Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 104.811215] ================================================================== [ 104.812011] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc8/0x200 [ 104.813000] Read of size 1 at addr ffff0000c67feeff by task kunit_try_catch/205 [ 104.814099] [ 104.814445] CPU: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 104.815496] Hardware name: linux,dummy-virt (DT) [ 104.816216] Call trace: [ 104.816757] dump_backtrace+0xe0/0x134 [ 104.817424] show_stack+0x20/0x2c [ 104.817999] dump_stack_lvl+0x88/0xb4 [ 104.818666] print_report+0x158/0x44c [ 104.819289] kasan_report+0xc8/0x180 [ 104.819917] __asan_load1+0x68/0x74 [ 104.820587] kmalloc_oob_left+0xc8/0x200 [ 104.821305] kunit_try_run_case+0x8c/0x124 [ 104.822006] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 104.822669] kthread+0x15c/0x170 [ 104.823047] ret_from_fork+0x10/0x20 [ 104.823419] [ 104.823601] Allocated by task 1: [ 104.823951] kasan_save_stack+0x3c/0x70 [ 104.824536] kasan_set_track+0x2c/0x40 [ 104.825047] kasan_save_alloc_info+0x24/0x34 [ 104.825735] __kasan_kmalloc+0xd4/0xe0 [ 104.826126] __kmalloc_node_track_caller+0x70/0x1c0 [ 104.826562] kvasprintf+0xe8/0x190 [ 104.826997] __kthread_create_on_node+0x290/0x300 [ 104.827555] kthread_create_on_node+0xe4/0x130 [ 104.828204] kunit_try_catch_run+0xec/0x34c [ 104.829024] kunit_run_case_catch_errors+0x15c/0x1e8 [ 104.829897] kunit_run_tests+0x324/0x6c4 [ 104.830555] __kunit_test_suites_init+0x88/0xbc [ 104.831288] kunit_run_all_tests+0x18c/0x2f0 [ 104.831797] kernel_init_freeable+0x33c/0x380 [ 104.832219] kernel_init+0x2c/0x150 [ 104.832941] ret_from_fork+0x10/0x20 [ 104.833615] [ 104.833956] The buggy address belongs to the object at ffff0000c67fee00 [ 104.833956] which belongs to the cache kmalloc-128 of size 128 [ 104.835430] The buggy address is located 127 bytes to the right of [ 104.835430] 128-byte region [ffff0000c67fee00, ffff0000c67fee80) [ 104.836985] [ 104.837372] The buggy address belongs to the physical page: [ 104.838109] page:0000000038e10ea4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067fe [ 104.839251] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 104.839943] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 104.840482] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 104.840982] page dumped because: kasan: bad access detected [ 104.841355] [ 104.841533] Memory state around the buggy address: [ 104.842467] ffff0000c67fed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.843733] ffff0000c67fee00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.845066] >ffff0000c67fee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.846289] ^ [ 104.847558] ffff0000c67fef00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.848915] ffff0000c67fef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.850031] ==================================================================
[ 74.622957] ================================================================== [ 74.623870] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x9c/0x154 [ 74.624600] Read of size 1 at addr ffff0000c59e1dff by task kunit_try_catch/121 [ 74.625383] [ 74.625668] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.626737] Hardware name: linux,dummy-virt (DT) [ 74.627158] Call trace: [ 74.627478] dump_backtrace+0xf8/0x118 [ 74.627992] show_stack+0x18/0x24 [ 74.628475] __dump_stack+0x28/0x38 [ 74.628936] dump_stack_lvl+0x54/0x6c [ 74.629363] print_address_description+0x7c/0x1ec [ 74.629933] print_report+0x50/0x68 [ 74.630388] kasan_report+0xac/0x100 [ 74.630841] __asan_load1+0x6c/0x70 [ 74.631318] kmalloc_oob_left+0x9c/0x154 [ 74.631841] kunit_try_run_case+0x80/0x184 [ 74.632440] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.633047] kthread+0x16c/0x21c [ 74.633790] ret_from_fork+0x10/0x20 [ 74.634235] [ 74.634444] Allocated by task 1: [ 74.634768] kasan_set_track+0x4c/0x80 [ 