[  OK  ] Reached target Login Prompts.
[  OK  ] Reached target Multi-User System.
[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
[  OK  ] Started Update UTMP about System Runlevel Changes.


Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.1.62' (ECDSA) to the list of known hosts.
syzkaller login: [   60.658380][ T6827] IPVS: ftp: loaded support on port[0] = 21
executing program
[   61.759985][ T6852] ==================================================================
[   61.768237][ T6852] BUG: KASAN: slab-out-of-bounds in hci_le_meta_evt+0x39eb/0x3fd0
[   61.776048][ T6852] Read of size 1 at addr ffff8880981dde04 by task kworker/u5:2/6852
[   61.784022][ T6852] 
[   61.786359][ T6852] CPU: 0 PID: 6852 Comm: kworker/u5:2 Not tainted 5.8.0-rc7-next-20200731-syzkaller #0
[   61.796067][ T6852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   61.806132][ T6852] Workqueue: hci0 hci_rx_work
[   61.810819][ T6852] Call Trace:
[   61.814126][ T6852]  dump_stack+0x18f/0x20d
[   61.818474][ T6852]  ? hci_le_meta_evt+0x39eb/0x3fd0
[   61.823592][ T6852]  ? hci_le_meta_evt+0x39eb/0x3fd0
[   61.828715][ T6852]  print_address_description.constprop.0.cold+0xae/0x497
[   61.835748][ T6852]  ? lockdep_hardirqs_off+0x7e/0xb0
[   61.840946][ T6852]  ? vprintk_func+0x97/0x1a6
[   61.845537][ T6852]  ? hci_le_meta_evt+0x39eb/0x3fd0
[   61.850733][ T6852]  ? hci_le_meta_evt+0x39eb/0x3fd0
[   61.855841][ T6852]  kasan_report.cold+0x1f/0x37
[   61.860627][ T6852]  ? hci_le_meta_evt+0x39eb/0x3fd0
[   61.865735][ T6852]  hci_le_meta_evt+0x39eb/0x3fd0
[   61.870676][ T6852]  ? mark_lock+0xbc/0x1710
[   61.875093][ T6852]  ? hci_key_refresh_complete_evt.isra.0+0x10b0/0x10b0
[   61.881939][ T6852]  ? mark_lock+0xbc/0x1710
[   61.886350][ T6852]  ? __lock_acquire+0x16cb/0x5640
[   61.891387][ T6852]  ? __lock_acquire+0x16cb/0x5640
[   61.896438][ T6852]  hci_event_packet+0x2e25/0x87a8
[   61.901476][ T6852]  ? lockdep_hardirqs_on_prepare+0x530/0x530
[   61.907477][ T6852]  ? __lock_acquire+0x16cb/0x5640
[   61.912502][ T6852]  ? hci_cmd_complete_evt+0xc6d0/0xc6d0
[   61.918047][ T6852]  ? lock_acquire+0x1f1/0xad0
[   61.922718][ T6852]  ? skb_dequeue+0x1c/0x180
[   61.927217][ T6852]  ? find_held_lock+0x2d/0x110
[   61.931978][ T6852]  ? mark_lock+0xbc/0x1710
[   61.936395][ T6852]  ? mark_held_locks+0x9f/0xe0
[   61.941160][ T6852]  ? _raw_spin_unlock_irqrestore+0x62/0xe0
[   61.946977][ T6852]  ? lockdep_hardirqs_on_prepare+0x354/0x530
[   61.952953][ T6852]  ? trace_hardirqs_on+0x5f/0x220
[   61.957977][ T6852]  ? lockdep_hardirqs_on+0x76/0xf0
[   61.963103][ T6852]  hci_rx_work+0x22e/0xb50
[   61.967529][ T6852]  process_one_work+0x94c/0x1670
[   61.972477][ T6852]  ? lock_release+0x8e0/0x8e0
[   61.977154][ T6852]  ? pwq_dec_nr_in_flight+0x2d0/0x2d0
[   61.982523][ T6852]  ? rwlock_bug.part.0+0x90/0x90
[   61.987463][ T6852]  ? lockdep_hardirqs_off+0x7e/0xb0
[   61.992664][ T6852]  worker_thread+0x64c/0x1120
[   61.997352][ T6852]  ? __kthread_parkme+0x13f/0x1e0
[   62.002373][ T6852]  ? process_one_work+0x1670/0x1670
[   62.007589][ T6852]  kthread+0x3b5/0x4a0
[   62.011654][ T6852]  ? __kthread_bind_mask+0xc0/0xc0
[   62.016759][ T6852]  ? __kthread_bind_mask+0xc0/0xc0
[   62.021870][ T6852]  ret_from_fork+0x1f/0x30
[   62.026288][ T6852] 
[   62.028610][ T6852] Allocated by task 6827:
[   62.032935][ T6852]  kasan_save_stack+0x1b/0x40
[   62.037606][ T6852]  __kasan_kmalloc.constprop.0+0xbf/0xd0
[   62.043253][ T6852]  __alloc_skb+0xae/0x550
[   62.047578][ T6852]  vhci_write+0xbd/0x450
[   62.051817][ T6852]  new_sync_write+0x422/0x650
[   62.056488][ T6852]  vfs_write+0x5ad/0x730
[   62.060750][ T6852]  ksys_write+0x12d/0x250
[   62.065087][ T6852]  do_syscall_64+0x2d/0x70
[   62.069508][ T6852]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   62.075384][ T6852] 
[   62.082672][ T6852] The buggy address belongs to the object at ffff8880981ddc00
[   62.082672][ T6852]  which belongs to the cache kmalloc-512 of size 512
[   62.096726][ T6852] The buggy address is located 4 bytes to the right of
[   62.096726][ T6852]  512-byte region [ffff8880981ddc00, ffff8880981dde00)
[   62.110332][ T6852] The buggy address belongs to the page:
[   62.115973][ T6852] page:00000000aa359a13 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x981dd
[   62.126129][ T6852] flags: 0xfffe0000000200(slab)
[   62.130981][ T6852] raw: 00fffe0000000200 ffffea00029eb1c8 ffffea000267d788 ffff8880aa000600
[   62.139583][ T6852] raw: 0000000000000000 ffff8880981dd000 0000000100000004 0000000000000000
[   62.148154][ T6852] page dumped because: kasan: bad access detected
[   62.154551][ T6852] 
[   62.156868][ T6852] Memory state around the buggy address:
[   62.162498][ T6852]  ffff8880981ddd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.170556][ T6852]  ffff8880981ddd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.178621][ T6852] >ffff8880981dde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.186675][ T6852]                    ^
[   62.190739][ T6852]  ffff8880981dde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.198795][ T6852]  ffff8880981ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.206877][ T6852] ==================================================================
[   62.214934][ T6852] Disabling lock debugging due to kernel taint
[   62.221337][ T6852] Kernel panic - not syncing: panic_on_warn set ...
