usb 5-1: received invalid command response:got 60, instead of 4 ================================================================== BUG: KASAN: stack-out-of-bounds in carl9170_cmd_callback drivers/net/wireless/ath/carl9170/rx.c:153 [inline] BUG: KASAN: stack-out-of-bounds in carl9170_handle_command_response+0x21f/0xc50 drivers/net/wireless/ath/carl9170/rx.c:168 Write of size 60 at addr ffffc9000009fa38 by task kworker/0:2/42 CPU: 0 UID: 0 PID: 42 Comm: kworker/0:2 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 Workqueue: usb_hub_wq hub_event Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x13d/0x4b0 mm/kasan/report.c:482 kasan_report+0xdf/0x1d0 mm/kasan/report.c:595 check_region_inline mm/kasan/generic.c:186 [inline] kasan_check_range+0x10f/0x1e0 mm/kasan/generic.c:200 __asan_memcpy+0x3c/0x60 mm/kasan/shadow.c:106 carl9170_cmd_callback drivers/net/wireless/ath/carl9170/rx.c:153 [inline] carl9170_handle_command_response+0x21f/0xc50 drivers/net/wireless/ath/carl9170/rx.c:168 carl9170_usb_rx_irq_complete+0xfc/0x1b0 drivers/net/wireless/ath/carl9170/usb.c:307 __usb_hcd_giveback_urb+0x38d/0x610 drivers/usb/core/hcd.c:1657 usb_hcd_giveback_urb+0x3ca/0x4a0 drivers/usb/core/hcd.c:1741 dummy_timer+0xda1/0x36c0 drivers/usb/gadget/udc/dummy_hcd.c:2005 __run_hrtimer kernel/time/hrtimer.c:1930 [inline] __hrtimer_run_queues+0x470/0xa00 kernel/time/hrtimer.c:1994 hrtimer_run_softirq+0x17d/0x2c0 kernel/time/hrtimer.c:2011 handle_softirqs+0x1dd/0x9e0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x160/0x210 kernel/softirq.c:735 irq_exit_rcu+0x9/0x30 kernel/softirq.c:752 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1061 [inline] sysvec_apic_timer_interrupt+0x8f/0xb0 arch/x86/kernel/apic/apic.c:1061 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:228 [inline] RIP: 0010:unwind_next_frame+0x1f6/0x2090 arch/x86/kernel/unwind_orc.c:510 Code: 89 c3 39 d0 0f 83 2f 16 00 00 48 ba 00 00 00 00 00 fc ff df 89 c1 48 8d 3c 8d d0 76 cc 8b 49 89 f8 49 c1 e8 03 45 0f b6 04 10 <48> 89 fa 83 e2 07 83 c2 03 44 38 c2 7c 2f 45 84 c0 74 2a 48 89 4c RSP: 0018:ffffc900002c6978 EFLAGS: 00000a02 RAX: 000000000002c46c RBX: 0000000000000001 RCX: 000000000002c46c RDX: dffffc0000000000 RSI: 0000000000067066 RDI: ffffffff8bd78880 RBP: ffffc900002c6a30 R08: 0000000000000000 R09: 0000000000000007 R10: 0000000000000200 R11: 000000000002c46c R12: ffffc900002c6a38 R13: ffffc900002c69e8 R14: ffffc900002c6a1d R15: ffffffff83c46c0e arch_stack_walk+0x94/0xf0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x30/0x50 mm/kasan/common.c:57 kasan_save_track+0x14/0x30 mm/kasan/common.c:78 kasan_save_free_info+0x3b/0x70 mm/kasan/generic.c:584 poison_slab_object mm/kasan/common.c:253 [inline] __kasan_slab_free+0x43/0x70 mm/kasan/common.c:285 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:2689 [inline] slab_free mm/slub.c:6246 [inline] kfree+0x204/0x650 mm/slub.c:6561 usb_control_msg+0x39f/0x4b0 drivers/usb/core/message.c:173 usb_control_msg_recv+0xe3/0x180 drivers/usb/core/message.c:291 get_registers drivers/net/usb/rtl8150.c:161 [inline] rtl8150_reset+0x123/0x1b0 drivers/net/usb/rtl8150.c:323 rtl8150_probe+0x3a7/0x820 drivers/net/usb/rtl8150.c:923 usb_probe_interface+0x303/0x8f0 drivers/usb/core/driver.c:396 call_driver_probe drivers/base/dd.c:631 [inline] really_probe+0x241/0xa60 drivers/base/dd.c:709 __driver_probe_device+0x22e/0x480 drivers/base/dd.c:871 driver_probe_device+0x4c/0x1b0 drivers/base/dd.c:901 __device_attach_driver+0x1df/0x340 drivers/base/dd.c:1029 bus_for_each_drv+0x159/0x1e0 drivers/base/bus.c:500 __device_attach+0x1e4/0x4d0 drivers/base/dd.c:1101 device_initial_probe+0xaf/0xd0 drivers/base/dd.c:1156 bus_probe_device+0x64/0x160 drivers/base/bus.c:613 device_add+0x1210/0x1950 drivers/base/core.c:3706 usb_set_configuration+0xd97/0x1c60 drivers/usb/core/message.c:2268 usb_generic_driver_probe+0xa1/0xe0 drivers/usb/core/generic.c:250 usb_probe_device+0xef/0x400 drivers/usb/core/driver.c:291 call_driver_probe drivers/base/dd.c:631 [inline] really_probe+0x241/0xa60 drivers/base/dd.c:709 __driver_probe_device+0x22e/0x480 drivers/base/dd.c:871 driver_probe_device+0x4c/0x1b0 drivers/base/dd.c:901 __device_attach_driver+0x1df/0x340 drivers/base/dd.c:1029 bus_for_each_drv+0x159/0x1e0 drivers/base/bus.c:500 __device_attach+0x1e4/0x4d0 drivers/base/dd.c:1101 device_initial_probe+0xaf/0xd0 drivers/base/dd.c:1156 bus_probe_device+0x64/0x160 drivers/base/bus.c:613 device_add+0x1210/0x1950 drivers/base/core.c:3706 usb_new_device.cold+0x685/0x115c drivers/usb/core/hub.c:2695 hub_port_connect drivers/usb/core/hub.c:5567 [inline] hub_port_connect_change drivers/usb/core/hub.c:5707 [inline] port_event drivers/usb/core/hub.c:5871 [inline] hub_event+0x314d/0x4af0 drivers/usb/core/hub.c:5953 process_one_work+0xa0e/0x1980 kernel/workqueue.c:3302 process_scheduled_works kernel/workqueue.c:3385 [inline] worker_thread+0x5ef/0xe50 kernel/workqueue.c:3466 kthread+0x370/0x450 kernel/kthread.c:436 ret_from_fork+0x69a/0xc80 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 The buggy address belongs to a vmalloc virtual mapping The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e87 flags: 0x200000000000000(node=0|zone=2) raw: 0200000000000000 ffffea000407a1c8 ffffea000407a1c8 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x29c2(GFP_NOWAIT|__GFP_HIGHMEM|__GFP_IO|__GFP_FS|__GFP_ZERO), pid 2, tgid 2 (kthreadd), ts 2036900883, free_ts 0 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1858 prep_new_page mm/page_alloc.c:1866 [inline] get_page_from_freelist+0xf34/0x3a90 mm/page_alloc.c:3946 __alloc_frozen_pages_noprof+0x273/0x28a0 mm/page_alloc.c:5226 __alloc_pages_noprof+0xb/0x110 mm/page_alloc.c:5260 __alloc_pages_node_noprof include/linux/gfp.h:289 [inline] alloc_pages_node_noprof include/linux/gfp.h:316 [inline] vm_area_alloc_pages mm/vmalloc.c:3655 [inline] __vmalloc_area_node mm/vmalloc.c:3878 [inline] __vmalloc_node_range_noprof+0xe0c/0x1630 mm/vmalloc.c:4064 __vmalloc_node_noprof+0xad/0xf0 mm/vmalloc.c:4124 alloc_thread_stack_node kernel/fork.c:357 [inline] dup_task_struct kernel/fork.c:926 [inline] copy_process+0x7fb/0x7d20 kernel/fork.c:2088 kernel_clone+0x12e/0x9c0 kernel/fork.c:2723 kernel_thread+0xdb/0x120 kernel/fork.c:2784 create_kthread kernel/kthread.c:459 [inline] kthreadd+0x498/0x7a0 kernel/kthread.c:817 ret_from_fork+0x69a/0xc80 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 page_owner free stack trace missing Memory state around the buggy address: ffffc9000009f900: f1 f1 f1 00 00 00 f3 f3 f3 f3 f3 00 00 00 00 00 ffffc9000009f980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc9000009fa00: 00 f1 f1 f1 f1 f1 f1 04 f2 04 f3 f3 f3 00 00 00 ^ ffffc9000009fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffc9000009fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== ---------------- Code disassembly (best guess): 0: 89 c3 mov %eax,%ebx 2: 39 d0 cmp %edx,%eax 4: 0f 83 2f 16 00 00 jae 0x1639 a: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx 11: fc ff df 14: 89 c1 mov %eax,%ecx 16: 48 8d 3c 8d d0 76 cc lea -0x74338930(,%rcx,4),%rdi 1d: 8b 1e: 49 89 f8 mov %rdi,%r8 21: 49 c1 e8 03 shr $0x3,%r8 25: 45 0f b6 04 10 movzbl (%r8,%rdx,1),%r8d * 2a: 48 89 fa mov %rdi,%rdx <-- trapping instruction 2d: 83 e2 07 and $0x7,%edx 30: 83 c2 03 add $0x3,%edx 33: 44 38 c2 cmp %r8b,%dl 36: 7c 2f jl 0x67 38: 45 84 c0 test %r8b,%r8b 3b: 74 2a je 0x67 3d: 48 rex.W 3e: 89 .byte 0x89 3f: 4c rex.WR