74.635281] kasan_save_alloc_info+0x28/0x34 [ 74.635782] __kasan_kmalloc+0x88/0xa0 [ 74.636250] __kmalloc_node_track_caller+0xc4/0xf0 [ 74.636840] kvasprintf+0xac/0x138 [ 74.637430] __kthread_create_on_node+0x1dc/0x28c [ 74.638018] kthread_create_on_node+0x8c/0xbc [ 74.638502] kunit_try_catch_run+0xac/0x314 [ 74.638992] kunit_run_tests+0x2fc/0xa40 [ 74.639431] __kunit_test_suites_init+0x74/0xa8 [ 74.639939] kunit_exec_run_tests+0x64/0x74 [ 74.640417] kunit_run_all_tests+0x88/0x1e0 [ 74.640950] kernel_init_freeable+0x174/0x1ec [ 74.641661] kernel_init+0x20/0x138 [ 74.642098] ret_from_fork+0x10/0x20 [ 74.642490] [ 74.642696] The buggy address belongs to the object at ffff0000c59e1d00 [ 74.642696] which belongs to the cache kmalloc-128 of size 128 [ 74.643601] The buggy address is located 127 bytes to the right of [ 74.643601] 128-byte region [ffff0000c59e1d00, ffff0000c59e1d80) [ 74.644559] [ 74.644774] The buggy address belongs to the physical page: [ 74.645312] page:000000000015983b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e1 [ 74.646245] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.646951] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.647566] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.648237] page dumped because: kasan: bad access detected [ 74.648711] [ 74.648936] Memory state around the buggy address: [ 74.649434] ffff0000c59e1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.650267] ffff0000c59e1d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.650899] >ffff0000c59e1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.651518] ^ [ 74.652109] ffff0000c59e1e00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.653274] ffff0000c59e1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.653892] ==================================================================
[ 73.584537] ================================================================== [ 73.585273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x9c/0x154 [ 73.586507] Read of size 1 at addr ffff0000c54ff4ff by task kunit_try_catch/121 [ 73.588266] [ 73.588688] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.590154] Hardware name: linux,dummy-virt (DT) [ 73.591228] Call trace: [ 73.591889] dump_backtrace+0xf4/0x114 [ 73.593065] show_stack+0x18/0x24 [ 73.593935] __dump_stack+0x28/0x38 [ 73.594901] dump_stack_lvl+0x50/0x68 [ 73.596079] print_address_description+0x7c/0x1ec [ 73.597179] print_report+0x50/0x68 [ 73.597962] kasan_report+0xac/0xfc [ 73.598394] __asan_load1+0x6c/0x70 [ 73.599003] kmalloc_oob_left+0x9c/0x154 [ 73.599929] kunit_try_run_case+0x80/0x184 [ 73.600792] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.601653] kthread+0x16c/0x21c [ 73.602282] ret_from_fork+0x10/0x20 [ 73.602922] [ 73.603225] Allocated by task 1: [ 73.603760] kasan_set_track+0x4c/0x80 [ 73.604451] kasan_save_alloc_info+0x28/0x34 [ 73.605139] __kasan_kmalloc+0x88/0xa0 [ 73.605834] kmalloc_trace+0x54/0x68 [ 73.606468] __kthread_create_on_node+0x90/0x28c [ 73.607219] kthread_create_on_node+0x8c/0xbc [ 73.608048] kunit_try_catch_run+0xac/0x30c [ 73.608490] kunit_run_tests+0x2f8/0xa3c [ 73.608907] __kunit_test_suites_init+0x74/0xa8 [ 73.609351] kunit_exec_run_tests+0x64/0x74 [ 73.609854] kunit_run_all_tests+0x88/0x1e0 [ 73.610380] kernel_init_freeable+0x174/0x1e4 [ 73.610832] kernel_init+0x20/0x138 [ 73.611372] ret_from_fork+0x10/0x20 [ 73.612018] [ 73.612255] Freed by task 1: [ 73.612591] kasan_set_track+0x4c/0x80 [ 73.613094] kasan_save_free_info+0x3c/0x60 [ 73.613622] ____kasan_slab_free+0xe8/0x140 [ 73.614134] __kasan_slab_free+0x18/0x28 [ 73.614636] __kmem_cache_free+0xdc/0x27c [ 73.615119] kfree+0x60/0x74 [ 73.615533] __kthread_create_on_node+0x204/0x28c [ 73.616307] kthread_create_on_node+0x8c/0xbc [ 73.616802] kunit_try_catch_run+0xac/0x30c [ 73.617316] kunit_run_tests+0x2f8/0xa3c [ 73.617776] __kunit_test_suites_init+0x74/0xa8 [ 73.618291] kunit_exec_run_tests+0x64/0x74 [ 