==================================================================
BUG: KASAN: use-after-free in bit_putcs+0xa54/0xde0
Read of size 1 at addr ffff8881d73aa0fe by task syz-executor.2/4118

CPU: 1 PID: 4118 Comm: syz-executor.2 Not tainted 5.9.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 dump_stack+0x191/0x1f1
 print_address_description.constprop.0.cold+0x72/0x4df
 kasan_report.cold+0x1f/0x37
 bit_putcs+0xa54/0xde0
 fbcon_putcs+0x358/0x440
 do_con_write+0xdb4/0x1f60
 con_write+0x20/0xb0
 n_tty_write+0x4b3/0x1180
 tty_write+0x4d5/0x860
 vfs_write+0x2a5/0x730
 ksys_write+0x131/0x250
 do_syscall_64+0x2d/0x70
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f91138b2f69
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f9112bf10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f91139e1120 RCX: 00007f91138b2f69
RDX: 0000000000001006 RSI: 0000000020000180 RDI: 0000000000000006
RBP: 00007f91138ff4a4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f91139e1120 R15: 00007ffc5adc5f68

Allocated by task 12:
 kasan_save_stack+0x19/0x40
 __kasan_kmalloc.constprop.0+0xd7/0xe0
 __alloc_skb+0xaa/0x550
 nsim_dev_trap_report_work+0x2ab/0xbe0
 process_one_work+0x9ae/0x1680
 worker_thread+0x676/0x1170
 kthread+0x3a6/0x490
 ret_from_fork+0x1f/0x30

Freed by task 12:
 kasan_save_stack+0x19/0x40
 kasan_set_track+0x1c/0x30
 kasan_set_free_info+0x1b/0x30
 __kasan_slab_free+0xd8/0x110
 kfree+0x10e/0x2a0
 skb_release_data+0x6d4/0x900
 consume_skb+0xc2/0x160
 nsim_dev_trap_report_work+0x872/0xbe0
 process_one_work+0x9ae/0x1680
 worker_thread+0x676/0x1170
 kthread+0x3a6/0x490
 ret_from_fork+0x1f/0x30

The buggy address belongs to the object at ffff8881d73aa000
 which belongs to the cache kmalloc-4k of size 4096
The buggy address is located 254 bytes inside of
 4096-byte region [ffff8881d73aa000, ffff8881d73ab000)
The buggy address belongs to the page:
page:0000000020c554fa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1d73aa
head:0000000020c554fa order:1 compound_mapcount:0
flags: 0x17ffe0000010200(slab|head)
raw: 017ffe0000010200 ffffea0007832008 ffffea0007835308 ffff8881f5040900
raw: 0000000000000000 ffff8881d73aa000 0000000100000001 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff8881d73a9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8881d73aa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff8881d73aa080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                                ^
 ffff8881d73aa100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff8881d73aa180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
