[  OK  ] Started Getty on tty4.
[  OK  ] Started Getty on tty3.
[  OK  ] Started Getty on tty2.
[  OK  ] Started Getty on tty1.
[  OK  ] Started Serial Getty on ttyS0.
[  OK  ] Reached target Login Prompts.
[  OK  ] Reached target Multi-User System.
[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
[  OK  ] Started Update UTMP about System Runlevel Changes.
         Starting Load/Save RF Kill Switch Status...
[  OK  ] Started Load/Save RF Kill Switch Status.

Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.10.35' (ECDSA) to the list of known hosts.
executing program
syzkaller login: [   68.111385][ T8423] ==================================================================
[   68.119716][ T8423] BUG: KASAN: use-after-free in find_uprobe+0x12c/0x150
[   68.126656][ T8423] Read of size 8 at addr ffff88801c9d1d68 by task syz-executor805/8423
[   68.134979][ T8423] 
[   68.137290][ T8423] CPU: 1 PID: 8423 Comm: syz-executor805 Not tainted 5.11.0-rc6-next-20210205-syzkaller #0
[   68.147859][ T8423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   68.157943][ T8423] Call Trace:
[   68.161226][ T8423]  dump_stack+0x107/0x163
[   68.165556][ T8423]  ? find_uprobe+0x12c/0x150
[   68.170136][ T8423]  ? find_uprobe+0x12c/0x150
[   68.174713][ T8423]  print_address_description.constprop.0.cold+0x5b/0x2f8
[   68.181760][ T8423]  ? find_uprobe+0x12c/0x150
[   68.186339][ T8423]  ? find_uprobe+0x12c/0x150
[   68.190920][ T8423]  kasan_report.cold+0x7c/0xd8
[   68.195670][ T8423]  ? find_uprobe+0x12c/0x150
[   68.200247][ T8423]  find_uprobe+0x12c/0x150
[   68.204651][ T8423]  uprobe_unregister+0x1e/0x70
[   68.209420][ T8423]  __probe_event_disable+0x11e/0x240
[   68.214695][ T8423]  probe_event_disable+0x155/0x1c0
[   68.219806][ T8423]  trace_uprobe_register+0x45a/0x880
[   68.225080][ T8423]  ? trace_uprobe_register+0x3ef/0x880
[   68.230536][ T8423]  ? rcu_read_lock_sched_held+0x3a/0x70
[   68.236079][ T8423]  perf_trace_event_unreg.isra.0+0xac/0x250
[   68.241962][ T8423]  perf_uprobe_destroy+0xbb/0x130
[   68.246983][ T8423]  ? perf_uprobe_init+0x210/0x210
[   68.251991][ T8423]  _free_event+0x2ee/0x1380
[   68.256485][ T8423]  perf_event_release_kernel+0xa24/0xe00
[   68.262102][ T8423]  ? fsnotify_first_mark+0x1f0/0x1f0
[   68.267379][ T8423]  ? __perf_event_exit_context+0x170/0x170
[   68.273189][ T8423]  ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[   68.279424][ T8423]  perf_release+0x33/0x40
[   68.283740][ T8423]  __fput+0x283/0x920
[   68.287718][ T8423]  ? perf_event_release_kernel+0xe00/0xe00
[   68.293585][ T8423]  task_work_run+0xdd/0x190
[   68.298117][ T8423]  do_exit+0xc5c/0x2ae0
[   68.302411][ T8423]  ? mm_update_next_owner+0x7a0/0x7a0
[   68.307828][ T8423]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[   68.314093][ T8423]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   68.320376][ T8423]  do_group_exit+0x125/0x310
[   68.324991][ T8423]  __x64_sys_exit_group+0x3a/0x50
[   68.330038][ T8423]  do_syscall_64+0x2d/0x70
[   68.334469][ T8423]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   68.340380][ T8423] RIP: 0033:0x43daf9
[   68.344266][ T8423] Code: Unable to access opcode bytes at RIP 0x43dacf.
[   68.351100][ T8423] RSP: 002b:00007ffcd183ad58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[   68.359508][ T8423] RAX: ffffffffffffffda RBX: 00000000004ae230 RCX: 000000000043daf9
[   68.367466][ T8423] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
[   68.375426][ T8423] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000000
[   68.383383][ T8423] R10: 00000000ffffffff R11: 0000000000000246 R12: 00000000004ae230
[   68.391337][ T8423] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[   68.399308][ T8423] 
[   68.401617][ T8423] Allocated by task 8423:
[   68.405922][ T8423]  kasan_save_stack+0x1b/0x40
[   68.410587][ T8423]  ____kasan_kmalloc.constprop.0+0xa0/0xd0
[   68.416379][ T8423]  __uprobe_register+0x19c/0x850
[   68.421309][ T8423]  probe_event_enable+0x357/0xa00
[   68.426320][ T8423]  trace_uprobe_register+0x443/0x880
[   68.431601][ T8423]  perf_trace_event_init+0x549/0xa20
[   68.436869][ T8423]  perf_uprobe_init+0x16f/0x210
[   68.441708][ T8423]  perf_uprobe_event_init+0xff/0x1c0
[   68.446976][ T8423]  perf_try_init_event+0x12a/0x560
[   68.452073][ T8423]  perf_event_alloc.part.0+0xe3b/0x3960
[   68.457624][ T8423]  __do_sys_perf_event_open+0x647/0x2e60
[   68.463245][ T8423]  do_syscall_64+0x2d/0x70
[   68.467671][ T8423]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   68.473566][ T8423] 
[   68.475873][ T8423] Freed by task 8423:
[   68.479836][ T8423]  kasan_save_stack+0x1b/0x40
[   68.484505][ T8423]  kasan_set_track+0x1c/0x30
[   68.489081][ T8423]  kasan_set_free_info+0x20/0x30
[   68.494048][ T8423]  ____kasan_slab_free.part.0+0xe1/0x110
[   68.499664][ T8423]  slab_free_freelist_hook+0x82/0x1d0
[   68.505026][ T8423]  kfree+0xe5/0x7b0
[   68.508820][ T8423]  put_uprobe+0x13b/0x190
[   68.513140][ T8423]  uprobe_apply+0xfc/0x130
[   68.517569][ T8423]  trace_uprobe_register+0x5c9/0x880
[   68.522933][ T8423]  perf_trace_event_init+0x17a/0xa20
[   68.528200][ T8423]  perf_uprobe_init+0x16f/0x210
[   68.533036][ T8423]  perf_uprobe_event_init+0xff/0x1c0
[   68.538304][ T8423]  perf_try_init_event+0x12a/0x560
[   68.543395][ T8423]  perf_event_alloc.part.0+0xe3b/0x3960
[   68.548925][ T8423]  __do_sys_perf_event_open+0x647/0x2e60
[   68.554542][ T8423]  do_syscall_64+0x2d/0x70
[   68.558940][ T8423]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   68.564818][ T8423] 
[   68.567123][ T8423] The buggy address belongs to the object at ffff88801c9d1c00
[   68.567123][ T8423]  which belongs to the cache kmalloc-512 of size 512
[   68.581262][ T8423] The buggy address is located 360 bytes inside of
[   68.581262][ T8423]  512-byte region [ffff88801c9d1c00, ffff88801c9d1e00)
[   68.594521][ T8423] The buggy address belongs to the page:
[   68.600133][ T8423] page:00000000690f3938 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1c9d0
[   68.610267][ T8423] head:00000000690f3938 order:1 compound_mapcount:0
[   68.616836][ T8423] flags: 0xfff00000010200(slab|head)
[   68.622173][ T8423] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff888010841c80
[   68.630749][ T8423] raw: 0000000000000000 0000000080080008 00000001ffffffff 0000000000000000
[   68.639317][ T8423] page dumped because: kasan: bad access detected
[   68.645896][ T8423] 
[   68.648217][ T8423] Memory state around the buggy address:
[   68.653829][ T8423]  ffff88801c9d1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   68.661927][ T8423]  ffff88801c9d1c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   68.669978][ T8423] >ffff88801c9d1d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   68.678021][ T8423]                                                           ^
[   68.685457][ T8423]  ffff88801c9d1d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   68.693501][ T8423]  ffff88801c9d1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.701543][ T8423] ==================================================================
[   68.709579][ T8423] Disabling lock debugging due to kernel taint
[   68.715836][ T8423] Kernel panic - not syncing: panic_on_warn set ...
