bisecting fixing commit since 961f830af0658ef5ef8a7708786d634a6115f16b building syzkaller on ff51e5229e0ee846d2fd687cb0dbca13de758c66 testing commit 961f830af0658ef5ef8a7708786d634a6115f16b with gcc (GCC) 8.4.1 20210217 kernel signature: 49e6f8de2fdf49fa914bb5cb8bfd9b79bb9c155029cbb49f84aa9f7c0130b6a7 run #0: crashed: KASAN: use-after-free Read in lock_sock_nested run #1: crashed: KASAN: use-after-free Read in lock_sock_nested run #2: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #3: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #4: crashed: KASAN: use-after-free Read in lock_sock_nested run #5: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #6: crashed: KASAN: use-after-free Read in lock_sock_nested run #7: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #8: crashed: KASAN: use-after-free Read in lock_sock_nested run #9: crashed: KASAN: use-after-free Read in lock_sock_nested run #10: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #11: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #12: crashed: KASAN: use-after-free Read in lock_sock_nested run #13: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #14: crashed: KASAN: use-after-free Read in lock_sock_nested run #15: crashed: KASAN: use-after-free Read in lock_sock_nested run #16: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #17: crashed: KASAN: use-after-free Read in lock_sock_nested run #18: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #19: crashed: KASAN: use-after-free Read in lock_sock_nested testing current HEAD eb575cd5d7f60241d016fdd13a9e86d962093c9b testing commit eb575cd5d7f60241d016fdd13a9e86d962093c9b with gcc (GCC) 8.4.1 20210217 kernel signature: 78c10c3041d1a3c60f3e9a784ed962c4636b87565f865aee388b5f89fae84469 run #0: crashed: KASAN: use-after-free Read in lock_sock_nested run #1: crashed: KASAN: use-after-free Read in lock_sock_nested run #2: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #3: crashed: KASAN: use-after-free Read in lock_sock_nested run #4: crashed: KASAN: use-after-free Read in lock_sock_nested run #5: crashed: KASAN: use-after-free Read in lock_sock_nested run #6: crashed: KASAN: use-after-free Read in lock_sock_nested run #7: crashed: KASAN: use-after-free Read in lock_sock_nested run #8: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put run #9: crashed: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put revisions tested: 2, total time: 29m41.935612061s (build: 17m31.597918999s, test: 11m46.459422211s) the crash still happens on HEAD commit msg: Linux 4.19.195 crash: BUG: unable to handle kernel NULL pointer dereference in l2cap_chan_put BUG: unable to handle kernel NULL pointer dereference at 0000000000000018 PGD 0 P4D 0 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 1 PID: 19 Comm: kworker/1:0 Not tainted 4.19.195-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events l2cap_chan_timeout RIP: 0010:refcount_dec_and_test arch/x86/include/asm/refcount.h:76 [inline] RIP: 0010:kref_put include/linux/kref.h:69 [inline] RIP: 0010:l2cap_chan_put+0xd/0x1a0 net/bluetooth/l2cap_core.c:498 Code: 8b 45 d0 e9 ef fe ff ff 48 89 df e8 fd 8d 7a fb e9 9d fe ff ff 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 ff 4f 18 0f 88 0d 22 c5 00 74 0b 5b 41 5c 41 5d 41 5e 41 5f 5d RSP: 0018:ffff8881f5757cd0 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff8881e98e6200 RCX: 1ffff1103eae91c4 RDX: 1ffff1103d31ccd0 RSI: ffff8881f5748e00 RDI: 0000000000000000 RBP: ffff8881f5757cf8 R08: ffff8881f5748e20 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881dfa8eec0 R13: ffff8881e7d76ff8 R14: ffff8881dfa8f328 R15: ffff8881dfa8efd0 FS: 0000000000000000(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000018 CR3: 000000000846d001 CR4: 00000000001606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: l2cap_sock_kill.part.2+0x32/0x60 net/bluetooth/l2cap_sock.c:1061 l2cap_sock_kill net/bluetooth/l2cap_sock.c:1332 [inline] l2cap_sock_close_cb+0x84/0xa0 net/bluetooth/l2cap_sock.c:1331 l2cap_chan_timeout+0x163/0x1c0 net/bluetooth/l2cap_core.c:432 process_one_work+0x7b9/0x15a0 kernel/workqueue.c:2153 worker_thread+0x85/0xb60 kernel/workqueue.c:2296 kthread+0x347/0x410 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Modules linked in: CR2: 0000000000000018 ---[ end trace f337aa785478597b ]--- RIP: 0010:refcount_dec_and_test arch/x86/include/asm/refcount.h:76 [inline] RIP: 0010:kref_put include/linux/kref.h:69 [inline] RIP: 0010:l2cap_chan_put+0xd/0x1a0 net/bluetooth/l2cap_core.c:498 Code: 8b 45 d0 e9 ef fe ff ff 48 89 df e8 fd 8d 7a fb e9 9d fe ff ff 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 ff 4f 18 0f 88 0d 22 c5 00 74 0b 5b 41 5c 41 5d 41 5e 41 5f 5d RSP: 0018:ffff8881f5757cd0 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff8881e98e6200 RCX: 1ffff1103eae91c4 RDX: 1ffff1103d31ccd0 RSI: ffff8881f5748e00 RDI: 0000000000000000 RBP: ffff8881f5757cf8 R08: ffff8881f5748e20 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881dfa8eec0 R13: ffff8881e7d76ff8 R14: ffff8881dfa8f328 R15: ffff8881dfa8efd0 FS: 0000000000000000(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000018 CR3: 000000000846d001 CR4: 00000000001606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400