73.618769] kunit_run_all_tests+0x88/0x1e0 [ 73.619271] kernel_init_freeable+0x174/0x1e4 [ 73.619769] kernel_init+0x20/0x138 [ 73.620219] ret_from_fork+0x10/0x20 [ 73.620647] [ 73.620897] The buggy address belongs to the object at ffff0000c54ff400 [ 73.620897] which belongs to the cache kmalloc-128 of size 128 [ 73.621812] The buggy address is located 127 bytes to the right of [ 73.621812] 128-byte region [ffff0000c54ff400, ffff0000c54ff480) [ 73.622734] [ 73.622963] The buggy address belongs to the physical page: [ 73.623415] page:00000000a33f1f12 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ff [ 73.624401] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.625127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.625884] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.626497] page dumped because: kasan: bad access detected [ 73.626989] [ 73.627178] Memory state around the buggy address: [ 73.627638] ffff0000c54ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.628504] ffff0000c54ff400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.629148] >ffff0000c54ff480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.629757] ^ [ 73.630336] ffff0000c54ff500: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.630931] ffff0000c54ff580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.631530] ==================================================================
[ 72.247949] ================================================================== [ 72.248958] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc0/0x200 [ 72.249744] Read of size 1 at addr ffff0000c596cfff by task kunit_try_catch/121 [ 72.250672] [ 72.251128] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.251825] Hardware name: linux,dummy-virt (DT) [ 72.252331] Call trace: [ 72.252709] dump_backtrace.part.0+0xdc/0xf0 [ 72.253305] show_stack+0x18/0x30 [ 72.253876] dump_stack_lvl+0x64/0x80 [ 72.254290] print_report+0x158/0x438 [ 72.254749] kasan_report+0xb4/0xf4 [ 72.255149] __asan_load1+0x68/0x74 [ 72.255638] kmalloc_oob_left+0xc0/0x200 [ 72.256115] kunit_try_run_case+0x84/0x120 [ 72.256575] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.257148] kthread+0x180/0x190 [ 72.257516] ret_from_fork+0x10/0x20 [ 72.257936] [ 72.258149] The buggy address belongs to the object at ffff0000c596cf00 [ 72.258149] which belongs to the cache cred_jar of size 176 [ 72.259311] The buggy address is located 79 bytes to the right of [ 72.259311] 176-byte region [ffff0000c596cf00, ffff0000c596cfb0) [ 72.260199] [ 72.260406] The buggy address belongs to the physical page: [ 72.260871] page:000000008af61330 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 72.261591] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.262534] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c02ce000 [ 72.263205] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.263804] page dumped because: kasan: bad access detected [ 72.264239] [ 72.264428] Memory state around the buggy address: [ 72.264879] ffff0000c596ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.265472] ffff0000c596cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.266319] >ffff0000c596cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.266904] ^ [ 72.267472] ffff0000c596d000: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.268064] ffff0000c596d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.268634] ==================================================================
