* [PATCH] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() @ 2026-05-13 6:45 w15303746062 2026-05-13 7:54 ` bluez.test.bot 2026-05-13 9:04 ` [PATCH] " Paul Menzel 0 siblings, 2 replies; 7+ messages in thread From: w15303746062 @ 2026-05-13 6:45 UTC (permalink / raw) To: marcel, luiz.dentz Cc: linux-bluetooth, linux-serial, linux-kernel, Mingyu Wang From: Mingyu Wang <25181214217@stu.xidian.edu.cn> A Use-After-Free (UAF) vulnerability and a subsequent General Protection Fault (GPF) were observed in h5_recv() due to a race condition between the initialization of the HCI UART line discipline and concurrent TTY hangup via TIOCVHANGUP. The issue arises because the workqueues (init_ready and write_work) are only cancelled if the HCI_UART_PROTO_READY flag is set. However, during the protocol initialization phase (HCI_UART_PROTO_INIT), the underlying protocol (e.g., H5) may schedule work (such as sending sync/config packets). If a hangup occurs before the setup completes and the READY flag is set, hci_uart_tty_close() skips the cancel_work_sync() calls and proceeds to free the `hu` struct. When the delayed workqueue finally executes, it blindly dereferences the freed `hu` struct, causing ODEBUG warnings and kernel panics. Fix this by moving the cancel_work_sync() calls outside the HCI_UART_PROTO_READY check, ensuring that any pending works are unconditionally cancelled before the hci_uart structure is freed. Signed-off-by: Mingyu Wang <25181214217@stu.xidian.edu.cn> --- drivers/bluetooth/hci_ldisc.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/bluetooth/hci_ldisc.c b/drivers/bluetooth/hci_ldisc.c index 275ea865bc29..566e1c525ee2 100644 --- a/drivers/bluetooth/hci_ldisc.c +++ b/drivers/bluetooth/hci_ldisc.c @@ -544,14 +544,18 @@ static void hci_uart_tty_close(struct tty_struct *tty) if (hdev) hci_uart_close(hdev); + /* + * Always cancel workqueues unconditionally before freeing the hu + * struct, as they might be active during the PROTO_INIT phase. + */ + cancel_work_sync(&hu->init_ready); + cancel_work_sync(&hu->write_work); + if (test_bit(HCI_UART_PROTO_READY, &hu->flags)) { percpu_down_write(&hu->proto_lock); clear_bit(HCI_UART_PROTO_READY, &hu->flags); percpu_up_write(&hu->proto_lock); - cancel_work_sync(&hu->init_ready); - cancel_work_sync(&hu->write_work); - if (hdev) { if (test_bit(HCI_UART_REGISTERED, &hu->flags)) hci_unregister_dev(hdev); -- 2.34.1 ^ permalink raw reply related [flat|nested] 7+ messages in thread
* RE: Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() 2026-05-13 6:45 [PATCH] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() w15303746062 @ 2026-05-13 7:54 ` bluez.test.bot 2026-05-13 9:04 ` [PATCH] " Paul Menzel 1 sibling, 0 replies; 7+ messages in thread From: bluez.test.bot @ 2026-05-13 7:54 UTC (permalink / raw) To: linux-bluetooth, w15303746062 [-- Attachment #1: Type: text/plain, Size: 882 bytes --] This is automated email and please do not reply to this email! Dear submitter, Thank you for submitting the patches to the linux bluetooth mailing list. This is a CI test results with your patch series: PW Link:https://patchwork.kernel.org/project/bluetooth/list/?series=1093952 ---Test result--- Test Summary: CheckPatch PASS 1.64 seconds GitLint PASS 0.35 seconds SubjectPrefix PASS 0.13 seconds BuildKernel PASS 24.81 seconds CheckAllWarning PASS 27.31 seconds CheckSparse PASS 26.18 seconds BuildKernel32 PASS 28.14 seconds TestRunnerSetup PASS 519.12 seconds IncrementalBuild PASS 24.50 seconds https://github.com/bluez/bluetooth-next/pull/182 --- Regards, Linux Bluetooth ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() 2026-05-13 6:45 [PATCH] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() w15303746062 2026-05-13 7:54 ` bluez.test.bot @ 2026-05-13 9:04 ` Paul Menzel 2026-05-14 15:17 ` [PATCH v2] " w15303746062 2026-05-15 6:50 ` [PATCH