Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 27.325930] ================================================================== [ 27.335548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 27.342749] Write of size 2 at addr ffff000801dea477 by task kunit_try_catch/219 [ 27.350126] [ 27.351611] CPU: 5 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 27.351668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.351684] Hardware name: WinLink E850-96 board (DT) [ 27.351704] Call trace: [ 27.351719] show_stack+0x20/0x38 (C) [ 27.351755] dump_stack_lvl+0x8c/0xd0 [ 27.351793] print_report+0x118/0x608 [ 27.351829] kasan_report+0xdc/0x128 [ 27.351863] kasan_check_range+0x100/0x1a8 [ 27.351899] __asan_memset+0x34/0x78 [ 27.351928] kmalloc_oob_memset_2+0x150/0x2f8 [ 27.351958] kunit_try_run_case+0x170/0x3f0 [ 27.351994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.352035] kthread+0x328/0x630 [ 27.352063] ret_from_fork+0x10/0x20 [ 27.352097] [ 27.417485] Allocated by task 219: [ 27.420875] kasan_save_stack+0x3c/0x68 [ 27.424690] kasan_save_track+0x20/0x40 [ 27.428510] kasan_save_alloc_info+0x40/0x58 [ 27.432763] __kasan_kmalloc+0xd4/0xd8 [ 27.436496] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.441010] kmalloc_oob_memset_2+0xb0/0x2f8 [ 27.445263] kunit_try_run_case+0x170/0x3f0 [ 27.449430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.454900] kthread+0x328/0x630 [ 27.458110] ret_from_fork+0x10/0x20 [ 27.461669] [ 27.463146] The buggy address belongs to the object at ffff000801dea400 [ 27.463146] which belongs to the cache kmalloc-128 of size 128 [ 27.475647] The buggy address is located 119 bytes inside of [ 27.475647] allocated 120-byte region [ffff000801dea400, ffff000801dea478) [ 27.488231] [ 27.489709] The buggy address belongs to the physical page: [ 27.495267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dea [ 27.503252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.510890] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.517833] page_type: f5(slab) [ 27.520970] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.528689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.536417] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.544227] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.552040] head: 0bfffe0000000001 fffffdffe0077a81 00000000ffffffff 00000000ffffffff [ 27.559852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.567657] page dumped because: kasan: bad access detected [ 27.573212] [ 27.574688] Memory state around the buggy address: [ 27.579470] ffff000801dea300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.586671] ffff000801dea380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.593876] >ffff000801dea400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.601077] ^ [ 27.608198] ffff000801dea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.615403] ffff000801dea500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.622607] ==================================================================
[ 25.306434] ================================================================== [ 25.306727] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 25.306839] Write of size 2 at addr fff00000c6507577 by task kunit_try_catch/172 [ 25.307330] [ 25.307425] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.308304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.308640] Hardware name: linux,dummy-virt (DT) [ 25.308758] Call trace: [ 25.308828] show_stack+0x20/0x38 (C) [ 25.308987] dump_stack_lvl+0x8c/0xd0 [ 25.309116] print_report+0x118/0x608 [ 25.309238] kasan_report+0xdc/0x128 [ 25.309653] kasan_check_range+0x100/0x1a8 [ 25.309832] __asan_memset+0x34/0x78 [ 25.310564] kmalloc_oob_memset_2+0x150/0x2f8 [ 25.311461] kunit_try_run_case+0x170/0x3f0 [ 25.311624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.312174] kthread+0x328/0x630 [ 25.312349] ret_from_fork+0x10/0x20 [ 25.312476] [ 25.312810] Allocated by task 172: [ 25.313068] kasan_save_stack+0x3c/0x68 [ 25.313338] kasan_save_track+0x20/0x40 [ 25.313575] kasan_save_alloc_info+0x40/0x58 [ 25.313682] __kasan_kmalloc+0xd4/0xd8 [ 25.313776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.314732] kmalloc_oob_memset_2+0xb0/0x2f8 [ 25.315093] kunit_try_run_case+0x170/0x3f0 [ 25.315225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.315786] kthread+0x328/0x630 [ 25.315893] ret_from_fork+0x10/0x20 [ 25.316318] [ 25.316555] The buggy address belongs to the object at fff00000c6507500 [ 25.316555] which belongs to the cache kmalloc-128 of size 128 [ 25.316696] The buggy address is located 119 bytes inside of [ 