From: Jakub Kicinski <kuba@kernel.org>
To: Luiz Augusto von Dentz <luiz.dentz@gmail.com>
Cc: davem@davemloft.net, linux-bluetooth@vger.kernel.org,
netdev@vger.kernel.org
Subject: Re: [GIT PULL] bluetooth 2026-03-12
Date: Sat, 14 Mar 2026 09:47:07 -0700 [thread overview]
Message-ID: <20260314094707.105683b1@kernel.org> (raw)
In-Reply-To: <20260312200655.1215688-1-luiz.dentz@gmail.com>
On Thu, 12 Mar 2026 16:06:54 -0400 Luiz Augusto von Dentz wrote:
> - hci_sync: Fix hci_le_create_conn_sync
> - MGMT: Fix list corruption and UAF in command complete handlers
> - L2CAP: Disconnect if received packet's SDU exceeds IMTU
> - L2CAP: Disconnect if sum of payload sizes exceed SDU
> - L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ
> - L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp()
> - L2CAP: Validate L2CAP_INFO_RSP payload length before access
> - L2CAP: Fix use-after-free in l2cap_unregister_user
> - ISO: Fix defer tests being unstable
> - HIDP: Fix possible UAF
> - SMP: make SM/PER/KDU/BI-04-C happy
> - qca: fix ROM version reading on WCN3998 chips
FWIW this is what our AI had to say about the series, mostly nit picks
but not all (LMK if you want me to hook the AI reviewer up to your
patchwork):
================================================================================
PATCH 1/12
================================================================================
commit e1d9a66889867c232657a9b6f25d451d7c3ab96f
Author: Christian Eggers <ceggers@arri.de>
Bluetooth: LE L2CAP: Disconnect if received packet's SDU exceeds IMTU
This commit adds proper validation and disconnect handling when received
L2CAP SDU length exceeds the receiver's MTU, fixing compliance test
L2CAP/LE/CFC/BV-26-C.
> Fixes: aac23bf63659 ("Bluetooth: Implement LE L2CAP reassembly")
The Fixes: tag points to commit aac23bf63659 ("Bluetooth: Implement LE
L2CAP reassembly"), but the function being fixed, l2cap_ecred_data_rcv(),
was created in commit 15f02b910562 ("Bluetooth: L2CAP: Add initial code
for Enhanced Credit Based Mode"). While aac23bf63659 introduced a similar
bug in the older l2cap_le_data_rcv() function, shouldn't the Fixes: tag
point to the commit that introduced the specific function being fixed?
Suggested: Fixes: 15f02b910562 ("Bluetooth: L2CAP: Add initial code for
Enhanced Credit Based Mode")
> diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c
> index ad98db9632fd..3056dcd5fa2f 100644
> --- a/net/bluetooth/l2cap_core.c
> +++ b/net/bluetooth/l2cap_core.c
[ ... ]
> @@ -6689,7 +6691,9 @@ static int l2cap_ecred_data_rcv(struct l2cap_chan *chan, struct sk_buff *skb)
> sdu_len, skb->len, chan->imtu);
>
> if (sdu_len > chan->imtu) {
> - BT_ERR("Too big LE L2CAP SDU length received");
> + BT_ERR("Too big LE L2CAP SDU length: len %u > %u",
> + skb->len, sdu_len);
> + l2cap_send_disconn_req(chan, ECONNRESET);
> err = -EMSGSIZE;
> goto failed;
> }
The error message prints skb->len and sdu_len, but the condition checks
sdu_len > chan->imtu. This is inconsistent with the first hunk of this
patch, which correctly prints the two values being compared:
net/bluetooth/l2cap_core.c:l2cap_ecred_data_rcv() {
if (skb->len > chan->imtu) {
BT_ERR("Too big LE L2CAP PDU: len %u > %u", skb->len,
chan->imtu);
...
}
}
Shouldn't the second error message follow the same pattern and print
sdu_len and chan->imtu instead?
