Buffer I/O error on dev loop6, logical block 0, async page read ================================================================== BUG: KASAN: use-after-free in iov_iter_revert+0x976/0x9d0 lib/iov_iter.c:890 Read of size 4 at addr ffff8801d8a48388 by task loop6/23897 CPU: 0 PID: 23897 Comm: loop6 Not tainted 4.13.0+ #70 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 print_address_description+0x73/0x250 mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report+0x24e/0x340 mm/kasan/report.c:409 __asan_report_load4_noabort+0x14/0x20 mm/kasan/report.c:429 iov_iter_revert+0x976/0x9d0 lib/iov_iter.c:890 generic_file_read_iter+0x1883/0x26c0 mm/filemap.c:2188 blkdev_read_iter+0x105/0x170 fs/block_dev.c:1917 call_read_iter include/linux/fs.h:1739 [inline] lo_rw_aio+0x9e9/0xc20 drivers/block/loop.c:501 do_req_filebacked drivers/block/loop.c:539 [inline] loop_handle_cmd drivers/block/loop.c:1694 [inline] loop_queue_work+0x1f91/0x3900 drivers/block/loop.c:1708 kthread_worker_fn+0x340/0x9b0 kernel/kthread.c:635 loop_kthread_worker_fn+0x51/0x60 drivers/block/loop.c:850 kthread+0x39c/0x470 kernel/kthread.c:231 ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431 Allocated by task 28416: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59 save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:551 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489 kmem_cache_alloc+0x12e/0x760 mm/slab.c:3561 mempool_alloc_slab+0x44/0x60 mm/mempool.c:449 mempool_alloc+0x16a/0x4b0 mm/mempool.c:329 bio_alloc_bioset+0x3c7/0x750 block/bio.c:486 bio_alloc include/linux/bio.h:409 [inline] submit_bh_wbc+0x104/0x5d0 fs/buffer.c:3111 submit_bh fs/buffer.c:3143 [inline] block_read_full_page+0x6cf/0x950 fs/buffer.c:2356 blkdev_readpage+0x1c/0x20 fs/block_dev.c:583 do_generic_file_read mm/filemap.c:2073 [inline] generic_file_read_iter+0x1286/0x26c0 mm/filemap.c:2204 blkdev_read_iter+0x105/0x170 fs/block_dev.c:1917 call_read_iter include/linux/fs.h:1739 [inline] new_sync_read fs/read_write.c:400 [inline] __vfs_read+0x6ad/0xa00 fs/read_write.c:412 vfs_read+0x124/0x360 fs/read_write.c:433 SYSC_read fs/read_write.c:549 [inline] SyS_read+0xef/0x220 fs/read_write.c:542 entry_SYSCALL_64_fastpath+0x1f/0xbe Freed by task 26492: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59 save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0x71/0xc0 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3503 [inline] kmem_cache_free+0x77/0x280 mm/slab.c:3763 mempool_free_slab+0x1d/0x30 mm/mempool.c:456 mempool_free+0xd4/0x1d0 mm/mempool.c:438 bio_free+0x11c/0x190 block/bio.c:265 bio_put+0x14f/0x180 block/bio.c:558 end_bio_bh_io_sync+0xc7/0x100 fs/buffer.c:3039 bio_endio+0x2ec/0x900 block/bio.c:1839 req_bio_endio block/blk-core.c:204 [inline] blk_update_request+0x2a0/0xe10 block/blk-core.c:2729 blk_mq_end_request+0x54/0x120 block/blk-mq.c:474 lo_complete_rq+0xbe/0x1f0 drivers/block/loop.c:460 __blk_mq_complete_request+0x396/0x6c0 block/blk-mq.c:515 blk_mq_complete_request+0x4f/0x60 block/blk-mq.c:535 lo_rw_aio_complete+0x5e/0x80 drivers/block/loop.c:468 blkdev_bio_end_io+0x224/0x6f0 fs/block_dev.c:309 bio_endio+0x2ec/0x900 block/bio.c:1839 req_bio_endio block/blk-core.c:204 [inline] blk_update_request+0x2a0/0xe10 block/blk-core.c:2729 blk_mq_end_request+0x54/0x120 block/blk-mq.c:474 lo_complete_rq+0xbe/0x1f0 drivers/block/loop.c:460 __blk_mq_complete_request+0x396/0x6c0 block/blk-mq.c:515 blk_mq_complete_request+0x4f/0x60 block/blk-mq.c:535 loop_handle_cmd drivers/block/loop.c:1699 [inline] loop_queue_work+0x26b/0x3900 drivers/block/loop.c:1708 kthread_worker_fn+0x340/0x9b0 kernel/kthread.c:635 loop_kthread_worker_fn+0x51/0x60 drivers/block/loop.c:850 kthread+0x39c/0x470 kernel/kthread.c:231 ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431 The buggy address belongs to the object at ffff8801d8a48300 which belongs to the cache bio-0 of size 192 The buggy address is located 136 bytes inside of 192-byte region [ffff8801d8a48300, ffff8801d8a483c0) The buggy address belongs to the page: page:ffffea0007629200 count:1 mapcount:0 mapping:ffff8801d8a48000 index:0x0 flags: 0x200000000000100(slab) raw: 0200000000000100 ffff8801d8a48000 0000000000000000 0000000100000010 raw: ffffea0007439960 ffffea00074e6ca0 ffff8801d7e59d80 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801d8a48280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ffff8801d8a48300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff8801d8a48380: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ^ ffff8801d8a48400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8801d8a48480: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ==================================================================