[ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts. syzkaller login: [ 62.088394][ T6857] IPVS: ftp: loaded support on port[0] = 21 executing program [ 62.173948][ T6863] ================================================================== [ 62.182243][ T6863] BUG: KASAN: slab-out-of-bounds in hci_le_meta_evt+0x3a02/0x3ff0 [ 62.190053][ T6863] Read of size 1 at addr ffff888099b96604 by task kworker/u5:2/6863 [ 62.198201][ T6863] [ 62.200535][ T6863] CPU: 0 PID: 6863 Comm: kworker/u5:2 Not tainted 5.8.0-syzkaller #0 [ 62.208857][ T6863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.219213][ T6863] Workqueue: hci0 hci_rx_work [ 62.223880][ T6863] Call Trace: [ 62.227152][ T6863] dump_stack+0x18f/0x20d [ 62.231457][ T6863] ? hci_le_meta_evt+0x3a02/0x3ff0 [ 62.236541][ T6863] ? hci_le_meta_evt+0x3a02/0x3ff0 [ 62.241642][ T6863] print_address_description.constprop.0.cold+0xae/0x497 [ 62.248654][ T6863] ? vprintk_func+0x97/0x1a6 [ 62.253222][ T6863] ? hci_le_meta_evt+0x3a02/0x3ff0 [ 62.258325][ T6863] ? hci_le_meta_evt+0x3a02/0x3ff0 [ 62.263416][ T6863] kasan_report.cold+0x1f/0x37 [ 62.268172][ T6863] ? hci_le_meta_evt+0x3a02/0x3ff0 [ 62.273260][ T6863] hci_le_meta_evt+0x3a02/0x3ff0 [ 62.278179][ T6863] ? mark_lock+0xbc/0x1710 [ 62.282569][ T6863] ? hci_key_refresh_complete_evt.isra.0+0x10b0/0x10b0 [ 62.289413][ T6863] ? mark_lock+0xbc/0x1710 [ 62.293805][ T6863] ? __lock_acquire+0x16cb/0x5640 [ 62.298809][ T6863] ? __lock_acquire+0x16cb/0x5640 [ 62.303812][ T6863] hci_event_packet+0x2e25/0x87a8 [ 62.308814][ T6863] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 62.314772][ T6863] ? __lock_acquire+0x16cb/0x5640 [ 62.319785][ T6863] ? hci_cmd_complete_evt+0xc6d0/0xc6d0 [ 62.325310][ T6863] ? lock_acquire+0x1f1/0xad0 [ 62.329963][ T6863] ? skb_dequeue+0x1c/0x180 [ 62.334462][ T6863] ? find_held_lock+0x2d/0x110 [ 62.339285][ T6863] ? mark_lock+0xbc/0x1710 [ 62.343713][ T6863] ? mark_held_locks+0x9f/0xe0 [ 62.348455][ T6863] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 62.354239][ T6863] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 62.360345][ T6863] ? trace_hardirqs_on+0x5f/0x220 [ 62.365347][ T6863] ? lockdep_hardirqs_on+0x76/0xf0 [ 62.370438][ T6863] hci_rx_work+0x22e/0xb50 [ 62.374837][ T6863] process_one_work+0x94c/0x1670 [ 62.379765][ T6863] ? lock_release+0x8e0/0x8e0 [ 62.384418][ T6863] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 62.389765][ T6863] ? rwlock_bug.part.0+0x90/0x90 [ 62.394682][ T6863] worker_thread+0x64c/0x1120 [ 62.399348][ T6863] ? __kthread_parkme+0x13f/0x1e0 [ 62.404350][ T6863] ? process_one_work+0x1670/0x1670 [ 62.409521][ T6863] kthread+0x3b5/0x4a0 [ 62.413588][ T6863] ? __kthread_bind_mask+0xc0/0xc0 [ 62.418672][ T6863] ? __kthread_bind_mask+0xc0/0xc0 [ 62.423759][ T6863] ret_from_fork+0x1f/0x30 [ 62.428170][ T6863] [ 62.430477][ T6863] Allocated by task 6857: [ 62.434780][ T6863] kasan_save_stack+0x1b/0x40 [ 62.439444][ T6863] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 62.445048][ T6863] __alloc_skb+0xae/0x550 [ 62.449354][ T6863] vhci_write+0xbd/0x450 [ 62.453569][ T6863] new_sync_write+0x422/0x650 [ 62.458221][ T6863] vfs_write+0x5ad/0x730 [ 62.462442][ T6863] ksys_write+0x12d/0x250 [ 62.466764][ T6863] __do_fast_syscall_32+0x57/0x80 [ 62.471766][ T6863] do_fast_syscall_32+0x2f/0x70 [ 62.476598][ T6863] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 62.482896][ T6863] [ 62.485207][ T6863] The buggy address belongs to the object at ffff888099b96400 [ 62.485207][ T6863] which belongs to the cache kmalloc-512 of size 512 [ 62.499234][ T6863] The buggy address is located 4 bytes to the right of [ 62.499234][ T6863] 512-byte region [ffff888099b96400, ffff888099b96600) [ 62.512837][ T6863] The buggy address belongs to the page: [ 62.518467][ T6863] page:00000000df741de5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b96 [ 62.528612][ T6863] flags: 0xfffe0000000200(slab) [ 62.533462][ T6863] raw: 00fffe0000000200 ffffea00025ddbc8 ffffea00024b7c08 ffff8880aa040600 [ 62.542031][ T6863] raw: 0000000000000000 ffff888099b96000 0000000100000004 0000000000000000 [ 62.550602][ T6863] page dumped because: kasan: bad access detected [ 62.556995][ T6863] [ 62.559323][ T6863] Memory state around the buggy address: [ 62.564931][ T6863] ffff888099b96500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.573074][ T6863] ffff888099b96580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.581133][ T6863] >ffff888099b96600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.589170][ T6863] ^ [ 62.593227][ T6863] ffff888099b96680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.601284][ T6863] ffff888099b96700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.609342][ T6863] ================================================================== [ 62.617377][ T6863] Disabling lock debugging due to kernel taint [ 62.625093][ T6863] Kernel panic - not syncing: panic_on_warn set ... [ 62.631946][ T6863] CPU: 0 PID: 6863 Comm: kworker/u5:2 Tainted: G B 5.8.0-syzkaller #0 [ 62.641397][ T6863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.651454][ T6863] Workqueue: hci0 hci_rx_work [ 62.656127][ T6863] Call Trace: [ 62.659400][ T6863] dump_stack+0x18f/0x20d [ 62.663730][ T6863] ? hci_le_meta_evt+0x3920/0x3ff0 [ 62.668890][ T6863] panic+0x2e3/0x75c [ 62.672783][ T6863] ? __warn_printk+0xf3/0xf3 [ 62.677481][ T6863] ? preempt_schedule_common+0x59/0xc0 [ 62.682921][ T6863] ? hci_le_meta_evt+0x3a02/0x3ff0 [ 62.688012][ T6863] ? preempt_schedule_thunk+0x16/0x18 [ 62.693360][ T6863] ? trace_hardirqs_on+0x55/0x220 [ 62.698361][ T6863] ? hci_le_meta_evt+0x3a02/0x3ff0 [ 62.703475][ T6863] ? hci_le_meta_evt+0x3a02/0x3ff0 [ 62.708582][ T6863] end_report+0x4d/0x53 [ 62.712722][ T6863] kasan_report.cold+0xd/0x37 [ 62.717461][ T6863] ? hci_le_meta_evt+0x3a02/0x3ff0 [ 62.722542][ T6863] hci_le_meta_evt+0x3a02/0x3ff0 [ 62.727457][ T6863] ? mark_lock+0xbc/0x1710 [ 62.731845][ T6863] ? hci_key_refresh_complete_evt.isra.0+0x10b0/0x10b0 [ 62.738671][ T6863] ? mark_lock+0xbc/0x1710 [ 62.743082][ T6863] ? __lock_acquire+0x16cb/0x5640 [ 62.748090][ T6863] ? __lock_acquire+0x16cb/0x5640 [ 62.753094][ T6863] hci_event_packet+0x2e25/0x87a8 [ 62.758098][ T6863] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 62.764049][ T6863] ? __lock_acquire+0x16cb/0x5640 [ 62.769653][ T6863] ? hci_cmd_complete_evt+0xc6d0/0xc6d0 [ 62.775173][ T6863] ? lock_acquire+0x1f1/0xad0 [ 62.779909][ T6863] ? skb_dequeue+0x1c/0x180 [ 62.784444][ T6863] ? find_held_lock+0x2d/0x110 [ 62.789179][ T6863] ? mark_lock+0xbc/0x1710 [ 62.793569][ T6863] ? mark_held_locks+0x9f/0xe0 [ 62.798306][ T6863] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 62.804096][ T6863] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 62.810219][ T6863] ? trace_hardirqs_on+0x5f/0x220 [ 62.815220][ T6863] ? lockdep_hardirqs_on+0x76/0xf0 [ 62.820314][ T6863] hci_rx_work+0x22e/0xb50 [ 62.824707][ T6863] process_one_work+0x94c/0x1670 [ 62.829615][ T6863] ? lock_release+0x8e0/0x8e0 [ 62.834266][ T6863] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 62.839649][ T6863] ? rwlock_bug.part.0+0x90/0x90 [ 62.844568][ T6863] worker_thread+0x64c/0x1120 [ 62.849234][ T6863] ? __kthread_parkme+0x13f/0x1e0 [ 62.854243][ T6863] ? process_one_work+0x1670/0x1670 [ 62.859411][ T6863] kthread+0x3b5/0x4a0 [ 62.863504][ T6863] ? __kthread_bind_mask+0xc0/0xc0 [ 62.868611][ T6863] ? __kthread_bind_mask+0xc0/0xc0 [ 62.873696][ T6863] ret_from_fork+0x1f/0x30 [ 62.879612][ T6863] Kernel Offset: disabled [ 62.883938][ T6863] Rebooting in 86400 seconds..