Warning: Permanently added '10.128.0.202' (ECDSA) to the list of known hosts. [ 40.225729] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program executing program executing program executing program executing program [ 40.339439] audit: type=1400 audit(1572285054.203:36): avc: denied { map } for pid=6850 comm="syz-executor582" path="/root/syz-executor582937734" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.405395] ================================================================== [ 40.412911] BUG: KASAN: use-after-free in disk_unblock_events+0x55/0x60 [ 40.419773] Read of size 8 at addr ffff88809ade26c8 by task syz-executor582/6862 [ 40.427305] [ 40.428936] CPU: 1 PID: 6862 Comm: syz-executor582 Not tainted 4.14.150 #0 [ 40.438812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.448433] Call Trace: [ 40.451028] dump_stack+0x138/0x197 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.454668] ? disk_unblock_events+0x55/0x60 [ 40.459088] print_address_description.cold+0x7c/0x1dc [ 40.464497] ? disk_unblock_events+0x55/0x60 [ 40.468916] kasan_report.cold+0xa9/0x2af [ 40.473088] __asan_report_load8_noabort+0x14/0x20 [ 40.478029] disk_unblock_events+0x55/0x60 [ 40.482275] __blkdev_get+0x7d6/0x1120 [ 40.486177] ? __blkdev_put+0x7f0/0x7f0 [ 40.490156] ? bd_acquire+0x178/0x2c0 [ 40.493963] ? find_held_lock+0x35/0x130 [ 40.498028] blkdev_get+0xa8/0x8e0 [ 40.501579] ? bd_may_claim+0xd0/0xd0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.505392] ? _raw_spin_unlock+0x2d/0x50 [ 40.509549] blkdev_open+0x1d1/0x260 [ 40.513264] ? security_file_open+0x89/0x190 [ 40.517682] do_dentry_open+0x73b/0xeb0 [ 40.521660] ? bd_acquire+0x2c0/0x2c0 [ 40.525469] vfs_open+0x105/0x220 [ 40.528929] path_openat+0x8bd/0x3f70 [ 40.532734] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 40.538106] ? trace_hardirqs_on+0x10/0x10 [ 40.542353] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 40.547128] ? __lock_is_held+0xb6/0x140 [ 40.551190] ? save_trace+0x290/0x290 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.554996] ? __alloc_fd+0x1d4/0x4a0 [ 40.558978] do_filp_open+0x18e/0x250 [ 40.562782] ? __alloc_fd+0x1d4/0x4a0 [ 40.566585] ? may_open_dev+0xe0/0xe0 [ 40.570397] ? _raw_spin_unlock+0x2d/0x50 [ 40.574554] ? __alloc_fd+0x1d4/0x4a0 [ 40.578375] do_sys_open+0x2c5/0x430 [ 40.582097] ? filp_open+0x70/0x70 [ 40.585648] ? up_read+0x1a/0x40 [ 40.589023] SyS_openat+0x30/0x40 [ 40.592482] ? SyS_open+0x40/0x40 [ 40.595942] do_syscall_64+0x1e8/0x640 [ 40.599831] ? trace_hardirqs_off_thunk+0x1a/0x1c executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.604679] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 40.609869] RIP: 0033:0x441259 [ 40.613061] RSP: 002b:00007fffe7a4e5c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 40.620775] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441259 [ 40.628045] RDX: 0000000000000000 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 40.635317] RBP: 00000000006cb018 R08: 0000000000000004 R09: 00000000004002c8 [ 40.642592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401fd0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.649867] R13: 0000000000402060 R14: 0000000000000000 R15: 0000000000000000 [ 40.657148] [ 40.658777] Allocated by task 1: [ 40.662148] save_stack_trace+0x16/0x20 [ 40.666123] save_stack+0x45/0xd0 [ 40.669578] kasan_kmalloc+0xce/0xf0 [ 40.673302] kmem_cache_alloc_node_trace+0x153/0x770 [ 40.678406] alloc_disk_node+0x64/0x3e0 [ 40.682386] alloc_disk+0x1b/0x20 [ 40.685845] md_alloc+0x219/0x840 [ 40.689301] md_probe+0x31/0x40 [ 40.692582] kobj_lookup+0x21c/0x400 [ 40.696297] get_gendisk+0x3b/0x240 [ 40.699927] __blkdev_get+0x3af/0x1120 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.703816] blkdev_get+0xa8/0x8e0 [ 40.707355] blkdev_open+0x1d1/0x260 [ 40.711168] do_dentry_open+0x73b/0xeb0 [ 40.715147] vfs_open+0x105/0x220 [ 40.718606] path_openat+0x8bd/0x3f70 [ 40.722413] do_filp_open+0x18e/0x250 [ 40.726212] do_sys_open+0x2c5/0x430 [ 40.729923] SyS_open+0x2d/0x40 [ 40.733206] md_run_setup+0x7a/0xad [ 40.736835] prepare_namespace+0x4a/0x21d [ 40.740983] kernel_init_freeable+0x514/0x532 [ 40.745476] kernel_init+0x12/0x162 [ 40.749099] ret_from_fork+0x24/0x30 [ 40.752801] executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.754429] Freed by task 6862: [ 40.757709] save_stack_trace+0x16/0x20 [ 40.761682] save_stack+0x45/0xd0 [ 40.765138] kasan_slab_free+0x75/0xc0 [ 40.769023] kfree+0xcc/0x270 [ 40.772128] disk_release+0x24b/0x2d0 [ 40.775933] device_release+0xf6/0x1a0 [ 40.779823] kobject_put.cold+0x269/0x2f9 [ 40.783974] put_disk+0x23/0x30 [ 40.787254] __blkdev_get+0x73c/0x1120 [ 