==================================================================
BUG: KASAN: use-after-free in hci_uart_write_work+0x3df/0x6e0 drivers/bluetooth/hci_ldisc.c:165
Read of size 8 at addr ffff88810f776ae0 by task kworker/1:0/20
CPU: 1 PID: 20 Comm: kworker/1:0 Tainted: G W syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: events hci_uart_write_work
Call Trace:
__dump_stack+0x21/0x24 lib/dump_stack.c:77
dump_stack_lvl+0x1a7/0x208 lib/dump_stack.c:118
print_address_description+0x7f/0x2c0 mm/kasan/report.c:248
__kasan_report mm/kasan/report.c:435 [inline]
kasan_report+0xe2/0x130 mm/kasan/report.c:452
__asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:309
hci_uart_write_work+0x3df/0x6e0 drivers/bluetooth/hci_ldisc.c:165
process_one_work+0x6e1/0xba0 kernel/workqueue.c:2301
worker_thread+0xa6a/0x13c0 kernel/workqueue.c:2447
kthread+0x346/0x3d0 kernel/kthread.c:313
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
Allocated by task 662:
kasan_save_stack mm/kasan/common.c:38 [inline]
kasan_set_track mm/kasan/common.c:45 [inline]
set_alloc_info mm/kasan/common.c:430 [inline]
__kasan_slab_alloc+0xbd/0xf0 mm/kasan/common.c:463
kasan_slab_alloc include/linux/kasan.h:244 [inline]
slab_post_alloc_hook+0x5d/0x2f0 mm/slab.h:580
slab_alloc_node mm/slub.c:2952 [inline]
slab_alloc mm/slub.c:2960 [inline]
kmem_cache_alloc+0x162/0x2d0 mm/slub.c:2965
kmem_cache_alloc_node include/linux/slab.h:426 [inline]
__alloc_skb+0x9e/0x520 net/core/skbuff.c:200
alloc_skb include/linux/skbuff.h:1126 [inline]
bt_skb_alloc include/net/bluetooth/bluetooth.h:391 [inline]
hci_prepare_cmd net/bluetooth/hci_request.c:298 [inline]
hci_req_add_ev+0x98/0x3c0 net/bluetooth/hci_request.c:332
hci_req_add+0x30/0x40 net/bluetooth/hci_request.c:351
bredr_init net/bluetooth/hci_core.c:202 [inline]
hci_init1_req+0x13c/0x280 net/bluetooth/hci_core.c:258
__hci_req_sync+0x14b/0x7f0 net/bluetooth/hci_request.c:207
__hci_init+0x2f/0x3b0 net/bluetooth/hci_core.c:907
hci_dev_do_open+0xa61/0x1150 net/bluetooth/hci_core.c:1573
hci_power_on+0x1b5/0x5b0 net/bluetooth/hci_core.c:2253
process_one_work+0x6e1/0xba0 kernel/workqueue.c:2301
worker_thread+0xa6a/0x13c0 kernel/workqueue.c:2447
kthread+0x346/0x3d0 kernel/kthread.c:313
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
Freed by task 989:
kasan_save_stack mm/kasan/common.c:38 [inline]
kasan_set_track+0x4a/0x70 mm/kasan/common.c:45
kasan_set_free_info+0x23/0x40 mm/kasan/generic.c:370
____kasan_slab_free+0x125/0x160 mm/kasan/common.c:362
__kasan_slab_free+0x11/0x20 mm/kasan/common.c:370
kasan_slab_free include/linux/kasan.h:220 [inline]
slab_free_hook mm/slub.c:1600 [inline]
slab_free_freelist_hook+0xc5/0x190 mm/slub.c:1626
slab_free mm/slub.c:3208 [inline]
kmem_cache_free+0x100/0x2d0 mm/slub.c:3224
kfree_skbmem+0x10c/0x180 net/core/skbuff.c:-1
__kfree_skb net/core/skbuff.c:695 [inline]
kfree_skb+0xc1/0x2f0 net/core/skbuff.c:713
hci_uart_flush+0x95/0x320 drivers/bluetooth/hci_ldisc.c:235
hci_uart_close drivers/bluetooth/hci_ldisc.c:268 [inline]
hci_uart_tty_close+0x7a/0x220 drivers/bluetooth/hci_ldisc.c:539
tty_ldisc_close drivers/tty/tty_ldisc.c:489 [inline]
tty_ldisc_kill+0x101/0x220 drivers/tty/tty_ldisc.c:637
tty_ldisc_hangup+0x3df/0x4f0 drivers/tty/tty_ldisc.c:756
__tty_hangup+0x60d/0x870 drivers/tty/tty_io.c:625
tty_vhangup drivers/tty/tty_io.c:698 [inline]
tty_ioctl+0x4d1/0xc60 drivers/tty/tty_io.c:2689
vfs_ioctl fs/ioctl.c:48 [inline]
__do_sys_ioctl fs/ioctl.c:753 [inline]
__se_sys_ioctl+0x121/0x1a0 fs/ioctl.c:739
__x64_sys_ioctl+0x7b/0x90 fs/ioctl.c:739
do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
entry_SYSCALL_64_after_hwframe+0x61/0xcb
The buggy address belongs to the object at ffff88810f776a00
which belongs to the cache skbuff_head_cache of size 248
The buggy address is located 224 bytes inside of
248-byte region [ffff88810f776a00, ffff88810f776af8)
