From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-oo1-f69.google.com (mail-oo1-f69.google.com [209.85.161.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EB59F2459EA for ; Sun, 5 Apr 2026 01:39:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.161.69 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775353145; cv=none; b=NAGLMxY5j/57zHkMLzx2knMQHzp57rgwpjSjKExCjWCSij/8TdgjB6LRAAFGOAxc2BF5XN0u0wOsdIPUaEOPz1cYKoIPrFiQbKhLtTb+JQWbICzAuIwbyg4+aIKL6RSQhGn8LOPs9VKyrZfJxb6VLNYbW1D8NO2DtlhqCIhJ6oU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775353145; c=relaxed/simple; bh=mQwZvCHxOyK2u1kef8RxPOyl8whfOb/4NsrCg6DI4ZA=; h=MIME-Version:Date:In-Reply-To:Message-ID:Subject:From:To: Content-Type; b=slXA8JEnMjRYwg5c5NSiszhrCjYieJtRbe7PpWVgnbw86vBR6ttm5CxZQ56qS90Ib8J1uA8BsUP1iMOH7+Ijpetw3zC8MaPPCudo6BC7rS6f7H2MhKaZrBvXyhzkQi8aKCwikfx1ufsVp5PlGhRvSlrf+wZOl76HFeV1EQ6PDGI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com; arc=none smtp.client-ip=209.85.161.69 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com Received: by mail-oo1-f69.google.com with SMTP id 006d021491bc7-68347833f02so3356272eaf.1 for ; Sat, 04 Apr 2026 18:39:03 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775353143; x=1775957943; h=to:from:subject:message-id:in-reply-to:date:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=mukv5rjw4CiOtbceQNMa+82/UDDhDYXiuxAZK/9wNkI=; b=m4BZvgKFhsBPWrIH3kAcfzwfH2bRGN8Tp27mmgYQvtQSZzez1wWGWntPtRDVHVxS4u L6+FFPaA2TTFVjnRrKq8CemAQIGlZweEqBR6alLAwn06la0N4OdnbW9uyGtA3yn3dIzh ps0Ki6daHscjssZXoe+qmIZ/Qq7DEIP5GlcRMvabcvkTR96RYZRdFvtXyiPJ++buF6U0 /r50PS0UYUqykLuFTlZ23LueKo8/MxIPDMjvap83RehuIK2XQrP17D15yC+jmFAUyhxF LSJCAbXtPecijK93vh4MA8hhhnMJegjBR4dTz6UXPbJl9lQVgC2yHJBYtwlqzYWGozfb tJwA== X-Forwarded-Encrypted: i=1; AJvYcCVhDCDO09sEyjTdqhyjfGG0QAI49hWOOzvkKNqsEWMB3XLTDr2lyruJVPKZU/0XcjDFT50nf0nMLLA9kp8=@vger.kernel.org X-Gm-Message-State: AOJu0YxyGiHI2Z4u6GpozB47RkwzLLQUq05JZ67RIf+NwjKJ3aM7i21c laEHB00+yHSm9W6I/tVHE5km+81DTm9xxIFEdWYFzf0rCblb4hEIpz15ya2ARxBbhQKEl89sic9 Q7Q/asowTEz65Irt4ErMr2Wxv1QvthRUuYjd2GhQe5cGwm4NiqRnneM6KnS4= Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Received: by 2002:a05:6820:998:b0:67b:f1c8:edd8 with SMTP id 006d021491bc7-682205474bfmr4592718eaf.54.1775353142875; Sat, 04 Apr 2026 18:39:02 -0700 (PDT) Date: Sat, 04 Apr 2026 18:39:02 -0700 In-Reply-To: <20260405012053.369470-1-kartikey406@gmail.com> X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <69d1bd36.a70a0220.a26f2.0015.GAE@google.com> Subject: Re: [syzbot] [kernel?] INFO: rcu detected stall in kill From: syzbot To: kartikey406@gmail.com, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Hello, syzbot has tested the proposed patch but the reproducer is still triggering an issue: KASAN: slab-use-after-free Write in usb_anchor_urb usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested ================================================================== BUG: KASAN: slab-use-after-free in instrument_atomic_read_write include/linux/instrumented.h:112 [inline] BUG: KASAN: slab-use-after-free in atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:252 [inline] BUG: KASAN: slab-use-after-free in __refcount_add include/linux/refcount.h:283 [inline] BUG: KASAN: slab-use-after-free in __refcount_inc include/linux/refcount.h:366 [inline] BUG: KASAN: slab-use-after-free in refcount_inc include/linux/refcount.h:383 [inline] BUG: KASAN: slab-use-after-free in kref_get include/linux/kref.h:45 [inline] BUG: KASAN: slab-use-after-free in usb_get_urb drivers/usb/core/urb.c:113 [inline] BUG: KASAN: slab-use-after-free in usb_anchor_urb+0x45/0x220 drivers/usb/core/urb.c:131 Write of size 4 at addr ffff88802a8dce00 by task kworker/1:8/6502 CPU: 1 UID: 0 PID: 6502 Comm: kworker/1:8 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 Workqueue: events ath9k_hif_usb_reg_in_resubmit Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xba/0x230 mm/kasan/report.c:482 kasan_report+0x117/0x150 mm/kasan/report.c:595 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x264/0x2c0 mm/kasan/generic.c:200 instrument_atomic_read_write include/linux/instrumented.h:112 [inline] atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:252 [inline] __refcount_add include/linux/refcount.h:283 [inline] __refcount_inc include/linux/refcount.h:366 [inline] refcount_inc include/linux/refcount.h:383 [inline] kref_get include/linux/kref.h:45 [inline] usb_get_urb drivers/usb/core/urb.c:113 [inline] usb_anchor_urb+0x45/0x220 drivers/usb/core/urb.c:131 ath9k_hif_usb_reg_in_resubmit+0x86/0x120 drivers/net/wireless/ath/ath9k/hif_usb.c:746 process_one_work kernel/workqueue.c:3276 [inline] process_scheduled_works+0xb6e/0x18c0 kernel/workqueue.c:3359 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3440 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Allocated by task 6466: kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 poison_kmalloc_redzone mm/kasan/common.c:398 [inline] __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:415 kasan_kmalloc include/linux/kasan.h:263 [inline] __do_kmalloc_node mm/slub.c:5260 [inline] __kmalloc_noprof+0x35c/0x760 mm/slub.c:5272 kmalloc_noprof include/linux/slab.h:954 [inline] usb_alloc_urb+0x46/0x150 drivers/usb/core/urb.c:75 ath9k_hif_usb_alloc_reg_in_urbs drivers/net/wireless/ath/ath9k/hif_usb.c:1004 [inline] ath9k_hif_usb_alloc_urbs+0xb8c/0x1120 drivers/net/wireless/ath/ath9k/hif_usb.c:1070 ath9k_hif_usb_dev_init drivers/net/wireless/ath/ath9k/hif_usb.c:1156 [inline] ath9k_hif_usb_firmware_cb+0x127/0x4c0 drivers/net/wireless/ath/ath9k/hif_usb.c:1289 request_firmware_work_func+0x105/0x1c0 drivers/base/firmware_loader/main.c:1152 process_one_work kernel/workqueue.c:3276 [inline] process_scheduled_works+0xb6e/0x18c0 kernel/workqueue.c:3359 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3440 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Freed by task 6345: kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:584 poison_slab_object mm/kasan/common.c:253 [inline] __kasan_slab_free+0x5c/0x80 mm/kasan/common.c:285 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:2685 [inline] slab_free mm/slub.c:6165 [inline] kfree+0x1c1/0x630 mm/slub.c:6483 dummy_timer+0xbbd/0x45d0 drivers/usb/gadget/udc/dummy_hcd.c:1995 __run_hrtimer kernel/time/hrtimer.c:1785 [inline] __hrtimer_run_queues+0x53a/0xcc0 kernel/time/hrtimer.c:1849 hrtimer_run_softirq+0x182/0x5a0 kernel/time/hrtimer.c:1866 handle_softirqs+0x22a/0x870 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 The buggy address belongs to the object at ffff88802a8dce00 which belongs to the cache kmalloc-192 of size 192 The buggy address is located 0 bytes inside of freed 192-byte region [ffff88802a8dce00, ffff88802a8dcec0) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a8dc flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f5(slab) raw: 00fff00000000000 ffff88813fea63c0 dead000000000100 dead000000000122 raw: 0000000000000000 0000000800100010 00000000f5000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0xd2c00(GFP_NOIO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 9831863731, free_ts 9679699786 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x231/0x280 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x24dc/0x2580 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x18d/0x380 mm/page_alloc.c:5250 alloc_slab_page mm/slub.c:3292 [inline] allocate_slab+0x77/0x660 mm/slub.c:3481 new_slab mm/slub.c:3539 [inline] refill_objects+0x331/0x3c0 mm/slub.c:7175 refill_sheaf mm/slub.c:2812 [inline] __pcs_replace_empty_main+0x2e6/0x730 mm/slub.c:4615 alloc_from_pcs mm/slub.c:4717 [inline] slab_alloc_node mm/slub.c:4851 [inline] __do_kmalloc_node mm/slub.c:5259 [inline] __kmalloc_noprof+0x474/0x760 mm/slub.c:5272 kmalloc_noprof include/linux/slab.h:954 [inline] usb_alloc_urb+0x46/0x150 drivers/usb/core/urb.c:75 usb_internal_control_msg drivers/usb/core/message.c:110 [inline] usb_control_msg+0x118/0x3e0 drivers/usb/core/message.c:167 usb_get_descriptor+0xb1/0x3e0 drivers/usb/core/message.c:852 usb_get_configuration+0x2c3/0x54f0 drivers/usb/core/config.c:956 usb_enumerate_device drivers/usb/core/hub.c:2527 [inline] usb_new_device+0x145/0x16f0 drivers/usb/core/hub.c:2665 register_root_hub+0x270/0x5f0 drivers/usb/core/hcd.c:990 usb_add_hcd+0xba1/0x10b0 drivers/usb/core/hcd.c:2987 vhci_hcd_probe+0x141/0x3e0 drivers/usb/usbip/vhci_hcd.c:1388 platform_probe+0xf9/0x190 drivers/base/platform.c:1418 page last free pid 29 tgid 29 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] __free_frozen_pages+0xc2b/0xdb0 mm/page_alloc.c:2978 vfree+0x25a/0x400 mm/vmalloc.c:3479 delayed_vfree_work+0x55/0x80 mm/vmalloc.c:3398 process_one_work kernel/workqueue.c:3276 [inline] process_scheduled_works+0xb6e/0x18c0 kernel/workqueue.c:3359 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3440 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Memory state around the buggy address: ffff88802a8dcd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88802a8dcd80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc >ffff88802a8dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88802a8dce80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ffff88802a8dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== Tested on: commit: 3aae9383 Merge tag 'input-for-v7.0-rc6' of git://git.k.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=135c4e06580000 kernel config: https://syzkaller.appspot.com/x/.config?x=6754c86e8d9e4c91 dashboard link: https://syzkaller.appspot.com/bug?extid=9b95da55ba5146a60734 compiler: Debian clang version 21.1.8 (++20251221033036+2078da43e25a-1~exp1~20251221153213.50), Debian LLD 21.1.8 patch: https://syzkaller.appspot.com/x/patch.diff?x=131ff3d6580000