================================================================================
PATCH 2/12
================================================================================
commit b6a2bf43aa37670432843bc73ae2a6288ba4d6f8
Author: Christian Eggers <ceggers@arri.de>
Bluetooth: LE L2CAP: Disconnect if sum of payload sizes exceed SDU
This commit adds a disconnect call when the sum of payload sizes for
K-frames exceeds the specified SDU length, addressing test case
L2CAP/LE/CFC/BV-27-C as specified in Core 6.0, Vol 3, Part A, 3.4.3.
> Fixes: aac23bf63659 ("Bluetooth: Implement LE L2CAP reassembly")
Does the Fixes: tag point to the correct commit? The current fix modifies
l2cap_ecred_data_rcv(), which was introduced in commit 15f02b910562
("Bluetooth: L2CAP: Add initial code for Enhanced Credit Based Mode"),
not in aac23bf63659.
Should the Fixes: tag be: Fixes: 15f02b910562 ("Bluetooth: L2CAP: Add
initial code for Enhanced Credit Based Mode")?
================================================================================
PATCH 3/12 - No review comments
================================================================================
================================================================================
PATCH 4/12 - No review comments
================================================================================
================================================================================
PATCH 5/12 - No review comments
================================================================================
================================================================================
PATCH 6/12
================================================================================
commit 17f89341cb4281d1da0e2fb0de5406ab7c4e25ef
Author: Wang Tao <wangtao554@huawei.com>
Bluetooth: MGMT: Fix list corruption and UAF in command complete handlers
This commit addresses two issues from the 302a1f674c00 rework that
changed mgmt_pending_valid() semantics: fixing double list_del() in
mgmt_add_adv_patterns_monitor_complete() and removing incorrect
mgmt_pending_foreach() usage in set_mesh_complete().
> diff --git a/net/bluetooth/mgmt.c b/net/bluetooth/mgmt.c
> index a7238fd3b03b..d52238ce6a9a 100644
> --- a/net/bluetooth/mgmt.c
> +++ b/net/bluetooth/mgmt.c
[ ... ]
> @@ -5377,7 +5374,7 @@ static void mgmt_add_adv_patterns_monitor_complete(struct hci_dev *hdev,
>
> mgmt_cmd_complete(cmd->sk, cmd->hdev->id, cmd->opcode,
> mgmt_status(status), &rp, sizeof(rp));
> - mgmt_pending_remove(cmd);
> + mgmt_pending_free(cmd);
>
> hci_dev_unlock(hdev);
> bt_dev_dbg(hdev, "add monitor %d complete, status %d",
Is this change actually correct? Looking at the function entry condition:
if (status == -ECANCELED && !mgmt_pending_valid(hdev, cmd))
return;
Due to short-circuit evaluation of '&&', mgmt_pending_valid() is only
called when status == -ECANCELED. On the normal completion path (status !=
-ECANCELED), mgmt_pending_valid() is never executed, so cmd remains linked
in hdev->mgmt_pending.
Calling mgmt_pending_free(cmd) here would kfree(cmd) without unlinking it
from the list first, leaving a dangling pointer. Any subsequent list
traversal (e.g., mgmt_pending_foreach during __mgmt_power_off, or another
mgmt_pending_valid call) would dereference freed memory.
Compare this to other MGMT completion handlers which use '||' instead:
if (err == -ECANCELED || !mgmt_pending_valid(hdev, cmd))
return;
With '||', mgmt_pending_valid() always executes on the normal path and
unlinks cmd from the list, making mgmt_pending_free(cmd) safe. Should this
function's early return condition be changed to use '||' to match the other
handlers?
================================================================================
PATCH 7/12
================================================================================
commit dbf666e4fc9bdd975a61bf682b3f75cb0145eedd
Author: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Bluetooth: HIDP: Fix possible UAF
This fixes the use-after-free caused by not dropping the l2cap_conn
reference when the user->remove callback is called. The patch drops the
l2cap_conn reference in hidp_session_remove() and adds NULL checks in
both session_free() and hidp_session_thread().