25.316696] allocated 120-byte region [fff00000c6507500, fff00000c6507578) [ 25.318064] [ 25.318158] The buggy address belongs to the physical page: [ 25.318232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507 [ 25.318360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.318472] page_type: f5(slab) [ 25.318564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.319378] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.319655] page dumped because: kasan: bad access detected [ 25.319777] [ 25.319823] Memory state around the buggy address: [ 25.319895] fff00000c6507400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.320698] fff00000c6507480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.320831] >fff00000c6507500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.320929] ^ [ 25.321326] fff00000c6507580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.322214] fff00000c6507600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.322946] ==================================================================
[ 25.551948] ================================================================== [ 25.552072] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 25.552199] Write of size 2 at addr fff00000c7747377 by task kunit_try_catch/172 [ 25.552316] [ 25.552871] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.554484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.554547] Hardware name: linux,dummy-virt (DT) [ 25.554621] Call trace: [ 25.554684] show_stack+0x20/0x38 (C) [ 25.554801] dump_stack_lvl+0x8c/0xd0 [ 25.555147] print_report+0x118/0x608 [ 25.555365] kasan_report+0xdc/0x128 [ 25.555489] kasan_check_range+0x100/0x1a8 [ 25.555616] __asan_memset+0x34/0x78 [ 25.555725] kmalloc_oob_memset_2+0x150/0x2f8 [ 25.555863] kunit_try_run_case+0x170/0x3f0 [ 25.555982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.556108] kthread+0x328/0x630 [ 25.556213] ret_from_fork+0x10/0x20 [ 25.556329] [ 25.556375] Allocated by task 172: [ 25.556444] kasan_save_stack+0x3c/0x68 [ 25.556546] kasan_save_track+0x20/0x40 [ 25.556643] kasan_save_alloc_info+0x40/0x58 [ 25.556742] __kasan_kmalloc+0xd4/0xd8 [ 25.556829] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.558700] kmalloc_oob_memset_2+0xb0/0x2f8 [ 25.558868] kunit_try_run_case+0x170/0x3f0 [ 25.558965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.560878] kthread+0x328/0x630 [ 25.561274] ret_from_fork+0x10/0x20 [ 25.561382] [ 25.562289] The buggy address belongs to the object at fff00000c7747300 [ 25.562289] which belongs to the cache kmalloc-128 of size 128 [ 25.562449] The buggy address is located 119 bytes inside of [ 25.562449] allocated 120-byte region [fff00000c7747300, fff00000c7747378) [ 25.562603] [ 25.562654] The buggy address belongs to the physical page: [ 25.562901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747 [ 25.563033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.563148] page_type: f5(slab) [ 25.563238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.563354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.563446] page dumped because: kasan: bad access detected [ 25.563516] [ 25.563557] Memory state around the buggy address: [ 25.563629] fff00000c7747200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.563728] fff00000c7747280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.563861] >fff00000c7747300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.563960] ^ [ 25.564068] fff00000c7747380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.564184] fff00000c7747400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.564307] ==================================================================
[ 18.919533] ================================================================== [ 18.920558] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 18.921569] Write of size 2 at addr ffff888101b20977 by task kunit_try_catch/190 [ 18.922198] [ 18.922405] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.922546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.922583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.922645] Call Trace: [ 18.922681] <TASK> [ 18.922729] dump_stack_lvl+0x73/0xb0 [ 18.922824] print_report+0xd1/0x650 [ 18.922900] ? __virt_addr_valid+0x1db/0x2d0 [ 18.922980] ? kmalloc_oob_memset_2+0x166/0x330 [ 18.923051] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.923120] ? kmalloc_oob_memset_2+0x166/0x330 [ 18.923192] kasan_report+0x141/0x180 [ 18.923295] ? kmalloc_oob_memset_2+0x166/0x330 [ 18.923383] kasan_check_range+0x10c/0x1c0 [ 18.923467] __asan_memset+0x27/0x50 [ 18.923557] kmalloc_oob_memset_2+0x166/0x330 [ 