v3] " w15303746062 1 sibling, 2 replies; 7+ messages in thread From: Paul Menzel @ 2026-05-13 9:04 UTC (permalink / raw) To: Mingyu Wang, Mingyu Wang Cc: marcel, luiz.dentz, linux-bluetooth, linux-serial, linux-kernel Dear Mingyu, Thank you for the patch, and your work on the Linux kernel. Am 13.05.26 um 08:45 schrieb w15303746062@163.com: > From: Mingyu Wang <25181214217@stu.xidian.edu.cn> > > A Use-After-Free (UAF) vulnerability and a subsequent General Protection > Fault (GPF) were observed in h5_recv() due to a race condition between > the initialization of the HCI UART line discipline and concurrent TTY > hangup via TIOCVHANGUP. Please elaborate, in what setup it was observed, and please add an excerpt of the trace. > The issue arises because the workqueues (init_ready and write_work) are > only cancelled if the HCI_UART_PROTO_READY flag is set. However, during > the protocol initialization phase (HCI_UART_PROTO_INIT), the underlying > protocol (e.g., H5) may schedule work (such as sending sync/config > packets). If a hangup occurs before the setup completes and the READY > flag is set, hci_uart_tty_close() skips the cancel_work_sync() calls > and proceeds to free the `hu` struct. > > When the delayed workqueue finally executes, it blindly dereferences > the freed `hu` struct, causing ODEBUG warnings and kernel panics. > > Fix this by moving the cancel_work_sync() calls outside the > HCI_UART_PROTO_READY check, ensuring that any pending works are > unconditionally cancelled before the hci_uart structure is freed. Please add a Fixes: tag, so it gets backported. Also, please add a Link: tag with a URL to the test case, or include it in the commit message. > Signed-off-by: Mingyu Wang <25181214217@stu.xidian.edu.cn> > --- > drivers/bluetooth/hci_ldisc.c | 10 +++++++--- > 1 file changed, 7 insertions(+), 3 deletions(-) > > diff --git a/drivers/bluetooth/hci_ldisc.c b/drivers/bluetooth/hci_ldisc.c > index 275ea865bc29..566e1c525ee2 100644 > --- a/drivers/bluetooth/hci_ldisc.c > +++ b/drivers/bluetooth/hci_ldisc.c > @@ -544,14 +544,18 @@ static void hci_uart_tty_close(struct tty_struct *tty) > if (hdev) > hci_uart_close(hdev); > > + /* > + * Always cancel workqueues unconditionally before freeing the hu > + * struct, as they might be active during the PROTO_INIT phase. > + */ > + cancel_work_sync(&hu->init_ready); > + cancel_work_sync(&hu->write_work); > + > if (test_bit(HCI_UART_PROTO_READY, &hu->flags)) { > percpu_down_write(&hu->proto_lock); > clear_bit(HCI_UART_PROTO_READY, &hu->flags); > percpu_up_write(&hu->proto_lock); > > - cancel_work_sync(&hu->init_ready); > - cancel_work_sync(&hu->write_work); > - > if (hdev) { > if (test_bit(HCI_UART_REGISTERED, &hu->flags)) > hci_unregister_dev(hdev); Kind regards, Paul PS: If you resend, and don’t know yet (you have commits in the Linux kernel already), please add v2 to the tag. (`git format-patch -2 …` or an equivalent option to your tooling. PPS: sashiko.dev did not pick this patch up yet [1]. [1]: https://sashiko.dev/#/?list=org.kernel.vger.linux-bluetooth ^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH v2] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() 2026-05-13 9:04 ` [PATCH] " Paul Menzel @ 2026-05-14 15:17 ` w15303746062 2026-05-14 17:00 ` [v2] " bluez.test.bot 2026-05-15 6:10 ` [PATCH v2] " Greg KH 2026-05-15 6:50 ` [PATCH v3] " w15303746062 1 sibling, 2 replies; 7+ messages in thread From: w15303746062 @ 2026-05-14 15:17 UTC (permalink / raw) To: pmenzel, marcel, luiz.dentz, linux-bluetooth Cc: linux-serial, linux-kernel, Mingyu Wang From: Mingyu Wang <25181214217@stu.xidian.edu.cn> A Use-After-Free (UAF) vulnerability and a subsequent kernel panic were observed in hci_uart_write_work() due to a race condition between the initialization of the HCI UART line discipline and concurrent TTY hangup. This issue