Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 28.242649] ================================================================== [ 28.252201] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 28.259489] Write of size 16 at addr ffff000801e28369 by task kunit_try_catch/225 [ 28.266954] [ 28.268440] CPU: 7 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.268498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.268515] Hardware name: WinLink E850-96 board (DT) [ 28.268535] Call trace: [ 28.268550] show_stack+0x20/0x38 (C) [ 28.268584] dump_stack_lvl+0x8c/0xd0 [ 28.268623] print_report+0x118/0x608 [ 28.268658] kasan_report+0xdc/0x128 [ 28.268690] kasan_check_range+0x100/0x1a8 [ 28.268729] __asan_memset+0x34/0x78 [ 28.268759] kmalloc_oob_memset_16+0x150/0x2f8 [ 28.268792] kunit_try_run_case+0x170/0x3f0 [ 28.268827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.268864] kthread+0x328/0x630 [ 28.268892] ret_from_fork+0x10/0x20 [ 28.268927] [ 28.334399] Allocated by task 225: [ 28.337788] kasan_save_stack+0x3c/0x68 [ 28.341605] kasan_save_track+0x20/0x40 [ 28.345423] kasan_save_alloc_info+0x40/0x58 [ 28.349678] __kasan_kmalloc+0xd4/0xd8 [ 28.353410] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.357923] kmalloc_oob_memset_16+0xb0/0x2f8 [ 28.362263] kunit_try_run_case+0x170/0x3f0 [ 28.366430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.371900] kthread+0x328/0x630 [ 28.375112] ret_from_fork+0x10/0x20 [ 28.378669] [ 28.380146] The buggy address belongs to the object at ffff000801e28300 [ 28.380146] which belongs to the cache kmalloc-128 of size 128 [ 28.392647] The buggy address is located 105 bytes inside of [ 28.392647] allocated 120-byte region [ffff000801e28300, ffff000801e28378) [ 28.405231] [ 28.406711] The buggy address belongs to the physical page: [ 28.412266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 28.420250] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.427889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.434836] page_type: f5(slab) [ 28.437970] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.445689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.453417] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.461227] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.469040] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 28.476852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.484657] page dumped because: kasan: bad access detected [ 28.490213] [ 28.491688] Memory state around the buggy address: [ 28.496470] ffff000801e28200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.503671] ffff000801e28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.510876] >ffff000801e28300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.518077] ^ [ 28.525199] ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.532405] ffff000801e28400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.539607] ==================================================================
[ 25.431239] ================================================================== [ 25.432065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 25.432414] Write of size 16 at addr fff00000c6507869 by task kunit_try_catch/178 [ 25.432760] [ 25.432844] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.433067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.433142] Hardware name: linux,dummy-virt (DT) [ 25.433681] Call trace: [ 25.433748] show_stack+0x20/0x38 (C) [ 25.433869] dump_stack_lvl+0x8c/0xd0 [ 25.434034] print_report+0x118/0x608 [ 25.434165] kasan_report+0xdc/0x128 [ 25.434277] kasan_check_range+0x100/0x1a8 [ 25.434408] __asan_memset+0x34/0x78 [ 25.435107] kmalloc_oob_memset_16+0x150/0x2f8 [ 25.435244] kunit_try_run_case+0x170/0x3f0 [ 25.435391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.435619] kthread+0x328/0x630 [ 25.435831] ret_from_fork+0x10/0x20 [ 25.435972] [ 25.436211] Allocated by task 178: [ 25.436316] kasan_save_stack+0x3c/0x68 [ 25.436417] kasan_save_track+0x20/0x40 [ 25.436798] kasan_save_alloc_info+0x40/0x58 [ 25.436911] __kasan_kmalloc+0xd4/0xd8 [ 25.437817] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.438708] kmalloc_oob_memset_16+0xb0/0x2f8 [ 25.438826] kunit_try_run_case+0x170/0x3f0 [ 25.439209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.440093] kthread+0x328/0x630 [ 25.440371] ret_from_fork+0x10/0x20 [ 25.440544] [ 25.440593] The buggy address belongs to the object at fff00000c6507800 [ 25.440593] which belongs to the cache kmalloc-128 of size 128 [ 25.440725] The buggy address is located 105 bytes inside of [ 25.440725] allocated 120-byte region [fff00000c6507800, fff00000c6507878) [ 25.440872] [ 25.440923] The buggy address belongs to the physical page: [ 25.441017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507 [ 25.443141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.443382] page_type: f5(slab) [ 25.443488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.444627] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.444735] page dumped because: kasan: bad access detected [ 25.445568] [ 25.446270] Memory state around the buggy address: [ 25.446640] fff00000c6507700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.446749] fff00000c6507780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.446852] >fff00000c6507800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.446969] ^ [ 25.447064] fff00000c6507880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.447169] fff00000c6507900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.448075] ==================================================================
[ 25.682338] ================================================================== [ 25.682457] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 25.682578] Write of size 16 at addr fff00000c7747669 by task kunit_try_catch/178 [ 25.682711] [ 25.682876] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.683261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.683477] Hardware name: linux,dummy-virt (DT) [ 25.683576] Call trace: [ 25.683633] show_stack+0x20/0x38 (C) [ 25.684020] dump_stack_lvl+0x8c/0xd0 [ 25.684152] print_report+0x118/0x608 [ 25.684368] kasan_report+0xdc/0x128 [ 25.684595] kasan_check_range+0x100/0x1a8 [ 25.684795] __asan_memset+0x34/0x78 [ 25.684921] kmalloc_oob_memset_16+0x150/0x2f8 [ 25.685035] kunit_try_run_case+0x170/0x3f0 [ 25.685260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.685473] kthread+0x328/0x630 [ 25.685602] ret_from_fork+0x10/0x20 [ 25.685747] [ 25.685801] Allocated by task 178: [ 25.685897] kasan_save_stack+0x3c/0x68 [ 25.686026] kasan_save_track+0x20/0x40 [ 25.686148] kasan_save_alloc_info+0x40/0x58 [ 25.686290] __kasan_kmalloc+0xd4/0xd8 [ 25.686481] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.686677] kmalloc_oob_memset_16+0xb0/0x2f8 [ 25.686884] kunit_try_run_case+0x170/0x3f0 [ 25.687028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.687155] kthread+0x328/0x630 [ 25.687256] ret_from_fork+0x10/0x20 [ 25.687353] [ 25.687400] The buggy address belongs to the object at fff00000c7747600 [ 25.687400] which belongs to the cache kmalloc-128 of size 128 [ 25.687655] The buggy address is located 105 bytes inside of [ 25.687655] allocated 120-byte region [fff00000c7747600, fff00000c7747678) [ 25.688045] [ 25.688477] The buggy address belongs to the physical page: [ 25.688566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747 [ 25.689075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.689261] page_type: f5(slab) [ 25.689369] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.689492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.690233] page dumped because: kasan: bad access detected [ 25.690338] [ 25.690392] Memory state around the buggy address: [ 25.690478] fff00000c7747500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.691109] fff00000c7747580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.691264] >fff00000c7747600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.691676] ^ [ 25.692027] fff00000c7747680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.692133] fff00000c7747700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.692224] ==================================================================
[ 19.091218] ================================================================== [ 19.092115] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 19.092810] Write of size 16 at addr ffff888101b20b69 by task kunit_try_catch/196 [ 19.093264] [ 19.093745] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 19.093867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.093902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.093960] Call Trace: [ 19.093998] <TASK> [ 19.094048] dump_stack_lvl+0x73/0xb0 [ 19.094141] print_report+0xd1/0x650 [ 19.094219] ? __virt_addr_valid+0x1db/0x2d0 [ 19.094324] ? kmalloc_oob_memset_16+0x166/0x330 [ 19.094397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.094469] ? kmalloc_oob_memset_16+0x166/0x330 [ 19.094567] kasan_report+0x141/0x180 [ 19.094643] ? kmalloc_oob_memset_16+0x166/0x330 [ 19.094724] kasan_check_range+0x10c/0x1c0 [ 19.094805] __asan_memset+0x27/0x50 [ 19.094869] kmalloc_oob_memset_16+0x166/0x330 [ 