usb 3-1: pegasus_irq - nonzero urb status received: -71 ================================================================== BUG: KASAN: slab-out-of-bounds in mcp2221_raw_event+0x1070/0x10a0 drivers/hid/hid-mcp2221.c:948 Read of size 1 at addr ffff88811d65bfff by task kworker/0:7/9585 CPU: 0 UID: 0 PID: 9585 Comm: kworker/0:7 Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Workqueue: events legacy_dvb_usb_read_remote_control Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xcd/0x630 mm/kasan/report.c:482 kasan_report+0xe0/0x110 mm/kasan/report.c:595 mcp2221_raw_event+0x1070/0x10a0 drivers/hid/hid-mcp2221.c:948 __hid_input_report.constprop.0+0x314/0x450 drivers/hid/hid-core.c:2139 hid_irq_in+0x35e/0x870 drivers/hid/usbhid/hid-core.c:286 __usb_hcd_giveback_urb+0x38b/0x610 drivers/usb/core/hcd.c:1661 usb_hcd_giveback_urb+0x39b/0x450 drivers/usb/core/hcd.c:1745 dummy_timer+0x1809/0x3a00 drivers/usb/gadget/udc/dummy_hcd.c:1995 __run_hrtimer kernel/time/hrtimer.c:1777 [inline] __hrtimer_run_queues+0x202/0xad0 kernel/time/hrtimer.c:1841 hrtimer_run_softirq+0x17d/0x350 kernel/time/hrtimer.c:1858 handle_softirqs+0x208/0x8d0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xfa/0x160 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline] sysvec_apic_timer_interrupt+0x90/0xb0 arch/x86/kernel/apic/apic.c:1052 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:console_trylock_spinning kernel/printk/printk.c:2034 [inline] RIP: 0010:vprintk_emit+0x526/0x680 kernel/printk/printk.c:2422 Code: 00 4d 85 ed 0f 85 19 01 00 00 e8 a5 9d 20 00 9c 5d 81 e5 00 02 00 00 31 ff 48 89 ee e8 03 99 20 00 48 85 ed 0f 85 25 01 00 00 85 9d 20 00 45 31 c9 41 b8 01 00 00 00 31 c9 48 8d 05 00 00 00 RSP: 0018:ffffc9000407f9e8 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 0000000000000017 RCX: ffffffff815db1eb RDX: ffff888108e83a00 RSI: ffffffff815db1f5 RDI: 0000000000000007 RBP: 0000000000000000 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff9200080ff3f R13: 0000000000000200 R14: ffff888114af5700 R15: ffffc9000407fab0 _printk+0xc7/0x100 kernel/printk/printk.c:2448 m920x_read drivers/media/usb/dvb-usb/m920x.c:40 [inline] m920x_rc_query+0x496/0x770 drivers/media/usb/dvb-usb/m920x.c:193 legacy_dvb_usb_read_remote_control+0x10c/0x4f0 drivers/media/usb/dvb-usb/dvb-usb-remote.c:123 process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3427 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x56d/0x700 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Allocated by task 2856: kasan_save_stack+0x33/0x60 mm/kasan/common.c:56 kasan_save_track+0x14/0x30 mm/kasan/common.c:77 unpoison_slab_object mm/kasan/common.c:342 [inline] __kasan_slab_alloc+0x6e/0x70 mm/kasan/common.c:368 kasan_slab_alloc include/linux/kasan.h:252 [inline] slab_post_alloc_hook mm/slub.c:4970 [inline] slab_alloc_node mm/slub.c:5280 [inline] kmem_cache_alloc_noprof+0x260/0x6c0 mm/slub.c:5287 alloc_empty_file+0x55/0x1e0 fs/file_table.c:237 path_openat+0xda/0x2cb0 fs/namei.c:4120 do_filp_open+0x20b/0x470 fs/namei.c:4161 do_sys_openat2+0x11b/0x1d0 fs/open.c:1437 do_sys_open fs/open.c:1452 [inline] __do_sys_openat fs/open.c:1468 [inline] __se_sys_openat fs/open.c:1463 [inline] __x64_sys_openat+0x174/0x210 fs/open.c:1463 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x4d0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 0: kasan_save_stack+0x33/0x60 mm/kasan/common.c:56 kasan_save_track+0x14/0x30 mm/kasan/common.c:77 __kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:587 kasan_save_free_info mm/kasan/kasan.h:406 [inline] poison_slab_object mm/kasan/common.c:252 [inline] __kasan_slab_free+0x43/0x70 mm/kasan/common.c:284 kasan_slab_free include/linux/kasan.h:234 [inline] slab_free_hook mm/slub.c:2539 [inline] slab_free_after_rcu_debug+0xcc/0x2a0 mm/slub.c:6688 rcu_do_batch kernel/rcu/tree.c:2605 [inline] rcu_core+0x79c/0x1530 kernel/rcu/tree.c:2861 handle_softirqs+0x208/0x8d0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xfa/0x160 