Warning: Permanently added '10.128.0.183' (ECDSA) to the list of known hosts. syzkaller login: [ 62.042834][ T6837] IPVS: ftp: loaded support on port[0] = 21 [ 62.045761][ T6833] IPVS: ftp: loaded support on port[0] = 21 [ 62.056780][ T6839] IPVS: ftp: loaded support on port[0] = 21 [ 62.070337][ T6841] IPVS: ftp: loaded support on port[0] = 21 [ 62.079467][ T6840] IPVS: ftp: loaded support on port[0] = 21 [ 62.087778][ T6838] IPVS: ftp: loaded support on port[0] = 21 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 63.590134][ T7012] ================================================================== [ 63.598423][ T7012] BUG: KASAN: use-after-free in sco_chan_del+0xe6/0x430 [ 63.605367][ T7012] Write of size 4 at addr ffff888098090010 by task syz-executor025/7012 [ 63.613688][ T7012] [ 63.616037][ T7012] CPU: 1 PID: 7012 Comm: syz-executor025 Not tainted 5.8.0-rc7-next-20200731-syzkaller #0 [ 63.625931][ T7012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.635990][ T7012] Call Trace: executing program executing program executing program executing program [ 63.639293][ T7012] dump_stack+0x18f/0x20d [ 63.643637][ T7012] ? sco_chan_del+0xe6/0x430 [ 63.648236][ T7012] ? sco_chan_del+0xe6/0x430 [ 63.652842][ T7012] print_address_description.constprop.0.cold+0xae/0x497 [ 63.659878][ T7012] ? sco_chan_del+0xab/0x430 [ 63.664481][ T7012] ? lockdep_hardirqs_off+0x7e/0xb0 [ 63.669689][ T7012] ? vprintk_func+0x97/0x1a6 [ 63.674300][ T7012] ? sco_chan_del+0xe6/0x430 [ 63.678898][ T7012] ? sco_chan_del+0xe6/0x430 [ 63.683494][ T7012] kasan_report.cold+0x1f/0x37 executing program executing program executing program [ 63.688271][ T7012] ? sco_chan_del+0xe6/0x430 [ 63.692874][ T7012] check_memory_region+0x13d/0x180 [ 63.697993][ T7012] sco_chan_del+0xe6/0x430 [ 63.702422][ T7012] __sco_sock_close+0x16e/0x5b0 [ 63.707283][ T7012] sco_sock_release+0x69/0x290 [ 63.712057][ T7012] __sock_release+0xcd/0x280 [ 63.716657][ T7012] sock_close+0x18/0x20 [ 63.720819][ T7012] __fput+0x285/0x920 [ 63.724812][ T7012] ? __sock_release+0x280/0x280 [ 63.729669][ T7012] task_work_run+0xdd/0x190 [ 63.734187][ T7012] get_signal+0xd6c/0x1ee0 executing program executing program executing program [ 63.738636][ T7012] ? kick_process+0xce/0x150 [ 63.743233][ T7012] ? task_work_add+0xe3/0x250 [ 63.747920][ T7012] arch_do_signal+0x82/0x2520 [ 63.752612][ T7012] ? fput_many+0xf6/0x1a0 [ 63.756948][ T7012] ? copy_siginfo_to_user32+0xa0/0xa0 [ 63.762335][ T7012] ? __sys_connect+0x109/0x190 [ 63.767104][ T7012] ? __sys_connect_file+0x1a0/0x1a0 [ 63.772313][ T7012] ? lock_is_held_type+0xbb/0xf0 [ 63.777261][ T7012] ? exit_to_user_mode_prepare+0xb9/0x1c0 [ 63.782985][ T7012] ? lockdep_hardirqs_on_prepare+0x354/0x530 executing program executing program [ 63.788972][ T7012] exit_to_user_mode_prepare+0x15d/0x1c0 [ 63.794615][ T7012] syscall_exit_to_user_mode+0x59/0x2b0 [ 63.800171][ T7012] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.806065][ T7012] RIP: 0033:0x4471b9 [ 63.809981][ T7012] Code: e8 4c e7 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 07 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 63.829754][ T7012] RSP: 002b:00007f6630337db8 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 