[ *** ] A start job is running for dev-ttyS0.device (1min 29s / 1min 30s) [ *** ] A start job is running for dev-ttyS0.device (1min 29s / 1min 30s) [*** ] A start job is running for dev-ttyS0.device (1min 30s / 1min 30s) [ TIME ] Timed out waiting for device dev-ttyS0.device. [DEPEND] Dependency failed for Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Warning: Permanently added '10.128.10.59' (ECDSA) to the list of known hosts. 2020/07/14 15:37:46 parsed 1 programs 2020/07/14 15:37:46 executed programs: 0 [ 620.984914][ T22] audit: type=1400 audit(1594741066.599:8): avc: denied { execmem } for pid=347 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 621.011116][ T352] cgroup1: Unknown subsys name 'perf_event' [ 621.012272][ T350] cgroup1: Unknown subsys name 'perf_event' [ 621.017766][ T352] cgroup1: Unknown subsys name 'net_cls' [ 621.024707][ T350] cgroup1: Unknown subsys name 'net_cls' [ 621.037334][ T355] cgroup1: Unknown subsys name 'perf_event' [ 621.039201][ T357] cgroup1: Unknown subsys name 'perf_event' [ 621.043841][ T355] cgroup1: Unknown subsys name 'net_cls' [ 621.051912][ T357] cgroup1: Unknown subsys name 'net_cls' [ 621.060099][ T360] cgroup1: Unknown subsys name 'perf_event' [ 621.067970][ T360] cgroup1: Unknown subsys name 'net_cls' [ 621.069006][ T363] cgroup1: Unknown subsys name 'perf_event' [ 621.079967][ T363] cgroup1: Unknown subsys name 'net_cls' [ 624.737299][ C1] hrtimer: interrupt took 14694 ns 2020/07/14 15:37:51 executed programs: 11 2020/07/14 15:37:56 executed programs: 43 2020/07/14 15:38:02 executed programs: 76 2020/07/14 15:38:07 executed programs: 109 2020/07/14 15:38:12 executed programs: 140 2020/07/14 15:38:17 executed programs: 172 2020/07/14 15:38:22 executed programs: 205 2020/07/14 15:38:27 executed programs: 239 2020/07/14 15:38:32 executed programs: 271 2020/07/14 15:38:38 executed programs: 302 2020/07/14 15:38:43 executed programs: 334 2020/07/14 15:38:48 executed programs: 366 2020/07/14 15:38:53 executed programs: 397 2020/07/14 15:38:58 executed programs: 430 2020/07/14 15:39:03 executed programs: 463 2020/07/14 15:39:08 executed programs: 497 2020/07/14 15:39:13 executed programs: 529 2020/07/14 15:39:19 executed programs: 562 2020/07/14 15:39:24 executed programs: 594 2020/07/14 15:39:29 executed programs: 626 2020/07/14 15:39:34 executed programs: 657 2020/07/14 15:39:39 executed programs: 690 2020/07/14 15:39:44 executed programs: 722 2020/07/14 15:39:49 executed programs: 756 2020/07/14 15:39:54 executed programs: 789 2020/07/14 15:40:00 executed programs: 821 2020/07/14 15:40:05 executed programs: 853 2020/07/14 15:40:10 executed programs: 884 2020/07/14 15:40:15 executed programs: 917 2020/07/14 15:40:20 executed programs: 948 2020/07/14 15:40:25 executed programs: 980 2020/07/14 15:40:30 executed programs: 1013 2020/07/14 15:40:36 executed programs: 1045 2020/07/14 15:40:41 executed programs: 1078 2020/07/14 15:40:46 executed programs: 1111 2020/07/14 15:40:51 executed programs: 1142 2020/07/14 15:40:56 executed programs: 1176 2020/07/14 15:41:01 executed programs: 1208 2020/07/14 15:41:06 executed programs: 1240 2020/07/14 15:41:12 executed programs: 1273 [ 827.483047][T11643] ================================================================== [ 827.491270][T11643] BUG: KASAN: stack-out-of-bounds in unwind_next_frame+0x1949/0x2330 [ 827.499318][T11643] Read of size 8 at addr ffff8881c8e9fe88 by task syz-executor.5/11643 [ 827.507536][T11643] [ 827.509860][T11643] CPU: 0 PID: 11643 Comm: syz-executor.5 Not tainted 5.4.51-syzkaller-00138-g22b73c7316d2 #0 [ 