[ 63.932914] ================================================================== [ 63.934144] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xd4/0x1e8 [ 63.934755] Read of size 1 at addr ffff0000c580feff by task kunit_try_catch/119 [ 63.935289] [ 63.935507] CPU: 0 PID: 119 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 63.936144] Hardware name: linux,dummy-virt (DT) [ 63.936582] Call trace: [ 63.936874] dump_backtrace+0x110/0x120 [ 63.937302] show_stack+0x18/0x28 [ 63.938151] dump_stack_lvl+0x68/0x84 [ 63.938567] print_report+0x158/0x484 [ 63.938966] kasan_report+0x98/0xe0 [ 63.939355] __asan_load1+0x68/0x78 [ 63.939744] kmalloc_oob_left+0xd4/0x1e8 [ 63.940167] kunit_try_run_case+0x7c/0x120 [ 63.940611] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 63.941091] kthread+0x1a4/0x1b8 [ 63.941606] ret_from_fork+0x10/0x20 [ 63.941978] [ 63.942158] Allocated by task 1: [ 63.942523] kasan_save_stack+0x2c/0x58 [ 63.942891] kasan_set_track+0x2c/0x40 [ 63.943422] kasan_save_alloc_info+0x24/0x38 [ 63.943844] __kasan_kmalloc+0xa0/0xb8 [ 63.944213] kmalloc_trace+0x50/0x68 [ 63.944601] __kthread_create_on_node+0xc8/0x2c0 [ 63.945044] kthread_create_on_node+0xa4/0xd8 [ 63.945937] kunit_try_catch_run+0xe8/0x348 [ 63.946378] kunit_run_case_catch_errors+0x150/0x1c8 [ 63.946872] kunit_run_tests+0x2d4/0x7a0 [ 63.947272] __kunit_test_suites_init+0x84/0xb8 [ 63.947733] kunit_run_all_tests+0x188/0x2f0 [ 63.948183] kernel_init_freeable+0x2f4/0x338 [ 63.948650] kernel_init+0x24/0x148 [ 63.949004] ret_from_fork+0x10/0x20 [ 63.949387] [ 63.949839] Freed by task 1: [ 63.950129] kasan_save_stack+0x2c/0x58 [ 63.950519] kasan_set_track+0x2c/0x40 [ 63.950901] kasan_save_free_info+0x38/0x60 [ 63.951356] __kasan_slab_free+0xe8/0x158 [ 63.951709] __kmem_cache_free+0x138/0x2b0 [ 63.952164] kfree+0x5c/0x70 [ 63.952494] __kthread_create_on_node+0x18c/0x2c0 [ 63.952918] kthread_create_on_node+0xa4/0xd8 [ 63.953326] kunit_try_catch_run+0xe8/0x348 [ 63.953755] kunit_run_case_catch_errors+0x150/0x1c8 [ 63.954224] kunit_run_tests+0x2d4/0x7a0 [ 63.954639] __kunit_test_suites_init+0x84/0xb8 [ 63.955075] kunit_run_all_tests+0x188/0x2f0 [ 63.955957] kernel_init_freeable+0x2f4/0x338 [ 63.956421] kernel_init+0x24/0x148 [ 63.956784] ret_from_fork+0x10/0x20 [ 63.957162] [ 63.957360] The buggy address belongs to the object at ffff0000c580fe00 [ 63.957360] which belongs to the cache kmalloc-128 of size 128 [ 63.958458] The buggy address is located 127 bytes to the right of [ 63.958458] 128-byte region [ffff0000c580fe00, ffff0000c580fe80) [ 63.959318] [ 63.959500] The buggy address belongs to the physical page: [ 63.959910] page:0000000019561651 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10580f [ 63.960649] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 63.961256] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 63.962510] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 63.963047] page dumped because: kasan: bad access detected [ 63.963504] [ 63.963691] Memory state around the buggy address: [ 63.964077] ffff0000c580fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.964632] ffff0000c580fe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.965196] >ffff0000c580fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.966107] ^ [ 63.966624] ffff0000c580ff00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.967182] ffff0000c580ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.967725] ==================================================================
[ 30.273889] ================================================================== [ 30.274291] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xcb/0x1e0 [ 30.274625] Read of size 1 at addr ffff888102f54abf by task kunit_try_catch/225 [ 30.274989] [ 30.275135] CPU: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 30.275585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.276098] Call Trace: [ 30.276285] <TASK> [ 30.276414] dump_stack_lvl+0x49/0x62 [ 30.276653] print_report+0x189/0x492 [ 30.276936] ? kasan_complete_mode_report_info+0x7c/0x200 [ 30.277300] ? kmalloc_oob_left+0xcb/0x1e0 [ 30.277546] kasan_report+0x10c/0x190 [ 30.277789] ? kmalloc_oob_left+0xcb/0x1e0 [ 30.278086] __asan_load1+0x62/0x70 [ 30.278319] kmalloc_oob_left+0xcb/0x1e0 [ 30.278503] ? kmalloc_pagealloc_oob_right+0x1c0/0x1c0 [ 30.278794] ? __kunit_add_resource+0xd1/0x100 [ 30.279123] kunit_try_run_case+0x8f/0xd0 [ 