Warning: Permanently added '10.128.0.234' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 46.759213] ================================================================== [ 46.766612] BUG: KASAN: use-after-free in disk_unblock_events+0x51/0x60 [ 46.773361] Read of size 8 at addr ffff8801cc7db860 by task syz-executor460/2165 [ 46.780887] [ 46.782526] CPU: 1 PID: 2165 Comm: syz-executor460 Not tainted 4.9.141+ #1 [ 46.789605] ffff8801cc54f6f8 ffffffff81b42e79 ffffea000731f600 ffff8801cc7db860 [ 46.797720] 0000000000000000 ffff8801cc7db860 0000000000000000 ffff8801cc54f730 [ 46.805908] ffffffff815009b8 ffff8801cc7db860 0000000000000008 0000000000000000 [ 46.813979] Call Trace: [ 46.816572] [] dump_stack+0xc1/0x128 [ 46.821947] [] print_address_description+0x6c/0x234 [ 46.828678] [] kasan_report.cold.6+0x242/0x2fe [ 46.834922] [] ? disk_unblock_events+0x51/0x60 [ 46.841163] [] __asan_report_load8_noabort+0x14/0x20 [ 46.847925] [] disk_unblock_events+0x51/0x60 [ 46.853995] [] __blkdev_get+0x6b6/0xd60 [ 46.859776] [] ? __blkdev_put+0x840/0x840 [ 46.865581] [] blkdev_get+0x2da/0x920 [ 46.871030] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 46.877937] [] ? bd_may_claim+0xd0/0xd0 [ 46.883554] [] ? bd_acquire+0xfc/0x250 [ 46.889077] [] ? bd_acquire+0x133/0x250 [ 46.894682] [] ? _raw_spin_unlock+0x2c/0x50 [ 46.900771] [] blkdev_open+0x1a5/0x250 [ 46.906291] [] do_dentry_open+0x3ef/0xc90 [ 46.912068] [] ? blkdev_get_by_dev+0x70/0x70 [ 46.918111] [] vfs_open+0x11c/0x210 [ 46.923370] [] ? may_open.isra.20+0x14f/0x2a0 [ 46.929498] [] path_openat+0x542/0x2790 [ 46.935106] [] ? path_mountpoint+0x6c0/0x6c0 [ 46.941241] [] ? trace_hardirqs_on+0x10/0x10 [ 46.947279] [] ? expand_files.part.3+0x3a9/0x6d0 [ 46.953666] [] do_filp_open+0x197/0x270 [ 46.959267] [] ? may_open_dev+0xe0/0xe0 [ 46.964865] [] ? _raw_spin_unlock+0x2c/0x50 [ 46.970812] [] ? __alloc_fd+0x1d7/0x4a0 [ 46.976420] [] do_sys_open+0x30d/0x5c0 [ 46.981943] [] ? filp_open+0x70/0x70 [ 46.987297] [] ? up_read+0x1a/0x40 [ 46.992478] [] SyS_open+0x2d/0x40 [ 46.997559] [] ? do_sys_open+0x5c0/0x5c0 [ 47.003256] [] do_syscall_64+0x19f/0x550 [ 47.008950] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 47.015861] [ 47.017488] Allocated by task 2165: [ 47.021109] save_stack_trace+0x16/0x20 [ 47.025212] kasan_kmalloc.part.1+0x62/0xf0 [ 47.029653] kasan_kmalloc+0xaf/0xc0 [ 47.033378] kmem_cache_alloc_trace+0x117/0x2e0 [ 47.038057] alloc_disk_node+0x54/0x3a0 [ 47.042039] alloc_disk+0x18/0x20 [ 47.045497] loop_add+0x368/0x7a0 [ 47.048957] loop_control_ioctl+0x136/0x300 [ 47.053281] do_vfs_ioctl+0x1ac/0x11a0 [ 47.057191] SyS_ioctl+0x8f/0xc0 [ 47.060555] do_syscall_64+0x19f/0x550 [ 47.064451] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 47.069547] [ 47.071175] Freed by task 2165: [ 47.074454] save_stack_trace+0x16/0x20 [ 47.078431] kasan_slab_free+0xac/0x190 [ 47.082408] kfree+0xfb/0x310 [ 47.085515] disk_release+0x259/0x330 [ 47.089313] device_release+0x7e/0x220 [ 47.093198] kobject_put+0x148/0x250 [ 47.096916] put_disk+0x23/0x30 [ 47.100195] __blkdev_get+0x616/0xd60 [ 47.103992] blkdev_get+0x2da/0x920 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.107615] blkdev_open+0x1a5/0x250 [ 47.111342] do_dentry_open+0x3ef/0xc90 [ 47.115324] vfs_open+0x11c/0x210 [ 47.118779] path_openat+0x542/0x2790 [ 47.122586] do_filp_open+0x197/0x270 [ 47.126387] do_sys_open+0x30d/0x5c0 [ 47.130104] SyS_open+0x2d/0x40 [ 47.133383] do_syscall_64+0x19f/0x550 [ 47.137272] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 47.142368] [ 