================================================================== BUG: KASAN: slab-out-of-bounds in mcp2221_raw_event+0xfc1/0x1180 drivers/hid/hid-mcp2221.c:830 Read of size 1 at addr ffff88805e31bfff by task kworker/u4:1/12 CPU: 1 PID: 12 Comm: kworker/u4:1 Not tainted 6.6.98-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: bat_events batadv_nc_worker Call Trace: dump_stack_lvl+0x16c/0x230 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:364 [inline] print_report+0xac/0x230 mm/kasan/report.c:475 kasan_report+0x117/0x150 mm/kasan/report.c:588 mcp2221_raw_event+0xfc1/0x1180 drivers/hid/hid-mcp2221.c:830 hid_input_report+0x400/0x520 drivers/hid/hid-core.c:2086 hid_irq_in+0x479/0x6d0 drivers/hid/usbhid/hid-core.c:284 __usb_hcd_giveback_urb+0x35f/0x520 drivers/usb/core/hcd.c:1650 dummy_timer+0x8a3/0x31b0 drivers/usb/gadget/udc/dummy_hcd.c:1993 __run_hrtimer kernel/time/hrtimer.c:1755 [inline] __hrtimer_run_queues+0x51e/0xc40 kernel/time/hrtimer.c:1819 hrtimer_run_softirq+0x187/0x2b0 kernel/time/hrtimer.c:1836 handle_softirqs+0x280/0x820 kernel/softirq.c:578 __do_softirq kernel/softirq.c:612 [inline] invoke_softirq kernel/softirq.c:452 [inline] __irq_exit_rcu+0xc7/0x190 kernel/softirq.c:661 irq_exit_rcu+0x9/0x20 kernel/softirq.c:673 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1088 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687 RIP: 0010:lock_acquire+0x1f2/0x410 kernel/locking/lockdep.c:5758 Code: 00 9c 8f 84 24 80 00 00 00 f6 84 24 81 00 00 00 02 0f 85 f5 00 00 00 41 f7 c6 00 02 00 00 74 01 fb 48 c7 44 24 60 0e 36 e0 45 <4b> c7 04 3c 00 00 00 00 66 43 c7 44 3c 09 00 00 43 c6 44 3c 0b 00 RSP: 0018:ffffc90000117a40 EFLAGS: 00000206 RAX: 0000000000000001 RBX: 0000000000000000 RCX: 83c8f66175382700 RDX: 0000000000000000 RSI: ffffffff8aaacac0 RDI: ffffffff8afc7880 RBP: ffffc90000117b48 R08: dffffc0000000000 R09: 1ffffffff21b4ca4 R10: dffffc0000000000 R11: fffffbfff21b4ca5 R12: 1ffff92000022f54 R13: ffffffff8cd2fae0 R14: 0000000000000246 R15: dffffc0000000000 rcu_lock_acquire include/linux/rcupdate.h:334 [inline] rcu_read_lock include/linux/rcupdate.h:786 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:408 [inline] batadv_nc_worker+0xef/0x610 net/batman-adv/network-coding.c:719 process_one_work kernel/workqueue.c:2634 [inline] process_scheduled_works+0xa45/0x15b0 kernel/workqueue.c:2711 worker_thread+0xa55/0xfc0 kernel/workqueue.c:2792 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 Allocated by task 993: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4e/0x70 mm/kasan/common.c:52 ____kasan_kmalloc mm/kasan/common.c:374 [inline] __kasan_kmalloc+0x8f/0xa0 mm/kasan/common.c:383 kasan_kmalloc include/linux/kasan.h:198 [inline] __do_kmalloc_node mm/slab_common.c:1007 [inline] __kmalloc+0xb4/0x240 mm/slab_common.c:1020 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:721 [inline] fib6_info_alloc+0x32/0xe0 net/ipv6/ip6_fib.c:155 ip6_route_info_create+0x44f/0x1200 net/ipv6/route.c:3793 ip6_route_add+0x28/0x130 net/ipv6/route.c:3889 addrconf_add_mroute net/ipv6/addrconf.c:2515 [inline] addrconf_add_dev+0x257/0x340 net/ipv6/addrconf.c:2533 addrconf_dev_config net/ipv6/addrconf.c:3452 [inline] addrconf_init_auto_addrs+0x5d7/0xb40 net/ipv6/addrconf.c:3545 addrconf_notify+0xb62/0x1010 net/ipv6/addrconf.c:3718 notifier_call_chain+0x197/0x390 kernel/notifier.c:93 netdev_state_change+0xd6/0x150 net/core/dev.c:1408 linkwatch_do_dev+0x10d/0x160 net/core/link_watch.c:191 __linkwatch_run_queue+0x40f/0x660 net/core/link_watch.c:244 linkwatch_event+0x4c/0x60 net/core/link_watch.c:287 process_one_work kernel/workqueue.c:2634 [inline] process_scheduled_works+0xa45/0x15b0 kernel/workqueue.c:2711 worker_thread+0xa55/0xfc0 kernel/workqueue.c:2792 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 The buggy address belongs to the object at ffff88805e31bc00 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 751 bytes to the right of allocated 272-byte region [ffff88805e31bc00, ffff88805e31bd10) The buggy address belongs to the physical page: page:ffffea000178c600 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88805e319c00 pfn:0x5e318 head:ffffea000178c600 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff) page_type: 0xffffffff() raw: 00fff00000000840 ffff888017841c80 ffffea0001773e10 ffffea0001771d10 raw: ffff88805e319c00 0000000000100009 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0x52820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 48, tgid 48 (kworker/u4:3), ts 91079503923, free_ts 27780281394 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x1cd/0x210 mm/page_alloc.c:1554 prep_new_page mm/page_alloc.c:1561 [inline] get_page_from_freelist+0x195c/0x19f0 mm/page_alloc.c:3191 __alloc_pages+0x1e3/0x460 mm/page_alloc.c:4457 alloc_slab_page+0x5d/0x170 mm/slub.c:1876 allocate_slab mm/slub.c:2023 [inline] new_slab+0x87/0x2e0 mm/slub.c:2076 ___slab_alloc+0xc6d/0x12f0 mm/slub.c:3230 __slab_alloc mm/slub.c:3329 [inline] __slab_alloc_node mm/slub.c:3382 [inline] slab_alloc_node mm/slub.c:3475 [inline] __kmem_cache_alloc_node+0x1a2/0x260 mm/slub.c:3524 kmalloc_trace+0x2a/0xe0 mm/slab_common.c:1098 kmalloc include/linux/slab.h:600 [inline] batadv_forw_packet_alloc+0x1e9/0x390 net/batman-adv/send.c:519 batadv_iv_ogm_aggregate_new net/batman-adv/bat_iv_ogm.c:561 [inline] batadv_iv_ogm_queue_add+0x77b/0xcf0 net/batman-adv/bat_iv_ogm.c:669 batadv_iv_ogm_schedule_buff net/batman-adv/bat_iv_ogm.c:832 [inline] batadv_iv_ogm_schedule+0x815/0xe90 net/batman-adv/bat_iv_ogm.c:867 batadv_iv_send_outstanding_bat_ogm_packet+0x731/0x840 net/batman-adv/bat_iv_ogm.c:1711 process_one_work kernel/workqueue.c:2634 [inline] process_scheduled_works+0xa45/0x15b0 kernel/workqueue.c:2711 worker_thread+0xa55/0xfc0 kernel/workqueue.c:2792 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1154 [inline] free_unref_page_prepare+0x7ce/0x8e0 mm/page_alloc.c:2336 free_unref_page+0x32/0x2e0 mm/page_alloc.c:2429 free_contig_range+0xa1/0x160 mm/page_alloc.c:6369 destroy_args+0x87/0x770 mm/debug_vm_pgtable.c:1015 debug_vm_pgtable+0x3cc/0x410 mm/debug_vm_pgtable.c:1395 do_one_initcall+0x1fd/0x750 init/main.c:1238 do_initcall_level+0x137/0x1f0 init/main.c:1300 do_initcalls+0x69/0xd0 init/main.c:1316 kernel_init_freeable+0x3d2/0x570 init/main.c:1553 kernel_init+0x1d/0x1c0 init/main.c:1443 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 Memory state around the buggy address: ffff88805e31be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88805e31bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff88805e31bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff88805e31c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88805e31c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== ---------------- Code disassembly (best guess): 0: 00 9c 8f 84 24 80 00 add %bl,0x802484(%rdi,%rcx,4) 7: 00 00 add %al,(%rax) 9: f6 84 24 81 00 00 00 testb $0x2,0x81(%rsp) 10: 02 11: 0f 85 f5 00 00 00 jne 0x10c 17: 41 f7 c6 00 02 00 00 test $0x200,%r14d 1e: 74 01 je 0x21 20: fb sti 21: 48 c7 44 24 60 0e 36 movq $0x45e0360e,0x60(%rsp) 28: e0 45 * 2a: 4b c7 04 3c 00 00 00 movq $0x0,(%r12,%r15,1) <-- trapping instruction 31: 00 32: 66 43 c7 44 3c 09 00 movw $0x0,0x9(%r12,%r15,1) 39: 00 3a: 43 c6 44 3c 0b 00 movb $0x0,0xb(%r12,%r15,1)