[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.102' (ECDSA) to the list of known hosts. 2021/05/27 20:23:54 parsed 1 programs 2021/05/27 20:23:54 executed programs: 0 syzkaller login: [ 412.137296] IPVS: ftp: loaded support on port[0] = 21 [ 412.231656] chnl_net:caif_netlink_parms(): no params data found [ 412.327564] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.334298] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.343345] device bridge_slave_0 entered promiscuous mode [ 412.351576] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.358974] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.366015] device bridge_slave_1 entered promiscuous mode [ 412.384633] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 412.394185] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 412.414241] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 412.422014] team0: Port device team_slave_0 added [ 412.428432] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 412.435757] team0: Port device team_slave_1 added [ 412.451379] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 412.457857] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 412.483332] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 412.495286] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 412.501751] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 412.527121] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 412.538242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 412.545768] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 412.565860] device hsr_slave_0 entered promiscuous mode [ 412.571780] device hsr_slave_1 entered promiscuous mode [ 412.578690] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 412.585758] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 412.656118] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.663063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.670106] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.676544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.712617] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 412.719346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 412.729806] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 412.739168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 412.749467] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.757167] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.764476] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 412.775382] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 412.781812] 8021q: adding VLAN 0 to HW filter on device team0 [ 412.791820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 412.799892] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.806288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.816239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 412.824841] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.831268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.847208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 412.855126] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 412.866379] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 412.878152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 412.888535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 412.898728] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 412.904744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 412.918781] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 412.926112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 412.933739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 412.944077] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 412.957650] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 412.967813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 413.004433] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 413.011900] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 413.020234] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 413.030392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.038760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 413.045784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 413.055122] device veth0_vlan entered promiscuous mode [ 413.065159] device veth1_vlan entered promiscuous mode [ 413.071236] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 413.080423] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 