19.094942] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 19.095016] ? __schedule+0x10cc/0x2b60 [ 19.095096] ? __pfx_read_tsc+0x10/0x10 [ 19.095165] ? ktime_get_ts64+0x86/0x230 [ 19.095243] kunit_try_run_case+0x1a5/0x480 [ 19.095350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.095426] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.095494] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.095590] ? __kthread_parkme+0x82/0x180 [ 19.095659] ? preempt_count_sub+0x50/0x80 [ 19.095718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.095756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.095791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.095825] kthread+0x337/0x6f0 [ 19.095853] ? trace_preempt_on+0x20/0xc0 [ 19.095886] ? __pfx_kthread+0x10/0x10 [ 19.095914] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.095944] ? calculate_sigpending+0x7b/0xa0 [ 19.095979] ? __pfx_kthread+0x10/0x10 [ 19.096007] ret_from_fork+0x116/0x1d0 [ 19.096031] ? __pfx_kthread+0x10/0x10 [ 19.096059] ret_from_fork_asm+0x1a/0x30 [ 19.096100] </TASK> [ 19.096116] [ 19.111136] Allocated by task 196: [ 19.111672] kasan_save_stack+0x45/0x70 [ 19.112151] kasan_save_track+0x18/0x40 [ 19.113576] kasan_save_alloc_info+0x3b/0x50 [ 19.114056] __kasan_kmalloc+0xb7/0xc0 [ 19.114421] __kmalloc_cache_noprof+0x189/0x420 [ 19.114831] kmalloc_oob_memset_16+0xac/0x330 [ 19.115367] kunit_try_run_case+0x1a5/0x480 [ 19.115870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.116278] kthread+0x337/0x6f0 [ 19.116849] ret_from_fork+0x116/0x1d0 [ 19.117354] ret_from_fork_asm+0x1a/0x30 [ 19.117853] [ 19.118107] The buggy address belongs to the object at ffff888101b20b00 [ 19.118107] which belongs to the cache kmalloc-128 of size 128 [ 19.118974] The buggy address is located 105 bytes inside of [ 19.118974] allocated 120-byte region [ffff888101b20b00, ffff888101b20b78) [ 19.120223] [ 19.120676] The buggy address belongs to the physical page: [ 19.121489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20 [ 19.122231] flags: 0x200000000000000(node=0|zone=2) [ 19.123665] page_type: f5(slab) [ 19.124107] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.124823] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.125515] page dumped because: kasan: bad access detected [ 19.125979] [ 19.126530] Memory state around the buggy address: [ 19.126919] ffff888101b20a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.127470] ffff888101b20a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.128134] >ffff888101b20b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.128764] ^ [ 19.129390] ffff888101b20b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.129968] ffff888101b20c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.130640] ==================================================================
[ 18.142381] ================================================================== [ 18.143690] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 18.144571] Write of size 16 at addr ffff8881038d5369 by task kunit_try_catch/196 [ 18.145437] [ 18.145735] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.145951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.145990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.146047] Call Trace: [ 18.146080] <TASK> [ 18.146121] dump_stack_lvl+0x73/0xb0 [ 18.146205] print_report+0xd1/0x650 [ 18.146241] ? __virt_addr_valid+0x1db/0x2d0 [ 18.146294] ? kmalloc_oob_memset_16+0x166/0x330 [ 18.146366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.146438] ? kmalloc_oob_memset_16+0x166/0x330 [ 18.146539] kasan_report+0x141/0x180 [ 18.146644] ? kmalloc_oob_memset_16+0x166/0x330 [ 18.146837] kasan_check_range+0x10c/0x1c0 [ 18.146940] __asan_memset+0x27/0x50 [ 18.147009] kmalloc_oob_memset_16+0x166/0x330 [ 18.147088] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 18.147170] ? __schedule+0x10cc/0x2b60 [ 18.147251] ? __pfx_read_tsc+0x10/0x10 [ 18.147319] ? ktime_get_ts64+0x86/0x230 [ 18.147357] kunit_try_run_case+0x1a5/0x480 [ 18.147396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.147430] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.147463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.147496] ? __kthread_parkme+0x82/0x180 [ 18.147575] ? preempt_count_sub+0x50/0x80 [ 18.147648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.147689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.147725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.147759] kthread+0x337/0x6f0 [ 18.147786] ? trace_preempt_on+0x20/0xc0 [ 18.147819] ? __pfx_kthread+0x10/0x10 [ 