was triggered by our custom device emulation and fuzzing framework (DevGen) on the v6.18 kernel. Due to the highly timing-dependent nature of this race condition (requiring a precise interleaving of TIOCVHANGUP and protocol setup), Syzkaller failed to extract a reliable standalone C reproducer (reproducer is too unreliable: 0.00). The crash trace is as follows: ODEBUG: free active (active state 0) object: ffff88804024e870 object type: work_struct hint: hci_uart_write_work+0x0/0x940 WARNING: CPU: 0 PID: 338273 at lib/debugobjects.c:612 debug_print_object+0x1a2/0x2b0 ... Call Trace: <TASK> debug_check_no_obj_freed+0x3ec/0x520 kfree+0x3f0/0x6c0 hci_uart_tty_close+0x127/0x2a0 tty_ldisc_close+0x113/0x1a0 tty_ldisc_kill+0x8e/0x150 tty_ldisc_hangup+0x3c1/0x730 __tty_hangup.part.0+0x3fd/0x8a0 tty_ioctl+0x120f/0x1690 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xcb/0xfa0 entry_SYSCALL_64_after_hwframe+0x77/0x7f </TASK> The issue arises because the workqueues (init_ready and write_work) are only cancelled if the HCI_UART_PROTO_READY flag is set. However, during the protocol initialization phase (HCI_UART_PROTO_INIT), the underlying protocol may schedule work. If a hangup occurs before the setup completes and the READY flag is set, hci_uart_tty_close() skips the cancel_work_sync() calls and proceeds to free the `hu` struct. When the delayed workqueue executes, it blindly dereferences the freed `hu` struct. Fix this by moving the cancel_work_sync() calls outside the HCI_UART_PROTO_READY check, ensuring that any pending works are unconditionally cancelled before the hci_uart structure is freed. Note that hu->init_ready and hu->write_work are initialized in hci_uart_tty_open(), so it is always safe to call cancel_work_sync() on them in hci_uart_tty_close(), even if the protocol was never fully attached. Fixes: 3b799254cf6f ("Bluetooth: hci_uart: Cancel init work before unregistering") Signed-off-by: Mingyu Wang <25181214217@stu.xidian.edu.cn> --- Changes in v2: - Added KASAN/ODEBUG crash trace. - Added explanation for the absence of a standalone reproducer (highly timing-dependent race condition). - Added Fixes tag pointing to commit 3b799254cf6f. drivers/bluetooth/hci_ldisc.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/bluetooth/hci_ldisc.c b/drivers/bluetooth/hci_ldisc.c index 275ea865bc29..566e1c525ee2 100644 --- a/drivers/bluetooth/hci_ldisc.c +++ b/drivers/bluetooth/hci_ldisc.c @@ -544,14 +544,18 @@ static void hci_uart_tty_close(struct tty_struct *tty) if (hdev) hci_uart_close(hdev); + /* + * Always cancel workqueues unconditionally before freeing the hu + * struct, as they might be active during the PROTO_INIT phase. + */ + cancel_work_sync(&hu->init_ready); + cancel_work_sync(&hu->write_work); + if (test_bit(HCI_UART_PROTO_READY, &hu->flags)) { percpu_down_write(&hu->proto_lock); clear_bit(HCI_UART_PROTO_READY, &hu->flags); percpu_up_write(&hu->proto_lock); - cancel_work_sync(&hu->init_ready); - cancel_work_sync(&hu->write_work); - if (hdev) { if (test_bit(HCI_UART_REGISTERED, &hu->flags)) hci_unregister_dev(hdev); -- 2.34.1 ^ permalink raw reply related [flat|nested] 7+ messages in thread
* RE: [v2] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() 2026-05-14 15:17 ` [PATCH v2] " w15303746062 @ 2026-05-14 17:00 ` bluez.test.bot 2026-05-15 6:10 ` [PATCH v2] " Greg KH 1 sibling, 0 replies; 7+ messages in thread From: bluez.test.bot @ 2026-05-14 17:00 UTC (permalink / raw) To: linux-bluetooth, w15303746062 [-- Attachment #1: Type: text/plain, Size: 2645 bytes --] This is automated email and please do not reply to this email! Dear submitter, Thank you for submitting the patches to the linux bluetooth mailing list. This is a CI test results with your patch series: PW Link:https://patchwork.kernel.org/project/bluetooth/list/?series=1094870 ---Test result--- Test Summary: CheckPatch FAIL 0.64 seconds GitLint FAIL 0.27 seconds SubjectPrefix PASS 0.10 seconds BuildKernel PASS 26.17 seconds CheckAllWarning PASS 28.47 seconds CheckSparse PASS 27.00 seconds BuildKernel32 PASS 24.99 seconds TestRunnerSetup PASS 556.38 seconds IncrementalBuild PASS 24.51 seconds Details ############################## Test: CheckPatch - FAIL Desc: Run checkpatch.pl script Output: [v2] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() WARNING: Prefer a maximum 75 chars per line (possible unwrapped commit description?) #85: ODEBUG: free active (active state 0) object: ffff88804024e870 object type: work_struct hint: hci_uart_write_work+0x0/0x940 total: 0 errors, 1 warnings, 21 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. /github/workspace/src/patch/14573255.patch has style problems, please review. NOTE: Ignored message types: UNKNOWN_COMMIT_ID NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. ############################## Test: GitLint - FAIL Desc: Run gitlint Output: [v2] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() WARNING: I3 - ignore-body-lines: gitlint will be switching from using Python regex 'match' (match beginning) to 'search' (match anywhere) semantics. Please review your ignore-body-lines.regex option accordingly. To remove this warning, set general.regex-style-search=True. More details: https://jorisroovers.github.io/gitlint/configuration/#regex-style-search 16: B1 Line exceeds max length (124>80): " ODEBUG: free active (active state 0) object: ffff88804024e870 object type: work_struct hint: hci_uart_write_work+0x0/0x940" 17: B1 Line exceeds max length (86>80): " WARNING: CPU: 0 PID: 338273 at lib/debugobjects.c:612 debug_print_object+0x1a2/0x2b0" 55: B1 Line exceeds max length (104>80): "- Added explanation for the absence of a standalone reproducer (highly timing-dependent race condition)." https://github.com/bluez/bluetooth-next/pull/190 --- Regards, Linux Bluetooth ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH v2] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() 2026-05-14 15:17 ` [PATCH v2] " w15303746062 2026-05-14 17:00 ` [v2] " bluez.test.bot @ 2026-05-15 6:10 ` Greg KH 1 sibling, 0 replies; 7+ messages in thread From: Greg KH @ 2026-05-15 6:10 UTC (permalink / raw) To: w15303746062 Cc: pmenzel, marcel, luiz.dentz, linux-bluetooth, linux-serial, linux-kernel, Mingyu Wang On Thu, May 14, 2026 at 11:17:22PM +0800, w15303746062@163.com wrote: > From: Mingyu Wang <25181214217@stu.xidian.edu.cn> > > A Use-After-Free (UAF) vulnerability and a subsequent kernel panic were > observed in hci_uart_write_work() due to a race condition between the > initialization of the HCI UART line discipline and concurrent TTY hangup. > > This issue was triggered by our custom device emulation and fuzzing > framework (DevGen) on the v6.18 kernel. Due to the highly timing-dependent > nature of this race condition (requiring a precise interleaving of > TIOCVHANGUP and protocol setup), Syzkaller failed to extract a reliable > standalone C reproducer (reproducer is too unreliable: 0.00). > > The crash trace is as follows: > ODEBUG: free active (active state 0) object: ffff88804024e870 object type: work_struct hint: hci_uart_write_work+0x0/0x940 > WARNING: CPU: 0 PID: 338273 at lib/debugobjects.c:612 debug_print_object+0x1a2/0x2b0 > ... > Call Trace: > <TASK> > debug_check_no_obj_freed+0x3ec/0x520 > kfree+0x3f0/0x6c0 > hci_uart_tty_close+0x127/0x2a0 > tty_ldisc_close+0x113/0x1a0 > tty_ldisc_kill+0x8e/0x150 > tty_ldisc_hangup+0x3c1/0x730 > __tty_hangup.part.0+0x3fd/0x8a0 > tty_ioctl+0x120f/0x1690 > __x64_sys_ioctl+0x18f/0x210 > do_syscall_64+0xcb/0xfa0 > entry_SYSCALL_64_after_hwframe+0x77/0x7f > </TASK> > > The issue arises because the workqueues (init_ready and write_work) are > only cancelled if the HCI_UART_PROTO_READY flag is