[   68.722399][ T8423] CPU: 1 PID: 8423 Comm: syz-executor805 Tainted: G    B             5.11.0-rc6-next-20210205-syzkaller #0
[   68.733742][ T8423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   68.743793][ T8423] Call Trace:
[   68.747057][ T8423]  dump_stack+0x107/0x163
[   68.751416][ T8423]  ? find_uprobe+0x90/0x150
[   68.755903][ T8423]  panic+0x306/0x73d
[   68.759776][ T8423]  ? __warn_printk+0xf3/0xf3
[   68.764345][ T8423]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[   68.770486][ T8423]  ? trace_hardirqs_on+0x38/0x1c0
[   68.775492][ T8423]  ? trace_hardirqs_on+0x51/0x1c0
[   68.780509][ T8423]  ? find_uprobe+0x12c/0x150
[   68.785078][ T8423]  ? find_uprobe+0x12c/0x150
[   68.789648][ T8423]  end_report.cold+0x5a/0x5a
[   68.794228][ T8423]  kasan_report.cold+0x6a/0xd8
[   68.798970][ T8423]  ? find_uprobe+0x12c/0x150
[   68.803553][ T8423]  find_uprobe+0x12c/0x150
[   68.807950][ T8423]  uprobe_unregister+0x1e/0x70
[   68.812696][ T8423]  __probe_event_disable+0x11e/0x240
[   68.817977][ T8423]  probe_event_disable+0x155/0x1c0
[   68.823070][ T8423]  trace_uprobe_register+0x45a/0x880
[   68.828367][ T8423]  ? trace_uprobe_register+0x3ef/0x880
[   68.833826][ T8423]  ? rcu_read_lock_sched_held+0x3a/0x70
[   68.839361][ T8423]  perf_trace_event_unreg.isra.0+0xac/0x250
[   68.845236][ T8423]  perf_uprobe_destroy+0xbb/0x130
[   68.850254][ T8423]  ? perf_uprobe_init+0x210/0x210
[   68.855272][ T8423]  _free_event+0x2ee/0x1380
[   68.859769][ T8423]  perf_event_release_kernel+0xa24/0xe00
[   68.865381][ T8423]  ? fsnotify_first_mark+0x1f0/0x1f0
[   68.870661][ T8423]  ? __perf_event_exit_context+0x170/0x170
[   68.876450][ T8423]  ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[   68.882690][ T8423]  perf_release+0x33/0x40
[   68.887002][ T8423]  __fput+0x283/0x920
[   68.890985][ T8423]  ? perf_event_release_kernel+0xe00/0xe00
[   68.896771][ T8423]  task_work_run+0xdd/0x190
[   68.901260][ T8423]  do_exit+0xc5c/0x2ae0
[   68.905402][ T8423]  ? mm_update_next_owner+0x7a0/0x7a0
[   68.910755][ T8423]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[   68.917007][ T8423]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   68.923237][ T8423]  do_group_exit+0x125/0x310
[   68.927810][ T8423]  __x64_sys_exit_group+0x3a/0x50
[   68.932823][ T8423]  do_syscall_64+0x2d/0x70
[   68.937223][ T8423]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   68.943104][ T8423] RIP: 0033:0x43daf9
[   68.946978][ T8423] Code: Unable to access opcode bytes at RIP 0x43dacf.
[   68.953800][ T8423] RSP: 002b:00007ffcd183ad58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[   68.962191][ T8423] RAX: ffffffffffffffda RBX: 00000000004ae230 RCX: 000000000043daf9
[   68.970141][ T8423] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
[   68.978089][ T8423] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000000
[   68.986040][ T8423] R10: 00000000ffffffff R11: 0000000000000246 R12: 00000000004ae230
[   68.994091][ T8423] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[   69.002754][ T8423] Kernel Offset: disabled
[   69.007068][ T8423] Rebooting in 86400 seconds..