[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.33' (ECDSA) to the list of known hosts. 2021/08/15 09:52:58 parsed 1 programs 2021/08/15 09:52:58 executed programs: 0 syzkaller login: [ 413.557264] IPVS: ftp: loaded support on port[0] = 21 [ 413.656595] chnl_net:caif_netlink_parms(): no params data found [ 413.727705] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.734823] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.742062] device bridge_slave_0 entered promiscuous mode [ 413.750149] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.757533] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.765234] device bridge_slave_1 entered promiscuous mode [ 413.783881] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 413.793557] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 413.813226] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 413.821303] team0: Port device team_slave_0 added [ 413.827865] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 413.835952] team0: Port device team_slave_1 added [ 413.852086] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 413.858503] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 413.885107] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 413.896931] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 413.903167] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 413.929264] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 413.940452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 413.948426] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 413.967829] device hsr_slave_0 entered promiscuous mode [ 413.973566] device hsr_slave_1 entered promiscuous mode [ 413.980037] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 413.987409] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 414.053439] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.060019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.066985] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.073346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.106866] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 414.113303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 414.122770] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 414.131617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 414.140140] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.147342] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.154739] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 414.165225] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 414.171297] 8021q: adding VLAN 0 to HW filter on device team0 [ 414.181149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 414.189881] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.196298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.206107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 414.213713] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.220315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.233850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 414.241700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 414.256941] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 414.266859] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 414.278797] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 414.287011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 414.295249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.295949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 414.314402] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 414.325525] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 414.331852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 414.338888] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 414.346098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 414.361150] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 414.370757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 414.403979] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 414.411809] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 414.419130] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 414.428441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.436006] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.442825] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.451340] device veth0_vlan entered promiscuous mode [ 414.460744] device veth1_vlan entered promiscuous mode [ 414.467401] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 414.476327] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 414.488697] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 