Bluetooth: hci3 command 0x0419 tx timeout Bluetooth: hci5 command 0x0419 tx timeout Bluetooth: hci0 command 0x0419 tx timeout Bluetooth: hci4 command 0x0419 tx timeout ================================================================== BUG: KASAN: use-after-free in drm_getunique+0x19e/0x250 drivers/gpu/drm/drm_ioctl.c:118 Read of size 4 at addr ffff8880ab907018 by task syz-executor.0/12100 CPU: 0 PID: 12100 Comm: syz-executor.0 Not tainted 4.14.231-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x14b/0x1e7 lib/dump_stack.c:58 print_address_description.cold.6+0x9/0x1ca mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report mm/kasan/report.c:409 [inline] kasan_report.cold.7+0x11a/0x2d3 mm/kasan/report.c:393 __asan_report_load4_noabort+0x14/0x20 mm/kasan/report.c:429 drm_getunique+0x19e/0x250 drivers/gpu/drm/drm_ioctl.c:118 drm_ioctl_kernel+0x133/0x1d0 drivers/gpu/drm/drm_ioctl.c:736 drm_ioctl+0x417/0x900 drivers/gpu/drm/drm_ioctl.c:836 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x180/0xfb0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x74/0x80 fs/ioctl.c:692 do_syscall_64+0x1c7/0x5b0 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465a49 RSP: 002b:00007fa5944bf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000055bfe8 RCX: 0000000000465a49 RDX: 0000000020000180 RSI: 00000000c0145401 RDI: 0000000000000003 RBP: 00000000004af682 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bfe8 R13: 00007ffdd1bd7e2f R14: 00007fa5944bf300 R15: 0000000000022000 Allocated by task 12092: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59 save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc.part.1+0x62/0xf0 mm/kasan/kasan.c:551 kasan_kmalloc+0xaf/0xc0 mm/kasan/kasan.c:536 kmem_cache_alloc_trace+0x152/0x3f0 mm/slab.c:3618 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] drm_master_create drivers/gpu/drm/drm_auth.c:100 [inline] drm_new_set_master+0x11c/0x480 drivers/gpu/drm/drm_auth.c:138 drm_master_open+0xd6/0x110 drivers/gpu/drm/drm_auth.c:236 drm_open_helper drivers/gpu/drm/drm_file.c:251 [inline] drm_open+0x816/0x1010 drivers/gpu/drm/drm_file.c:155 drm_stub_open+0x267/0x430 drivers/gpu/drm/drm_drv.c:944 chrdev_open+0x1e9/0x5b0 fs/char_dev.c:423 do_dentry_open+0x3e4/0xde0 fs/open.c:777 vfs_open+0xfc/0x240 fs/open.c:888 do_last fs/namei.c:3428 [inline] path_openat+0xb6f/0x2760 fs/namei.c:3569 do_filp_open+0x16b/0x220 fs/namei.c:3603 do_sys_open+0x1d0/0x350 fs/open.c:1081 SYSC_openat fs/open.c:1108 [inline] SyS_openat+0xf/0x20 fs/open.c:1102 do_syscall_64+0x1c7/0x5b0 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb Freed by task 12092: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59 save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0xab/0x190 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3496 [inline] kfree+0xcc/0x270 mm/slab.c:3815 drm_master_destroy drivers/gpu/drm/drm_auth.c:322 [inline] kref_put include/linux/kref.h:70 [inline] drm_master_put+0x120/0x170 drivers/gpu/drm/drm_auth.c:333 drm_new_set_master+0x2e3/0x480 drivers/gpu/drm/drm_auth.c:157 drm_setmaster_ioctl+0x168/0x1e0 drivers/gpu/drm/drm_auth.c:190 drm_ioctl_kernel+0x133/0x1d0 drivers/gpu/drm/drm_ioctl.c:736 drm_ioctl+0x417/0x900 drivers/gpu/drm/drm_ioctl.c:836 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x180/0xfb0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x74/0x80 fs/ioctl.c:692 do_syscall_64+0x1c7/0x5b0 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb The buggy address belongs to the object at ffff8880ab907000 which belongs to the cache kmalloc-256 of size 256 The buggy address is located 24 bytes inside of 256-byte region [ffff8880ab907000, ffff8880ab907100) The buggy address belongs to the page: page:ffffea0002ae41c0 count:1 mapcount:0 mapping:ffff8880ab907000 index:0xffff8880ab907b40 flags: 0xfff00000000100(slab) raw: 00fff00000000100 ffff8880ab907000 ffff8880ab907b40 000000010000000b raw: ffffea0002aea020 ffffea0002ab5aa0 ffff88813fe607c0 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8880ab906f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8880ab906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff8880ab907000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8880ab907080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8880ab907100: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 ==================================================================