40.791141] blkdev_get+0xa8/0x8e0 [ 40.794688] blkdev_open+0x1d1/0x260 [ 40.798414] do_dentry_open+0x73b/0xeb0 [ 40.802389] vfs_open+0x105/0x220 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.805841] path_openat+0x8bd/0x3f70 [ 40.809645] do_filp_open+0x18e/0x250 [ 40.813443] do_sys_open+0x2c5/0x430 [ 40.817154] SyS_openat+0x30/0x40 [ 40.820613] do_syscall_64+0x1e8/0x640 [ 40.824503] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 40.829685] [ 40.831313] The buggy address belongs to the object at ffff88809ade2140 [ 40.831313] which belongs to the cache kmalloc-2048 of size 2048 [ 40.844146] The buggy address is located 1416 bytes inside of [ 40.844146] 2048-byte region [ffff88809ade2140, ffff88809ade2940) executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.856199] The buggy address belongs to the page: [ 40.861132] page:ffffea00026b7880 count:1 mapcount:0 mapping:ffff88809ade2140 index:0x0 compound_mapcount: 0 [ 40.871114] flags: 0x1fffc0000008100(slab|head) [ 40.875801] raw: 01fffc0000008100 ffff88809ade2140 0000000000000000 0000000100000003 [ 40.883698] raw: ffffea00026b6b20 ffffea00024fb520 ffff8880aa800c40 0000000000000000 [ 40.891581] page dumped because: kasan: bad access detected [ 40.897290] [ 40.898917] Memory state around the buggy address: executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.903855] ffff88809ade2580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 40.911216] ffff88809ade2600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 40.918583] >ffff88809ade2680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 40.925943] ^ [ 40.931653] ffff88809ade2700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 40.939017] ffff88809ade2780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 40.946377] ================================================================== executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 40.953738] Disabling lock debugging due to kernel taint [ 40.962719] Kernel panic - not syncing: panic_on_warn set ... [ 40.962719] [ 40.970120] CPU: 1 PID: 6862 Comm: syz-executor582 Tainted: G B 4.14.150 #0 [ 40.978344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.987697] Call Trace: [ 40.990292] dump_stack+0x138/0x197 [ 40.993923] ? disk_unblock_events+0x55/0x60 [ 40.998331] panic+0x1f9/0x42d [ 41.001524] ? add_taint.cold+0x16/0x16 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.005505] ? ___preempt_schedule+0x16/0x18 [ 41.009918] kasan_end_report+0x47/0x4f [ 41.013895] kasan_report.cold+0x130/0x2af [ 41.018139] __asan_report_load8_noabort+0x14/0x20 [ 41.023109] disk_unblock_events+0x55/0x60 [ 41.027349] __blkdev_get+0x7d6/0x1120 [ 41.031240] ? __blkdev_put+0x7f0/0x7f0 [ 41.035212] ? bd_acquire+0x178/0x2c0 [ 41.039014] ? find_held_lock+0x35/0x130 [ 41.044030] blkdev_get+0xa8/0x8e0 [ 41.047578] ? bd_may_claim+0xd0/0xd0 [ 41.051382] ? _raw_spin_unlock+0x2d/0x50 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.055627] blkdev_open+0x1d1/0x260 [ 41.059342] ? security_file_open+0x89/0x190 [ 41.063753] do_dentry_open+0x73b/0xeb0 [ 41.067728] ? bd_acquire+0x2c0/0x2c0 [ 41.071533] vfs_open+0x105/0x220 [ 41.074992] path_openat+0x8bd/0x3f70 [ 41.078803] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 41.084171] ? trace_hardirqs_on+0x10/0x10 [ 41.088418] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 41.093111] ? __lock_is_held+0xb6/0x140 [ 41.097177] ? save_trace+0x290/0x290 [ 41.100977] ? __alloc_fd+0x1d4/0x4a0 [ 41.104797] do_filp_open+0x18e/0x250 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.108605] ? __alloc_fd+0x1d4/0x4a0 [ 41.112407] ? may_open_dev+0xe0/0xe0 [ 41.116214] ? _raw_spin_unlock+0x2d/0x50 [ 41.120365] ? __alloc_fd+0x1d4/0x4a0 [ 41.124179] do_sys_open+0x2c5/0x430 [ 41.127899] ? filp_open+0x70/0x70 [ 41.131442] ? up_read+0x1a/0x40 [ 41.134814] SyS_openat+0x30/0x40 [ 41.138266] ? SyS_open+0x40/0x40 [ 41.141719] do_syscall_64+0x1e8/0x640 [ 41.145605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 41.150451] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 41.155640] RIP: 0033:0x441259 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.158822] RSP: 002b:00007fffe7a4e5c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 41.166529] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441259 [ 41.173843] RDX: 0000000000000000 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 41.181109] RBP: 00000000006cb018 R08: 0000000000000004 R09: 00000000004002c8 [ 41.188383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401fd0 [ 41.196954] R13: 0000000000402060 R14: 0000000000000000 R15: 0000000000000000 [ 41.205618] Kernel Offset: disabled [ 41.209239] Rebooting in 86400 seconds..