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline] sysvec_apic_timer_interrupt+0x90/0xb0 arch/x86/kernel/apic/apic.c:1052 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 Last potentially related work creation: kasan_save_stack+0x33/0x60 mm/kasan/common.c:56 kasan_record_aux_stack+0x8c/0xa0 mm/kasan/generic.c:559 slab_free_hook mm/slub.c:2500 [inline] slab_free mm/slub.c:6630 [inline] kmem_cache_free+0x13f/0x660 mm/slub.c:6740 file_free fs/file_table.c:79 [inline] __fput+0x68d/0xb70 fs/file_table.c:481 fput_close_sync+0x118/0x210 fs/file_table.c:573 __do_sys_close fs/open.c:1589 [inline] __se_sys_close fs/open.c:1574 [inline] __x64_sys_close+0x8b/0x120 fs/open.c:1574 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x4d0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f The buggy address belongs to the object at ffff88811d65bdc0 which belongs to the cache filp of size 360 The buggy address is located 215 bytes to the right of allocated 360-byte region [ffff88811d65bdc0, ffff88811d65bf28) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11d65a head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 memcg:ffff888133537e01 anon flags: 0x200000000000040(head|node=0|zone=2) page_type: f5(slab) raw: 0200000000000040 ffff8881012a13c0 0000000000000000 dead000000000001 raw: 0000000000000000 0000000000120012 00000000f5000000 ffff888133537e01 head: 0200000000000040 ffff8881012a13c0 0000000000000000 dead000000000001 head: 0000000000000000 0000000000120012 00000000f5000000 ffff888133537e01 head: 0200000000000001 ffffea0004759681 00000000ffffffff 00000000ffffffff head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000002 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 1, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 2858, tgid 2858 (udevd), ts 14078090723, free_ts 0 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1c0/0x230 mm/page_alloc.c:1850 prep_new_page mm/page_alloc.c:1858 [inline] get_page_from_freelist+0x1003/0x2dc0 mm/page_alloc.c:3884 __alloc_frozen_pages_noprof+0x259/0x21f0 mm/page_alloc.c:5183 alloc_pages_mpol+0xe4/0x410 mm/mempolicy.c:2416 alloc_slab_page mm/slub.c:3055 [inline] allocate_slab mm/slub.c:3228 [inline] new_slab+0x24a/0x360 mm/slub.c:3282 ___slab_alloc+0xdb7/0x1a70 mm/slub.c:4651 __slab_alloc.constprop.0+0x63/0x110 mm/slub.c:4770 __slab_alloc_node mm/slub.c:4846 [inline] slab_alloc_node mm/slub.c:5268 [inline] kmem_cache_alloc_noprof+0x393/0x6c0 mm/slub.c:5287 alloc_empty_file+0x55/0x1e0 fs/file_table.c:237 path_openat+0xda/0x2cb0 fs/namei.c:4120 do_filp_open+0x20b/0x470 fs/namei.c:4161 do_sys_openat2+0x11b/0x1d0 fs/open.c:1437 do_sys_open fs/open.c:1452 [inline] __do_sys_openat fs/open.c:1468 [inline] __se_sys_openat fs/open.c:1463 [inline] __x64_sys_openat+0x174/0x210 fs/open.c:1463 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x4d0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f page_owner free stack trace missing Memory state around the buggy address: ffff88811d65be80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88811d65bf00: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc >ffff88811d65bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff88811d65c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88811d65c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== ---------------- Code disassembly (best guess): 0: 00 4d 85 add %cl,-0x7b(%rbp) 3: ed in (%dx),%eax 4: 0f 85 19 01 00 00 jne 0x123 a: e8 a5 9d 20 00 call 0x209db4 f: 9c pushf 10: 5d pop %rbp 11: 81 e5 00 02 00 00 and $0x200,%ebp 17: 31 ff xor %edi,%edi 19: 48 89 ee mov %rbp,%rsi 1c: e8 03 99 20 00 call 0x209924 21: 48 85 ed test %rbp,%rbp 24: 0f 85 25 01 00 00 jne 0x14f * 2a: e8 85 9d 20 00 call 0x209db4 <-- trapping instruction 2f: 45 31 c9 xor %r9d,%r9d 32: 41 b8 01 00 00 00 mov $0x1,%r8d 38: 31 c9 xor %ecx,%ecx 3a: 48 rex.W 3b: 8d .byte 0x8d 3c: 05 .byte 0x5 3d: 00 00 add %al,(%rax)