [ 33.775045] CPU: 0 PID: 2099 Comm: syz-executor311 Not tainted 4.4.166+ #17 [ 33.782140] 0000000000000000 fb21ab47d6d5ab1e ffff8800b64e7660 ffffffff81aa62ad [ 33.790231] ffffea0002d93e00 ffff8800b64fa768 0000000000000000 ffff8800b64fa768 executing program executing program executing program executing program [ 33.798360] 0000000000000000 ffff8800b64e7698 ffffffff8148b12b ffff8800b64fa768 [ 33.806425] Call Trace: [ 33.809006] [] dump_stack+0xc1/0x124 [ 33.814364] [] print_address_description+0x6c/0x217 [ 33.821023] [] kasan_report.cold.6+0x175/0x2f7 [ 33.827252] [] ? disk_unblock_events+0x51/0x60 [ 33.833489] [] __asan_report_load8_noabort+0x14/0x20 [ 33.840238] [] disk_unblock_events+0x51/0x60 [ 33.846290] [] __blkdev_get+0x70c/0xdf0 executing program executing program [ 33.851913] [] ? trace_hardirqs_on+0x10/0x10 [ 33.857981] [] ? __blkdev_put+0x840/0x840 [ 33.863781] [] ? blkdev_get_block+0x80/0x80 [ 33.869743] [] blkdev_get+0x2da/0x920 [ 33.875239] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 33.882011] [] ? bd_may_claim+0xd0/0xd0 [ 33.887625] [] ? bd_acquire+0x100/0x370 [ 33.893254] [] ? bd_acquire+0x137/0x370 [ 33.898874] [] ? _raw_spin_unlock+0x2c/0x50 [ 33.904863] [] blkdev_open+0x1a5/0x250 [ 33.910396] [] do_dentry_open+0x38d/0xbd0 [ 33.916194] [] ? __inode_permission2+0x9b/0x240 [ 33.922505] [] ? blkdev_get_by_dev+0x70/0x70 [ 33.928554] [] vfs_open+0x12a/0x210 [ 33.933919] [] ? may_open.isra.19+0x156/0x240 [ 33.940083] [] path_openat+0xc10/0x3f10 [ 33.945726] [] ? may_open.isra.19+0x240/0x240 [ 33.951861] [] ? do_sys_open+0x203/0x610 [ 33.957562] [] ? compat_SyS_open+0x2a/0x40 [ 33.963439] [] ? do_fast_syscall_32+0x31e/0xa80 [ 33.969751] [] ? sysenter_flags_fixed+0xd/0x1a [ 33.975982] [] ? trace_hardirqs_on+0x10/0x10 [ 33.982032] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 33.988786] [] ? native_set_pgd+0x50/0x50 [ 33.994592] [] do_filp_open+0x197/0x270 [ 34.000215] [] ? user_path_mountpoint_at+0x70/0x70 [ 34.006794] [] ? _raw_spin_unlock+0x2c/0x50 [ 34.012785] [] ? __alloc_fd+0x1f3/0x4a0 [ 34.018405] [] do_sys_open+0x31c/0x610 [ 34.023932] [] ? filp_open+0x70/0x70 [ 34.029286] [] ? __do_page_fault+0x2b6/0x7e0 [ 34.035342] [] compat_SyS_open+0x2a/0x40 [ 34.041044] [] ? compat_SyS_getdents64+0x260/0x260 [ 34.047615] [] do_fast_syscall_32+0x31e/0xa80 [ 34.053755] [] sysenter_flags_fixed+0xd/0x1a [ 34.059820] [ 34.061450] Allocated by task 2099: [ 34.065058] [] save_stack_trace+0x26/0x50 [ 34.070979] [] kasan_kmalloc.part.1+0x62/0xf0 [ 34.077264] [] kasan_kmalloc+0xaf/0xc0 [ 34.082924] [] kmem_cache_alloc_trace+0x117/0x2d0 [ 34.089541] [] alloc_disk_node+0x54/0x3a0 [ 34.095498] [] alloc_disk+0x18/0x20 [ 34.100905] [] loop_add+0x36b/0x7c0 [ 34.106322] [] loop_control_ioctl+0x136/0x300 [ 34.112590] [] compat_SyS_ioctl+0x4af/0x2220 [ 34.118785] [] do_fast_syscall_32+0x31e/0xa80 [ 34.125084] [] sysenter_flags_fixed+0xd/0x1a [ 34.131285] [ 34.132899] Freed by task 2099: [ 34.136163] [] save_stack_trace+0x26/0x50 [ 34.142106] [] kasan_slab_free+0xac/0x190 [ 34.148026] [] kfree+0xf4/0x310 [ 34.153101] [] disk_release+0x259/0x330 [ 34.158848] [] device_release+0x7e/0x220 [ 34.164691] [] kobject_put+0x144/0x260 [ 34.170371] [] put_disk+0x23/0x30 [ 34.175609] [] __blkdev_get+0x66c/0xdf0 [ 34.181361] [] blkdev_get+0x2da/0x920 [ 34.186948] [] blkdev_open+0x1a5/0x250 [ 34.192624] [] do_dentry_open+0x38d/0xbd0 [ 34.198563] [] vfs_open+0x12a/0x210 [ 34.203971] [] path_openat+0xc10/0x3f10 [ 34.209718] [] do_filp_open+0x197/0x270 [ 34.215464] [] do_sys_open+0x31c/0x610 [ 34.221123] [] compat_SyS_open+0x2a/0x40 [ 34.226957] [] do_fast_syscall_32+0x31e/0xa80 [ 34.233254] [] sysenter_flags_fixed+0xd/0x1a [ 34.239451] [ 34.241218] The buggy address belongs to the object at ffff8800b64fa200 [ 34.241218] which belongs to the cache kmalloc-2048 of size 2048 [ 34.254068] The buggy address is located 1384 bytes inside of [ 34.254068] 2048-byte region [ffff8800b64fa200, ffff8800b64faa00) [ 34.266104] The buggy address belongs to the page: [ 34.273750] ------------[ cut here ]------------