================================================================== BUG: KASAN: use-after-free in hci_uart_write_work+0x4ad/0x7b0 drivers/bluetooth/hci_ldisc.c:165 Read of size 8 at addr ffff88811b41a868 by task kworker/0:1/19 CPU: 0 PID: 19 Comm: kworker/0:1 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: events hci_uart_write_work Call Trace: __dump_stack+0x21/0x24 lib/dump_stack.c:88 dump_stack_lvl+0xee/0x150 lib/dump_stack.c:106 print_address_description+0x71/0x200 mm/kasan/report.c:316 print_report+0x4a/0x60 mm/kasan/report.c:420 kasan_report+0x122/0x150 mm/kasan/report.c:524 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:351 hci_uart_write_work+0x4ad/0x7b0 drivers/bluetooth/hci_ldisc.c:165 process_one_work+0x71f/0xc40 kernel/workqueue.c:2302 worker_thread+0xa29/0x11f0 kernel/workqueue.c:2449 kthread+0x281/0x320 kernel/kthread.c:386 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Allocated by task 1699: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 kasan_save_alloc_info+0x25/0x30 mm/kasan/generic.c:505 __kasan_slab_alloc+0x72/0x80 mm/kasan/common.c:333 kasan_slab_alloc include/linux/kasan.h:202 [inline] slab_post_alloc_hook+0x4f/0x2d0 mm/slab.h:768 slab_alloc_node mm/slub.c:3382 [inline] kmem_cache_alloc_node+0x181/0x340 mm/slub.c:3429 __alloc_skb+0xea/0x4b0 net/core/skbuff.c:508 alloc_skb include/linux/skbuff.h:1290 [inline] bt_skb_alloc include/net/bluetooth/bluetooth.h:473 [inline] hci_cmd_sync_alloc net/bluetooth/hci_sync.c:55 [inline] hci_cmd_sync_add net/bluetooth/hci_sync.c:96 [inline] __hci_cmd_sync_sk+0x1d1/0xcf0 net/bluetooth/hci_sync.c:158 __hci_cmd_sync_status_sk net/bluetooth/hci_sync.c:253 [inline] __hci_cmd_sync_status net/bluetooth/hci_sync.c:277 [inline] hci_read_local_features_sync net/bluetooth/hci_sync.c:3621 [inline] hci_init_stage_sync net/bluetooth/hci_sync.c:3532 [inline] hci_init1_sync net/bluetooth/hci_sync.c:3716 [inline] hci_init_sync net/bluetooth/hci_sync.c:4798 [inline] hci_dev_init_sync net/bluetooth/hci_sync.c:4989 [inline] hci_dev_open_sync+0x13a7/0x3260 net/bluetooth/hci_sync.c:5069 hci_dev_do_open net/bluetooth/hci_core.c:439 [inline] hci_power_on+0x195/0x5c0 net/bluetooth/hci_core.c:945 process_one_work+0x71f/0xc40 kernel/workqueue.c:2302 worker_thread+0xa29/0x11f0 kernel/workqueue.c:2449 kthread+0x281/0x320 kernel/kthread.c:386 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 The buggy address belongs to the object at ffff88811b41a780 which belongs to the cache skbuff_head_cache of size 256 The buggy address is located 232 bytes inside of 256-byte region [ffff88811b41a780, ffff88811b41a880) The buggy address belongs to the physical page: page:ffffea00046d0680 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11b41a flags: 0x4000000000000200(slab|zone=1) raw: 4000000000000200 ffffea0004e2f280 dead000000000004 ffff8881002b0000 raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_HARDWALL), pid 25427, tgid 25423 (syz.1.8036), ts 1401078418030, free_ts 1401051215145 set_page_owner include/linux/page_owner.h:33 [inline] post_alloc_hook+0x1f5/0x210 mm/page_alloc.c:2643 prep_new_page+0x1c/0x110 mm/page_alloc.c:2650 get_page_from_freelist+0x2c7b/0x2cf0 mm/page_alloc.c:4554 __alloc_pages+0x1c3/0x450 mm/page_alloc.c:5868 alloc_slab_page+0x6e/0xf0 include/linux/gfp.h:-1 allocate_slab mm/slub.c:1967 [inline] new_slab+0x98/0x3d0 mm/slub.c:2020 ___slab_alloc+0x6bd/0xb20 mm/slub.c:3177 __slab_alloc+0x5e/0xa0 mm/slub.c:3263 slab_alloc_node mm/slub.c:3348 [inline] kmem_cache_alloc_node+0x1c2/0x340 mm/slub.c:3429 __alloc_skb+0xea/0x4b0 net/core/skbuff.c:508 __pskb_copy_fclone+0xa7/0xeb0 net/core/skbuff.c:1774 __pskb_copy include/linux/skbuff.h:1354 [inline] tipc_msg_reassemble+0x12e/0x440 net/tipc/msg.c:775 tipc_mcast_xmit+0x1c6/0x1720 net/tipc/bcast.c:392 tipc_send_group_bcast+0x759/0xa40 net/tipc/socket.c:1133 __tipc_sendmsg+0x309/0x2680 net/tipc/socket.c:1436 tipc_sendmsg+0x55/0x70 net/tipc/socket.c:1403 page last free stack trace: reset_page_owner include/linux/page_owner.h:26 [inline] free_pages_prepare mm/page_alloc.c:1551 [inline] free_pcp_prepare mm/page_alloc.c:1625 [inline] free_unref_page_prepare+0x742/0x750 mm/page_alloc.c:3589 free_unref_page+0x8f/0x530 mm/page_alloc.c:3687 free_the_page mm/page_alloc.c:836 [inline] __free_pages+0x67/0x100 mm/page_alloc.c:5957 pcpu_free_pages mm/percpu-vm.c:65 [inline] pcpu_depopulate_chunk+0x4b4/0x580 mm/percpu-vm.c:330 pcpu_reclaim_populated mm/percpu.c:2193 [inline] pcpu_balance_workfn+0x296/0x1010 mm/percpu.c:2245 process_one_work+0x71f/0xc40 kernel/workqueue.c:2302 worker_thread+0xa29/0x11f0 kernel/workqueue.c:2449 kthread+0x281/0x320 kernel/kthread.c:386 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Memory state around the buggy address: ffff88811b41a700: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ffff88811b41a780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff88811b41a800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88811b41a880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb ffff88811b41a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================