set. However, during > the protocol initialization phase (HCI_UART_PROTO_INIT), the underlying > protocol may schedule work. If a hangup occurs before the setup completes > and the READY flag is set, hci_uart_tty_close() skips the cancel_work_sync() > calls and proceeds to free the `hu` struct. When the delayed workqueue > executes, it blindly dereferences the freed `hu` struct. > > Fix this by moving the cancel_work_sync() calls outside the > HCI_UART_PROTO_READY check, ensuring that any pending works are > unconditionally cancelled before the hci_uart structure is freed. > Note that hu->init_ready and hu->write_work are initialized in > hci_uart_tty_open(), so it is always safe to call cancel_work_sync() > on them in hci_uart_tty_close(), even if the protocol was never > fully attached. > > Fixes: 3b799254cf6f ("Bluetooth: hci_uart: Cancel init work before unregistering") > > Signed-off-by: Mingyu Wang <25181214217@stu.xidian.edu.cn> > --- > Changes in v2: > - Added KASAN/ODEBUG crash trace. > - Added explanation for the absence of a standalone reproducer (highly timing-dependent race condition). > - Added Fixes tag pointing to commit 3b799254cf6f. > > drivers/bluetooth/hci_ldisc.c | 10 +++++++--- > 1 file changed, 7 insertions(+), 3 deletions(-) > > diff --git a/drivers/bluetooth/hci_ldisc.c b/drivers/bluetooth/hci_ldisc.c > index 275ea865bc29..566e1c525ee2 100644 > --- a/drivers/bluetooth/hci_ldisc.c > +++ b/drivers/bluetooth/hci_ldisc.c > @@ -544,14 +544,18 @@ static void hci_uart_tty_close(struct tty_struct *tty) > if (hdev) > hci_uart_close(hdev); > > + /* > + * Always cancel workqueues unconditionally before freeing the hu > + * struct, as they might be active during the PROTO_INIT phase. > + */ > + cancel_work_sync(&hu->init_ready); > + cancel_work_sync(&hu->write_work); > + > if (test_bit(HCI_UART_PROTO_READY, &hu->flags)) { > percpu_down_write(&hu->proto_lock); > clear_bit(HCI_UART_PROTO_READY, &hu->flags); > percpu_up_write(&hu->proto_lock); > > - cancel_work_sync(&hu->init_ready); > - cancel_work_sync(&hu->write_work); > - > if (hdev) { > if (test_bit(HCI_UART_REGISTERED, &hu->flags)) > hci_unregister_dev(hdev); > -- > 2.34.1 > > Hi, This is the friendly patch-bot of Greg Kroah-Hartman. You have sent him a patch that has triggered this response. He used to manually respond to these common problems, but in order to save his sanity (he kept writing the same thing over and over, yet to different people), I was created. Hopefully you will not take offence and will fix the problem in your patch and resubmit it so that it can be accepted into the Linux kernel tree. You are receiving this message because of the following common error(s) as indicated below: - You have marked a patch with a "Fixes:" tag for a commit that is in an older released kernel, yet you do not have a cc: stable line in the signed-off-by area at all, which means that the patch will not be applied to any older kernel releases. To properly fix this, please follow the documented rules in the Documentation/process/stable-kernel-rules.rst file for how to resolve this. If you wish to discuss this problem further, or you have questions about how to resolve this issue, please feel free to respond to this email and Greg will reply once he has dug out from the pending patches received from other developers. thanks, greg k-h's patch email bot ^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH v3] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() 2026-05-13 9:04 ` [PATCH] " Paul Menzel 2026-05-14 15:17 ` [PATCH v2] " w15303746062 @ 2026-05-15 6:50 ` w15303746062 1 sibling, 0 replies; 7+ messages in thread From: w15303746062 @ 2026-05-15 6:50 UTC (permalink / raw) To: pmenzel, marcel, luiz.dentz, linux-bluetooth Cc: linux-serial, linux-kernel, greg, stable, Mingyu Wang From: Mingyu Wang <25181214217@stu.xidian.edu.cn> A