Date
Dec. 5, 2024, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.721333] ================================================================== [ 30.722667] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 30.723520] Read of size 1 at addr fff00000c653d073 by task kunit_try_catch/183 [ 30.724725] [ 30.725129] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.726447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.727320] Hardware name: linux,dummy-virt (DT) [ 30.728407] Call trace: [ 30.728819] show_stack+0x20/0x38 (C) [ 30.729509] dump_stack_lvl+0x8c/0xd0 [ 30.730133] print_report+0x118/0x5e0 [ 30.730807] kasan_report+0xc8/0x118 [ 30.731741] __asan_report_load1_noabort+0x20/0x30 [ 30.732945] ksize_unpoisons_memory+0x638/0x750 [ 30.733803] kunit_try_run_case+0x14c/0x3d0 [ 30.734468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.735682] kthread+0x24c/0x2d0 [ 30.736419] ret_from_fork+0x10/0x20 [ 30.737082] [ 30.737405] Allocated by task 183: [ 30.738058] kasan_save_stack+0x3c/0x68 [ 30.738694] kasan_save_track+0x20/0x40 [ 30.739456] kasan_save_alloc_info+0x40/0x58 [ 30.740215] __kasan_kmalloc+0xd4/0xd8 [ 30.740789] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.741368] ksize_unpoisons_memory+0xc0/0x750 [ 30.741855] kunit_try_run_case+0x14c/0x3d0 [ 30.742585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.743315] kthread+0x24c/0x2d0 [ 30.744079] ret_from_fork+0x10/0x20 [ 30.745042] [ 30.745320] The buggy address belongs to the object at fff00000c653d000 [ 30.745320] which belongs to the cache kmalloc-128 of size 128 [ 30.746584] The buggy address is located 0 bytes to the right of [ 30.746584] allocated 115-byte region [fff00000c653d000, fff00000c653d073) [ 30.748179] [ 30.748589] The buggy address belongs to the physical page: [ 30.749157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d [ 30.750928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.751867] page_type: f5(slab) [ 30.752384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.753275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.754427] page dumped because: kasan: bad access detected [ 30.755480] [ 30.756101] Memory state around the buggy address: [ 30.756591] fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.757453] fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.758475] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.759287] ^ [ 30.760329] fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.760744] fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.761683] ================================================================== [ 30.764250] ================================================================== [ 30.765177] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 30.765836] Read of size 1 at addr fff00000c653d078 by task kunit_try_catch/183 [ 30.767668] [ 30.767967] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.769233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.769746] Hardware name: linux,dummy-virt (DT) [ 30.770349] Call trace: [ 30.770960] show_stack+0x20/0x38 (C) [ 30.771751] dump_stack_lvl+0x8c/0xd0 [ 30.772559] print_report+0x118/0x5e0 [ 30.773212] kasan_report+0xc8/0x118 [ 30.773804] __asan_report_load1_noabort+0x20/0x30 [ 30.774628] ksize_unpoisons_memory+0x628/0x750 [ 30.775748] kunit_try_run_case+0x14c/0x3d0 [ 30.776502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.777217] kthread+0x24c/0x2d0 [ 30.777724] ret_from_fork+0x10/0x20 [ 30.778384] [ 30.778747] Allocated by task 183: [ 30.779314] kasan_save_stack+0x3c/0x68 [ 30.780466] kasan_save_track+0x20/0x40 [ 30.781296] kasan_save_alloc_info+0x40/0x58 [ 30.781934] __kasan_kmalloc+0xd4/0xd8 [ 30.782628] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.783193] ksize_unpoisons_memory+0xc0/0x750 [ 30.784182] kunit_try_run_case+0x14c/0x3d0 [ 30.784699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.785473] kthread+0x24c/0x2d0 [ 30.786072] ret_from_fork+0x10/0x20 [ 30.786625] [ 30.786923] The buggy address belongs to the object at fff00000c653d000 [ 30.786923] which belongs to the cache kmalloc-128 of size 128 [ 30.788983] The buggy address is located 5 bytes to the right of [ 30.788983] allocated 115-byte region [fff00000c653d000, fff00000c653d073) [ 30.790468] [ 30.790772] The buggy address belongs to the physical page: [ 30.792289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d [ 30.792774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.793193] page_type: f5(slab) [ 30.793443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.794104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.795607] page dumped because: kasan: bad access detected [ 30.797033] [ 30.797701] Memory state around the buggy address: [ 30.798553] fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.800190] fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.800807] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.801890] ^ [ 30.802941] fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.804104] fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.805260] ================================================================== [ 30.806635] ================================================================== [ 30.807595] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 30.808710] Read of size 1 at addr fff00000c653d07f by task kunit_try_catch/183 [ 30.809623] [ 30.810138] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.812091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.812800] Hardware name: linux,dummy-virt (DT) [ 30.813631] Call trace: [ 30.814060] show_stack+0x20/0x38 (C) [ 30.814769] dump_stack_lvl+0x8c/0xd0 [ 30.815758] print_report+0x118/0x5e0 [ 30.816620] kasan_report+0xc8/0x118 [ 30.817425] __asan_report_load1_noabort+0x20/0x30 [ 30.818022] ksize_unpoisons_memory+0x6a0/0x750 [ 30.818708] kunit_try_run_case+0x14c/0x3d0 [ 30.819598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.820356] kthread+0x24c/0x2d0 [ 30.820938] ret_from_fork+0x10/0x20 [ 30.821541] [ 30.821824] Allocated by task 183: [ 30.822562] kasan_save_stack+0x3c/0x68 [ 30.823085] kasan_save_track+0x20/0x40 [ 30.824376] kasan_save_alloc_info+0x40/0x58 [ 