30.279426] ? kunit_catch_run_case+0x80/0x80 [ 30.279658] ? kunit_try_catch_throw+0x40/0x40 [ 30.279934] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.280267] kthread+0x17b/0x1b0 [ 30.280492] ? kthread_complete_and_exit+0x30/0x30 [ 30.280760] ret_from_fork+0x22/0x30 [ 30.281025] </TASK> [ 30.281207] [ 30.281324] Allocated by task 27: [ 30.281539] kasan_save_stack+0x41/0x70 [ 30.281798] kasan_set_track+0x25/0x40 [ 30.282020] kasan_save_alloc_info+0x1e/0x30 [ 30.282296] __kasan_kmalloc+0xb6/0xc0 [ 30.282546] __kmalloc_node_track_caller+0x62/0x170 [ 30.282858] kvasprintf+0xc2/0x150 [ 30.283036] kasprintf+0xb3/0xe0 [ 30.283246] input_devnode+0x3b/0x50 [ 30.283419] device_get_devnode+0xcb/0x150 [ 30.283670] dev_uevent+0x28e/0x410 [ 30.283880] kobject_uevent_env+0x33b/0x890 [ 30.284139] kobject_uevent+0xb/0x20 [ 30.284422] device_add+0x73a/0xf50 [ 30.284662] cdev_device_add+0xf2/0x160 [ 30.284836] evdev_connect+0x228/0x260 [ 30.285064] input_attach_handler.isra.0+0xb8/0xe0 [ 30.285354] input_register_device.cold+0xcc/0x1a3 [ 30.285628] psmouse_connect+0x4f0/0x680 [ 30.285893] serio_driver_probe+0x55/0x70 [ 30.286087] really_probe+0x138/0x520 [ 30.286439] __driver_probe_device+0xcd/0x1d0 [ 30.286682] driver_probe_device+0x4f/0x100 [ 30.286938] __driver_attach+0x13c/0x290 [ 30.287213] bus_for_each_dev+0x10c/0x160 [ 30.287453] driver_attach+0x2b/0x40 [ 30.287664] serio_handle_event+0x199/0x3c0 [ 30.287847] process_one_work+0x444/0x750 [ 30.288089] worker_thread+0x91/0x6c0 [ 30.288434] kthread+0x17b/0x1b0 [ 30.288634] ret_from_fork+0x22/0x30 [ 30.288942] [ 30.289103] Freed by task 27: [ 30.289283] kasan_save_stack+0x41/0x70 [ 30.289496] kasan_set_track+0x25/0x40 [ 30.289669] kasan_save_free_info+0x2e/0x50 [ 30.290031] ____kasan_slab_free+0x175/0x1d0 [ 30.290331] __kasan_slab_free+0x12/0x20 [ 30.290592] __kmem_cache_free+0x188/0x2f0 [ 30.290847] kfree+0x78/0x120 [ 30.291052] dev_uevent+0x2e1/0x410 [ 30.291314] kobject_uevent_env+0x33b/0x890 [ 30.291585] kobject_uevent+0xb/0x20 [ 30.291797] device_add+0x73a/0xf50 [ 30.292001] cdev_device_add+0xf2/0x160 [ 30.292439] evdev_connect+0x228/0x260 [ 30.292683] input_attach_handler.isra.0+0xb8/0xe0 [ 30.292877] input_register_device.cold+0xcc/0x1a3 [ 30.293251] psmouse_connect+0x4f0/0x680 [ 30.293693] serio_driver_probe+0x55/0x70 [ 30.293991] really_probe+0x138/0x520 [ 30.294255] __driver_probe_device+0xcd/0x1d0 [ 30.294571] driver_probe_device+0x4f/0x100 [ 30.294852] __driver_attach+0x13c/0x290 [ 30.295070] bus_for_each_dev+0x10c/0x160 [ 30.295333] driver_attach+0x2b/0x40 [ 30.295577] serio_handle_event+0x199/0x3c0 [ 30.295814] process_one_work+0x444/0x750 [ 30.296156] worker_thread+0x91/0x6c0 [ 30.296367] kthread+0x17b/0x1b0 [ 30.296516] ret_from_fork+0x22/0x30 [ 30.296790] [ 30.296950] The buggy address belongs to the object at ffff888102f54aa0 [ 30.296950] which belongs to the cache kmalloc-16 of size 16 [ 30.297614] The buggy address is located 15 bytes to the right of [ 30.297614] 16-byte region [ffff888102f54aa0, ffff888102f54ab0) [ 30.298196] [ 30.298356] The buggy address belongs to the physical page: [ 30.298627] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 30.298974] flags: 0x200000000000200(slab|node=0|zone=2) [ 30.299338] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 30.299857] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 30.300176] page dumped because: kasan: bad access detected [ 30.300600] [ 30.300700] Memory state around the buggy address: [ 30.300954] ffff888102f54980: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 30.301298] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 30.301684] >ffff888102f54a80: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 30.302025] ^ [ 30.302310] ffff888102f54b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.302650] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.302990] ==================================================================