414.497815] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 414.505378] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 414.512712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.522884] device veth0_macvtap entered promiscuous mode [ 414.529749] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 414.538059] device veth1_macvtap entered promiscuous mode [ 414.547061] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 414.557310] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 414.567045] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 414.573749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.583124] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 414.594816] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 414.601691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 414.721848] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 414.729197] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 414.737478] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 414.754913] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 414.765104] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 414.772438] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 414.780135] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 414.787877] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 415.585530] Bluetooth: hci0: command 0x0409 tx timeout [ 417.664567] Bluetooth: hci0: command 0x041b tx timeout 2021/08/15 09:53:04 executed programs: 4 [ 419.744887] Bluetooth: hci0: command 0x040f tx timeout [ 421.824173] Bluetooth: hci0: command 0x0419 tx timeout 2021/08/15 09:53:09 executed programs: 10 [ 423.904077] Bluetooth: hci0: command 0x0405 tx timeout 2021/08/15 09:53:14 executed programs: 16 2021/08/15 09:53:19 executed programs: 22 2021/08/15 09:53:24 executed programs: 28 [ 441.344950] ieee802154 phy0 wpan0: encryption failed: -22 [ 441.350675] ieee802154 phy1 wpan1: encryption failed: -22 2021/08/15 09:53:29 executed programs: 34 2021/08/15 09:53:34 executed programs: 40 2021/08/15 09:53:39 executed programs: 46 2021/08/15 09:53:45 executed programs: 52 2021/08/15 09:53:50 executed programs: 58 2021/08/15 09:53:55 executed programs: 64 2021/08/15 09:54:00 executed programs: 70 2021/08/15 09:54:05 executed programs: 76 2021/08/15 09:54:10 executed programs: 82 2021/08/15 09:54:15 executed programs: 88 [ 490.620726] ================================================================== [ 490.628222] BUG: KASAN: use-after-free in __lock_acquire+0x2cb4/0x3ff0 [ 490.634869] Read of size 8 at addr ffff8880a4a20be0 by task kworker/1:0/8282 [ 490.642030] [ 490.643664] CPU: 1 PID: 8282 Comm: kworker/1:0 Not tainted 4.19.203-syzkaller #0 [ 490.651186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.660561] Workqueue: events l2cap_chan_timeout [ 490.665318] Call Trace: [ 490.667891] dump_stack+0x1fc/0x2ef [ 490.671519] print_address_description.cold+0x54/0x219 [ 490.676782] kasan_report_error.cold+0x8a/0x1b9 [ 490.681436] ? __lock_acquire+0x2cb4/0x3ff0 [ 490.685738] __asan_report_load8_noabort+0x88/0x90 [ 490.690648] ? __lock_acquire+0x2cb4/0x3ff0 [ 490.694953] __lock_acquire+0x2cb4/0x3ff0 [ 490.699108] ? trace_hardirqs_off+0x64/0x200 [ 490.703529] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 490.708639] ? debug_object_assert_init+0x242/0x2e0 [ 490.713646] ? mark_held_locks+0xf0/0xf0 [ 490.717699] ? debug_object_free+0x380/0x380 [ 490.722115] ? mark_held_locks+0xf0/0xf0 [ 490.726175] ? __save_stack_trace+0x9f/0x190 [ 490.730580] ? del_timer+0xc3/0x100 [ 490.734201] lock_acquire+0x170/0x3c0 [ 490.738013] ? lock_sock_nested+0x3b/0x110 [ 490.742323] _raw_spin_lock_bh+0x2f/0x40 [ 490.746525] ? lock_sock_nested+0x3b/0x110 [ 490.750753] lock_sock_nested+0x3b/0x110 [ 490.754802] l2cap_sock_teardown_cb+0xa0/0x6d0 [ 490.759369] ? lock_downgrade+0x720/0x720 [ 490.763510] l2cap_chan_del+0xbc/0xa50 [ 490.767386] ? trace_hardirqs_off+0x64/0x200 [ 490.771779] l2cap_chan_close+0x1b5/0x950 [ 490.775911] ? __set_monitor_timer+0x200/0x200 [ 490.780487] ? check_preemption_disabled+0x41/0x280 [ 490.785493] l2cap_chan_timeout+0x17e/0x2f0 [ 490.789805] process_one_work+0x864/0x1570 [ 490.794032] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 490.798682] worker_thread+0x64c/0x1130 [ 490.802639] ? __kthread_parkme+0x133/0x1e0 [ 490.806976] ? process_one_work+0x1570/0x1570 [ 490.811461] kthread+0x33f/0x460 [ 490.814809] ? kthread_park+0x180/0x180 [ 490.818765] ret_from_fork+0x24/0x30 [ 490.822455] [ 490.824063] Allocated by task 8660: [ 490.827760] __kmalloc+0x15a/0x3c0 [ 490.831296] sk_prot_alloc+0x1e2/0x2d0 [ 490.835161] sk_alloc+0x36/0xec0 [ 490.838521] l2cap_sock_alloc.constprop.0+0x31/0x210 [ 490.843605] l2cap_sock_create+0x123/0x1f0 [ 490.847822] bt_sock_create+0x154/0x2a0 [ 490.851775] __sock_create+0x3d8/0x740 [ 490.855638] __sys_socket+0xef/0x200 [ 490.859329] __x64_sys_socket+0x6f/0xb0 [ 490.863287] do_syscall_64+0xf9/0x620 [ 490.867069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.873097] [ 490.874708] Freed by task 8659: [ 490.877982] kfree+0xcc/0x210 [ 490.881069] __sk_destruct+0x684/0x8a0 [ 490.884935] __sk_free+0x165/0x3b0 [ 490.888454] sk_free+0x3b/0x50 [ 490.891642] l2cap_sock_kill.part.0+0x124/0x150 [ 490.896302] l2cap_sock_release+0x1e6/0x290 [ 490.900611] __sock_release+0xcd/0x2a0 [ 490.904487] sock_close+0x15/0x20 [ 490.907926] __fput+0x2ce/0x890 [ 490.911186] task_work_run+0x148/0x1c0 [ 490.915224] get_signal+0x1b64/0x1f70 [ 490.919005] do_signal+0x8f/0x1670 [ 490.922522] exit_to_usermode_loop+0x204/0x2a0 [ 490.927083] do_syscall_64+0x538/0x620 [ 490.930954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.936498] [ 490.938221] The buggy address belongs to the object at ffff8880a4a20b40 [ 490.938221] which belongs to the cache kmalloc-2048 of size 2048 [ 490.951157] The buggy address is located 160 bytes inside of [ 490.951157] 2048-byte region [ffff8880a4a20b40, ffff8880a4a21340) [ 490.963103] The buggy address belongs to the page: [ 490.968216] page:ffffea0002928800 count:1 mapcount:0 mapping:ffff88813bff0c40 index:0x0 compound_mapcount: 0 [ 490.978166] flags: 0xfff00000008100(slab|head) [ 490.982968] raw: 00fff00000008100 ffffea00028af408 ffffea00028d5708 ffff88813bff0c40 [ 490.991361] raw: 0000000000000000 ffff8880a4a202c0 0000000100000003 0000000000000000 [ 490.999592] page dumped because: kasan: bad access detected [ 491.005366] [ 491.006974] Memory state around the buggy address: [ 491.012023] ffff8880a4a20a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 491.019359] ffff8880a4a20b00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 491.026782] >ffff8880a4a20b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 491.034229] ^ [ 491.040715] ffff8880a4a20c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 491.048173] ffff8880a4a20c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 491.055525] ================================================================== [ 491.063395] Disabling lock debugging due to kernel taint [ 491.069002] Kernel panic - not syncing: panic_on_warn set ... [ 491.069002] [ 491.076527] CPU: 1 PID: 8282 Comm: kworker/1:0 Tainted: G B 4.19.203-syzkaller #0 [ 491.085427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.094771] Workqueue: events l2cap_chan_timeout [ 491.099524] Call Trace: [ 491.102095] dump_stack+0x1fc/0x2ef [ 491.105767] panic+0x26a/0x50e [ 491.108951] ? __warn_printk+0xf3/0xf3 [ 491.112827] ? lock_downgrade+0x720/0x720 [ 491.116968] ? print_shadow_for_address+0xb8/0x114 [ 491.121881] ? trace_hardirqs_off+0x64/0x200 [ 491.126269] kasan_end_report+0x43/0x49 [ 491.130225] kasan_report_error.cold+0xa7/0x1b9 [ 491.134872] ? __lock_acquire+0x2cb4/0x3ff0 [ 491.139174] __asan_report_load8_noabort+0x88/0x90 [ 491.144607] ? __lock_acquire+0x2cb4/0x3ff0 [ 491.149000] __lock_acquire+0x2cb4/0x3ff0 [ 491.153131] ? trace_hardirqs_off+0x64/0x200 [ 491.157527] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 491.162615] ? debug_object_assert_init+0x242/0x2e0 [ 491.167625] ? mark_held_locks+0xf0/0xf0 [ 491.171666] ? debug_object_free+0x380/0x380 [ 491.176054] ? mark_held_locks+0xf0/0xf0 [ 491.180098] ? __save_stack_trace+0x9f/0x190 [ 491.184493] ? del_timer+0xc3/0x100 [ 491.188107] lock_acquire+0x170/0x3c0 [ 491.191894] ? lock_sock_nested+0x3b/0x110 [ 491.196121] _raw_spin_lock_bh+0x2f/0x40 [ 491.200171] ? lock_sock_nested+0x3b/0x110 [ 491.204395] lock_sock_nested+0x3b/0x110 [ 491.208488] l2cap_sock_teardown_cb+0xa0/0x6d0 [ 491.213066] ? lock_downgrade+0x720/0x720 [ 491.217212] l2cap_chan_del+0xbc/0xa50 [ 491.221167] ? trace_hardirqs_off+0x64/0x200 [ 491.225567] l2cap_chan_close+0x1b5/0x950 [ 491.229745] ? __set_monitor_timer+0x200/0x200 [ 491.234312] ? check_preemption_disabled+0x41/0x280 [ 491.239308] l2cap_chan_timeout+0x17e/0x2f0 [ 491.243625] process_one_work+0x864/0x1570 [ 491.247843] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 491.252509] worker_thread+0x64c/0x1130 [ 491.256487] ? __kthread_parkme+0x133/0x1e0 [ 491.260789] ? process_one_work+0x1570/0x1570 [ 491.265366] kthread+0x33f/0x460 [ 491.268711] ? kthread_park+0x180/0x180 [ 491.272665] ret_from_fork+0x24/0x30 [ 491.276476] Kernel Offset: disabled [ 491.280083] Rebooting in 86400 seconds..