Warning: Permanently added '10.128.0.71' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.462723] ================================================================== [ 49.470329] BUG: KASAN: use-after-free in disk_unblock_events+0x51/0x60 [ 49.477059] Read of size 8 at addr ffff8801ca33eb60 by task blkid/2306 [ 49.483698] [ 49.485315] CPU: 1 PID: 2306 Comm: blkid Not tainted 4.9.135+ #61 [ 49.491617] ffff8801cd6a76f8 ffffffff81b36bf9 ffffea000728ce00 ffff8801ca33eb60 [ 49.499624] 0000000000000000 ffff8801ca33eb60 0000000000000000 ffff8801cd6a7730 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.507654] ffffffff815009ad ffff8801ca33eb60 0000000000000008 0000000000000000 [ 49.515742] Call Trace: [ 49.518320] [] dump_stack+0xc1/0x128 [ 49.523662] [] print_address_description+0x6c/0x234 [ 49.530304] [] kasan_report.cold.6+0x242/0x2fe [ 49.536533] [] ? disk_unblock_events+0x51/0x60 [ 49.542745] [] __asan_report_load8_noabort+0x14/0x20 [ 49.549475] [] disk_unblock_events+0x51/0x60 [ 49.555618] [] __blkdev_get+0x6b6/0xd60 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.561222] [] ? __blkdev_put+0x840/0x840 [ 49.567013] [] ? fsnotify+0x114/0x1100 [ 49.572532] [] blkdev_get+0x2da/0x920 [ 49.577963] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 49.584694] [] ? bd_may_claim+0xd0/0xd0 [ 49.590354] [] ? bd_acquire+0x27/0x250 [ 49.595875] [] ? bd_acquire+0x88/0x250 [ 49.601390] [] ? _raw_spin_unlock+0x2c/0x50 [ 49.607347] [] blkdev_open+0x1a5/0x250 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.612864] [] do_dentry_open+0x3ef/0xc90 [ 49.618636] [] ? blkdev_get_by_dev+0x70/0x70 [ 49.624668] [] vfs_open+0x11c/0x210 [ 49.629922] [] ? may_open.isra.20+0x14f/0x2a0 [ 49.636042] [] path_openat+0x542/0x2790 [ 49.641642] [] ? path_mountpoint+0x6c0/0x6c0 [ 49.647675] [] ? trace_hardirqs_on+0x10/0x10 [ 49.653825] [] ? new_slab+0x22e/0x3d0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.659267] [] ? expand_files.part.3+0x3a9/0x6d0 [ 49.665654] [] do_filp_open+0x197/0x270 [ 49.671260] [] ? may_open_dev+0xe0/0xe0 [ 49.676882] [] ? _raw_spin_unlock+0x2c/0x50 [ 49.682828] [] ? __alloc_fd+0x1d7/0x4a0 [ 49.688431] [] do_sys_open+0x30d/0x5c0 [ 49.693941] [] ? filp_open+0x70/0x70 [ 49.699289] [] ? up_read+0x1a/0x40 [ 49.704453] [] SyS_open+0x2d/0x40 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.709532] [] ? do_sys_open+0x5c0/0x5c0 [ 49.715218] [] do_syscall_64+0x19f/0x550 [ 49.720916] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 49.727816] [ 49.729421] Allocated by task 2298: [ 49.733026] save_stack_trace+0x16/0x20 [ 49.736977] kasan_kmalloc.part.1+0x62/0xf0 [ 49.741274] kasan_kmalloc+0xaf/0xc0 [ 49.745113] kmem_cache_alloc_trace+0x117/0x2e0 [ 49.749766] alloc_disk_node+0x54/0x3a0 [ 49.753713] alloc_disk+0x18/0x20 [ 49.757195] loop_add+0x368/0x7a0 [ 49.760631] loop_probe+0x14f/0x180 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.764250] kobj_lookup+0x223/0x410 [ 49.767942] get_gendisk+0x39/0x2d0 [ 49.771541] __blkdev_get+0x351/0xd60 [ 49.775314] blkdev_get+0x488/0x920 [ 49.778915] blkdev_open+0x1a5/0x250 [ 49.782603] do_dentry_open+0x3ef/0xc90 [ 49.786551] vfs_open+0x11c/0x210 [ 49.789980] path_openat+0x542/0x2790 [ 49.793754] do_filp_open+0x197/0x270 [ 49.797528] do_sys_open+0x30d/0x5c0 [ 49.801214] SyS_open+0x2d/0x40 [ 49.804468] do_syscall_64+0x19f/0x550 [ 49.808331] entry_SYSCALL_64_after_swapgs+0x5d/0xdb executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.813401] [ 49.815006] Freed by task 2306: [ 49.818272] save_stack_trace+0x16/0x20 [ 49.822230] kasan_slab_free+0xac/0x190 [ 49.826189] kfree+0xfb/0x310 [ 49.829270] disk_release+0x259/0x330 [ 49.833043] device_release+0x7e/0x220 [ 49.836903] kobject_put+0x148/0x250 [ 49.840690] put_disk+0x23/0x30 [ 49.843947] __blkdev_get+0x616/0xd60 [ 49.847720] blkdev_get+0x2da/0x920 [ 49.851322] blkdev_open+0x1a5/0x250 [ 49.855009] do_dentry_open+0x3ef/0xc90 [ 49.858959] vfs_open+0x11c/0x210 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.862515] path_openat+0x542/0x2790 [ 49.866293] do_filp_open+0x197/0x270 [ 49.870077] do_sys_open+0x30d/0x5c0 [ 49.873885] SyS_open+0x2d/0x40 [ 49.877140] do_syscall_64+0x19f/0x550 [ 49.881004] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 49.886079] [ 49.887734] The buggy address belongs to the object at ffff8801ca33e600 [ 49.887734] which belongs to the cache kmalloc-2048 of size 2048 [ 49.900549] The buggy address is located 1376 bytes inside of [ 49.900549] 2048-byte region [ffff8801ca33e600, ffff8801ca33ee00) executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.912573] The buggy address belongs to the page: [ 49.917482] page:ffffea000728ce00 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 49.927718] flags: 0x4000000000004080(slab|head) [ 49.932447] page dumped because: kasan: bad access detected [ 49.938169] [ 49.939773] Memory state around the buggy address: [ 49.944798] ffff8801ca33ea00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.952132] ffff8801ca33ea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.959576] >ffff8801ca33eb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.966912] ^ [ 49.973378] ffff8801ca33eb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.980711] ffff8801ca33ec00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.988091] ================================================================== [ 49.995428] Disabling lock debugging due to kernel taint [ 50.003266] Kernel panic - not syncing: panic_on_warn set ... [ 50.003266] executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.010617] CPU: 1 PID: 2306 Comm: blkid Tainted: G B 4.9.135+ #61 [ 50.018039] ffff8801cd6a7658 ffffffff81b36bf9 ffffffff82e366e0 00000000ffffffff [ 50.026029] 0000000000000000 0000000000000001 0000000000000000 ffff8801cd6a7718 [ 50.034038] ffffffff813f6aa5 0000000041b58ab3 ffffffff82e2a6e3 ffffffff813f68e6 [ 50.042046] Call Trace: [ 50.044616] [] dump_stack+0xc1/0x128 [ 50.049955] [] panic+0x1bf/0x39f [ 50.054989] [] ? add_taint.cold.6+0x16/0x16 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.061027] [] ? ___preempt_schedule+0x16/0x18 [ 50.067507] [] kasan_end_report+0x47/0x4f [ 50.073299] [] kasan_report.cold.6+0x76/0x2fe [ 50.079424] [] ? disk_unblock_events+0x51/0x60 [ 50.085644] [] __asan_report_load8_noabort+0x14/0x20 [ 50.092484] [] disk_unblock_events+0x51/0x60 [ 50.098520] [] __blkdev_get+0x6b6/0xd60 [ 50.104126] [] ? __blkdev_put+0x840/0x840 [ 50.110009] [] ? fsnotify+0x114/0x1100 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.115530] [] blkdev_get+0x2da/0x920 [ 50.121022] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 50.127756] [] ? bd_may_claim+0xd0/0xd0 [ 50.133360] [] ? bd_acquire+0x27/0x250 [ 50.138872] [] ? bd_acquire+0x88/0x250 [ 50.144388] [] ? _raw_spin_unlock+0x2c/0x50 [ 50.150336] [] blkdev_open+0x1a5/0x250 [ 50.155848] [] do_dentry_open+0x3ef/0xc90 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.161618] [] ? blkdev_get_by_dev+0x70/0x70 [ 50.167657] [] vfs_open+0x11c/0x210 [ 50.172920] [] ? may_open.isra.20+0x14f/0x2a0 [ 50.179046] [] path_openat+0x542/0x2790 [ 50.184644] [] ? path_mountpoint+0x6c0/0x6c0 [ 50.190677] [] ? trace_hardirqs_on+0x10/0x10 [ 50.196894] [] ? new_slab+0x22e/0x3d0 [ 50.202329] [] ? expand_files.part.3+0x3a9/0x6d0 [ 50.208717] [] do_filp_open+0x197/0x270 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.214318] [] ? may_open_dev+0xe0/0xe0 [ 50.219927] [] ? _raw_spin_unlock+0x2c/0x50 [ 50.225921] [] ? __alloc_fd+0x1d7/0x4a0 [ 50.231529] [] do_sys_open+0x30d/0x5c0 [ 50.237042] [] ? filp_open+0x70/0x70 [ 50.242425] [] ? up_read+0x1a/0x40 [ 50.247597] [] SyS_open+0x2d/0x40 [ 50.252766] [] ? do_sys_open+0x5c0/0x5c0 [ 50.258462] [] do_syscall_64+0x19f/0x550 executing program executing program executing program executing program executing program executing program [ 50.264149] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 50.271334] Kernel Offset: disabled [ 50.274939] Rebooting in 86400 seconds..