Bluetooth: hci0: command 0x0c1a tx timeout ================================================================== BUG: KASAN: use-after-free in __queue_work+0xc4f/0xf00 kernel/workqueue.c:1415 Read of size 4 at addr ffff88801fde89c0 by task kworker/1:5/9894 CPU: 1 PID: 9894 Comm: kworker/1:5 Not tainted 5.10.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events hci_cmd_timeout Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x163 lib/dump_stack.c:118 print_address_description.constprop.0.cold+0xae/0x497 mm/kasan/report.c:385 __kasan_report mm/kasan/report.c:545 [inline] kasan_report.cold+0x1f/0x37 mm/kasan/report.c:562 __queue_work+0xc4f/0xf00 kernel/workqueue.c:1415 queue_work_on+0xc7/0xd0 kernel/workqueue.c:1521 process_one_work+0x933/0x15a0 kernel/workqueue.c:2272 worker_thread+0x64c/0x1120 kernel/workqueue.c:2418 kthread+0x3af/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Allocated by task 33: kasan_save_stack+0x1b/0x40 mm/kasan/common.c:48 kasan_set_track mm/kasan/common.c:56 [inline] __kasan_kmalloc.constprop.0+0xbf/0xd0 mm/kasan/common.c:461 __kmalloc_reserve net/core/skbuff.c:142 [inline] pskb_expand_head+0x15a/0x1040 net/core/skbuff.c:1622 netlink_trim+0x1ea/0x240 net/netlink/af_netlink.c:1286 netlink_broadcast_filtered+0x65/0xdc0 net/netlink/af_netlink.c:1491 netlink_broadcast+0x35/0x40 net/netlink/af_netlink.c:1536 nlmsg_multicast include/net/netlink.h:1033 [inline] kauditd_send_multicast_skb+0x376/0x3e0 kernel/audit.c:804 kauditd_send_queue+0x54/0x210 kernel/audit.c:729 kauditd_thread+0x7e7/0xb70 kernel/audit.c:860 kthread+0x3af/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Last call_rcu(): kasan_save_stack+0x1b/0x40 mm/kasan/common.c:48 kasan_record_aux_stack+0x82/0xb0 mm/kasan/generic.c:346 __call_rcu kernel/rcu/tree.c:2953 [inline] call_rcu+0xbb/0x700 kernel/rcu/tree.c:3027 pwq_unbound_release_workfn+0x23a/0x2d0 kernel/workqueue.c:3697 process_one_work+0x933/0x15a0 kernel/workqueue.c:2272 worker_thread+0x64c/0x1120 kernel/workqueue.c:2418 kthread+0x3af/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 The buggy address belongs to the object at ffff88801fde8800 which belongs to the cache kmalloc-1k of size 1024 The buggy address is located 448 bytes inside of 1024-byte region [ffff88801fde8800, ffff88801fde8c00) The buggy address belongs to the page: page:00000000137dfb7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1fde8 flags: 0xfff00000000200(slab) raw: 00fff00000000200 ffffea0000c55548 ffffea00009afd08 ffff888010040700 raw: 0000000000000000 ffff88801fde8000 0000000100000002 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88801fde8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88801fde8900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88801fde8980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff88801fde8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88801fde8a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================