[ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.230' (ECDSA) to the list of known hosts. syzkaller login: [ 65.921219][ T6859] IPVS: ftp: loaded support on port[0] = 21 executing program [ 66.021800][ T1547] ================================================================== [ 66.030241][ T1547] BUG: KASAN: slab-out-of-bounds in hci_le_meta_evt+0x3937/0x3ff0 [ 66.038516][ T1547] Read of size 1 at addr ffff88809915720c by task kworker/u5:0/1547 [ 66.046476][ T1547] [ 66.048791][ T1547] CPU: 1 PID: 1547 Comm: kworker/u5:0 Not tainted 5.9.0-rc2-next-20200826-syzkaller #0 [ 66.058402][ T1547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.068750][ T1547] Workqueue: hci0 hci_rx_work [ 66.073404][ T1547] Call Trace: [ 66.076676][ T1547] dump_stack+0x18f/0x20d [ 66.080999][ T1547] ? hci_le_meta_evt+0x3937/0x3ff0 [ 66.086102][ T1547] ? hci_le_meta_evt+0x3937/0x3ff0 [ 66.091204][ T1547] print_address_description.constprop.0.cold+0xae/0x497 [ 66.098219][ T1547] ? vprintk_func+0x97/0x1a6 [ 66.102787][ T1547] ? hci_le_meta_evt+0x3937/0x3ff0 [ 66.107873][ T1547] ? hci_le_meta_evt+0x3937/0x3ff0 [ 66.112959][ T1547] kasan_report.cold+0x1f/0x37 [ 66.117713][ T1547] ? hci_le_meta_evt+0x3937/0x3ff0 [ 66.122801][ T1547] hci_le_meta_evt+0x3937/0x3ff0 [ 66.127719][ T1547] ? mark_lock+0xbc/0x1710 [ 66.132111][ T1547] ? hci_key_refresh_complete_evt.isra.0+0x10b0/0x10b0 [ 66.139331][ T1547] ? mark_lock+0xbc/0x1710 [ 66.143724][ T1547] ? __lock_acquire+0x16cb/0x5640 [ 66.148728][ T1547] ? __lock_acquire+0x16cb/0x5640 [ 66.153994][ T1547] hci_event_packet+0x2e25/0x87a8 [ 66.159000][ T1547] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 66.164957][ T1547] ? __lock_acquire+0x16cb/0x5640 [ 66.170140][ T1547] ? hci_cmd_complete_evt+0xc6d0/0xc6d0 [ 66.175665][ T1547] ? lock_acquire+0x1f1/0xad0 [ 66.180324][ T1547] ? skb_dequeue+0x1c/0x180 [ 66.184803][ T1547] ? find_held_lock+0x2d/0x110 [ 66.189562][ T1547] ? mark_lock+0xbc/0x1710 [ 66.193975][ T1547] ? mark_held_locks+0x9f/0xe0 [ 66.198756][ T1547] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 66.204555][ T1547] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 66.210603][ T1547] ? trace_hardirqs_on+0x5f/0x220 [ 66.215642][ T1547] ? lockdep_hardirqs_on+0x76/0xf0 [ 66.220737][ T1547] hci_rx_work+0x22e/0xb50 [ 66.225141][ T1547] process_one_work+0x94c/0x1670 [ 66.230060][ T1547] ? lock_release+0x8e0/0x8e0 [ 66.234726][ T1547] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 66.240080][ T1547] ? rwlock_bug.part.0+0x90/0x90 [ 66.245001][ T1547] worker_thread+0x64c/0x1120 [ 66.249736][ T1547] ? process_one_work+0x1670/0x1670 [ 66.254931][ T1547] kthread+0x3b5/0x4a0 [ 66.259003][ T1547] ? __kthread_bind_mask+0xc0/0xc0 [ 66.264103][ T1547] ? __kthread_bind_mask+0xc0/0xc0 [ 66.269199][ T1547] ret_from_fork+0x1f/0x30 [ 66.273597][ T1547] [ 66.275903][ T1547] Allocated by task 6859: [ 66.280212][ T1547] kasan_save_stack+0x1b/0x40 [ 66.284874][ T1547] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 66.290487][ T1547] __alloc_skb+0xae/0x550 [ 66.294792][ T1547] vhci_write+0xbd/0x450 [ 66.299048][ T1547] new_sync_write+0x422/0x650 [ 66.303709][ T1547] vfs_write+0x5ad/0x730 [ 66.308018][ T1547] ksys_write+0x12d/0x250 [ 66.312364][ T1547] do_syscall_64+0x2d/0x70 [ 66.316763][ T1547] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.322625][ T1547] [ 66.324933][ T1547] The buggy address belongs to the object at ffff888099157000 [ 66.324933][ T1547] which belongs to the cache kmalloc-512 of size 512 [ 66.338974][ T1547] The buggy address is located 12 bytes to the right of [ 66.338974][ T1547] 512-byte region [ffff888099157000, ffff888099157200) [ 66.352712][ T1547] The buggy address belongs to the page: [ 66.358846][ T1547] page:000000000ad0ab30 