47.143995] The buggy address belongs to the object at ffff8801cc7db300 [ 47.143995] which belongs to the cache kmalloc-2048 of size 2048 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.156829] The buggy address is located 1376 bytes inside of [ 47.156829] 2048-byte region [ffff8801cc7db300, ffff8801cc7dbb00) [ 47.168881] The buggy address belongs to the page: [ 47.173826] page:ffffea000731f600 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 47.184117] flags: 0x4000000000004080(slab|head) [ 47.188895] page dumped because: kasan: bad access detected [ 47.194598] [ 47.196220] Memory state around the buggy address: [ 47.201146] ffff8801cc7db700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.208510] ffff8801cc7db780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.215880] >ffff8801cc7db800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.223244] ^ [ 47.229757] ffff8801cc7db880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.237123] ffff8801cc7db900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.244484] ================================================================== [ 47.251870] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.260468] Kernel panic - not syncing: panic_on_warn set ... [ 47.260468] [ 47.267860] CPU: 1 PID: 2165 Comm: syz-executor460 Tainted: G B 4.9.141+ #1 [ 47.276091] ffff8801cc54f658 ffffffff81b42e79 ffffffff82e37630 00000000ffffffff [ 47.284200] 0000000000000000 0000000000000001 0000000000000000 ffff8801cc54f718 [ 47.292284] ffffffff813f7125 0000000041b58ab3 ffffffff82e2b62b ffffffff813f6f66 [ 47.300364] Call Trace: [ 47.302961] [] dump_stack+0xc1/0x128 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.308337] [] panic+0x1bf/0x39f [ 47.313358] [] ? add_taint.cold.5+0x16/0x16 [ 47.319339] [] ? ___preempt_schedule+0x16/0x18 [ 47.325592] [] kasan_end_report+0x47/0x4f [ 47.336145] [] kasan_report.cold.6+0x76/0x2fe [ 47.342301] [] ? disk_unblock_events+0x51/0x60 [ 47.348631] [] __asan_report_load8_noabort+0x14/0x20 [ 47.355405] [] disk_unblock_events+0x51/0x60 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.361470] [] __blkdev_get+0x6b6/0xd60 [ 47.367102] [] ? __blkdev_put+0x840/0x840 [ 47.372907] [] blkdev_get+0x2da/0x920 [ 47.378366] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 47.385909] [] ? bd_may_claim+0xd0/0xd0 [ 47.391544] [] ? bd_acquire+0xfc/0x250 [ 47.397095] [] ? bd_acquire+0x133/0x250 [ 47.402724] [] ? _raw_spin_unlock+0x2c/0x50 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.408723] [] blkdev_open+0x1a5/0x250 [ 47.414266] [] do_dentry_open+0x3ef/0xc90 [ 47.420074] [] ? blkdev_get_by_dev+0x70/0x70 [ 47.426141] [] vfs_open+0x11c/0x210 [ 47.431428] [] ? may_open.isra.20+0x14f/0x2a0 [ 47.437592] [] path_openat+0x542/0x2790 [ 47.443230] [] ? path_mountpoint+0x6c0/0x6c0 [ 47.449386] [] ? trace_hardirqs_on+0x10/0x10 [ 47.455484] [] ? expand_files.part.3+0x3a9/0x6d0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.461905] [] do_filp_open+0x197/0x270 [ 47.467551] [] ? may_open_dev+0xe0/0xe0 [ 47.473190] [] ? _raw_spin_unlock+0x2c/0x50 [ 47.479174] [] ? __alloc_fd+0x1d7/0x4a0 [ 47.484809] [] do_sys_open+0x30d/0x5c0 [ 47.490349] [] ? filp_open+0x70/0x70 [ 47.495717] [] ? up_read+0x1a/0x40 [ 47.500913] [] SyS_open+0x2d/0x40 [ 47.506021] [] ? do_sys_open+0x5c0/0x5c0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.511740] [] do_syscall_64+0x19f/0x550 [ 47.517454] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 47.524714] Kernel Offset: disabled [ 47.528338] Rebooting in 86400 seconds..