================================================================== BUG: KASAN: slab-out-of-bounds in technisat_usb2_rc_query+0x5f5/0x650 Read of size 1 at addr ffff8881d8b36868 by task kworker/0:2/2529 CPU: 0 PID: 2529 Comm: kworker/0:2 Not tainted 5.1.0-rc3+ #7 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events dvb_usb_read_remote_control Call Trace: dump_stack+0xca/0x13e print_address_description+0x67/0x231 kasan_report.cold+0x1a/0x35 technisat_usb2_rc_query+0x5f5/0x650 dvb_usb_read_remote_control+0xe0/0x1c0 process_one_work+0x90a/0x1580 worker_thread+0x96/0xe20 kthread+0x30e/0x420 ret_from_fork+0x3a/0x50 Allocated by task 12: __kasan_kmalloc.constprop.0+0xbf/0xd0 dvb_usb_device_init.cold+0x463/0x11ae technisat_usb2_probe+0x7d/0x2c0 usb_probe_interface+0x30d/0x7b0 really_probe+0x296/0x680 driver_probe_device+0xf9/0x200 __device_attach_driver+0x1c4/0x230 bus_for_each_drv+0x15e/0x1e0 __device_attach+0x21e/0x360 bus_probe_device+0x1ec/0x2a0 device_add+0xaf4/0x1700 usb_set_configuration+0xdf2/0x1670 generic_probe+0x9d/0xd5 usb_probe_device+0xa8/0x110 really_probe+0x296/0x680 driver_probe_device+0xf9/0x200 __device_attach_driver+0x1c4/0x230 bus_for_each_drv+0x15e/0x1e0 __device_attach+0x21e/0x360 bus_probe_device+0x1ec/0x2a0 device_add+0xaf4/0x1700 usb_new_device.cold+0x8b8/0x1030 hub_event+0x1ac9/0x35a0 process_one_work+0x90a/0x1580 worker_thread+0x96/0xe20 kthread+0x30e/0x420 ret_from_fork+0x3a/0x50 Freed by task 1: __kasan_slab_free+0x130/0x180 kfree+0xd7/0x290 krealloc+0x78/0xc0 add_sysfs_param.isra.0+0xc8/0x930 param_sysfs_init+0x35f/0x430 do_one_initcall+0xd9/0x585 kernel_init_freeable+0x4b4/0x5a1 kernel_init+0xd/0x1bf ret_from_fork+0x3a/0x50 The buggy address belongs to the object at ffff8881d8b36780 which belongs to the cache kmalloc-256 of size 256 The buggy address is located 232 bytes inside of 256-byte region [ffff8881d8b36780, ffff8881d8b36880) The buggy address belongs to the page: page:ffffea000762cd80 count:1 mapcount:0 mapping:ffff8881dac02e00 index:0x0 flags: 0x200000000000200(slab) raw: 0200000000000200 dead000000000100 dead000000000200 ffff8881dac02e00 raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8881d8b36700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc ffff8881d8b36780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8881d8b36800: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc ^ ffff8881d8b36880: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 ffff8881d8b36900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================