====================================================== WARNING: possible circular locking dependency detected syzkaller #0 Not tainted ------------------------------------------------------ syz.1.148/4832 is trying to acquire lock: ffff88806211f120 (sk_lock-AF_AX25){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1731 [inline] ffff88806211f120 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_kill_by_device net/ax25/af_ax25.c:99 [inline] ffff88806211f120 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_device_event+0x217/0x4f0 net/ax25/af_ax25.c:142 but task is already holding lock: ffffffff8d238988 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x54e/0xe50 net/core/dev_ioctl.c:586 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (rtnl_mutex){+.+.}-{3:3}: __mutex_lock_common+0x1eb/0x2390 kernel/locking/mutex.c:596 __mutex_lock kernel/locking/mutex.c:729 [inline] mutex_lock_nested+0x17/0x20 kernel/locking/mutex.c:743 ax25_setsockopt+0x830/0xa40 net/ax25/af_ax25.c:676 __sys_setsockopt+0x2bf/0x3d0 net/socket.c:2213 __do_sys_setsockopt net/socket.c:2224 [inline] __se_sys_setsockopt net/socket.c:2221 [inline] __x64_sys_setsockopt+0xb1/0xc0 net/socket.c:2221 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 -> #0 (sk_lock-AF_AX25){+.+.}-{0:0}: check_prev_add kernel/locking/lockdep.c:3053 [inline] check_prevs_add kernel/locking/lockdep.c:3172 [inline] validate_chain kernel/locking/lockdep.c:3788 [inline] __lock_acquire+0x2c33/0x7c60 kernel/locking/lockdep.c:5012 lock_acquire+0x197/0x3f0 kernel/locking/lockdep.c:5623 lock_sock_nested+0x44/0x100 net/core/sock.c:3256 lock_sock include/net/sock.h:1731 [inline] ax25_kill_by_device net/ax25/af_ax25.c:99 [inline] ax25_device_event+0x217/0x4f0 net/ax25/af_ax25.c:142 notifier_call_chain kernel/notifier.c:83 [inline] raw_notifier_call_chain+0xcb/0x160 kernel/notifier.c:391 call_netdevice_notifiers_extack net/core/dev.c:2061 [inline] call_netdevice_notifiers net/core/dev.c:2075 [inline] __dev_notify_flags+0x178/0x2d0 net/core/dev.c:-1 dev_change_flags+0xe3/0x1a0 net/core/dev.c:8929 dev_ifsioc+0x147/0xe70 net/core/dev_ioctl.c:324 dev_ioctl+0x55f/0xe50 net/core/dev_ioctl.c:587 sock_do_ioctl+0x222/0x2f0 net/socket.c:1164 sock_ioctl+0x4ed/0x6e0 net/socket.c:1267 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl+0xfa/0x170 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(rtnl_mutex ); lock(sk_lock-AF_AX25); lock(rtnl_mutex); lock( sk_lock-AF_AX25); *** DEADLOCK *** 1 lock held by syz.1.148/4832: #0: ffffffff8d238988 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x54e/0xe50 net/core/dev_ioctl.c:586 stack backtrace: CPU: 1 PID: 4832 Comm: syz.1.148 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Call Trace: dump_stack_lvl+0x168/0x230 lib/dump_stack.c:106 check_noncircular+0x274/0x310 kernel/locking/lockdep.c:2133 check_prev_add kernel/locking/lockdep.c:3053 [inline] check_prevs_add kernel/locking/lockdep.c:3172 [inline] validate_chain kernel/locking/lockdep.c:3788 [inline] __lock_acquire+0x2c33/0x7c60 kernel/locking/lockdep.c:5012 lock_acquire+0x197/0x3f0 kernel/locking/lockdep.c:5623 lock_sock_nested+0x44/0x100 net/core/sock.c:3256 lock_sock include/net/sock.h:1731 [inline] ax25_kill_by_device net/ax25/af_ax25.c:99 [inline] ax25_device_event+0x217/0x4f0 net/ax25/af_ax25.c:142 notifier_call_chain kernel/notifier.c:83 [inline] raw_notifier_call_chain+0xcb/0x160 kernel/notifier.c:391 call_netdevice_notifiers_extack net/core/dev.c:2061 [inline] call_netdevice_notifiers net/core/dev.c:2075 [inline] __dev_notify_flags+0x178/0x2d0 net/core/dev.c:-1 dev_change_flags+0xe3/0x1a0 