general protection fault, probably for non-canonical address 0xe01ffbffffffffe1: 0000 [#1] PREEMPT SMP KASAN KASAN: maybe wild-memory-access in range [0x00ffffffffffff08-0x00ffffffffffff0f] CPU: 0 PID: 3637 Comm: kworker/u5:7 Not tainted 5.16.0-rc4-next-20211210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: hci2 hci_rx_work RIP: 0010:hci_inquiry_result_with_rssi_evt+0xbc/0x970 net/bluetooth/hci_event.c:4520 Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 88 07 00 00 48 8b 04 24 4c 8b 28 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 4c 89 ea 83 e2 07 38 d0 7f 08 84 c0 0f 85 1b 07 00 00 RSP: 0018:ffffc90002a3fad0 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffff888074718000 RCX: 0000000000000000 RDX: 001fffffffffffe1 RSI: ffffffff8835a7e8 RDI: ffff888074718000 RBP: ffff888074718000 R08: 0000000000000078 R09: 0000000000000000 R10: ffffffff88378e67 R11: 0000000000000000 R12: ffff88823bd76f00 R13: 00ffffffffffff08 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000000 CR3: 0000000022f4f000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: hci_event_func net/bluetooth/hci_event.c:6812 [inline] hci_event_packet+0x817/0xe90 net/bluetooth/hci_event.c:6860 hci_rx_work+0x4fa/0xd30 net/bluetooth/hci_core.c:3817 process_one_work+0x9ac/0x1680 kernel/workqueue.c:2307 worker_thread+0x652/0x11c0 kernel/workqueue.c:2454 kthread+0x405/0x4f0 kernel/kthread.c:345 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: ---[ end trace fec35e3717dafaee ]--- RIP: 0010:hci_inquiry_result_with_rssi_evt+0xbc/0x970 net/bluetooth/hci_event.c:4520 Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 88 07 00 00 48 8b 04 24 4c 8b 28 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 4c 89 ea 83 e2 07 38 d0 7f 08 84 c0 0f 85 1b 07 00 00 RSP: 0018:ffffc90002a3fad0 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffff888074718000 RCX: 0000000000000000 RDX: 001fffffffffffe1 RSI: ffffffff8835a7e8 RDI: ffff888074718000 RBP: ffff888074718000 R08: 0000000000000078 R09: 0000000000000000 R10: ffffffff88378e67 R11: 0000000000000000 R12: ffff88823bd76f00 R13: 00ffffffffffff08 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000000 CR3: 000000006501f000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 4 bytes skipped: 0: 48 c1 ea 03 shr $0x3,%rdx 4: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 8: 0f 85 88 07 00 00 jne 0x796 e: 48 8b 04 24 mov (%rsp),%rax 12: 4c 8b 28 mov (%rax),%r13 15: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1c: fc ff df 1f: 4c 89 ea mov %r13,%rdx 22: 48 c1 ea 03 shr $0x3,%rdx * 26: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2a: 4c 89 ea mov %r13,%rdx 2d: 83 e2 07 and $0x7,%edx 30: 38 d0 cmp %dl,%al 32: 7f 08 jg 0x3c 34: 84 c0 test %al,%al 36: 0f 85 1b 07 00 00 jne 0x757