Starting mcstransd: [ 9.718007] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.167511] random: sshd: uninitialized urandom read (32 bytes read) [ 18.427753] random: sshd: uninitialized urandom read (32 bytes read) [ 18.572302] random: crng init done Warning: Permanently added '10.128.0.211' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.545759] ================================================================== [ 41.553157] BUG: KASAN: use-after-free in disk_unblock_events+0x55/0x60 [ 41.559898] Read of size 8 at addr ffff8801ce538de0 by task blkid/2085 [ 41.566539] [ 41.568152] CPU: 0 PID: 2085 Comm: blkid Not tainted 4.9.189+ #4 [ 41.574280] ffff8801cef0f730 ffffffff81b65c01 0000000000000000 ffffea0007394e00 [ 41.582294] ffff8801ce538de0 0000000000000008 ffffffff81b3a0b5 ffff8801cef0f768 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.590296] ffffffff8150c168 0000000000000000 ffff8801ce538de0 ffff8801ce538de0 [ 41.598971] Call Trace: [ 41.601544] [<0000000003a9df5f>] dump_stack+0xc1/0x120 [ 41.606886] [<0000000053bef6f6>] ? disk_unblock_events+0x55/0x60 [ 41.613098] [<000000008c7560f9>] print_address_description+0x6f/0x23a [ 41.619752] [<0000000053bef6f6>] ? disk_unblock_events+0x55/0x60 [ 41.625972] [<0000000034402178>] kasan_report.cold+0x8c/0x2ba [ 41.631931] [<00000000525c9a0b>] __asan_report_load8_noabort+0x14/0x20 [ 41.638667] [<0000000053bef6f6>] disk_unblock_events+0x55/0x60 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.644899] [<0000000072892199>] __blkdev_get+0x6ba/0xeb0 [ 41.650510] [<000000001582cb82>] ? __blkdev_put+0x840/0x840 [ 41.656289] [<0000000055e65f1c>] blkdev_get+0x2e8/0x920 [ 41.661719] [<000000002e05e12f>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 41.668564] [<0000000067108aaf>] ? bd_may_claim+0xd0/0xd0 [ 41.674178] [<00000000eef09d34>] ? bd_acquire+0x26/0x250 [ 41.679701] [<00000000727069ec>] ? bd_acquire+0x88/0x250 [ 41.685230] [<00000000ad80c548>] ? _raw_spin_unlock+0x2d/0x50 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.691192] [<000000008e71ed8b>] blkdev_open+0x1aa/0x250 [ 41.696817] [<00000000831fd3b0>] do_dentry_open+0x422/0xd20 [ 41.702596] [<000000002cc437de>] ? blkdev_get_by_dev+0x80/0x80 [ 41.708643] [<00000000a95eb9a9>] vfs_open+0x105/0x230 [ 41.714113] [<00000000e9912158>] ? may_open.isra.0+0x139/0x290 [ 41.720152] [<00000000fe38d68e>] path_openat+0xbf5/0x2f60 [ 41.725866] [<0000000071860e5b>] ? path_mountpoint+0x6d0/0x6d0 [ 41.731920] [<00000000085a92fd>] do_filp_open+0x1a1/0x280 [ 41.737632] [<00000000bab91731>] ? may_open_dev+0xe0/0xe0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.743236] [<00000000b8c04b53>] ? __alloc_fd+0x1d4/0x490 [ 41.748853] [<00000000ad80c548>] ? _raw_spin_unlock+0x2d/0x50 [ 41.754817] [<00000000b8c04b53>] ? __alloc_fd+0x1d4/0x490 [ 41.760424] [<0000000043fffdf3>] do_sys_open+0x2f0/0x610 [ 41.765957] [<000000001a8eadb1>] ? filp_open+0x70/0x70 [ 41.771322] [<0000000075f0d344>] ? __do_page_fault+0x545/0xa60 [ 41.777379] [<000000005618acc7>] SyS_open+0x2d/0x40 [ 41.782485] [<00000000847311cc>] ? do_sys_open+0x610/0x610 [ 41.788195] [<0000000044661fcc>] do_syscall_64+0x1ad/0x5c0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.793914] [<00000000a41291ac>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 41.800834] [ 41.802456] Allocated by task 2078: [ 41.806081] save_stack_trace+0x16/0x20 [ 41.810056] kasan_kmalloc.part.0+0x62/0xf0 [ 41.814376] kasan_kmalloc+0xb7/0xd0 [ 41.818085] kmem_cache_alloc_trace+0x115/0x2d0 [ 41.822748] alloc_disk_node+0x50/0x3c0 [ 41.826723] alloc_disk+0x1b/0x20 [ 41.830168] loop_add+0x37e/0x7d0 [ 41.833616] loop_control_ioctl+0x138/0x320 [ 41.837931] do_vfs_ioctl+0xb87/0x11d0 [ 41.841812] SyS_ioctl+0x8f/0xc0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.845173] do_syscall_64+0x1ad/0x5c0 [ 41.849059] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 41.854146] [ 41.855767] Freed by task 2085: [ 41.859051] save_stack_trace+0x16/0x20 [ 41.863055] kasan_slab_free+0xb0/0x190 [ 41.867028] kfree+0xfc/0x310 [ 41.870126] disk_release+0x255/0x330 [ 41.873927] device_release+0x7d/0x220 [ 41.877809] kobject_put+0x150/0x260 [ 41.881517] put_disk+0x23/0x30 [ 41.884797] __blkdev_get+0x61a/0xeb0 [ 41.888594] blkdev_get+0x2e8/0x920 [ 41.892217] blkdev_open+0x1aa/0x250 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.895927] do_dentry_open+0x422/0xd20 [ 41.899898] vfs_open+0x105/0x230 [ 41.903349] path_openat+0xbf5/0x2f60 [ 41.907143] do_filp_open+0x1a1/0x280 [ 41.910939] do_sys_open+0x2f0/0x610 [ 