> diff --git a/net/bluetooth/hidp/core.c b/net/bluetooth/hidp/core.c
> index 6fe815241b01..7bcf8c5ceaee 100644
> --- a/net/bluetooth/hidp/core.c
> +++ b/net/bluetooth/hidp/core.c
[ ... ]
> @@ -1164,6 +1165,15 @@ static void hidp_session_remove(struct l2cap_conn *conn,
>
> down_write(&hidp_session_sem);
>
> + /* Drop L2CAP reference immediately to indicate that
> + * l2cap_unregister_user() shall not be called as it is already
> + * considered removed.
> + */
> + if (session->conn) {
> + l2cap_conn_put(session->conn);
> + session->conn = NULL;
> + }
> +
> hidp_session_terminate(session);
>
> cancel_work_sync(&session->dev_init);
Does setting session->conn = NULL in hidp_session_remove() create a
race with hidp_connection_del()?
Before this patch, session->conn was always a valid pointer (initialized
in hidp_session_new() and only released in session_free()). After this
patch, hidp_session_remove() sets session->conn = NULL.
Looking at hidp_connection_del():
int hidp_connection_del(struct hidp_conndel_req *req)
{
...
session = hidp_session_find(&req->bdaddr);
if (!session)
return -ENOENT;
if (req->flags & BIT(HIDP_VIRTUAL_CABLE_UNPLUG))
hidp_send_ctrl_message(session, ...);
else
l2cap_unregister_user(session->conn, &session->user);
hidp_session_put(session);
return 0;
}
After hidp_session_find() releases hidp_session_sem, there's no
protection preventing hidp_session_remove() from running concurrently and
setting session->conn = NULL.
If hidp_session_remove() runs between the hidp_session_find() return and
the l2cap_unregister_user() call, then l2cap_unregister_user() receives a
NULL conn pointer and immediately dereferences it in its first line:
struct hci_dev *hdev = conn->hcon->hdev;
causing a NULL pointer dereference.
> @@ -1301,7 +1311,9 @@ static int hidp_session_thread(void *arg)
> * Instead, this call has the same semantics as if user-space tried to
> * delete the session.
> */
> - l2cap_unregister_user(session->conn, &session->user);
> + if (session->conn)
> + l2cap_unregister_user(session->conn, &session->user);
> +
> hidp_session_put(session);
>
> module_put_and_kthread_exit(0);
================================================================================
PATCH 8/12
================================================================================
commit 752a6c9596dd25efd6978a73ff21f3b592668f4a
Author: Shaurya Rane <ssrane_b23@ee.vjti.ac.in>
Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
This patch addresses a use-after-free bug reported by syzbot where
l2cap_unregister_user() dereferences conn->hcon->hdev after the hci_dev
structure has been freed. The fix switches from hci_dev_lock to conn->lock
in both l2cap_register_user() and l2cap_unregister_user().
Closes: https://syzkaller.appspot.com/bug?extid=14b6d57fb728e27ce23c
> Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
>
> After commit ab4eedb790ca ("Bluetooth: L2CAP: Fix corrupted list in
> hci_chan_del"), l2cap_conn_del() uses conn->lock to protect access to
> conn->users. However, l2cap_register_user() and l2cap_unregister_user()
> don't use conn->lock, creating a race condition where these functions can
> access conn->users and conn->hchan concurrently with l2cap_conn_del().
>
> This can lead to use-after-free and list corruption bugs, as reported
> by syzbot.
Does the commit message accurately describe the syzbot-reported bug?
The syzbot report (syzbot+14b6d57fb728e27ce23c) shows a use-after-free in
l2cap_unregister_user at the mutex_lock_nested call. The actual crash
happens because the hci_dev structure (accessed via conn->hcon->hdev)
was already freed when l2cap_unregister_user tried to lock it with
hci_dev_lock(hdev):
Crash site:
l2cap_unregister_user -> hci_dev_lock(hdev)
where hdev = conn->hcon->hdev
Freed by:
hci_release_dev -> kfree()
via vhci_release -> hci_free_dev -> kobject_put -> hci_release_dev
The freed object is an 8192-byte kmalloc slab (hci_dev), and the crash
task is khidpd_* (hidp_session_thread).