18.923637] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 18.923709] ? __schedule+0x10cc/0x2b60 [ 18.923785] ? __pfx_read_tsc+0x10/0x10 [ 18.923852] ? ktime_get_ts64+0x86/0x230 [ 18.923931] kunit_try_run_case+0x1a5/0x480 [ 18.924014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.924087] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.924164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.924242] ? __kthread_parkme+0x82/0x180 [ 18.924601] ? preempt_count_sub+0x50/0x80 [ 18.924681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.924743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.924782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.924818] kthread+0x337/0x6f0 [ 18.924847] ? trace_preempt_on+0x20/0xc0 [ 18.924883] ? __pfx_kthread+0x10/0x10 [ 18.924912] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.924942] ? calculate_sigpending+0x7b/0xa0 [ 18.924978] ? __pfx_kthread+0x10/0x10 [ 18.925007] ret_from_fork+0x116/0x1d0 [ 18.925032] ? __pfx_kthread+0x10/0x10 [ 18.925061] ret_from_fork_asm+0x1a/0x30 [ 18.925103] </TASK> [ 18.925117] [ 18.942581] Allocated by task 190: [ 18.943033] kasan_save_stack+0x45/0x70 [ 18.943669] kasan_save_track+0x18/0x40 [ 18.944184] kasan_save_alloc_info+0x3b/0x50 [ 18.944761] __kasan_kmalloc+0xb7/0xc0 [ 18.945168] __kmalloc_cache_noprof+0x189/0x420 [ 18.945893] kmalloc_oob_memset_2+0xac/0x330 [ 18.946423] kunit_try_run_case+0x1a5/0x480 [ 18.946954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.947685] kthread+0x337/0x6f0 [ 18.948087] ret_from_fork+0x116/0x1d0 [ 18.948454] ret_from_fork_asm+0x1a/0x30 [ 18.948972] [ 18.949356] The buggy address belongs to the object at ffff888101b20900 [ 18.949356] which belongs to the cache kmalloc-128 of size 128 [ 18.950428] The buggy address is located 119 bytes inside of [ 18.950428] allocated 120-byte region [ffff888101b20900, ffff888101b20978) [ 18.951091] [ 18.951284] The buggy address belongs to the physical page: [ 18.951914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20 [ 18.952717] flags: 0x200000000000000(node=0|zone=2) [ 18.953481] page_type: f5(slab) [ 18.953953] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.954814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.955624] page dumped because: kasan: bad access detected [ 18.956183] [ 18.956489] Memory state around the buggy address: [ 18.957004] ffff888101b20800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.957702] ffff888101b20880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.958142] >ffff888101b20900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.958708] ^ [ 18.959565] ffff888101b20980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.960366] ffff888101b20a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.961014] ==================================================================
[ 17.982034] ================================================================== [ 17.983021] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 17.984024] Write of size 2 at addr ffff8881038d5277 by task kunit_try_catch/190 [ 17.985156] [ 17.985467] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.985586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.985623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.985823] Call Trace: [ 17.985863] <TASK> [ 17.985926] dump_stack_lvl+0x73/0xb0 [ 17.986017] print_report+0xd1/0x650 [ 17.986091] ? __virt_addr_valid+0x1db/0x2d0 [ 17.986169] ? kmalloc_oob_memset_2+0x166/0x330 [ 17.986243] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.986321] ? kmalloc_oob_memset_2+0x166/0x330 [ 17.986390] kasan_report+0x141/0x180 [ 17.986425] ? kmalloc_oob_memset_2+0x166/0x330 [ 17.986462] kasan_check_range+0x10c/0x1c0 [ 17.986495] __asan_memset+0x27/0x50 [ 17.986656] kmalloc_oob_memset_2+0x166/0x330 [ 17.986700] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 17.986733] ? __schedule+0x10cc/0x2b60 [ 17.986766] ? __pfx_read_tsc+0x10/0x10 [ 17.986796] ? ktime_get_ts64+0x86/0x230 [ 17.986828] kunit_try_run_case+0x1a5/0x480 [ 17.986863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.986926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.986962] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.986995] ? __kthread_parkme+0x82/0x180 [ 17.987022] ? preempt_count_sub+0x50/0x80 [ 17.987052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.987086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.987144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.987182] kthread+0x337/0x6f0 [ 17.987210] ? trace_preempt_on+0x20/0xc0 [ 17.987242] ? __pfx_kthread+0x10/0x10 [ 