[ OK ] Started Regular background program processing daemon. [ OK ] Started Daily Cleanup of Temporary Directories. Starting Permit User Sessions... [ OK ] Started Daily apt upgrade and clean activities. [ OK ] Reached target Timers. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ OK ] Found device /dev/ttyS0. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.242' (ECDSA) to the list of known hosts. syzkaller login: [ 65.612331][ T27] audit: type=1400 audit(1596486874.528:8): avc: denied { execmem } for pid=6832 comm="syz-executor190" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 65.635539][ T6841] IPVS: ftp: loaded support on port[0] = 21 [ 65.652043][ T6839] IPVS: ftp: loaded support on port[0] = 21 [ 65.652709][ T6840] IPVS: ftp: loaded support on port[0] = 21 [ 65.663177][ T6842] IPVS: ftp: loaded support on port[0] = 21 [ 65.674330][ T6844] IPVS: ftp: loaded support on port[0] = 21 [ 65.685842][ T6843] IPVS: ftp: loaded support on port[0] = 21 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 67.330265][ T7053] ================================================================== [ 67.338543][ T7053] BUG: KASAN: use-after-free in sco_chan_del+0xe6/0x430 [ 67.345576][ T7053] Write of size 4 at addr ffff88809f978010 by task syz-executor190/7053 [ 67.354076][ T7053] [ 67.356422][ T7053] CPU: 0 PID: 7053 Comm: syz-executor190 Not tainted 5.8.0-syzkaller #0 [ 67.364924][ T7053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.374990][ T7053] Call Trace: executing program executing program executing program [ 67.378300][ T7053] dump_stack+0x18f/0x20d [ 67.382658][ T7053] ? sco_chan_del+0xe6/0x430 [ 67.387264][ T7053] ? sco_chan_del+0xe6/0x430 [ 67.391870][ T7053] ? __sock_release+0x280/0x280 [ 67.396897][ T7053] print_address_description.constprop.0.cold+0xae/0x436 [ 67.403936][ T7053] ? sco_chan_del+0xab/0x430 [ 67.416368][ T7053] ? lockdep_hardirqs_off+0x66/0xa0 [ 67.421584][ T7053] ? vprintk_func+0x97/0x1a6 [ 67.426192][ T7053] ? sco_chan_del+0xe6/0x430 executing program executing program executing program [ 67.430796][ T7053] kasan_report.cold+0x1f/0x37 [ 67.435573][ T7053] ? sco_chan_del+0xe6/0x430 [ 67.440183][ T7053] check_memory_region+0x13d/0x180 [ 67.445308][ T7053] sco_chan_del+0xe6/0x430 [ 67.449739][ T7053] __sco_sock_close+0x16e/0x5b0 [ 67.454604][ T7053] sco_sock_release+0x69/0x290 [ 67.459387][ T7053] __sock_release+0xcd/0x280 [ 67.463997][ T7053] sock_close+0x18/0x20 [ 67.468169][ T7053] __fput+0x33c/0x880 [ 67.472176][ T7053] task_work_run+0xdd/0x190 [ 67.476699][ T7053] get_signal+0xd6c/0x1ee0 executing program executing program executing program [ 67.481149][ T7053] do_signal+0x82/0x2520 [ 67.485521][ T7053] ? fput_many+0xf6/0x1a0 [ 67.490217][ T7053] ? copy_siginfo_to_user32+0xa0/0xa0 [ 67.495600][ T7053] ? __sys_connect_file+0x1a0/0x1a0 [ 67.500809][ T7053] ? __x64_sys_futex+0x378/0x4e0 [ 67.505761][ T7053] ? __x64_sys_futex+0x382/0x4e0 [ 67.510802][ T7053] ? lock_is_held_type+0xb0/0xe0 [ 67.515766][ T7053] ? __prepare_exit_to_usermode+0xcc/0x1f0 [ 67.521676][ T7053] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 executing program executing program executing program [ 67.527681][ T7053] __prepare_exit_to_usermode+0x156/0x1f0 [ 67.535628][ T7053] do_syscall_64+0x6c/0xe0 [ 67.540065][ T7053] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.546044][ T7053] RIP: 