================================================================== BUG: KASAN: slab-out-of-bounds in mcp2221_raw_event+0x106a/0x1240 drivers/hid/hid-mcp2221.c:957 Read of size 1 at addr ffff88807ab33fff by task udevd/5213 CPU: 1 UID: 0 PID: 5213 Comm: udevd Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_address_description+0x55/0x1e0 mm/kasan/report.c:378 print_report+0x58/0x70 mm/kasan/report.c:482 kasan_report+0x117/0x150 mm/kasan/report.c:595 mcp2221_raw_event+0x106a/0x1240 drivers/hid/hid-mcp2221.c:957 __hid_input_report drivers/hid/hid-core.c:2139 [inline] hid_input_report+0x41d/0x580 drivers/hid/hid-core.c:2166 hid_irq_in+0x47e/0x6d0 drivers/hid/usbhid/hid-core.c:286 __usb_hcd_giveback_urb+0x376/0x540 drivers/usb/core/hcd.c:1657 dummy_timer+0xbc0/0x4650 drivers/usb/gadget/udc/dummy_hcd.c:2005 __run_hrtimer kernel/time/hrtimer.c:1930 [inline] __hrtimer_run_queues+0x3c0/0xa20 kernel/time/hrtimer.c:1994 hrtimer_run_softirq+0x17a/0x240 kernel/time/hrtimer.c:2011 handle_softirqs+0x22a/0x840 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xca/0x220 kernel/softirq.c:735 irq_exit_rcu+0x9/0x30 kernel/softirq.c:752 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1061 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1061 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:__orc_find arch/x86/kernel/unwind_orc.c:110 [inline] RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:238 [inline] RIP: 0010:unwind_next_frame+0x2bb/0x2550 arch/x86/kernel/unwind_orc.c:510 Code: 17 04 00 00 4a 8d 14 ad f4 2f 46 90 45 29 e8 4a 8d 1c 82 48 83 c3 fc 49 89 d5 48 39 da 0f 86 1c 02 00 00 49 29 d5 49 c1 fd 02 <4a> 8d 04 6d 00 00 00 00 4c 01 e8 48 8d 14 46 48 bd 00 00 00 00 00 RSP: 0018:ffffc90002eb70b8 EFLAGS: 00000246 RAX: ffffffff9054f22c RBX: ffffffff9054f230 RCX: ffffffff9054f234 RDX: ffffffff9054f230 RSI: ffffffff90d64202 RDI: ffffffff8c2a9200 RBP: ffffffff9054f234 R08: 0000000000000009 R09: ffffffff8e95d260 R10: ffffc90002eb71d8 R11: ffffffff81b1aa30 R12: ffffffff8224644b R13: 0000000000000000 R14: ffffc90002eb7188 R15: ffffffff9054f230 arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 poison_kmalloc_redzone mm/kasan/common.c:398 [inline] __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:415 kasan_kmalloc include/linux/kasan.h:263 [inline] __do_kmalloc_node mm/slub.c:5292 [inline] __kmalloc_noprof+0x35c/0x760 mm/slub.c:5304 kmalloc_noprof include/linux/slab.h:954 [inline] tomoyo_realpath_from_path+0xe3/0x5d0 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_check_open_permission+0x229/0x470 security/tomoyo/file.c:776 security_file_open+0xa9/0x240 security/security.c:2637 do_dentry_open+0x384/0x14e0 fs/open.c:924 vfs_open+0x3b/0x340 fs/open.c:1079 do_open fs/namei.c:4699 [inline] path_openat+0x2e08/0x3860 fs/namei.c:4858 do_file_open+0x23e/0x4a0 fs/namei.c:4887 do_sys_openat2+0x113/0x200 fs/open.c:1364 do_sys_open fs/open.c:1370 [inline] __do_sys_openat fs/open.c:1386 [inline] __se_sys_openat fs/open.c:1381 [inline] __x64_sys_openat+0x138/0x170 fs/open.c:1381 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f4ce5ea7407 Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff RSP: 002b:00007ffca0a96560 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f4ce65f1880 RCX: 00007f4ce5ea7407 RDX: 0000000000080141 RSI: 000055bee1cb202e RDI: ffffffffffffff9c RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000000001a4 R11: 0000000000000202 R12: 00000000ffffffff R13: 00000000ffffffff R14: ffffffffffffffff R15: 0000000000000000 Allocated by task 15: kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 poison_kmalloc_redzone mm/kasan/common.c:398 [inline] __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:415 kasan_kmalloc include/linux/kasan.h:263 [inline] __do_kmalloc_node mm/slub.c:5292 [inline] __kmalloc_noprof+0x35c/0x760 mm/slub.c:5304 kmalloc_noprof include/linux/slab.h:954 [inline] kzalloc_noprof include/linux/slab.h:1188 [inline] cfg80211_inform_single_bss_data+0x934/0x1af0 net/wireless/scan.c:2344 cfg80211_inform_bss_data+0x266/0x3c40 net/wireless/scan.c:3226 cfg80211_inform_bss_frame_data+0x3c7/0x730 net/wireless/scan.c:3317 ieee80211_bss_info_update+0x794/0xa40 net/mac80211/scan.c:230 ieee80211_scan_rx+0x552/0xa40 net/mac80211/scan.c:364 __ieee80211_rx_handle_packet net/mac80211/rx.c:5298 [inline] ieee80211_rx_list+0x29e3/0x3710 net/mac80211/rx.c:5581 ieee80211_rx_napi+0x1b1/0x3e0 net/mac80211/rx.c:5604 ieee80211_rx include/net/mac80211.h:5271 [inline] ieee80211_handle_queued_frames+0xe8/0x1e0 net/mac80211/main.c:452 tasklet_action_common+0x2da/0x4b0 kernel/softirq.c:938 handle_softirqs+0x22a/0x840 kernel/softirq.c:622 run_ksoftirqd+0x36/0x60 kernel/softirq.c:1076 smpboot_thread_fn+0x541/0xa50 kernel/smpboot.c:160 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Freed by task 8861: kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:584 poison_slab_object mm/kasan/common.c:253 [inline] __kasan_slab_free+0x5c/0x80 mm/kasan/common.c:285 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:2689 [inline] __rcu_free_sheaf_prepare+0x12d/0x2a0 mm/slub.c:2940 rcu_free_sheaf+0x31/0x200 mm/slub.c:5842 rcu_do_batch kernel/rcu/tree.c:2617 [inline] rcu_core+0x7cd/0x1070 kernel/rcu/tree.c:2869 handle_softirqs+0x22a/0x840 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xca/0x220 kernel/softirq.c:735 irq_exit_rcu+0x9/0x30 kernel/softirq.c:752 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1061 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1061 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 The buggy address belongs to the object at ffff88807ab33f80 which belongs to the cache kmalloc-96 of size 96 The buggy address is located 31 bytes to the right of allocated 96-byte region [ffff88807ab33f80, ffff88807ab33fe0) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7ab33 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f5(slab) raw: 00fff00000000000 ffff88813fe34280 dead000000000100 dead000000000122 raw: 0000000000000000 0000000800200020 00000000f5000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0xd2820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1117, tgid 1117 (kworker/u8:9), ts 209016328600, free_ts 209015363057 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x231/0x280 mm/page_alloc.c:1858 prep_new_page mm/page_alloc.c:1866 [inline] get_page_from_freelist+0x24ba/0x2540 mm/page_alloc.c:3946 __alloc_frozen_pages_noprof+0x18d/0x380 mm/page_alloc.c:5226 alloc_slab_page mm/slub.c:3278 [inline] allocate_slab+0x77/0x660 mm/slub.c:3467 new_slab mm/slub.c:3525 [inline] refill_objects+0x339/0x3d0 mm/slub.c:7247 refill_sheaf mm/slub.c:2816 [inline] __pcs_replace_empty_main+0x321/0x720 mm/slub.c:4651 alloc_from_pcs mm/slub.c:4749 [inline] slab_alloc_node mm/slub.c:4883 [inline] __do_kmalloc_node mm/slub.c:5291 [inline] __kmalloc_noprof+0x474/0x760 mm/slub.c:5304 kmalloc_noprof include/linux/slab.h:954 [inline] kzalloc_noprof include/linux/slab.h:1188 [inline] cfg80211_inform_single_bss_data+0x934/0x1af0 net/wireless/scan.c:2344 cfg80211_inform_bss_data+0x266/0x3c40 net/wireless/scan.c:3226 cfg80211_inform_bss_frame_data+0x3c7/0x730 net/wireless/scan.c:3317 ieee80211_bss_info_update+0x794/0xa40 net/mac80211/scan.c:230 ieee80211_rx_bss_info net/mac80211/ibss.c:1088 [inline] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1569 [inline] ieee80211_ibss_rx_queued_mgmt+0x1901/0x2cb0 net/mac80211/ibss.c:1596 ieee80211_iface_process_skb net/mac80211/iface.c:1757 [inline] ieee80211_iface_work+0x845/0x1380 net/mac80211/iface.c:1811 cfg80211_wiphy_work+0x2cf/0x460 net/wireless/core.c:513 process_one_work kernel/workqueue.c:3302 [inline] process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3385 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3466 page last free pid 8384 tgid 8380 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1402 [inline] __free_frozen_pages+0xbc7/0xd30 mm/page_alloc.c:2943 tlb_batch_list_free mm/mmu_gather.c:161 [inline] tlb_finish_mmu+0x144/0x230 mm/mmu_gather.c:552 exit_mmap+0x498/0x9e0 mm/mmap.c:1313 __mmput+0x118/0x430 kernel/fork.c:1178 exit_mm+0x18e/0x250 kernel/exit.c:581 do_exit+0x6a2/0x22c0 kernel/exit.c:963 do_group_exit+0x21b/0x2d0 kernel/exit.c:1117 get_signal+0x1284/0x1330 kernel/signal.c:3037 arch_do_signal_or_restart+0xbc/0x830 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x480 kernel/entry/common.c:98 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:238 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:269 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:328 [inline] do_syscall_64+0x33e/0xf80 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f Memory state around the buggy address: ffff88807ab33e80: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc ffff88807ab33f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc >ffff88807ab33f80: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc ^ ffff88807ab34000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88807ab34080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== ---------------- Code disassembly (best guess), 2 bytes skipped: 0: 00 00 add %al,(%rax) 2: 4a 8d 14 ad f4 2f 46 lea -0x6fb9d00c(,%r13,4),%rdx 9: 90 a: 45 29 e8 sub %r13d,%r8d d: 4a 8d 1c 82 lea (%rdx,%r8,4),%rbx 11: 48 83 c3 fc add $0xfffffffffffffffc,%rbx 15: 49 89 d5 mov %rdx,%r13 18: 48 39 da cmp %rbx,%rdx 1b: 0f 86 1c 02 00 00 jbe 0x23d 21: 49 29 d5 sub %rdx,%r13 24: 49 c1 fd 02 sar $0x2,%r13 * 28: 4a 8d 04 6d 00 00 00 lea 0x0(,%r13,2),%rax <-- trapping instruction 2f: 00 30: 4c 01 e8 add %r13,%rax 33: 48 8d 14 46 lea (%rsi,%rax,2),%rdx 37: 48 rex.W 38: bd 00 00 00 00 mov $0x0,%ebp