63.838191][ T7012] RAX: fffffffffffffffc RBX: 00000000006dcc28 RCX: 00000000004471b9 [ 63.846170][ T7012] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000004 [ 63.854149][ T7012] RBP: 00000000006dcc20 R08: 0000000000000000 R09: 0000000000000000 [ 63.862125][ T7012] R10: 0000000000000002 R11: 0000000000000246 R12: 00000000006dcc2c [ 63.870099][ T7012] R13: 00007ffff218693f R14: 00007f66303389c0 R15: 0000000000000064 [ 63.878088][ T7012] [ 63.880415][ T7012] Allocated by task 7012: [ 63.884751][ T7012] kasan_save_stack+0x1b/0x40 [ 63.889431][ T7012] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 63.895064][ T7012] kmem_cache_alloc_trace+0x16e/0x2c0 [ 63.900439][ T7012] hci_conn_add+0x53/0x1330 [ 63.904947][ T7012] hci_connect_sco+0x356/0x860 [ 63.909716][ T7012] sco_sock_connect+0x308/0x980 [ 63.914573][ T7012] __sys_connect_file+0x155/0x1a0 [ 63.919597][ T7012] __sys_connect+0x160/0x190 [ 63.924185][ T7012] __x64_sys_connect+0x6f/0xb0 [ 63.928959][ T7012] do_syscall_64+0x2d/0x70 [ 63.933376][ T7012] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.939273][ T7012] executing program executing program [ 63.941619][ T7012] Freed by task 6986: [ 63.945608][ T7012] kasan_save_stack+0x1b/0x40 [ 63.950289][ T7012] kasan_set_track+0x1c/0x30 [ 63.954883][ T7012] kasan_set_free_info+0x1b/0x30 [ 63.959940][ T7012] __kasan_slab_free+0xd8/0x120 [ 63.964793][ T7012] kfree+0x103/0x2c0 [ 63.968691][ T7012] device_release+0x71/0x200 [ 63.973288][ T7012] kobject_put+0x171/0x270 [ 63.977704][ T7012] put_device+0x1b/0x30 [ 63.981865][ T7012] hci_conn_del+0x27e/0x6a0 [ 63.986382][ T7012] hci_phy_link_complete_evt.isra.0+0x508/0x790 [ 63.992618][ T7012] hci_event_packet+0x4696/0x87a8 [ 63.997741][ T7012] hci_rx_work+0x22e/0xb50 [ 64.002145][ T7012] process_one_work+0x94c/0x1670 [ 64.007060][ T7012] worker_thread+0x64c/0x1120 [ 64.011810][ T7012] kthread+0x3b5/0x4a0 [ 64.015863][ T7012] ret_from_fork+0x1f/0x30 [ 64.020250][ T7012] [ 64.022612][ T7012] The buggy address belongs to the object at ffff888098090000 [ 64.022612][ T7012] which belongs to the cache kmalloc-4k of size 4096 [ 64.036650][ T7012] The buggy address is located 16 bytes inside of [ 64.036650][ T7012] 4096-byte region [ffff888098090000, ffff888098091000) [ 64.049906][ T7012] The buggy address belongs to the page: [ 64.055578][ T7012] page:00000000ca74174a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x98090 [ 64.065702][ T7012] head:00000000ca74174a order:1 compound_mapcount:0 [ 64.072283][ T7012] flags: 0xfffe0000010200(slab|head) [ 64.077550][ T7012] raw: 00fffe0000010200 ffffea00024ebd08 ffffea00024c6208 ffff8880aa000900 [ 64.086114][ T7012] raw: 0000000000000000 ffff888098090000 0000000100000001 0000000000000000 [ 64.094673][ T7012] page dumped because: kasan: bad access detected [ 64.101060][ T7012] [ 64.103369][ T7012] Memory state around the buggy address: [ 64.109006][ T7012] ffff88809808ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.117046][ T7012] ffff88809808ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.125085][ T7012] >ffff888098090000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.133130][ T7012] ^ executing program executing program [ 64.137698][ T7012] ffff888098090080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.145740][ T7012] ffff888098090100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.153788][ T7012] ================================================================== [ 64.161825][ T7012] Disabling lock debugging due to kernel taint [ 64.170685][ T7012] Kernel panic - not syncing: panic_on_warn set ... [ 64.177278][ T7012] CPU: 1 PID: 7012 Comm: syz-executor025 Tainted: G B 5.8.0-rc7-next-20200731-syzkaller #0 [ 64.188541][ T7012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.198613][ T7012] Call Trace: [ 64.201906][ T7012] dump_stack+0x18f/0x20d [ 64.206241][ T7012] ? sco_chan_del+0x20/0x430 [ 64.210825][ T7012] panic+0x2e3/0x75c [ 64.214700][ T7012] ? __warn_printk+0xf3/0xf3 [ 64.219270][ T7012] ? preempt_schedule_common+0x59/0xc0 [ 64.224704][ T7012] ? sco_chan_del+0xe6/0x430 [ 64.229276][ T7012] ? preempt_schedule_thunk+0x16/0x18 [ 64.234641][ T7012] ? trace_hardirqs_on+0x55/0x220 [ 64.239642][ T7012] ? sco_chan_del+0xe6/0x430 [ 64.244210][ T7012] ? sco_chan_del+0xe6/0x430 [ 64.248775][ T7012] end_report+0x4d/0x53 [ 64.252931][ T7012] kasan_report.cold+0xd/0x37 [ 64.257596][ T7012] ? sco_chan_del+0xe6/0x430 [ 64.262180][ T7012] check_memory_region+0x13d/0x180 [ 64.267271][ T7012] sco_chan_del+0xe6/0x430 [ 64.271681][ T7012] __sco_sock_close+0x16e/0x5b0 [ 64.276528][ T7012] sco_sock_release+0x69/0x290 [ 64.281268][ T7012] __sock_release+0xcd/0x280 [ 64.285836][ T7012] sock_close+0x18/0x20 [ 64.289973][ T7012] __fput+0x285/0x920 [ 64.293941][ T7012] ? __sock_release+0x280/0x280 [ 64.298771][ T7012] task_work_run+0xdd/0x190 [ 64.303253][ T7012] get_signal+0xd6c/0x1ee0 [ 64.307648][ T7012] ? kick_process+0xce/0x150 [ 64.312214][ T7012] ? task_work_add+0xe3/0x250 [ 64.316884][ T7012] arch_do_signal+0x82/0x2520 [ 64.321625][ T7012] ? fput_many+0xf6/0x1a0 [ 64.325932][ T7012] ? copy_siginfo_to_user32+0xa0/0xa0 [ 64.331294][ T7012] ? __sys_connect+0x109/0x190 [ 64.336039][ T7012] ? __sys_connect_file+0x1a0/0x1a0 [ 64.341213][ T7012] ? lock_is_held_type+0xbb/0xf0 [ 64.346126][ T7012] ? exit_to_user_mode_prepare+0xb9/0x1c0 [ 64.351818][ T7012] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 64.357775][ T7012] exit_to_user_mode_prepare+0x15d/0x1c0 [ 64.363385][ T7012] syscall_exit_to_user_mode+0x59/0x2b0 [ 64.368905][ T7012] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 64.374769][ T7012] RIP: 0033:0x4471b9 [ 64.378638][ T7012] Code: e8 4c e7 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 07 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 64.398220][ T7012] RSP: 002b:00007f6630337db8 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 64.406613][ T7012] RAX: fffffffffffffffc RBX: 00000000006dcc28 RCX: 00000000004471b9 [ 64.414565][ T7012] RDX: 0000000000000008 RSI: 0000000020000040 RDI: 0000000000000004 [ 64.422547][ T7012] RBP: 00000000006dcc20 R08: 0000000000000000 R09: 0000000000000000 [ 64.430597][ T7012] R10: 0000000000000002 R11: 0000000000000246 R12: 00000000006dcc2c [ 64.438548][ T7012] R13: 00007ffff218693f R14: 00007f66303389c0 R15: 0000000000000064 [ 64.447650][ T7012] Kernel Offset: disabled [ 64.451967][ T7012] Rebooting in 86400 seconds..