Warning: Permanently added '10.128.0.144' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.418878][ T29] audit: type=1400 audit(1596573171.955:8): avc: denied { execmem } for pid=6839 comm="syz-executor591" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.589068][ T23] ================================================================== [ 554.597525][ T23] BUG: KASAN: use-after-free in refcount_warn_saturate+0x19/0x1e0 [ 554.605332][ T23] Write of size 4 at addr ffff88809bf70018 by task kworker/1:1/23 [ 554.613121][ T23] [ 554.615451][ T23] CPU: 1 PID: 23 Comm: kworker/1:1 Not tainted 5.8.0-syzkaller #0 [ 554.623243][ T23] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.633420][ T23] Workqueue: events do_enable_set executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.638480][ T23] Call Trace: [ 554.641837][ T23] dump_stack+0x18f/0x20d [ 554.646174][ T23] ? refcount_warn_saturate+0x19/0x1e0 [ 554.651633][ T23] ? refcount_warn_saturate+0x19/0x1e0 [ 554.657175][ T23] print_address_description.constprop.0.cold+0xae/0x436 [ 554.664279][ T23] ? vprintk_func+0x97/0x1a6 [ 554.668880][ T23] ? refcount_warn_saturate+0x19/0x1e0 [ 554.674337][ T23] kasan_report.cold+0x1f/0x37 [ 554.679108][ T23] ? refcount_warn_saturate+0x19/0x1e0 [ 554.684577][ T23] check_memory_region+0x13d/0x180 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.689705][ T23] refcount_warn_saturate+0x19/0x1e0 [ 554.695034][ T23] l2cap_chan_put+0x1d3/0x230 [ 554.699725][ T23] do_enable_set+0x4f9/0x980 [ 554.704325][ T23] ? chan_recv_cb+0xa10/0xa10 [ 554.709069][ T23] ? _raw_spin_unlock_irq+0x1f/0x80 [ 554.714271][ T23] ? _raw_spin_unlock_irq+0x1f/0x80 [ 554.719512][ T23] ? lock_is_held_type+0xbb/0xf0 [ 554.724513][ T23] process_one_work+0x94c/0x1670 [ 554.729476][ T23] ? lock_release+0x8e0/0x8e0 [ 554.734157][ T23] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.739534][ T23] ? rwlock_bug.part.0+0x90/0x90 [ 554.744482][ T23] worker_thread+0x64c/0x1120 [ 554.749298][ T23] ? __kthread_parkme+0x13f/0x1e0 [ 554.754325][ T23] ? process_one_work+0x1670/0x1670 [ 554.759526][ T23] kthread+0x3b5/0x4a0 [ 554.763596][ T23] ? __kthread_bind_mask+0xc0/0xc0 [ 554.768712][ T23] ? __kthread_bind_mask+0xc0/0xc0 [ 554.773892][ T23] ret_from_fork+0x1f/0x30 [ 554.778325][ T23] [ 554.780695][ T23] Allocated by task 23: [ 554.784861][ T23] save_stack+0x1b/0x40 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.789012][ T23] __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 554.794686][ T23] kmem_cache_alloc_trace+0x14f/0x2d0 [ 554.800057][ T23] l2cap_chan_create+0x40/0x3a0 [ 554.804906][ T23] do_enable_set+0x52f/0x980 [ 554.809496][ T23] process_one_work+0x94c/0x1670 [ 554.814431][ T23] worker_thread+0x64c/0x1120 [ 554.819105][ T23] kthread+0x3b5/0x4a0 [ 554.823172][ T23] ret_from_fork+0x1f/0x30 [ 554.827574][ T23] [ 554.829899][ T23] Freed by task 2529: [ 554.833876][ T23] save_stack+0x1b/0x40 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.838038][ T23] __kasan_slab_free+0xf5/0x140 [ 554.842886][ T23] kfree+0x103/0x2c0 [ 554.846778][ T23] l2cap_chan_put+0x1b2/0x230 [ 554.851452][ T23] do_enable_set+0x4f9/0x980 [ 554.856043][ T23] process_one_work+0x94c/0x1670 [ 554.860981][ T23] worker_thread+0x64c/0x1120 [ 554.865741][ T23] kthread+0x3b5/0x4a0 [ 554.869823][ T23] ret_from_fork+0x1f/0x30 [ 554.874239][ T23] [ 554.876623][ T23] The buggy address belongs to the object at ffff88809bf70000 [ 554.876623][ T23] which belongs to the cache kmalloc-2k of size 2048 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.890676][ T23] The buggy address is located 24 bytes inside of [ 554.890676][ T23] 2048-byte region [ffff88809bf70000, ffff88809bf70800) [ 554.903938][ T23] The buggy address belongs to the page: [ 554.909569][ T23] page:ffffea00026fdc00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 554.918674][ T23] flags: 0xfffe0000000200(slab) [ 554.923528][ T23] raw: 00fffe0000000200 ffffea00028f9148 ffffea0002440388 ffff8880aa000e00 [ 554.932110][ T23] raw: 0000000000000000 ffff88809bf70000 0000000100000001 0000000000000000 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.940686][ T23] page dumped because: kasan: bad access detected [ 554.947087][ T23] [ 554.949407][ T23] Memory state around the buggy address: [ 554.955035][ T23] ffff88809bf6ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 554.963095][ T23] ffff88809bf6ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 554.971152][ T23] >ffff88809bf70000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 554.979203][ T23] ^ executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 554.984049][ T23] ffff88809bf70080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 554.992111][ T23] ffff88809bf70100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 555.000161][ T23] ================================================================== [ 555.008212][ T23] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 555.071168][ T23] Kernel panic - not syncing: panic_on_warn set ... [ 555.077775][ T23] CPU: 1 PID: 23 Comm: kworker/1:1 Tainted: G B 5.8.0-syzkaller #0 [ 555.086954][ T23] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.097012][ T23] Workqueue: events do_enable_set [ 555.102025][ T23] Call Trace: [ 555.105312][ T23] dump_stack+0x18f/0x20d [ 555.109639][ T23] ? refcount_dec_if_one+0x70/0xb0 [ 555.114831][ T23] panic+0x2e3/0x75c [ 555.118725][ T23] ? __warn_printk+0xf3/0xf3 [ 555.123315][ T23] ? preempt_schedule_common+0x59/0xc0 [ 555.128768][ T23] ? refcount_warn_saturate+0x19/0x1e0 [ 555.134222][ T23] ? preempt_schedule_thunk+0x16/0x18 [ 555.139673][ T23] ? trace_hardirqs_on+0x55/0x220 [ 555.144696][ T23] ? refcount_warn_saturate+0x19/0x1e0 [ 555.150146][ T23] ? refcount_warn_saturate+0x19/0x1e0 [ 555.155605][ T23] end_report+0x4d/0x53 [ 555.159756][ T23] kasan_report.cold+0xd/0x37 [ 555.164431][ T23] ? refcount_warn_saturate+0x19/0x1e0 [ 555.169884][ T23] check_memory_region+0x13d/0x180 [ 555.174990][ T23] refcount_warn_saturate+0x19/0x1e0 [ 555.180271][ T23] l2cap_chan_put+0x1d3/0x230 [ 555.184944][ T23] do_enable_set+0x4f9/0x980 [ 555.189532][ T23] ? chan_recv_cb+0xa10/0xa10 [ 555.194200][ T23] ? _raw_spin_unlock_irq+0x1f/0x80 [ 555.199395][ T23] ? _raw_spin_unlock_irq+0x1f/0x80 [ 555.204591][ T23] ? lock_is_held_type+0xbb/0xf0 [ 555.209528][ T23] process_one_work+0x94c/0x1670 [ 555.214463][ T23] ? lock_release+0x8e0/0x8e0 [ 555.219137][ T23] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 555.224504][ T23] ? rwlock_bug.part.0+0x90/0x90 [ 555.229439][ T23] worker_thread+0x64c/0x1120 [ 555.234111][ T23] ? __kthread_parkme+0x13f/0x1e0 [ 555.239129][ T23] ? process_one_work+0x1670/0x1670 [ 555.244321][ T23] kthread+0x3b5/0x4a0 [ 555.248381][ T23] ? __kthread_bind_mask+0xc0/0xc0 [ 555.253483][ T23] ? __kthread_bind_mask+0xc0/0xc0 [ 555.258590][ T23] ret_from_fork+0x1f/0x30 [ 555.264271][ T23] Kernel Offset: disabled [ 555.268584][ T23] Rebooting in 86400 seconds..