827.520016][T11643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.530057][T11643] Call Trace: [ 827.533340][T11643] dump_stack+0x14a/0x1ce [ 827.537665][T11643] ? show_regs_print_info+0x12/0x12 [ 827.542873][T11643] ? printk+0xd2/0x114 [ 827.546928][T11643] print_address_description+0x93/0x620 [ 827.552471][T11643] ? unwind_next_frame+0x1949/0x2330 [ 827.557732][T11643] __kasan_report+0x16d/0x1e0 [ 827.562389][T11643] ? unwind_next_frame+0x1949/0x2330 [ 827.567667][T11643] kasan_report+0x36/0x60 [ 827.571972][T11643] ? unwind_next_frame+0x689/0x2330 [ 827.577144][T11643] unwind_next_frame+0x1949/0x2330 [ 827.582250][T11643] ? retint_kernel+0x1b/0x1b [ 827.586818][T11643] ? unwind_get_return_address_ptr+0x130/0x130 [ 827.592948][T11643] ? unwind_next_frame+0x2330/0x2330 [ 827.598208][T11643] ? retint_kernel+0x1b/0x1b [ 827.602789][T11643] ? __schedule+0x918/0xef0 [ 827.607267][T11643] ? in_sched_functions+0x9/0x40 [ 827.612182][T11643] ? stack_trace_save_tsk+0x490/0x490 [ 827.617551][T11643] arch_stack_walk+0xf4/0x120 [ 827.622207][T11643] stack_trace_save_tsk+0x2e7/0x490 [ 827.627386][T11643] ? stack_trace_consume_entry+0x230/0x230 [ 827.633166][T11643] ? _raw_spin_lock+0xa1/0x170 [ 827.637905][T11643] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 827.644387][T11643] ? __ptrace_may_access+0x2b4/0x530 [ 827.649666][T11643] ? kmem_cache_alloc_trace+0xc3/0x280 [ 827.655102][T11643] proc_pid_stack+0x12f/0x1f0 [ 827.659756][T11643] proc_single_show+0xd3/0x130 [ 827.664496][T11643] seq_read+0x4aa/0xd30 [ 827.668634][T11643] do_iter_read+0x43b/0x550 [ 827.673115][T11643] do_preadv+0x213/0x350 [ 827.677331][T11643] ? do_writev+0x5b0/0x5b0 [ 827.681742][T11643] do_syscall_64+0xcb/0x150 [ 827.686243][T11643] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 827.692111][T11643] RIP: 0033:0x45cba9 [ 827.695981][T11643] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.715581][T11643] RSP: 002b:00007f478ad48c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 827.723971][T11643] RAX: ffffffffffffffda RBX: 00000000004fc3c0 RCX: 000000000045cba9 [ 827.731920][T11643] RDX: 00000000000001a1 RSI: 00000000200017c0 RDI: 0000000000000006 [ 827.739869][T11643] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 827.747818][T11643] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 827.755767][T11643] R13: 000000000000089b R14: 00000000004cb8cc R15: 00007f478ad496d4 [ 827.763805][T11643] [ 827.766106][T11643] The buggy address belongs to the page: [ 827.771732][T11643] page:ffffea000723a7c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 827.780811][T11643] flags: 0x8000000000000000() [ 827.785466][T11643] raw: 8000000000000000 0000000000000000 ffffea000723a7c8 0000000000000000 [ 827.794047][T11643] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 827.802628][T11643] page dumped because: kasan: bad access detected [ 827.809117][T11643] [ 827.811421][T11643] Memory state around the buggy address: [ 827.817076][T11643] ffff8881c8e9fd80: 00 00 00 00 f1 f1 f1 f1 00 00 f3 f3 00 00 00 00 [ 827.825113][T11643] ffff8881c8e9fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 827.833149][T11643] >ffff8881c8e9fe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 827.841183][T11643] ^ [ 827.845486][T11643] ffff8881c8e9ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 827.853542][T11643] ffff8881c8e9ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 827.861590][T11643] ================================================================== [ 827.869625][T11643] Disabling lock debugging due to kernel taint 2020/07/14 15:41:17 executed programs: 1304 2020/07/14 15:41:22 executed programs: 1338