Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 27.782119] ================================================================== [ 27.782386] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 27.782528] Read of size 8 at addr fff00000c67e4878 by task kunit_try_catch/283 [ 27.782707] [ 27.782851] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.784288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.784371] Hardware name: linux,dummy-virt (DT) [ 27.784465] Call trace: [ 27.784570] show_stack+0x20/0x38 (C) [ 27.785020] dump_stack_lvl+0x8c/0xd0 [ 27.785233] print_report+0x118/0x608 [ 27.785610] kasan_report+0xdc/0x128 [ 27.786019] __asan_report_load8_noabort+0x20/0x30 [ 27.786172] copy_to_kernel_nofault+0x204/0x250 [ 27.786319] copy_to_kernel_nofault_oob+0x158/0x418 [ 27.786863] kunit_try_run_case+0x170/0x3f0 [ 27.787020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.787158] kthread+0x328/0x630 [ 27.787280] ret_from_fork+0x10/0x20 [ 27.787427] [ 27.787565] Allocated by task 283: [ 27.787650] kasan_save_stack+0x3c/0x68 [ 27.788112] kasan_save_track+0x20/0x40 [ 27.788292] kasan_save_alloc_info+0x40/0x58 [ 27.788409] __kasan_kmalloc+0xd4/0xd8 [ 27.788515] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.788857] copy_to_kernel_nofault_oob+0xc8/0x418 [ 27.788990] kunit_try_run_case+0x170/0x3f0 [ 27.789095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.789267] kthread+0x328/0x630 [ 27.789374] ret_from_fork+0x10/0x20 [ 27.789523] [ 27.789626] The buggy address belongs to the object at fff00000c67e4800 [ 27.789626] which belongs to the cache kmalloc-128 of size 128 [ 27.789820] The buggy address is located 0 bytes to the right of [ 27.789820] allocated 120-byte region [fff00000c67e4800, fff00000c67e4878) [ 27.790027] [ 27.790411] The buggy address belongs to the physical page: [ 27.790506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4 [ 27.790647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.791236] page_type: f5(slab) [ 27.791404] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.791609] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.792007] page dumped because: kasan: bad access detected [ 27.792102] [ 27.792157] Memory state around the buggy address: [ 27.792241] fff00000c67e4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.792361] fff00000c67e4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.792478] >fff00000c67e4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.792605] ^ [ 27.793067] fff00000c67e4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.793193] fff00000c67e4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.793295] ================================================================== [ 27.800693] ================================================================== [ 27.800829] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 27.801227] Write of size 8 at addr fff00000c67e4878 by task kunit_try_catch/283 [ 27.801724] [ 27.801803] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.802179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.802640] Hardware name: linux,dummy-virt (DT) [ 27.802760] Call trace: [ 27.802827] show_stack+0x20/0x38 (C) [ 27.802975] dump_stack_lvl+0x8c/0xd0 [ 27.803100] print_report+0x118/0x608 [ 27.803216] kasan_report+0xdc/0x128 [ 27.803377] kasan_check_range+0x100/0x1a8 [ 27.803531] __kasan_check_write+0x20/0x30 [ 27.803664] copy_to_kernel_nofault+0x8c/0x250 [ 27.803991] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 27.804146] kunit_try_run_case+0x170/0x3f0 [ 27.804292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.804437] kthread+0x328/0x630 [ 27.805153] ret_from_fork+0x10/0x20 [ 27.805353] [ 27.805409] Allocated by task 283: [ 27.805511] kasan_save_stack+0x3c/0x68 [ 27.805802] kasan_save_track+0x20/0x40 [ 27.806021] kasan_save_alloc_info+0x40/0x58 [ 27.806123] __kasan_kmalloc+0xd4/0xd8 [ 27.806231] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.806507] copy_to_kernel_nofault_oob+0xc8/0x418 [ 27.806654] kunit_try_run_case+0x170/0x3f0 [ 27.806755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.806899] kthread+0x328/0x630 [ 27.807030] ret_from_fork+0x10/0x20 [ 27.807687] [ 27.807751] The buggy address belongs to the object at fff00000c67e4800 [ 27.807751] which belongs to the cache kmalloc-128 of size 128 [ 27.808165] The buggy address is located 0 bytes to the right of [ 27.808165] allocated 120-byte region [fff00000c67e4800, fff00000c67e4878) [ 27.808428] [ 27.808481] The buggy address belongs to the physical page: [ 27.808558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4 [ 27.808685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.808827] page_type: f5(slab) [ 27.809192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.809388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.809501] page dumped because: kasan: bad access detected [ 27.809579] [ 27.809645] Memory state around the buggy address: [ 27.809821] fff00000c67e4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.809981] fff00000c67e4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.810657] >fff00000c67e4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.810925] ^ [ 27.811098] fff00000c67e4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.811394] fff00000c67e4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.811768] ==================================================================
[ 15.354083] ================================================================== [ 15.355888] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 15.356467] Read of size 8 at addr ffff888102756778 by task kunit_try_catch/302 [ 15.357318] [ 15.357678] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.357733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.357748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.357779] Call Trace: [ 15.357794] <TASK> [ 15.357814] dump_stack_lvl+0x73/0xb0 [ 15.357845] print_report+0xd1/0x650 [ 15.357871] ? __virt_addr_valid+0x1db/0x2d0 [ 15.357896] ? copy_to_kernel_nofault+0x225/0x260 [ 15.357921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.357945] ? copy_to_kernel_nofault+0x225/0x260 [ 15.357970] kasan_report+0x141/0x180 [ 15.357994] ? copy_to_kernel_nofault+0x225/0x260 [ 15.358024] __asan_report_load8_noabort+0x18/0x20 [ 15.358046] copy_to_kernel_nofault+0x225/0x260 [ 15.358073] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 15.358099] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 15.358132] ? finish_task_switch.isra.0+0x153/0x700 [ 15.358158] ? __schedule+0x10cc/0x2b30 [ 15.358184] ? trace_hardirqs_on+0x37/0xe0 [ 15.358218] ? __pfx_read_tsc+0x10/0x10 [ 15.358239] ? ktime_get_ts64+0x86/0x230 [ 15.358266] kunit_try_run_case+0x1a5/0x480 [ 15.358291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.358314] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.358479] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.358506] ? __kthread_parkme+0x82/0x180 [ 15.358531] ? preempt_count_sub+0x50/0x80 [ 15.358556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.358613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.358639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.358663] kthread+0x337/0x6f0 [ 15.358686] ? trace_preempt_on+0x20/0xc0 [ 15.358710] ? __pfx_kthread+0x10/0x10 [ 15.358733] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.358756] ? calculate_sigpending+0x7b/0xa0 [ 15.358780] ? __pfx_kthread+0x10/0x10 [ 15.358803] ret_from_fork+0x41/0x80 [ 15.358825] ? __pfx_kthread+0x10/0x10 [ 15.358847] ret_from_fork_asm+0x1a/0x30 [ 15.358881] </TASK> [ 15.358893] [ 15.375628] Allocated by task 302: [ 15.376079] kasan_save_stack+0x45/0x70 [ 15.376676] kasan_save_track+0x18/0x40 [ 15.377208] kasan_save_alloc_info+0x3b/0x50 [ 15.377889] __kasan_kmalloc+0xb7/0xc0 [ 15.378307] __kmalloc_cache_noprof+0x189/0x420 [ 15.378776] copy_to_kernel_nofault_oob+0x12f/0x560 [ 15.379438] kunit_try_run_case+0x1a5/0x480 [ 15.379766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.379954] kthread+0x337/0x6f0 [ 15.380081] ret_from_fork+0x41/0x80 [ 15.380392] ret_from_fork_asm+0x1a/0x30 [ 15.380893] [ 15.381059] The buggy address belongs to the object at ffff888102756700 [ 15.381059] which belongs to the cache kmalloc-128 of size 128 [ 15.382359] The buggy address is located 0 bytes to the right of [ 15.382359] allocated 120-byte region [ffff888102756700, ffff888102756778) [ 15.383288] [ 15.383375] The buggy address belongs to the physical page: [ 15.383596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102756 [ 15.384354] flags: 0x200000000000000(node=0|zone=2) [ 15.384817] page_type: f5(slab) [ 15.384948] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.385205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.385976] page dumped because: kasan: bad access detected [ 15.386474] [ 15.386668] Memory state around the buggy address: [ 15.387160] ffff888102756600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.388384] ffff888102756680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.388668] >ffff888102756700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.388887] ^ [ 15.389104] ffff888102756780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389319] ffff888102756800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389579] ================================================================== [ 15.391572] ================================================================== [ 15.392024] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 15.392763] Write of size 8 at addr ffff888102756778 by task kunit_try_catch/302 [ 15.393312] [ 15.393425] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.393473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.393485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.393507] Call Trace: [ 15.393519] <TASK> [ 15.393533] dump_stack_lvl+0x73/0xb0 [ 15.393559] print_report+0xd1/0x650 [ 15.393584] ? __virt_addr_valid+0x1db/0x2d0 [ 15.393607] ? copy_to_kernel_nofault+0x99/0x260 [ 15.393631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.393655] ? copy_to_kernel_nofault+0x99/0x260 [ 15.393681] kasan_report+0x141/0x180 [ 15.393705] ? copy_to_kernel_nofault+0x99/0x260 [ 15.393736] kasan_check_range+0x10c/0x1c0 [ 15.393761] __kasan_check_write+0x18/0x20 [ 15.393795] copy_to_kernel_nofault+0x99/0x260 [ 15.393822] copy_to_kernel_nofault_oob+0x288/0x560 [ 15.393848] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 15.393872] ? finish_task_switch.isra.0+0x153/0x700 [ 15.393896] ? __schedule+0x10cc/0x2b30 [ 15.393919] ? trace_hardirqs_on+0x37/0xe0 [ 15.393951] ? __pfx_read_tsc+0x10/0x10 [ 15.393971] ? ktime_get_ts64+0x86/0x230 [ 15.393998] kunit_try_run_case+0x1a5/0x480 [ 15.394021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.394044] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.394067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.394092] ? __kthread_parkme+0x82/0x180 [ 15.394114] ? preempt_count_sub+0x50/0x80 [ 15.394139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.394163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.394186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.394210] kthread+0x337/0x6f0 [ 15.394231] ? trace_preempt_on+0x20/0xc0 [ 15.394254] ? __pfx_kthread+0x10/0x10 [ 15.394277] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.394299] ? calculate_sigpending+0x7b/0xa0 [ 15.394333] ? __pfx_kthread+0x10/0x10 [ 15.394356] ret_from_fork+0x41/0x80 [ 15.394377] ? __pfx_kthread+0x10/0x10 [ 15.394400] ret_from_fork_asm+0x1a/0x30 [ 15.394432] </TASK> [ 15.394444] [ 15.402456] Allocated by task 302: [ 15.402635] kasan_save_stack+0x45/0x70 [ 15.402787] kasan_save_track+0x18/0x40 [ 15.402928] kasan_save_alloc_info+0x3b/0x50 [ 15.403193] __kasan_kmalloc+0xb7/0xc0 [ 15.403425] __kmalloc_cache_noprof+0x189/0x420 [ 15.403654] copy_to_kernel_nofault_oob+0x12f/0x560 [ 15.403856] kunit_try_run_case+0x1a5/0x480 [ 15.404047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.404305] kthread+0x337/0x6f0 [ 15.404569] ret_from_fork+0x41/0x80 [ 15.404757] ret_from_fork_asm+0x1a/0x30 [ 15.404932] [ 15.405005] The buggy address belongs to the object at ffff888102756700 [ 15.405005] which belongs to the cache kmalloc-128 of size 128 [ 15.405407] The buggy address is located 0 bytes to the right of [ 15.405407] allocated 120-byte region [ffff888102756700, ffff888102756778) [ 15.405942] [ 15.406037] The buggy address belongs to the physical page: [ 15.406320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102756 [ 15.406669] flags: 0x200000000000000(node=0|zone=2) [ 15.406832] page_type: f5(slab) [ 15.406952] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.407301] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.408191] page dumped because: kasan: bad access detected [ 15.408386] [ 15.408790] Memory state around the buggy address: [ 15.409040] ffff888102756600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.409727] ffff888102756680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.410249] >ffff888102756700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.410781] ^ [ 15.411088] ffff888102756780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.411786] ffff888102756800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.412299] ==================================================================