net/core/dev.c:8929 dev_ifsioc+0x147/0xe70 net/core/dev_ioctl.c:324 dev_ioctl+0x55f/0xe50 net/core/dev_ioctl.c:587 sock_do_ioctl+0x222/0x2f0 net/socket.c:1164 sock_ioctl+0x4ed/0x6e0 net/socket.c:1267 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl+0xfa/0x170 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7efc89ee0749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007efc88126038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007efc8a137090 RCX: 00007efc89ee0749 RDX: 0000200000000000 RSI: 0000000000008914 RDI: 0000000000000004 RBP: 00007efc89f64f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007efc8a137128 R14: 00007efc8a137090 R15: 00007ffec0e7ed58 ================================================================== BUG: KASAN: use-after-free in instrument_atomic_read_write include/linux/instrumented.h:101 [inline] BUG: KASAN: use-after-free in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:167 [inline] BUG: KASAN: use-after-free in __refcount_sub_and_test include/linux/refcount.h:272 [inline] BUG: KASAN: use-after-free in __refcount_dec_and_test include/linux/refcount.h:315 [inline] BUG: KASAN: use-after-free in refcount_dec_and_test include/linux/refcount.h:333 [inline] BUG: KASAN: use-after-free in ax25_dev_put include/net/ax25.h:301 [inline] BUG: KASAN: use-after-free in ax25_dev_device_down+0x35e/0x520 net/ax25/ax25_dev.c:122 Write of size 4 at addr ffff8880236862b8 by task syz.1.148/4832 CPU: 0 PID: 4832 Comm: syz.1.148 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Call Trace: dump_stack_lvl+0x168/0x230 lib/dump_stack.c:106 print_address_description+0x60/0x2d0 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:434 [inline] kasan_report+0xdf/0x130 mm/kasan/report.c:451 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x27b/0x290 mm/kasan/generic.c:189 instrument_atomic_read_write include/linux/instrumented.h:101 [inline] atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:167 [inline] __refcount_sub_and_test include/linux/refcount.h:272 [inline] __refcount_dec_and_test include/linux/refcount.h:315 [inline] refcount_dec_and_test include/linux/refcount.h:333 [inline] ax25_dev_put include/net/ax25.h:301 [inline] ax25_dev_device_down+0x35e/0x520 net/ax25/ax25_dev.c:122 ax25_device_event+0x4b4/0x4f0 net/ax25/af_ax25.c:144 notifier_call_chain kernel/notifier.c:83 [inline] raw_notifier_call_chain+0xcb/0x160 kernel/notifier.c:391 call_netdevice_notifiers_extack net/core/dev.c:2061 [inline] call_netdevice_notifiers net/core/dev.c:2075 [inline] __dev_notify_flags+0x178/0x2d0 net/core/dev.c:-1 dev_change_flags+0xe3/0x1a0 net/core/dev.c:8929 dev_ifsioc+0x147/0xe70 net/core/dev_ioctl.c:324 dev_ioctl+0x55f/0xe50 net/core/dev_ioctl.c:587 sock_do_ioctl+0x222/0x2f0 net/socket.c:1164 sock_ioctl+0x4ed/0x6e0 net/socket.c:1267 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl+0xfa/0x170 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7efc89ee0749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007efc88126038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007efc8a137090 RCX: 00007efc89ee0749 RDX: 0000200000000000 RSI: 0000000000008914 RDI: 0000000000000004 RBP: 00007efc89f64f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007efc8a137128 R14: 00007efc8a137090 R15: 00007ffec0e7ed58 Allocated by task 4825: kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] ____kasan_kmalloc mm/kasan/common.c:513 [inline] __kasan_kmalloc+0xb5/0xf0 mm/kasan/common.c:522 kmalloc include/linux/slab.h:607 [inline] kzalloc include/linux/slab.h:738 [inline] ax25_dev_device_up+0x50/0x580 net/ax25/ax25_dev.c:55 ax25_device_event+0x483/0x4f0 