The buggy address belongs to the page:
page:ffffea00043ddd80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10f776
flags: 0x4000000000000200(slab)
raw: 4000000000000200 dead000000000100 dead000000000122 ffff888107d92780
raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 103, ts 5390859150, free_ts 5390535512
set_page_owner include/linux/page_owner.h:35 [inline]
post_alloc_hook mm/page_alloc.c:2456 [inline]
prep_new_page+0x179/0x180 mm/page_alloc.c:2462
get_page_from_freelist+0x223b/0x23d0 mm/page_alloc.c:4254
__alloc_pages_nodemask+0x290/0x620 mm/page_alloc.c:5370
alloc_slab_page mm/slub.c:-1 [inline]
allocate_slab mm/slub.c:1813 [inline]
new_slab+0x84/0x3f0 mm/slub.c:1874
new_slab_objects mm/slub.c:2632 [inline]
___slab_alloc+0x2a6/0x450 mm/slub.c:2796
__slab_alloc+0x63/0xa0 mm/slub.c:2836
slab_alloc_node mm/slub.c:2918 [inline]
slab_alloc mm/slub.c:2960 [inline]
kmem_cache_alloc+0x1ac/0x2d0 mm/slub.c:2965
kmem_cache_alloc_node include/linux/slab.h:426 [inline]
__alloc_skb+0x9e/0x520 net/core/skbuff.c:200
alloc_skb include/linux/skbuff.h:1126 [inline]
netlink_alloc_large_skb net/netlink/af_netlink.c:1178 [inline]
netlink_sendmsg+0x605/0xb50 net/netlink/af_netlink.c:1889
sock_sendmsg_nosec net/socket.c:652 [inline]
__sock_sendmsg net/socket.c:664 [inline]
____sys_sendmsg+0x5b7/0x8f0 net/socket.c:2376
___sys_sendmsg+0x236/0x2e0 net/socket.c:2430
__sys_sendmsg net/socket.c:2459 [inline]
__do_sys_sendmsg net/socket.c:2468 [inline]
__se_sys_sendmsg net/socket.c:2466 [inline]
__x64_sys_sendmsg+0x1f9/0x2c0 net/socket.c:2466
do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
entry_SYSCALL_64_after_hwframe+0x61/0xcb
page last free stack trace:
reset_page_owner include/linux/page_owner.h:28 [inline]
free_pages_prepare mm/page_alloc.c:1349 [inline]
free_pcp_prepare mm/page_alloc.c:1421 [inline]
free_unref_page_prepare+0x2b7/0x2d0 mm/page_alloc.c:3336
free_unref_page mm/page_alloc.c:3391 [inline]
free_the_page mm/page_alloc.c:5429 [inline]
__free_pages+0x146/0x3b0 mm/page_alloc.c:5440
free_pages+0x82/0x90 mm/page_alloc.c:5451
selinux_genfs_get_sid+0x20b/0x250 security/selinux/hooks.c:1332
inode_doinit_with_dentry+0x879/0xd70 security/selinux/hooks.c:1529
selinux_d_instantiate+0x27/0x40 security/selinux/hooks.c:6395
security_d_instantiate+0x9e/0xf0 security/security.c:1980
d_splice_alias+0x6d/0x390 fs/dcache.c:3038
kernfs_iop_lookup+0x2c5/0x310 fs/kernfs/dir.c:1178
lookup_open fs/namei.c:3234 [inline]
open_last_lookups fs/namei.c:3325 [inline]
path_openat+0x1140/0x31c0 fs/namei.c:3514
do_filp_open+0x1e2/0x410 fs/namei.c:3544
do_sys_openat2+0x19f/0x750 fs/open.c:1219
do_sys_open fs/open.c:1235 [inline]
__do_sys_openat fs/open.c:1251 [inline]
__se_sys_openat fs/open.c:1246 [inline]
__x64_sys_openat+0x136/0x160 fs/open.c:1246
do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
entry_SYSCALL_64_after_hwframe+0x61/0xcb
Memory state around the buggy address:
ffff88810f776980: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
ffff88810f776a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff88810f776a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc
^
ffff88810f776b00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
ffff88810f776b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
usb 4-1: reset full-speed USB device number 4 using dummy_hcd
usb 4-1: device descriptor read/64, error -32
usb 4-1: device descriptor read/64, error -32
usb 4-1: reset full-speed USB device number 4 using dummy_hcd
usb 4-1: device descriptor read/64, error -32
usb 4-1: device descriptor read/64, error -32
usb 4-1: reset full-speed USB device number 4 using dummy_hcd
usb 4-1: device descriptor read/8, error -32
usb 4-1: device descriptor read/8, error -32
usb 4-1: reset full-speed USB device number 4 using dummy_hcd
usb 4-1: device descriptor read/8, error -32
usb 4-1: device descriptor read/8, error -32