18.147848] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.147904] ? calculate_sigpending+0x7b/0xa0 [ 18.147943] ? __pfx_kthread+0x10/0x10 [ 18.147973] ret_from_fork+0x116/0x1d0 [ 18.147998] ? __pfx_kthread+0x10/0x10 [ 18.148026] ret_from_fork_asm+0x1a/0x30 [ 18.148067] </TASK> [ 18.148081] [ 18.162866] Allocated by task 196: [ 18.163319] kasan_save_stack+0x45/0x70 [ 18.166232] kasan_save_track+0x18/0x40 [ 18.166734] kasan_save_alloc_info+0x3b/0x50 [ 18.167378] __kasan_kmalloc+0xb7/0xc0 [ 18.167988] __kmalloc_cache_noprof+0x189/0x420 [ 18.168622] kmalloc_oob_memset_16+0xac/0x330 [ 18.169148] kunit_try_run_case+0x1a5/0x480 [ 18.170074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.170468] kthread+0x337/0x6f0 [ 18.170759] ret_from_fork+0x116/0x1d0 [ 18.171155] ret_from_fork_asm+0x1a/0x30 [ 18.171479] [ 18.171664] The buggy address belongs to the object at ffff8881038d5300 [ 18.171664] which belongs to the cache kmalloc-128 of size 128 [ 18.172311] The buggy address is located 105 bytes inside of [ 18.172311] allocated 120-byte region [ffff8881038d5300, ffff8881038d5378) [ 18.174815] [ 18.175623] The buggy address belongs to the physical page: [ 18.176391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5 [ 18.176911] flags: 0x200000000000000(node=0|zone=2) [ 18.177149] page_type: f5(slab) [ 18.177296] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.177547] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.177790] page dumped because: kasan: bad access detected [ 18.178693] [ 18.179312] Memory state around the buggy address: [ 18.179860] ffff8881038d5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.181636] ffff8881038d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.182616] >ffff8881038d5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.183284] ^ [ 18.184443] ffff8881038d5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.184990] ffff8881038d5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.186294] ==================================================================
[ 20.619116] ================================================================== [ 20.620194] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 20.620888] Write of size 16 at addr ffff00000e1a3069 by task kunit_try_catch/231 [ 20.621586] [ 20.621749] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.621800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.621815] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.621832] Call trace: [ 20.621843] show_stack+0x20/0x38 (C) [ 20.621879] dump_stack_lvl+0x8c/0xd0 [ 20.621915] print_report+0x118/0x608 [ 20.621948] kasan_report+0xdc/0x128 [ 20.621979] kasan_check_range+0x100/0x1a8 [ 20.622014] __asan_memset+0x34/0x78 [ 20.622040] kmalloc_oob_memset_16+0x150/0x2f8 [ 20.622070] kunit_try_run_case+0x170/0x3f0 [ 20.622104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.622142] kthread+0x328/0x630 [ 20.622168] ret_from_fork+0x10/0x20 [ 20.622200] [ 20.628059] Allocated by task 231: [ 20.628383] kasan_save_stack+0x3c/0x68 [ 20.628761] kasan_save_track+0x20/0x40 [ 20.629137] kasan_save_alloc_info+0x40/0x58 [ 20.629554] __kasan_kmalloc+0xd4/0xd8 [ 20.629920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.630358] kmalloc_oob_memset_16+0xb0/0x2f8 [ 20.630775] kunit_try_run_case+0x170/0x3f0 [ 20.631181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.631705] kthread+0x328/0x630 [ 20.632020] ret_from_fork+0x10/0x20 [ 20.632369] [ 20.632522] The buggy address belongs to the object at ffff00000e1a3000 [ 20.632522] which belongs to the cache kmalloc-128 of size 128 [ 20.633654] The buggy address is located 105 bytes inside of [ 20.633654] allocated 120-byte region [ffff00000e1a3000, ffff00000e1a3078) [ 20.634798] [ 20.634952] The buggy address belongs to the physical page: [ 20.635467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3 [ 20.636191] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.636802] page_type: f5(slab) [ 20.637114] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.637829] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.638536] page dumped because: kasan: bad access detected [ 20.639050] [ 20.639202] Memory state around the buggy address: [ 20.639650] ffff00000e1a2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.640316] ffff00000e1a2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.640982] >ffff00000e1a3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.641642] ^ [ 20.642299] ffff00000e1a3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.642964] ffff00000e1a3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.643627] ==================================================================