net/ax25/af_ax25.c:139 notifier_call_chain kernel/notifier.c:83 [inline] raw_notifier_call_chain+0xcb/0x160 kernel/notifier.c:391 call_netdevice_notifiers_extack net/core/dev.c:2061 [inline] call_netdevice_notifiers net/core/dev.c:2075 [inline] __dev_notify_flags+0x178/0x2d0 net/core/dev.c:-1 dev_change_flags+0xe3/0x1a0 net/core/dev.c:8929 dev_ifsioc+0x147/0xe70 net/core/dev_ioctl.c:324 dev_ioctl+0x55f/0xe50 net/core/dev_ioctl.c:587 sock_do_ioctl+0x222/0x2f0 net/socket.c:1164 sock_ioctl+0x4ed/0x6e0 net/socket.c:1267 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl+0xfa/0x170 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 Freed by task 4832: kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:46 kasan_set_free_info+0x1f/0x40 mm/kasan/generic.c:360 ____kasan_slab_free+0xd5/0x110 mm/kasan/common.c:366 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1710 [inline] slab_free_freelist_hook+0xea/0x170 mm/slub.c:1736 slab_free mm/slub.c:3504 [inline] kfree+0xef/0x2a0 mm/slub.c:4564 ax25_dev_put include/net/ax25.h:302 [inline] ax25_dev_device_down+0x1c0/0x520 net/ax25/ax25_dev.c:119 ax25_device_event+0x4b4/0x4f0 net/ax25/af_ax25.c:144 notifier_call_chain kernel/notifier.c:83 [inline] raw_notifier_call_chain+0xcb/0x160 kernel/notifier.c:391 call_netdevice_notifiers_extack net/core/dev.c:2061 [inline] call_netdevice_notifiers net/core/dev.c:2075 [inline] __dev_notify_flags+0x178/0x2d0 net/core/dev.c:-1 dev_change_flags+0xe3/0x1a0 net/core/dev.c:8929 dev_ifsioc+0x147/0xe70 net/core/dev_ioctl.c:324 dev_ioctl+0x55f/0xe50 net/core/dev_ioctl.c:587 sock_do_ioctl+0x222/0x2f0 net/socket.c:1164 sock_ioctl+0x4ed/0x6e0 net/socket.c:1267 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl+0xfa/0x170 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 Last potentially related work creation: kasan_save_stack+0x35/0x60 mm/kasan/common.c:38 kasan_record_aux_stack+0xb8/0x100 mm/kasan/generic.c:348 __call_rcu kernel/rcu/tree.c:3011 [inline] call_rcu+0x182/0x930 kernel/rcu/tree.c:3091 rhashtable_rehash_table lib/rhashtable.c:345 [inline] rht_deferred_worker+0x18d5/0x2080 lib/rhashtable.c:429 process_one_work+0x863/0x1000 kernel/workqueue.c:2310 worker_thread+0xaa8/0x12a0 kernel/workqueue.c:2457 kthread+0x436/0x520 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Second to last potentially related work creation: kasan_save_stack+0x35/0x60 mm/kasan/common.c:38 kasan_record_aux_stack+0xb8/0x100 mm/kasan/generic.c:348 insert_work+0x54/0x3d0 kernel/workqueue.c:1366 __queue_work+0x9c5/0xd50 kernel/workqueue.c:1532 queue_work_on+0x11d/0x1d0 kernel/workqueue.c:1559 queue_work include/linux/workqueue.h:512 [inline] call_usermodehelper_exec+0x26b/0x460 kernel/umh.c:435 kobject_uevent_env+0x681/0x890 lib/kobject_uevent.c:633 really_probe+0x77d/0xc80 drivers/base/dd.c:649 __driver_probe_device+0x18c/0x330 drivers/base/dd.c:755 driver_probe_device+0x4f/0x420 drivers/base/dd.c:785 __device_attach_driver+0x2b0/0x500 drivers/base/dd.c:907 bus_for_each_drv+0x175/0x200 drivers/base/bus.c:429 __device_attach+0x29b/0x460 drivers/base/dd.c:979 bus_probe_device+0xbc/0x1e0 drivers/base/bus.c:489 device_add+0xa00/0xfb0 drivers/base/core.c:3412 usb_set_configuration+0x1991/0x1fd0 drivers/usb/core/message.c:2165 usb_generic_driver_probe+0x89/0x150 drivers/usb/core/generic.c:238 usb_probe_device+0x139/0x270 drivers/usb/core/driver.c:293 call_driver_probe drivers/base/dd.c:-1 [inline] really_probe+0x284/0xc80 drivers/base/dd.c:595 __driver_probe_device+0x18c/0x330 drivers/base/dd.c:755 driver_probe_device+0x4f/0x420 drivers/base/dd.c:785 __device_attach_driver+0x2b0/0x500 drivers/base/dd.c:907 bus_for_each_drv+0x175/0x200 drivers/base/bus.c:429 __device_attach+0x29b/0x460 drivers/base/dd.c:979 bus_probe_device+0xbc/0x1e0 drivers/base/bus.c:489 device_add+0xa00/0xfb0 drivers/base/core.c:3412 usb_new_device+0xd53/0x1640 drivers/usb/core/hub.c:2632 register_root_hub+0x278/0x580 drivers/usb/core/hcd.c:1021 usb_add_hcd+0xa88/0xef0 drivers/usb/core/hcd.c:3007 dummy_hcd_probe+0x130/0x260 drivers/usb/gadget/udc/dummy_hcd.c:2676 platform_probe+0x137/0x1c0 drivers/base/platform.c:1391 call_driver_probe drivers/base/dd.c:-1 [inline] really_probe+0x284/0xc80 drivers/base/dd.c:595 __driver_probe_device+0x18c/0x330 drivers/base/dd.c:755 driver_probe_device+0x4f/0x420 drivers/base/dd.c:785 __device_attach_driver+0x2b0/0x500 drivers/base/dd.c:907 bus_for_each_drv+0x175/0x200 drivers/base/bus.c:429 __device_attach+0x29b/0x460 drivers/base/dd.c:979 bus_probe_device+0xbc/0x1e0 drivers/base/bus.c:489 device_add+0xa00/0xfb0 drivers/base/core.c:3412 platform_device_add+0x4b9/0x820 drivers/base/platform.c:712 init+0x290/0x1070 drivers/usb/gadget/udc/dummy_hcd.c:2829 do_one_initcall+0x1ee/0x680 init/main.c:1316 do_initcall_level+0x137/0x1f0 init/main.c:1389 do_initcalls+0x4b/0x90 init/main.c:1405 kernel_init_freeable+0x3ce/0x560 init/main.c:1629 kernel_init+0x19/0x1b0 init/main.c:1520 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 The buggy address belongs to the object at ffff888023686200 which belongs to the cache kmalloc-192 of size 192 The buggy address is located 184 bytes inside of 192-byte region [ffff888023686200, ffff8880236862c0) The buggy address belongs to the page: page:ffffea00008da180 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888023686c00 pfn:0x23686 flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000200 ffffea00009ca400 0000000200000002 ffff888016841a00 raw: ffff888023686c00 000000008010000c 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 10442969931, free_ts 0 prep_new_page mm/page_alloc.c:2426 [inline] get_page_from_freelist+0x1b77/0x1c60 mm/page_alloc.c:4192 __alloc_pages+0x1e1/0x470 mm/page_alloc.c:5487 alloc_page_interleave+0x24/0x1e0 mm/mempolicy.c:2031 alloc_slab_page mm/slub.c:1780 [inline] allocate_slab mm/slub.c:1917 [inline] new_slab+0xc0/0x4b0 mm/slub.c:1980 ___slab_alloc+0x81e/0xdf0 mm/slub.c:3013 __slab_alloc mm/slub.c:3100 [inline] slab_alloc_node mm/slub.c:3191 [inline] slab_alloc mm/slub.c:3233 [inline] __kmalloc+0x1cd/0x330 mm/slub.c:4408 kmalloc include/linux/slab.h:612 [inline] usb_alloc_urb+0x3f/0x140 drivers/usb/core/urb.c:74 hub_configure drivers/usb/core/hub.c:1680 [inline] hub_probe+0x21d1/0x35e0 drivers/usb/core/hub.c:1951 usb_probe_interface+0x5a0/0xaf0 drivers/usb/core/driver.c:396 call_driver_probe drivers/base/dd.c:-1 [inline] really_probe+0x284/0xc80 drivers/base/dd.c:595 __driver_probe_device+0x18c/0x330 drivers/base/dd.c:755 driver_probe_device+0x4f/0x420 drivers/base/dd.c:785 __device_attach_driver+0x2b0/0x500 drivers/base/dd.c:907 bus_for_each_drv+0x175/0x200 drivers/base/bus.c:429 __device_attach+0x29b/0x460 drivers/base/dd.c:979 bus_probe_device+0xbc/0x1e0 drivers/base/bus.c:489 page_owner free stack trace missing Memory state around the buggy address: ffff888023686180: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ffff888023686200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff888023686280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ^ ffff888023686300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888023686380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc ==================================================================