kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 686 Comm: syz-executor.1 Not tainted 5.4.233-syzkaller-00022-gcf4e000017b8 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023
RIP: 0010:hci_uart_tty_ioctl+0x32b/0xa40 drivers/bluetooth/hci_ldisc.c:769
Code: fe 4c 89 f3 48 81 c3 88 00 00 00 48 89 d8 48 c1 e8 03 80 3c 28 00 74 08 48 89 df e8 7f 61 6d fe 48 8b 1b 48 89 d8 48 c1 e8 03 <0f> b6 04 28 84 c0 0f 85 66 06 00 00 8b 2b 89 e8 48 83 c4 30 5b 41
RSP: 0018:ffff8881e9f57c10 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881ea2faf40
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff83267419 R09: ffffed103d47a084
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: ffff8881e9cdb800 R14: ffff8881ea3d0400 R15: 00000000800455c9
FS: 00007fc4cab1f700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055f4ae87e0a8 CR3: 00000001ea2eb000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
tty_ioctl+0x954/0xcb0 drivers/tty/tty_io.c:2666
do_vfs_ioctl+0x742/0x1720 fs/ioctl.c:47
ksys_ioctl fs/ioctl.c:742 [inline]
__do_sys_ioctl fs/ioctl.c:749 [inline]
__se_sys_ioctl fs/ioctl.c:747 [inline]
__x64_sys_ioctl+0xd4/0x110 fs/ioctl.c:747
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
Modules linked in:
---[ end trace 03daceeeec010a9d ]---
RIP: 0010:hci_uart_tty_ioctl+0x32b/0xa40 drivers/bluetooth/hci_ldisc.c:769
Code: fe 4c 89 f3 48 81 c3 88 00 00 00 48 89 d8 48 c1 e8 03 80 3c 28 00 74 08 48 89 df e8 7f 61 6d fe 48 8b 1b 48 89 d8 48 c1 e8 03 <0f> b6 04 28 84 c0 0f 85 66 06 00 00 8b 2b 89 e8 48 83 c4 30 5b 41
RSP: 0018:ffff8881e9f57c10 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881ea2faf40
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff83267419 R09: ffffed103d47a084
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: ffff8881e9cdb800 R14: ffff8881ea3d0400 R15: 00000000800455c9
FS: 00007fc4cab1f700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055f4ae87e0a8 CR3: 00000001ea2eb000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: fe 4c 89 f3 decb -0xd(%rcx,%rcx,4)
4: 48 81 c3 88 00 00 00 add $0x88,%rbx
b: 48 89 d8 mov %rbx,%rax
e: 48 c1 e8 03 shr $0x3,%rax
12: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1)
16: 74 08 je 0x20
18: 48 89 df mov %rbx,%rdi
1b: e8 7f 61 6d fe callq 0xfe6d619f
20: 48 8b 1b mov (%rbx),%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 0f b6 04 28 movzbl (%rax,%rbp,1),%eax <-- trapping instruction
2e: 84 c0 test %al,%al
30: 0f 85 66 06 00 00 jne 0x69c
36: 8b 2b mov (%rbx),%ebp
38: 89 e8 mov %ebp,%eax
3a: 48 83 c4 30 add $0x30,%rsp
3e: 5b pop %rbx
3f: 41 rex.B