17.987270] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.987300] ? calculate_sigpending+0x7b/0xa0 [ 17.987333] ? __pfx_kthread+0x10/0x10 [ 17.987361] ret_from_fork+0x116/0x1d0 [ 17.987386] ? __pfx_kthread+0x10/0x10 [ 17.987413] ret_from_fork_asm+0x1a/0x30 [ 17.987456] </TASK> [ 17.987471] [ 18.010113] Allocated by task 190: [ 18.010893] kasan_save_stack+0x45/0x70 [ 18.011500] kasan_save_track+0x18/0x40 [ 18.012194] kasan_save_alloc_info+0x3b/0x50 [ 18.012775] __kasan_kmalloc+0xb7/0xc0 [ 18.013484] __kmalloc_cache_noprof+0x189/0x420 [ 18.013964] kmalloc_oob_memset_2+0xac/0x330 [ 18.014465] kunit_try_run_case+0x1a5/0x480 [ 18.015336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.015980] kthread+0x337/0x6f0 [ 18.016681] ret_from_fork+0x116/0x1d0 [ 18.017080] ret_from_fork_asm+0x1a/0x30 [ 18.017946] [ 18.018332] The buggy address belongs to the object at ffff8881038d5200 [ 18.018332] which belongs to the cache kmalloc-128 of size 128 [ 18.019801] The buggy address is located 119 bytes inside of [ 18.019801] allocated 120-byte region [ffff8881038d5200, ffff8881038d5278) [ 18.021007] [ 18.021404] The buggy address belongs to the physical page: [ 18.021958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5 [ 18.023295] flags: 0x200000000000000(node=0|zone=2) [ 18.023828] page_type: f5(slab) [ 18.024374] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.025189] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.026069] page dumped because: kasan: bad access detected [ 18.026984] [ 18.027251] Memory state around the buggy address: [ 18.028197] ffff8881038d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.028780] ffff8881038d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.029488] >ffff8881038d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.030419] ^ [ 18.031417] ffff8881038d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.032210] ffff8881038d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.033231] ==================================================================
[ 20.532700] ================================================================== [ 20.533791] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 20.534477] Write of size 2 at addr ffff00000e2f8277 by task kunit_try_catch/225 [ 20.535161] [ 20.535324] CPU: 2 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.535374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.535387] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.535405] Call trace: [ 20.535416] show_stack+0x20/0x38 (C) [ 20.535449] dump_stack_lvl+0x8c/0xd0 [ 20.535484] print_report+0x118/0x608 [ 20.535518] kasan_report+0xdc/0x128 [ 20.535548] kasan_check_range+0x100/0x1a8 [ 20.535582] __asan_memset+0x34/0x78 [ 20.535608] kmalloc_oob_memset_2+0x150/0x2f8 [ 20.535636] kunit_try_run_case+0x170/0x3f0 [ 20.535670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.535707] kthread+0x328/0x630 [ 20.535733] ret_from_fork+0x10/0x20 [ 20.535765] [ 20.541620] Allocated by task 225: [ 20.541953] kasan_save_stack+0x3c/0x68 [ 20.542336] kasan_save_track+0x20/0x40 [ 20.542711] kasan_save_alloc_info+0x40/0x58 [ 20.543127] __kasan_kmalloc+0xd4/0xd8 [ 20.543493] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.543929] kmalloc_oob_memset_2+0xb0/0x2f8 [ 20.544341] kunit_try_run_case+0x170/0x3f0 [ 20.544747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.545270] kthread+0x328/0x630 [ 20.545585] ret_from_fork+0x10/0x20 [ 20.545935] [ 20.546089] The buggy address belongs to the object at ffff00000e2f8200 [ 20.546089] which belongs to the cache kmalloc-128 of size 128 [ 20.547219] The buggy address is located 119 bytes inside of [ 20.547219] allocated 120-byte region [ffff00000e2f8200, ffff00000e2f8278) [ 20.548362] [ 20.548517] The buggy address belongs to the physical page: [ 20.549031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe2f8 [ 20.549755] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.550364] page_type: f5(slab) [ 20.550677] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.551393] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.552099] page dumped because: kasan: bad access detected [ 20.552612] [ 20.552765] Memory state around the buggy address: [ 20.553213] ffff00000e2f8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.553878] ffff00000e2f8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.554543] >ffff00000e2f8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.555203] ^ [ 20.555857] ffff00000e2f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.556521] ffff00000e2f8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.557182] ==================================================================