[   62.227926][ T6852] CPU: 0 PID: 6852 Comm: kworker/u5:2 Tainted: G    B             5.8.0-rc7-next-20200731-syzkaller #0
[   62.238931][ T6852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   62.249007][ T6852] Workqueue: hci0 hci_rx_work
[   62.253673][ T6852] Call Trace:
[   62.256960][ T6852]  dump_stack+0x18f/0x20d
[   62.261287][ T6852]  ? hci_le_meta_evt+0x3920/0x3fd0
[   62.266391][ T6852]  panic+0x2e3/0x75c
[   62.270278][ T6852]  ? __warn_printk+0xf3/0xf3
[   62.274863][ T6852]  ? preempt_schedule_common+0x59/0xc0
[   62.280313][ T6852]  ? hci_le_meta_evt+0x39eb/0x3fd0
[   62.285414][ T6852]  ? preempt_schedule_thunk+0x16/0x18
[   62.290777][ T6852]  ? trace_hardirqs_on+0x55/0x220
[   62.295795][ T6852]  ? hci_le_meta_evt+0x39eb/0x3fd0
[   62.300896][ T6852]  ? hci_le_meta_evt+0x39eb/0x3fd0
[   62.305999][ T6852]  end_report+0x4d/0x53
[   62.310147][ T6852]  kasan_report.cold+0xd/0x37
[   62.314817][ T6852]  ? hci_le_meta_evt+0x39eb/0x3fd0
[   62.319917][ T6852]  hci_le_meta_evt+0x39eb/0x3fd0
[   62.324848][ T6852]  ? mark_lock+0xbc/0x1710
[   62.329261][ T6852]  ? hci_key_refresh_complete_evt.isra.0+0x10b0/0x10b0
[   62.336098][ T6852]  ? mark_lock+0xbc/0x1710
[   62.340507][ T6852]  ? __lock_acquire+0x16cb/0x5640
[   62.345545][ T6852]  ? __lock_acquire+0x16cb/0x5640
[   62.350568][ T6852]  hci_event_packet+0x2e25/0x87a8
[   62.355590][ T6852]  ? lockdep_hardirqs_on_prepare+0x530/0x530
[   62.361561][ T6852]  ? __lock_acquire+0x16cb/0x5640
[   62.366591][ T6852]  ? hci_cmd_complete_evt+0xc6d0/0xc6d0
[   62.372127][ T6852]  ? lock_acquire+0x1f1/0xad0
[   62.376795][ T6852]  ? skb_dequeue+0x1c/0x180
[   62.381286][ T6852]  ? find_held_lock+0x2d/0x110
[   62.386041][ T6852]  ? mark_lock+0xbc/0x1710
[   62.390459][ T6852]  ? mark_held_locks+0x9f/0xe0
[   62.395231][ T6852]  ? _raw_spin_unlock_irqrestore+0x62/0xe0
[   62.401046][ T6852]  ? lockdep_hardirqs_on_prepare+0x354/0x530
[   62.407016][ T6852]  ? trace_hardirqs_on+0x5f/0x220
[   62.412036][ T6852]  ? lockdep_hardirqs_on+0x76/0xf0
[   62.417139][ T6852]  hci_rx_work+0x22e/0xb50
[   62.421555][ T6852]  process_one_work+0x94c/0x1670
[   62.426490][ T6852]  ? lock_release+0x8e0/0x8e0
[   62.431161][ T6852]  ? pwq_dec_nr_in_flight+0x2d0/0x2d0
[   62.436563][ T6852]  ? rwlock_bug.part.0+0x90/0x90
[   62.441494][ T6852]  ? lockdep_hardirqs_off+0x7e/0xb0
[   62.446686][ T6852]  worker_thread+0x64c/0x1120
[   62.451362][ T6852]  ? __kthread_parkme+0x13f/0x1e0
[   62.456376][ T6852]  ? process_one_work+0x1670/0x1670
[   62.461588][ T6852]  kthread+0x3b5/0x4a0
[   62.465663][ T6852]  ? __kthread_bind_mask+0xc0/0xc0
[   62.470792][ T6852]  ? __kthread_bind_mask+0xc0/0xc0
[   62.475897][ T6852]  ret_from_fork+0x1f/0x30
[   62.481250][ T6852] Kernel Offset: disabled
[   62.485570][ T6852] Rebooting in 86400 seconds..