The commit message states "This can lead to use-after-free and list
corruption bugs, as reported by syzbot." While the theoretical race on
conn->users IS possible, the actual syzbot-reported crash is about
accessing freed hdev memory when trying to acquire hci_dev_lock, not
about conn->users list corruption or conn->hchan use-after-free.
>
> Fix this by changing l2cap_register_user() and l2cap_unregister_user()
> to use conn->lock instead of hci_dev_lock(), ensuring consistent locking
> for the l2cap_conn structure.
>
> Reported-by: syzbot+14b6d57fb728e27ce23c@syzkaller.appspotmail.com
> Closes: https://syzkaller.appspot.com/bug?extid=14b6d57fb728e27ce23c
> Fixes: ab4eedb790ca ("Bluetooth: L2CAP: Fix corrupted list in hci_chan_del")
> Signed-off-by: Shaurya Rane <ssrane_b23@ee.vjti.ac.in>
> Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
>
> diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c
> index 0f400051f093..780136e18aae 100644
> --- a/net/bluetooth/l2cap_core.c
> +++ b/net/bluetooth/l2cap_core.c
> @@ -1678,17 +1678,15 @@ static void l2cap_info_timeout(struct work_struct *work)
>
> int l2cap_register_user(struct l2cap_conn *conn, struct l2cap_user *user)
> {
> - struct hci_dev *hdev = conn->hcon->hdev;
> int ret;
>
> /* We need to check whether l2cap_conn is registered. If it is not, we
> - * must not register the l2cap_user. l2cap_conn_del() is unregisters
> - * l2cap_conn objects, but doesn't provide its own locking. Instead, it
> - * relies on the parent hci_conn object to be locked. This itself relies
> - * on the hci_dev object to be locked. So we must lock the hci device
> - * here, too. */
> + * must not register the l2cap_user. l2cap_conn_del() unregisters
> + * l2cap_conn objects under conn->lock, and we use the same lock here
> + * to protect access to conn->users and conn->hchan.
> + */
Does the new comment fully explain the reason for the change?
The comment states that l2cap_conn_del() unregisters l2cap_conn objects
under conn->lock, and we use the same lock to protect conn->users and
conn->hchan. This is factually correct.
However, the comment omits the actual reason for changing the locking:
the old code dereferenced conn->hcon->hdev to acquire hci_dev_lock,
but hci_dev can be freed before this point, causing the use-after-free
crash that syzbot reported.
The comment describes a secondary benefit (consistent locking for
conn->users and conn->hchan) rather than the primary bug being fixed
(accessing a freed hci_dev structure through conn->hcon->hdev).
>
> - hci_dev_lock(hdev);
> + mutex_lock(&conn->lock);
>
> if (!list_empty(&user->list)) {
> ret = -EINVAL;
[ ... ]
================================================================================
PATCH 9/12 - No review comments
================================================================================
================================================================================
PATCH 10/12 - No review comments
================================================================================
================================================================================
PATCH 11/12 - No review comments
================================================================================
================================================================================
PATCH 12/12 - No review comments
================================================================================
next prev parent reply other threads:[~2026-03-14 16:47 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-12 20:06 [GIT PULL] bluetooth 2026-03-12 Luiz Augusto von Dentz
2026-03-14 16:47 ` Jakub Kicinski [this message]
2026-03-16 13:58 ` Luiz Augusto von Dentz
2026-03-16 23:26 ` Jakub Kicinski
2026-03-17 20:45 ` Luiz Augusto von Dentz
2026-03-14 17:44 ` Jakub Kicinski
2026-03-15 15:04 ` Konstantin Ryabitsev
2026-03-15 20:20 ` Jakub Kicinski
2026-03-19 2:48 ` Jakub Kicinski
2026-03-19 13:21 ` Konstantin Ryabitsev
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260314094707.105683b1@kernel.org \
--to=kuba@kernel.org \
--cc=davem@davemloft.net \
--cc=linux-bluetooth@vger.kernel.org \
--cc=luiz.dentz@gmail.com \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox