================================================================== BUG: KASAN: slab-use-after-free in load_firmware_cb+0xbc/0x1638 drivers/media/tuners/xc2028.c:1372 Read of size 8 at addr ffff0000d2fc6318 by task kworker/1:28/6592 CPU: 1 UID: 0 PID: 6592 Comm: kworker/1:28 Not tainted 6.14.0-rc7-syzkaller-ga2392f333575 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events request_firmware_work_func Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0x198/0x550 mm/kasan/report.c:521 kasan_report+0xd8/0x138 mm/kasan/report.c:634 __asan_report_load8_noabort+0x20/0x2c mm/kasan/report_generic.c:381 load_firmware_cb+0xbc/0x1638 drivers/media/tuners/xc2028.c:1372 request_firmware_work_func+0x150/0x214 drivers/base/firmware_loader/main.c:1196 process_one_work+0x810/0x1638 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x97c/0xeec kernel/workqueue.c:3400 kthread+0x65c/0x7b0 kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Allocated by task 6794: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x40/0x78 mm/kasan/common.c:68 kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:562 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0xac/0xc4 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x2cc/0x428 mm/slub.c:4325 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] i2c_new_client_device+0xb4/0xf3c drivers/i2c/i2c-core-base.c:968 v4l2_i2c_new_subdev_board+0xb0/0x224 drivers/media/v4l2-core/v4l2-i2c.c:80 v4l2_i2c_new_subdev+0x144/0x1e4 drivers/media/v4l2-core/v4l2-i2c.c:135 em28xx_v4l2_init+0x5d8/0x28d4 drivers/media/usb/em28xx/em28xx-video.c:2594 em28xx_init_extension+0x10c/0x1b4 drivers/media/usb/em28xx/em28xx-core.c:1117 request_module_async+0x68/0x98 drivers/media/usb/em28xx/em28xx-cards.c:3457 process_one_work+0x810/0x1638 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x97c/0xeec kernel/workqueue.c:3400 kthread+0x65c/0x7b0 kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Freed by task 6794: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x40/0x78 mm/kasan/common.c:68 kasan_save_free_info+0x54/0x6c mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x64/0x8c mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4609 [inline] kfree+0x180/0x478 mm/slub.c:4757 i2c_new_client_device+0x4bc/0xf3c drivers/i2c/i2c-core-base.c:1045 v4l2_i2c_new_subdev_board+0xb0/0x224 drivers/media/v4l2-core/v4l2-i2c.c:80 v4l2_i2c_new_subdev+0x144/0x1e4 drivers/media/v4l2-core/v4l2-i2c.c:135 em28xx_v4l2_init+0x5d8/0x28d4 drivers/media/usb/em28xx/em28xx-video.c:2594 em28xx_init_extension+0x10c/0x1b4 drivers/media/usb/em28xx/em28xx-core.c:1117 request_module_async+0x68/0x98 drivers/media/usb/em28xx/em28xx-cards.c:3457 process_one_work+0x810/0x1638 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x97c/0xeec kernel/workqueue.c:3400 kthread+0x65c/0x7b0 kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 The buggy address belongs to the object at ffff0000d2fc6000 which belongs to the cache kmalloc-2k of size 2048 The buggy address is located 792 bytes inside of freed 2048-byte region [ffff0000d2fc6000, ffff0000d2fc6800) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d2fc5000 pfn:0x112fc0 head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 flags: 0x5ffc00000000240(workingset|head|node=0|zone=2|lastcpupid=0x7ff) page_type: f5(slab) raw: 05ffc00000000240 ffff0000c0002000 fffffdffc31a0c10 fffffdffc35b3e10 raw: ffff0000d2fc5000 0000000000080006 00000000f5000000 0000000000000000 head: 05ffc00000000240 ffff0000c0002000 fffffdffc31a0c10 fffffdffc35b3e10 head: ffff0000d2fc5000 0000000000080006 00000000f5000000 0000000000000000 head: 05ffc00000000003 fffffdffc34bf001 ffffffffffffffff 0000000000000000 head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000d2fc6200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff0000d2fc6280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff0000d2fc6300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff0000d2fc6380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff0000d2fc6400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================