41.914646] SyS_open+0x2d/0x40 [ 41.917918] do_syscall_64+0x1ad/0x5c0 [ 41.921805] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 41.927005] [ 41.928626] The buggy address belongs to the object at ffff8801ce538880 [ 41.928626] which belongs to the cache kmalloc-2048 of size 2048 [ 41.941456] The buggy address is located 1376 bytes inside of executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.941456] 2048-byte region [ffff8801ce538880, ffff8801ce539080) [ 41.953498] The buggy address belongs to the page: [ 41.958422] page:ffffea0007394e00 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 41.968655] flags: 0x4000000000010200(slab|head) [ 41.973399] page dumped because: kasan: bad access detected [ 41.979099] [ 41.980718] Memory state around the buggy address: [ 41.985643] ffff8801ce538c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 41.993092] ffff8801ce538d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.000444] >ffff8801ce538d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.007797] ^ [ 42.023010] ffff8801ce538e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.030370] ffff8801ce538e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.037719] ================================================================== executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.045068] Disabling lock debugging due to kernel taint [ 42.063191] Kernel panic - not syncing: panic_on_warn set ... [ 42.063191] [ 42.070810] CPU: 0 PID: 2085 Comm: blkid Tainted: G B 4.9.189+ #4 [ 42.078154] ffff8801cef0f670 ffffffff81b65c01 ffff8801cef0f700 ffffffff82e405cf [ 42.086168] 00000000ffffffff 0000000000000000 ffffffff81b3a0b5 ffff8801cef0f750 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.094273] ffffffff813feb5a 0000000041b58ab3 ffffffff82e3260d ffffffff813fe981 [ 42.102330] Call Trace: [ 42.104919] [<0000000003a9df5f>] dump_stack+0xc1/0x120 [ 42.110368] [<0000000053bef6f6>] ? disk_unblock_events+0x55/0x60 [ 42.116603] [<00000000f03dd2e1>] panic+0x1d9/0x3bd [ 42.121622] [<000000002c2645e3>] ? add_taint.cold+0x16/0x16 [ 42.127417] [<000000005950a4f9>] ? preempt_schedule_common+0x4f/0xe0 [ 42.133994] [<0000000053bef6f6>] ? disk_unblock_events+0x55/0x60 [ 42.140230] [<00000000237fa18e>] ? preempt_schedule+0x26/0x30 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.146206] [<00000000fd20b835>] ? ___preempt_schedule+0x16/0x18 [ 42.152439] [<00000000150cd5a6>] kasan_end_report+0x47/0x4f [ 42.158238] [<00000000b6154e18>] kasan_report.cold+0xa9/0x2ba [ 42.164216] [<00000000525c9a0b>] __asan_report_load8_noabort+0x14/0x20 [ 42.171057] [<0000000053bef6f6>] disk_unblock_events+0x55/0x60 [ 42.177121] [<0000000072892199>] __blkdev_get+0x6ba/0xeb0 [ 42.182792] [<000000001582cb82>] ? __blkdev_put+0x840/0x840 [ 42.189192] [<0000000055e65f1c>] blkdev_get+0x2e8/0x920 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.194648] [<000000002e05e12f>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 42.201401] [<0000000067108aaf>] ? bd_may_claim+0xd0/0xd0 [ 42.207025] [<00000000eef09d34>] ? bd_acquire+0x26/0x250 [ 42.212562] [<00000000727069ec>] ? bd_acquire+0x88/0x250 [ 42.219142] [<00000000ad80c548>] ? _raw_spin_unlock+0x2d/0x50 [ 42.225590] [<000000008e71ed8b>] blkdev_open+0x1aa/0x250 [ 42.231118] [<00000000831fd3b0>] do_dentry_open+0x422/0xd20 [ 42.237005] [<000000002cc437de>] ? blkdev_get_by_dev+0x80/0x80 [ 42.243181] [<00000000a95eb9a9>] vfs_open+0x105/0x230 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.248440] [<00000000e9912158>] ? may_open.isra.0+0x139/0x290 [ 42.254492] [<00000000fe38d68e>] path_openat+0xbf5/0x2f60 [ 42.260104] [<0000000071860e5b>] ? path_mountpoint+0x6d0/0x6d0 [ 42.266149] [<00000000085a92fd>] do_filp_open+0x1a1/0x280 [ 42.271757] [<00000000bab91731>] ? may_open_dev+0xe0/0xe0 [ 42.277361] [<00000000b8c04b53>] ? __alloc_fd+0x1d4/0x490 [ 42.282971] [<00000000ad80c548>] ? _raw_spin_unlock+0x2d/0x50 [ 42.288969] [<00000000b8c04b53>] ? __alloc_fd+0x1d4/0x490 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.294580] [<0000000043fffdf3>] do_sys_open+0x2f0/0x610 [ 42.300100] [<000000001a8eadb1>] ? filp_open+0x70/0x70 [ 42.305454] [<0000000075f0d344>] ? __do_page_fault+0x545/0xa60 [ 42.311493] [<000000005618acc7>] SyS_open+0x2d/0x40 [ 42.316697] [<00000000847311cc>] ? do_sys_open+0x610/0x610 [ 42.322406] [<0000000044661fcc>] do_syscall_64+0x1ad/0x5c0 [ 42.328204] [<00000000a41291ac>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 42.335516] Kernel Offset: disabled [ 42.339178] Rebooting in 86400 seconds..