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888099157800 pfn:0x99157 [ 66.370271][ T1547] flags: 0xfffe0000000200(slab) [ 66.375129][ T1547] raw: 00fffe0000000200 ffffea00028857c8 ffffea00025021c8 ffff8880aa040600 [ 66.383692][ T1547] raw: ffff888099157800 ffff888099157000 0000000100000002 0000000000000000 [ 66.392261][ T1547] page dumped because: kasan: bad access detected [ 66.398674][ T1547] [ 66.400986][ T1547] Memory state around the buggy address: [ 66.406629][ T1547] ffff888099157100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.414669][ T1547] ffff888099157180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.422721][ T1547] >ffff888099157200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.430825][ T1547] ^ [ 66.435149][ T1547] ffff888099157280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.443198][ T1547] ffff888099157300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.451233][ T1547] ================================================================== [ 66.459272][ T1547] Disabling lock debugging due to kernel taint [ 66.466745][ T1547] Kernel panic - not syncing: panic_on_warn set ... [ 66.473354][ T1547] CPU: 1 PID: 1547 Comm: kworker/u5:0 Tainted: G B 5.9.0-rc2-next-20200826-syzkaller #0 [ 66.484371][ T1547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.494419][ T1547] Workqueue: hci0 hci_rx_work [ 66.499075][ T1547] Call Trace: [ 66.502345][ T1547] dump_stack+0x18f/0x20d [ 66.506657][ T1547] ? hci_le_meta_evt+0x3840/0x3ff0 [ 66.511757][ T1547] panic+0x2e3/0x75c [ 66.515635][ T1547] ? __warn_printk+0xf3/0xf3 [ 66.520221][ T1547] ? preempt_schedule_common+0x59/0xc0 [ 66.525659][ T1547] ? hci_le_meta_evt+0x3937/0x3ff0 [ 66.530748][ T1547] ? preempt_schedule_thunk+0x16/0x18 [ 66.536098][ T1547] ? trace_hardirqs_on+0x55/0x220 [ 66.541111][ T1547] ? hci_le_meta_evt+0x3937/0x3ff0 [ 66.546198][ T1547] ? hci_le_meta_evt+0x3937/0x3ff0 [ 66.551289][ T1547] end_report+0x4d/0x53 [ 66.555428][ T1547] kasan_report.cold+0xd/0x37 [ 66.560084][ T1547] ? hci_le_meta_evt+0x3937/0x3ff0 [ 66.565175][ T1547] hci_le_meta_evt+0x3937/0x3ff0 [ 66.570096][ T1547] ? mark_lock+0xbc/0x1710 [ 66.574513][ T1547] ? hci_key_refresh_complete_evt.isra.0+0x10b0/0x10b0 [ 66.581340][ T1547] ? mark_lock+0xbc/0x1710 [ 66.585751][ T1547] ? __lock_acquire+0x16cb/0x5640 [ 66.590777][ T1547] ? __lock_acquire+0x16cb/0x5640 [ 66.595814][ T1547] hci_event_packet+0x2e25/0x87a8 [ 66.600827][ T1547] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 66.606794][ T1547] ? __lock_acquire+0x16cb/0x5640 [ 66.611815][ T1547] ? hci_cmd_complete_evt+0xc6d0/0xc6d0 [ 66.617350][ T1547] ? lock_acquire+0x1f1/0xad0 [ 66.622094][ T1547] ? skb_dequeue+0x1c/0x180 [ 66.626592][ T1547] ? find_held_lock+0x2d/0x110 [ 66.631339][ T1547] ? mark_lock+0xbc/0x1710 [ 66.635736][ T1547] ? mark_held_locks+0x9f/0xe0 [ 66.640482][ T1547] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 66.646378][ T1547] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 66.653378][ T1547] ? trace_hardirqs_on+0x5f/0x220 [ 66.658384][ T1547] ? lockdep_hardirqs_on+0x76/0xf0 [ 66.663475][ T1547] hci_rx_work+0x22e/0xb50 [ 66.667875][ T1547] process_one_work+0x94c/0x1670 [ 66.672813][ T1547] ? lock_release+0x8e0/0x8e0 [ 66.677472][ T1547] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 66.683501][ T1547] ? rwlock_bug.part.0+0x90/0x90 [ 66.688425][ T1547] worker_thread+0x64c/0x1120 [ 66.693087][ T1547] ? process_one_work+0x1670/0x1670 [ 66.698267][ T1547] kthread+0x3b5/0x4a0 [ 66.702316][ T1547] ? __kthread_bind_mask+0xc0/0xc0 [ 66.707409][ T1547] ? __kthread_bind_mask+0xc0/0xc0 [ 66.712502][ T1547] ret_from_fork+0x1f/0x30 [ 66.718909][ T1547] Kernel Offset: disabled [ 66.723224][ T1547] Rebooting in 86400 seconds..