0033:0x4471b9 [ 67.550125][ T7053] Code: e8 4c e7 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 07 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 67.569744][ T7053] RSP: 002b:00007f5c303cddb8 EFLAGS: 00000246 ORIG_RAX: 000000000000002a executing program executing program [ 67.578179][ T7053] RAX: fffffffffffffffc RBX: 00000000006dcc28 RCX: 00000000004471b9 [ 67.586162][ T7053] RDX: 0000000000000008 RSI: 0000000020000000 RDI: 0000000000000004 [ 67.594147][ T7053] RBP: 00000000006dcc20 R08: 0000000000000000 R09: 0000000000000000 [ 67.602255][ T7053] R10: 0000000000000002 R11: 0000000000000246 R12: 00000000006dcc2c [ 67.610248][ T7053] R13: 00007fff7ffc592f R14: 00007f5c303ce9c0 R15: 0000000000000064 [ 67.618250][ T7053] [ 67.620587][ T7053] Allocated by task 7011: [ 67.625120][ T7053] save_stack+0x1b/0x40 executing program executing program executing program [ 67.629301][ T7053] __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 67.634945][ T7053] kmem_cache_alloc_trace+0x14f/0x2d0 [ 67.640330][ T7053] hci_conn_add+0x53/0x1340 [ 67.644843][ T7053] hci_connect_sco+0x350/0x860 [ 67.649616][ T7053] sco_sock_connect+0x308/0x980 [ 67.654484][ T7053] __sys_connect_file+0x155/0x1a0 [ 67.659522][ T7053] __sys_connect+0x160/0x190 [ 67.664125][ T7053] __x64_sys_connect+0x6f/0xb0 [ 67.668901][ T7053] do_syscall_64+0x60/0xe0 [ 67.673326][ T7053] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.679349][ T7053] executing program executing program executing program [ 67.681810][ T7053] Freed by task 6987: [ 67.685805][ T7053] save_stack+0x1b/0x40 [ 67.689970][ T7053] __kasan_slab_free+0xf5/0x140 [ 67.694832][ T7053] kfree+0x103/0x2c0 [ 67.698738][ T7053] device_release+0x71/0x200 [ 67.703552][ T7053] kobject_put+0x1c0/0x270 [ 67.707976][ T7053] put_device+0x1b/0x30 [ 67.712145][ T7053] hci_conn_del+0x27e/0x6a0 [ 67.716661][ T7053] hci_phy_link_complete_evt.isra.0+0x508/0x790 [ 67.722918][ T7053] hci_event_packet+0x481a/0x86f5 [ 67.728040][ T7053] hci_rx_work+0x22e/0xb10 executing program executing program [ 67.732474][ T7053] process_one_work+0x94c/0x1670 [ 67.737424][ T7053] worker_thread+0x64c/0x1120 [ 67.742110][ T7053] kthread+0x3b5/0x4a0 [ 67.746539][ T7053] ret_from_fork+0x1f/0x30 [ 67.751049][ T7053] [ 67.753386][ T7053] The buggy address belongs to the object at ffff88809f978000 [ 67.753386][ T7053] which belongs to the cache kmalloc-4k of size 4096 [ 67.767451][ T7053] The buggy address is located 16 bytes inside of [ 67.767451][ T7053] 4096-byte region [ffff88809f978000, ffff88809f979000) executing program executing program executing program [ 67.780729][ T7053] The buggy address belongs to the page: [ 67.786470][ T7053] page:ffffea00027e5e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 head:ffffea00027e5e00 order:1 compound_mapcount:0 [ 67.799931][ T7053] flags: 0xfffe0000010200(slab|head) [ 67.805231][ T7053] raw: 00fffe0000010200 ffffea00024ce208 ffffea00027f2f88 ffff8880aa002000 [ 67.813837][ T7053] raw: 0000000000000000 ffff88809f978000 0000000100000001 0000000000000000 [ 67.822418][ T7053] page dumped because: kasan: bad access detected [ 67.828818][ T7053] [ 67.831129][ T7053] Memory state around the buggy address: [ 67.836744][ T7053] ffff88809f977f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.844793][ T7053] ffff88809f977f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.852968][ T7053] >ffff88809f978000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.861012][ T7053] ^ [ 67.865586][ T7053] ffff88809f978080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.873635][ T7053] ffff88809f978100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb executing program executing program [ 67.882079][ T7053] ================================================================== [ 67.890132][ T7053] Disabling lock debugging due to kernel taint [ 67.898129][ T7053] Kernel panic - not syncing: panic_on_warn set ... [ 67.904734][ T7053] CPU: 0 PID: 7053 Comm: syz-executor190 Tainted: G B 5.8.0-syzkaller #0 [ 67.914445][ T7053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.924499][ T7053] Call Trace: [ 67.927799][ T7053] dump_stack+0x18f/0x20d [ 67.932135][ T7053] ? sco_chan_del+0x50/0x430 [ 67.936723][ T7053] ? __sock_release+0x280/0x280 [ 67.941555][ T7053] panic+0x2e3/0x75c [ 67.945445][ T7053] ? __warn_printk+0xf3/0xf3 [ 67.950030][ T7053] ? preempt_schedule_common+0x59/0xc0 [ 67.955478][ T7053] ? sco_chan_del+0xe6/0x430 [ 67.960057][ T7053] ? preempt_schedule_thunk+0x16/0x18 [ 67.965418][ T7053] ? trace_hardirqs_on+0x55/0x220 [ 67.970519][ T7053] ? sco_chan_del+0xe6/0x430 [ 67.975090][ T7053] ? sco_chan_del+0xe6/0x430 [ 67.979667][ T7053] ? __sock_release+0x280/0x280 [ 67.984499][ T7053] end_report+0x4d/0x53 [ 67.988637][ T7053] kasan_report.cold+0xd/0x37 [ 67.993310][ T7053] ? sco_chan_del+0xe6/0x430 [ 67.997977][ T7053] check_memory_region+0x13d/0x180 [ 68.003074][ T7053] sco_chan_del+0xe6/0x430 [ 68.007480][ T7053] __sco_sock_close+0x16e/0x5b0 [ 68.012328][ T7053] sco_sock_release+0x69/0x290 [ 68.017167][ T7053] __sock_release+0xcd/0x280 [ 68.021741][ T7053] sock_close+0x18/0x20 [ 68.025894][ T7053] __fput+0x33c/0x880 [ 68.029970][ T7053] task_work_run+0xdd/0x190 [ 68.034460][ T7053] get_signal+0xd6c/0x1ee0 [ 68.038862][ T7053] do_signal+0x82/0x2520 [ 68.043090][ T7053] ? fput_many+0xf6/0x1a0 [ 68.047439][ T7053] ? copy_siginfo_to_user32+0xa0/0xa0 [ 68.052846][ T7053] ? __sys_connect_file+0x1a0/0x1a0 [ 68.058037][ T7053] ? __x64_sys_futex+0x378/0x4e0 [ 68.062955][ T7053] ? __x64_sys_futex+0x382/0x4e0 [ 68.067877][ T7053] ? lock_is_held_type+0xb0/0xe0 [ 68.072834][ T7053] ? __prepare_exit_to_usermode+0xcc/0x1f0 [ 68.078624][ T7053] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 68.084588][ T7053] __prepare_exit_to_usermode+0x156/0x1f0 [ 68.090341][ T7053] do_syscall_64+0x6c/0xe0 [ 68.094831][ T7053] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 68.100792][ T7053] RIP: 0033:0x4471b9 [ 68.104672][ T7053] Code: e8 4c e7 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 07 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 68.124263][ T7053] RSP: 002b:00007f5c303cddb8 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 68.132670][ T7053] RAX: fffffffffffffffc RBX: 00000000006dcc28 RCX: 00000000004471b9 [ 68.140624][ T7053] RDX: 0000000000000008 RSI: 0000000020000000 RDI: 0000000000000004 [ 68.148665][ T7053] RBP: 00000000006dcc20 R08: 0000000000000000 R09: 0000000000000000 [ 68.156624][ T7053] R10: 0000000000000002 R11: 0000000000000246 R12: 00000000006dcc2c [ 68.164577][ T7053] R13: 00007fff7ffc592f R14: 00007f5c303ce9c0 R15: 0000000000000064 [ 68.173887][ T7053] Kernel Offset: disabled [ 68.178244][ T7053] Rebooting in 86400 seconds..