Use-After-Free (UAF) vulnerability and a subsequent kernel panic were observed in hci_uart_write_work() due to a race condition between the initialization of the HCI UART line discipline and concurrent TTY hangup. This issue was triggered by our custom device emulation and fuzzing framework (DevGen) on the v6.18 kernel. Due to the highly timing-dependent nature of this race condition (requiring a precise interleaving of TIOCVHANGUP and protocol setup), Syzkaller failed to extract a reliable standalone C reproducer (reproducer is too unreliable: 0.00). The crash trace is as follows: ODEBUG: free active (active state 0) object: ffff88804024e870 object type: work_struct hint: hci_uart_write_work+0x0/0x940 WARNING: CPU: 0 PID: 338273 at lib/debugobjects.c:612 debug_print_object+0x1a2/0x2b0 ... Call Trace: <TASK> debug_check_no_obj_freed+0x3ec/0x520 kfree+0x3f0/0x6c0 hci_uart_tty_close+0x127/0x2a0 tty_ldisc_close+0x113/0x1a0 tty_ldisc_kill+0x8e/0x150 tty_ldisc_hangup+0x3c1/0x730 __tty_hangup.part.0+0x3fd/0x8a0 tty_ioctl+0x120f/0x1690 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xcb/0xfa0 entry_SYSCALL_64_after_hwframe+0x77/0x7f </TASK> The issue arises because the workqueues (init_ready and write_work) are only cancelled if the HCI_UART_PROTO_READY flag is set. However, during the protocol initialization phase (HCI_UART_PROTO_INIT), the underlying protocol may schedule work. If a hangup occurs before the setup completes and the READY flag is set, hci_uart_tty_close() skips the cancel_work_sync() calls and proceeds to free the `hu` struct. When the delayed workqueue executes, it blindly dereferences the freed `hu` struct. Fix this by moving the cancel_work_sync() calls outside the HCI_UART_PROTO_READY check, ensuring that any pending works are unconditionally cancelled before the hci_uart structure is freed. Note that hu->init_ready and hu->write_work are initialized in hci_uart_tty_open(), so it is always safe to call cancel_work_sync() on them in hci_uart_tty_close(), even if the protocol was never fully attached. Fixes: 3b799254cf6f ("Bluetooth: hci_uart: Cancel init work before unregistering") Cc: stable@vger.kernel.org Signed-off-by: Mingyu Wang <25181214217@stu.xidian.edu.cn> --- Changes in v3: - Added 'Cc: stable' tag as requested by the stable bot. Changes in v2: - Added KASAN/ODEBUG crash trace. drivers/bluetooth/hci_ldisc.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/bluetooth/hci_ldisc.c b/drivers/bluetooth/hci_ldisc.c index 275ea865bc29..566e1c525ee2 100644 --- a/drivers/bluetooth/hci_ldisc.c +++ b/drivers/bluetooth/hci_ldisc.c @@ -544,14 +544,18 @@ static void hci_uart_tty_close(struct tty_struct *tty) if (hdev) hci_uart_close(hdev); + /* + * Always cancel workqueues unconditionally before freeing the hu + * struct, as they might be active during the PROTO_INIT phase. + */ + cancel_work_sync(&hu->init_ready); + cancel_work_sync(&hu->write_work); + if (test_bit(HCI_UART_PROTO_READY, &hu->flags)) { percpu_down_write(&hu->proto_lock); clear_bit(HCI_UART_PROTO_READY, &hu->flags); percpu_up_write(&hu->proto_lock); - cancel_work_sync(&hu->init_ready); - cancel_work_sync(&hu->write_work); - if (hdev) { if (test_bit(HCI_UART_REGISTERED, &hu->flags)) hci_unregister_dev(hdev); -- 2.34.1 ^ permalink raw reply related [flat|nested] 7+ messages in thread
end of thread, other threads:[~2026-05-15 6:50 UTC | newest] Thread overview: 7+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2026-05-13 6:45 [PATCH] Bluetooth: hci_uart: fix UAF in hci_uart_tty_close() w15303746062 2026-05-13 7:54 ` bluez.test.bot 2026-05-13 9:04 ` [PATCH] " Paul Menzel 2026-05-14 15:17 ` [PATCH v2] " w15303746062 2026-05-14 17:00 ` [v2] " bluez.test.bot 2026-05-15 6:10 ` [PATCH v2] " Greg KH 2026-05-15 6:50 ` [PATCH v3] " w15303746062
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox