Starting getty on tty2-tty6 if dbus and logind are not available... [ OK ] Started Daily apt download activities. [ OK ] Started Daily apt upgrade and clean activities. [ OK ] Reached target Timers. [ OK ] Started Regular background program processing daemon. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ OK ] Found device /dev/ttyS0. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Warning: Permanently added '10.128.0.154' (ECDSA) to the list of known hosts. Debian GNU/Linux 9 syzkaller ttyS0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 68.679300][ T27] audit: type=1400 audit(1596601470.188:8): avc: denied { execmem } for pid=6823 comm="syz-executor106" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 68.902321][ T3906] ================================================================== [ 68.910600][ T3906] BUG: KASAN: use-after-free in l2cap_chan_close+0x564/0xb10 [ 68.917984][ T3906] Read of size 1 at addr ffff88809a1fb020 by task kworker/0:3/3906 [ 68.925910][ T3906] [ 68.928254][ T3906] CPU: 0 PID: 3906 Comm: kworker/0:3 Not tainted 5.8.0-syzkaller #0 [ 68.936292][ T3906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.946351][ T3906] Workqueue: events do_enable_set [ 68.951365][ T3906] Call Trace: [ 68.954652][ T3906] dump_stack+0x18f/0x20d [ 68.959001][ T3906] ? l2cap_chan_close+0x564/0xb10 [ 68.964030][ T3906] ? l2cap_chan_close+0x564/0xb10 [ 68.969053][ T3906] print_address_description.constprop.0.cold+0xae/0x436 [ 68.976071][ T3906] ? mark_lock+0xbc/0x1710 [ 68.980496][ T3906] ? vprintk_func+0x97/0x1a6 [ 68.985109][ T3906] ? l2cap_chan_close+0x564/0xb10 [ 68.990153][ T3906] kasan_report.cold+0x1f/0x37 [ 68.994939][ T3906] ? l2cap_chan_close+0x564/0xb10 [ 69.000062][ T3906] l2cap_chan_close+0x564/0xb10 [ 69.004924][ T3906] ? l2cap_retransmit_all+0x760/0x760 [ 69.010487][ T3906] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 69.016486][ T3906] do_enable_set+0x4ed/0x980 [ 69.021095][ T3906] ? chan_recv_cb+0xa10/0xa10 [ 69.025769][ T3906] ? _raw_spin_unlock_irq+0x1f/0x80 [ 69.030972][ T3906] ? _raw_spin_unlock_irq+0x1f/0x80 [ 69.036165][ T3906] ? lock_is_held_type+0xbb/0xf0 [ 69.041114][ T3906] process_one_work+0x94c/0x1670 [ 69.046067][ T3906] ? lock_release+0x8e0/0x8e0 [ 69.050742][ T3906] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 69.056135][ T3906] ? rwlock_bug.part.0+0x90/0x90 [ 69.061083][ T3906] worker_thread+0x64c/0x1120 [ 69.065772][ T3906] ? __kthread_parkme+0x13f/0x1e0 [ 69.070792][ T3906] ? process_one_work+0x1670/0x1670 [ 69.075984][ T3906] kthread+0x3b5/0x4a0 [ 69.080088][ T3906] ? __kthread_bind_mask+0xc0/0xc0 [ 69.085295][ T3906] ? __kthread_bind_mask+0xc0/0xc0 [ 69.090422][ T3906] ret_from_fork+0x1f/0x30 [ 69.094844][ T3906] [ 69.097158][ T3906] Allocated by task 2572: [ 69.101475][ T3906] save_stack+0x1b/0x40 [ 69.105631][ T3906] __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 69.111270][ T3906] kmem_cache_alloc_trace+0x14f/0x2d0 [ 69.116648][ T3906] l2cap_chan_create+0x40/0x3a0 [ 69.121509][ T3906] do_enable_set+0x52f/0x980 [ 69.126085][ T3906] process_one_work+0x94c/0x1670 [ 69.131056][ T3906] worker_thread+0x64c/0x1120 [ 69.135716][ T3906] kthread+0x3b5/0x4a0 [ 69.139773][ T3906] ret_from_fork+0x1f/0x30 [ 69.144179][ T3906] [ 69.146510][ T3906] Freed by task 2572: [ 69.150475][ T3906] save_stack+0x1b/0x40 [ 69.154628][ T3906] __kasan_slab_free+0xf5/0x140 [ 69.159475][ T3906] kfree+0x103/0x2c0 [ 69.163358][ T3906] l2cap_chan_put+0x1b2/0x230 [ 69.168023][ T3906] do_enable_set+0x4f9/0x980 [ 69.172634][ T3906] process_one_work+0x94c/0x1670 [ 69.177576][ T3906] worker_thread+0x64c/0x1120 [ 69.182257][ T3906] kthread+0x3b5/0x4a0 [ 69.186323][ T3906] ret_from_fork+0x1f/0x30 [ 69.190742][ T3906] [ 69.193077][ T3906] The buggy address belongs to the object at ffff88809a1fb000 [ 69.193077][ T3906] which belongs to the cache kmalloc-2k of size 2048 [ 69.207159][ T3906] The buggy address is located 32 bytes inside of [ 69.207159][ T3906] 2048-byte region [ffff88809a1fb000, ffff88809a1fb800) [ 69.220535][ T3906] The buggy address belongs to the page: [ 69.226163][ T3906] page:ffffea0002687ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 69.235262][ T3906] flags: 0xfffe0000000200(slab) [ 69.240139][ T3906] raw: 00fffe0000000200 ffffea00027f1388 ffffea000248ee48 ffff8880aa000e00 [ 69.248733][ T3906] raw: 0000000000000000 ffff88809a1fb000 0000000100000001 0000000000000000 [ 69.257313][ T3906] page dumped because: kasan: bad access detected [ 69.263723][ T3906] [ 69.266032][ T3906] Memory state around the buggy address: [ 69.271652][ T3906] ffff88809a1faf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.279715][ T3906] ffff88809a1faf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.287820][ T3906] >ffff88809a1fb000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.295892][ T3906] ^ executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 69.301012][ T3906] ffff88809a1fb080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.309067][ T3906] ffff88809a1fb100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.317127][ T3906] ================================================================== [ 69.325178][ T3906] Disabling lock debugging due to kernel taint [ 69.380596][ T3906] Kernel panic - not syncing: panic_on_warn set ... [ 69.387212][ T3906] CPU: 0 PID: 3906 Comm: kworker/0:3 Tainted: G B 5.8.0-syzkaller #0 [ 69.396574][ T3906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.406652][ T3906] Workqueue: events do_enable_set [ 69.411682][ T3906] Call Trace: [ 69.414984][ T3906] dump_stack+0x18f/0x20d [ 69.419334][ T3906] ? l2cap_chan_close+0x480/0xb10 [ 69.424344][ T3906] panic+0x2e3/0x75c [ 69.428282][ T3906] ? __warn_printk+0xf3/0xf3 [ 69.432875][ T3906] ? preempt_schedule_common+0x59/0xc0 [ 69.438330][ T3906] ? l2cap_chan_close+0x564/0xb10 [ 69.443368][ T3906] ? preempt_schedule_thunk+0x16/0x18 [ 69.448739][ T3906] ? trace_hardirqs_on+0x55/0x220 [ 69.453751][ T3906] ? l2cap_chan_close+0x564/0xb10 [ 69.458799][ T3906] ? l2cap_chan_close+0x564/0xb10 [ 69.463813][ T3906] end_report+0x4d/0x53 [ 69.467964][ T3906] kasan_report.cold+0xd/0x37 [ 69.472654][ T3906] ? l2cap_chan_close+0x564/0xb10 [ 69.477672][ T3906] l2cap_chan_close+0x564/0xb10 [ 69.482543][ T3906] ? l2cap_retransmit_all+0x760/0x760 [ 69.487917][ T3906] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 69.493909][ T3906] do_enable_set+0x4ed/0x980 [ 69.498520][ T3906] ? chan_recv_cb+0xa10/0xa10 [ 69.503187][ T3906] ? _raw_spin_unlock_irq+0x1f/0x80 [ 69.508380][ T3906] ? _raw_spin_unlock_irq+0x1f/0x80 [ 69.513567][ T3906] ? lock_is_held_type+0xbb/0xf0 [ 69.518512][ T3906] process_one_work+0x94c/0x1670 [ 69.523443][ T3906] ? lock_release+0x8e0/0x8e0 [ 69.528124][ T3906] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 69.533487][ T3906] ? rwlock_bug.part.0+0x90/0x90 [ 69.538445][ T3906] worker_thread+0x64c/0x1120 [ 69.543142][ T3906] ? __kthread_parkme+0x13f/0x1e0 [ 69.548154][ T3906] ? process_one_work+0x1670/0x1670 [ 69.553347][ T3906] kthread+0x3b5/0x4a0 [ 69.557425][ T3906] ? __kthread_bind_mask+0xc0/0xc0 [ 69.562545][ T3906] ? __kthread_bind_mask+0xc0/0xc0 [ 69.567657][ T3906] ret_from_fork+0x1f/0x30 [ 69.573107][ T3906] Kernel Offset: disabled [ 69.577461][ T3906] Rebooting in 86400 seconds..