413.093351] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 413.103597] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 413.111332] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 413.119044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 413.130605] device veth0_macvtap entered promiscuous mode [ 413.137782] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 413.146197] device veth1_macvtap entered promiscuous mode [ 413.156319] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 413.166228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 413.177506] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 413.184474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 413.193669] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 413.204632] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 413.212691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 413.331909] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 413.339786] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 413.352041] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 413.361235] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 413.372744] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 413.380597] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 413.388868] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 413.396081] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 414.157488] Bluetooth: hci0: command 0x0409 tx timeout [ 416.236695] Bluetooth: hci0: command 0x041b tx timeout 2021/05/27 20:24:00 executed programs: 4 [ 418.316346] Bluetooth: hci0: command 0x040f tx timeout [ 420.406728] Bluetooth: hci0: command 0x0419 tx timeout 2021/05/27 20:24:05 executed programs: 10 [ 422.476261] Bluetooth: hci0: command 0x0405 tx timeout 2021/05/27 20:24:10 executed programs: 16 2021/05/27 20:24:15 executed programs: 22 2021/05/27 20:24:20 executed programs: 28 [ 441.277422] ieee802154 phy0 wpan0: encryption failed: -22 [ 441.283366] ieee802154 phy1 wpan1: encryption failed: -22 2021/05/27 20:24:25 executed programs: 34 2021/05/27 20:24:31 executed programs: 40 2021/05/27 20:24:36 executed programs: 46 [ 455.996305] ================================================================== [ 456.003957] BUG: KASAN: use-after-free in __lock_acquire+0x2cb4/0x3ff0 [ 456.010777] Read of size 8 at addr ffff8880ab638920 by task kworker/1:3/8364 [ 456.017949] [ 456.019567] CPU: 1 PID: 8364 Comm: kworker/1:3 Not tainted 4.19.192-syzkaller #0 [ 456.027173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.036548] Workqueue: events l2cap_chan_timeout [ 456.041288] Call Trace: [ 456.043901] dump_stack+0x1fc/0x2ef [ 456.047613] print_address_description.cold+0x54/0x219 [ 456.053069] kasan_report_error.cold+0x8a/0x1b9 [ 456.057763] ? __lock_acquire+0x2cb4/0x3ff0 [ 456.062107] __asan_report_load8_noabort+0x88/0x90 [ 456.067050] ? __lock_acquire+0x2cb4/0x3ff0 [ 456.071379] __lock_acquire+0x2cb4/0x3ff0 [ 456.075520] ? trace_hardirqs_off+0x64/0x200 [ 456.080059] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 456.085223] ? debug_object_assert_init+0x242/0x2e0 [ 456.090322] ? mark_held_locks+0xf0/0xf0 [ 456.094387] ? debug_object_free+0x380/0x380 [ 456.098800] ? mark_held_locks+0xf0/0xf0 [ 456.102859] ? __save_stack_trace+0x9f/0x190 [ 456.107256] ? del_timer+0xc3/0x100 [ 456.110881] lock_acquire+0x170/0x3c0 [ 456.114679] ? lock_sock_nested+0x3b/0x110 [ 456.118902] _raw_spin_lock_bh+0x2f/0x40 [ 456.122960] ? lock_sock_nested+0x3b/0x110 [ 456.127296] lock_sock_nested+0x3b/0x110 [ 456.131465] l2cap_sock_teardown_cb+0xa0/0x6d0 [ 456.136049] ? lock_downgrade+0x720/0x720 [ 456.140189] l2cap_chan_del+0xbc/0xa50 [ 456.144169] ? trace_hardirqs_off+0x64/0x200 [ 456.148747] l2cap_chan_close+0x1b5/0x950 [ 456.153171] ? __set_monitor_timer+0x200/0x200 [ 456.158362] ? check_preemption_disabled+0x41/0x280 [ 456.163514] l2cap_chan_timeout+0x17e/0x2f0 [ 456.167830] process_one_work+0x864/0x1570 [ 456.172507] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 456.177175] worker_thread+0x64c/0x1130 [ 456.181400] ? __kthread_parkme+0x133/0x1e0 [ 456.185716] ? process_one_work+0x1570/0x1570 [ 456.190286] kthread+0x33f/0x460 [ 456.193654] ? kthread_park+0x180/0x180 [ 456.197618] ret_from_fork+0x24/0x30 [ 456.201418] [ 456.203075] Allocated by task 8427: [ 456.206712] __kmalloc+0x15a/0x3c0 [ 456.210236] sk_prot_alloc+0x1e2/0x2d0 [ 456.214144] sk_alloc+0x36/0xec0 [ 456.217551] l2cap_sock_alloc.constprop.0+0x31/0x210 [ 456.222635] l2cap_sock_create+0x123/0x1f0 [ 456.226856] bt_sock_create+0x154/0x2a0 [ 456.230815] __sock_create+0x3d8/0x740 [ 456.234706] __sys_socket+0xef/0x200 [ 456.238416] __x64_sys_socket+0x6f/0xb0 [ 456.242379] do_syscall_64+0xf9/0x620 [ 456.246169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.251343] [ 456.252968] Freed by task 8427: [ 456.256237] kfree+0xcc/0x210 [ 456.259343] __sk_destruct+0x684/0x8a0 [ 456.263228] __sk_free+0x165/0x3b0 [ 456.266756] sk_free+0x3b/0x50 [ 456.269938] l2cap_sock_kill.part.0+0x124/0x150 [ 456.274594] l2cap_sock_release+0x1e6/0x290 [ 456.278902] __sock_release+0xcd/0x2a0 [ 456.282789] sock_close+0x15/0x20 [ 456.286238] __fput+0x2ce/0x890 [ 456.289503] task_work_run+0x148/0x1c0 [ 456.293387] get_signal+0x1b64/0x1f70 [ 456.297171] do_signal+0x8f/0x1670 [ 456.300745] exit_to_usermode_loop+0x204/0x2a0 [ 456.305425] do_syscall_64+0x538/0x620 [ 456.309415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.316802] [ 456.318430] The buggy address belongs to the object at ffff8880ab638880 [ 456.318430] which belongs to the cache kmalloc-2048 of size 2048 [ 456.331305] The buggy address is located 160 bytes inside of [ 456.331305] 2048-byte region [ffff8880ab638880, ffff8880ab639080) [ 456.343295] The buggy address belongs to the page: [ 456.348236] page:ffffea0002ad8e00 count:1 mapcount:0 mapping:ffff88813bff0c40 index:0x0 compound_mapcount: 0 [ 456.358459] flags: 0xfff00000008100(slab|head) [ 456.363039] raw: 00fff00000008100 ffffea0002ad2408 ffffea0002acfe08 ffff88813bff0c40 [ 456.370920] raw: 0000000000000000 ffff8880ab638000 0000000100000003 0000000000000000 [ 456.378781] page dumped because: kasan: bad access detected [ 456.384469] [ 456.386077] Memory state around the buggy address: [ 456.390990] ffff8880ab638800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 456.398342] ffff8880ab638880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 456.405691] >ffff8880ab638900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 456.413042] ^ [ 456.417432] ffff8880ab638980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 456.424781] ffff8880ab638a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 456.432126] ================================================================== [ 456.439470] Disabling lock debugging due to kernel taint [ 456.444924] Kernel panic - not syncing: panic_on_warn set ... [ 456.444924] [ 456.452299] CPU: 1 PID: 8364 Comm: kworker/1:3 Tainted: G B 4.19.192-syzkaller #0 [ 456.461230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.470595] Workqueue: events l2cap_chan_timeout [ 456.475335] Call Trace: [ 456.477919] dump_stack+0x1fc/0x2ef [ 456.481550] panic+0x26a/0x50e [ 456.484739] ? __warn_printk+0xf3/0xf3 [ 456.488632] ? lock_downgrade+0x720/0x720 [ 456.492786] ? print_shadow_for_address+0xb8/0x114 [ 456.497733] ? trace_hardirqs_off+0x64/0x200 [ 456.502150] kasan_end_report+0x43/0x49 [ 456.506111] kasan_report_error.cold+0xa7/0x1b9 [ 456.510768] ? __lock_acquire+0x2cb4/0x3ff0 [ 456.515076] __asan_report_load8_noabort+0x88/0x90 [ 456.520086] ? __lock_acquire+0x2cb4/0x3ff0 [ 456.524541] __lock_acquire+0x2cb4/0x3ff0 [ 456.528685] ? trace_hardirqs_off+0x64/0x200 [ 456.533097] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 456.538196] ? debug_object_assert_init+0x242/0x2e0 [ 456.543251] ? mark_held_locks+0xf0/0xf0 [ 456.547303] ? debug_object_free+0x380/0x380 [ 456.551701] ? mark_held_locks+0xf0/0xf0 [ 456.555750] ? __save_stack_trace+0x9f/0x190 [ 456.560167] ? del_timer+0xc3/0x100 [ 456.563977] lock_acquire+0x170/0x3c0 [ 456.567768] ? lock_sock_nested+0x3b/0x110 [ 456.572005] _raw_spin_lock_bh+0x2f/0x40 [ 456.576052] ? lock_sock_nested+0x3b/0x110 [ 456.580367] lock_sock_nested+0x3b/0x110 [ 456.584451] l2cap_sock_teardown_cb+0xa0/0x6d0 [ 456.589110] ? lock_downgrade+0x720/0x720 [ 456.593287] l2cap_chan_del+0xbc/0xa50 [ 456.597280] ? trace_hardirqs_off+0x64/0x200 [ 456.601704] l2cap_chan_close+0x1b5/0x950 [ 456.605838] ? __set_monitor_timer+0x200/0x200 [ 456.610411] ? check_preemption_disabled+0x41/0x280 [ 456.615415] l2cap_chan_timeout+0x17e/0x2f0 [ 456.619725] process_one_work+0x864/0x1570 [ 456.623947] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 456.628617] worker_thread+0x64c/0x1130 [ 456.632837] ? __kthread_parkme+0x133/0x1e0 [ 456.637140] ? process_one_work+0x1570/0x1570 [ 456.641967] kthread+0x33f/0x460 [ 456.645426] ? kthread_park+0x180/0x180 [ 456.650698] ret_from_fork+0x24/0x30 [ 456.655429] Kernel Offset: disabled [ 456.659065] Rebooting in 86400 seconds..