[ 25.667227] ================================================================== [ 25.668612] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 25.669307] Read of size 8 at addr ffff00001019f778 by task kunit_try_catch/335 [ 25.669978] [ 25.670156] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.670210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.670227] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.670246] Call trace: [ 25.670259] show_stack+0x20/0x38 (C) [ 25.670296] dump_stack_lvl+0x8c/0xd0 [ 25.670330] print_report+0x118/0x608 [ 25.670363] kasan_report+0xdc/0x128 [ 25.670392] __asan_report_load8_noabort+0x20/0x30 [ 25.670428] copy_to_kernel_nofault+0x204/0x250 [ 25.670460] copy_to_kernel_nofault_oob+0x158/0x418 [ 25.670497] kunit_try_run_case+0x170/0x3f0 [ 25.670533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.670574] kthread+0x328/0x630 [ 25.670609] ret_from_fork+0x10/0x20 [ 25.670643] [ 25.676693] Allocated by task 335: [ 25.677021] kasan_save_stack+0x3c/0x68 [ 25.677396] kasan_save_track+0x20/0x40 [ 25.677768] kasan_save_alloc_info+0x40/0x58 [ 25.678183] __kasan_kmalloc+0xd4/0xd8 [ 25.678546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.678988] copy_to_kernel_nofault_oob+0xc8/0x418 [ 25.679452] kunit_try_run_case+0x170/0x3f0 [ 25.679859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.680385] kthread+0x328/0x630 [ 25.680710] ret_from_fork+0x10/0x20 [ 25.681060] [ 25.681215] The buggy address belongs to the object at ffff00001019f700 [ 25.681215] which belongs to the cache kmalloc-128 of size 128 [ 25.682350] The buggy address is located 0 bytes to the right of [ 25.682350] allocated 120-byte region [ffff00001019f700, ffff00001019f778) [ 25.683526] [ 25.683681] The buggy address belongs to the physical page: [ 25.684199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f [ 25.684933] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.685546] page_type: f5(slab) [ 25.685859] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.686576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.687285] page dumped because: kasan: bad access detected [ 25.687802] [ 25.687955] Memory state around the buggy address: [ 25.688405] ffff00001019f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.689072] ffff00001019f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.689740] >ffff00001019f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.690403] ^ [ 25.691060] ffff00001019f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.691726] ffff00001019f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.692390] ================================================================== [ 25.693455] ================================================================== [ 25.694139] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 25.694824] Write of size 8 at addr ffff00001019f778 by task kunit_try_catch/335 [ 25.695499] [ 25.695657] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.695695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.695707] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.695720] Call trace: [ 25.695730] show_stack+0x20/0x38 (C) [ 25.695755] dump_stack_lvl+0x8c/0xd0 [ 25.695779] print_report+0x118/0x608 [ 25.695802] kasan_report+0xdc/0x128 [ 25.695823] kasan_check_range+0x100/0x1a8 [ 25.695846] __kasan_check_write+0x20/0x30 [ 25.695870] copy_to_kernel_nofault+0x8c/0x250 [ 25.695892] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 25.695918] kunit_try_run_case+0x170/0x3f0 [ 25.695944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.695973] kthread+0x328/0x630 [ 25.695998] ret_from_fork+0x10/0x20 [ 25.696022] [ 25.702318] Allocated by task 335: [ 25.702636] kasan_save_stack+0x3c/0x68 [ 25.703000] kasan_save_track+0x20/0x40 [ 25.703360] kasan_save_alloc_info+0x40/0x58 [ 25.703763] __kasan_kmalloc+0xd4/0xd8 [ 25.704116] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.704546] copy_to_kernel_nofault_oob+0xc8/0x418 [ 25.704995] kunit_try_run_case+0x170/0x3f0 [ 25.705390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.705902] kthread+0x328/0x630 [ 25.706214] ret_from_fork+0x10/0x20 [ 25.706554] [ 25.706702] The buggy address belongs to the object at ffff00001019f700 [ 25.706702] which belongs to the cache kmalloc-128 of size 128 [ 25.707821] The buggy address is located 0 bytes to the right of [ 25.707821] allocated 120-byte region [ffff00001019f700, ffff00001019f778) [ 25.708982] [ 25.709131] The buggy address belongs to the physical page: [ 25.709639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f [ 25.710359] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.710960] page_type: f5(slab) [ 25.711262] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.711966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.712665] page dumped because: kasan: bad access detected [ 25.713170] [ 25.713318] Memory state around the buggy address: [ 25.713757] ffff00001019f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.714415] ffff00001019f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.715070] >ffff00001019f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.715722] ^ [ 25.716369] ffff00001019f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.717024] ffff00001019f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.717678] ==================================================================