30.825017] __kasan_kmalloc+0xd4/0xd8 [ 30.825656] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.826169] ksize_unpoisons_memory+0xc0/0x750 [ 30.826845] kunit_try_run_case+0x14c/0x3d0 [ 30.827479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.828574] kthread+0x24c/0x2d0 [ 30.829074] ret_from_fork+0x10/0x20 [ 30.829685] [ 30.830060] The buggy address belongs to the object at fff00000c653d000 [ 30.830060] which belongs to the cache kmalloc-128 of size 128 [ 30.832232] The buggy address is located 12 bytes to the right of [ 30.832232] allocated 115-byte region [fff00000c653d000, fff00000c653d073) [ 30.833647] [ 30.833973] The buggy address belongs to the physical page: [ 30.834825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d [ 30.836145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.837011] page_type: f5(slab) [ 30.837557] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.838725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.839749] page dumped because: kasan: bad access detected [ 30.840850] [ 30.841224] Memory state around the buggy address: [ 30.841806] fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.842701] fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.843666] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.844588] ^ [ 30.845729] fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.846615] fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.847170] ==================================================================
[ 28.601621] ================================================================== [ 28.603358] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 28.604725] Read of size 1 at addr ffff888101ab2b78 by task kunit_try_catch/201 [ 28.605448] [ 28.605627] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.606918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.607621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.608879] Call Trace: [ 28.609639] <TASK> [ 28.610235] dump_stack_lvl+0x73/0xb0 [ 28.610663] print_report+0xd1/0x640 [ 28.611081] ? __virt_addr_valid+0x1db/0x2d0 [ 28.611553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.612320] kasan_report+0x102/0x140 [ 28.613184] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 28.614484] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 28.615302] __asan_report_load1_noabort+0x18/0x20 [ 28.616283] ksize_unpoisons_memory+0x7eb/0x9b0 [ 28.616775] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 28.617598] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.618521] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 28.619272] kunit_try_run_case+0x1b3/0x490 [ 28.619730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.620247] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.620821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.621836] ? __kthread_parkme+0x82/0x160 [ 28.622457] ? preempt_count_sub+0x50/0x80 [ 28.622832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.623946] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.624710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.625456] kthread+0x257/0x310 [ 28.626243] ? __pfx_kthread+0x10/0x10 [ 28.626882] ret_from_fork+0x41/0x80 [ 28.627950] ? __pfx_kthread+0x10/0x10 [ 28.628396] ret_from_fork_asm+0x1a/0x30 [ 28.628893] </TASK> [ 28.629400] [ 28.629763] Allocated by task 201: [ 28.630652] kasan_save_stack+0x3d/0x60 [ 28.630967] kasan_save_track+0x18/0x40 [ 28.631525] kasan_save_alloc_info+0x3b/0x50 [ 28.632388] __kasan_kmalloc+0xb7/0xc0 [ 28.632658] __kmalloc_cache_noprof+0x184/0x410 [ 28.633549] ksize_unpoisons_memory+0xc8/0x9b0 [ 28.634456] kunit_try_run_case+0x1b3/0x490 [ 28.635229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.636081] kthread+0x257/0x310 [ 28.636876] ret_from_fork+0x41/0x80 [ 28.637120] ret_from_fork_asm+0x1a/0x30 [ 28.637312] [ 28.637411] The buggy address belongs to the object at ffff888101ab2b00 [ 28.637411] which belongs to the cache kmalloc-128 of size 128 [ 28.638143] The buggy address is located 5 bytes to the right of [ 28.638143] allocated 115-byte region [ffff888101ab2b00, ffff888101ab2b73) [ 28.639287] [ 28.639535] The buggy address belongs to the physical page: [ 28.640134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab2 [ 28.640642] flags: 0x200000000000000(node=0|zone=2) [ 28.641335] page_type: f5(slab) [ 28.641813] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.642455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.643455] page dumped because: kasan: bad access detected [ 28.644059] [ 28.644322] Memory state around the buggy address: [ 28.644858] ffff888101ab2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 28.645457] ffff888101ab2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.645938] >ffff888101ab2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.647111] ^ [ 28.647912] ffff888101ab2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.648653] ffff888101ab2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.649451] ================================================================== [ 28.549532] ================================================================== [ 28.550655] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 28.551825] Read of size 1 at addr ffff888101ab2b73 by task kunit_try_catch/201 [ 28.552783] [ 28.553052] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.553640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.554128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.555512] Call Trace: [ 28.556003] <TASK> [ 28.556210] dump_stack_lvl+0x73/0xb0 [ 28.557037] print_report+0xd1/0x640 [ 28.557582] ? __virt_addr_valid+0x1db/0x2d0 [ 28.558477] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.559508] kasan_report+0x102/0x140 [ 28.560232] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 28.560917] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 28.561591] __asan_report_load1_noabort+0x18/0x20 [ 28.562929] ksize_unpoisons_memory+0x81e/0x9b0 [ 28.563793] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 28.564524] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.565382] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 28.566294] kunit_try_run_case+0x1b3/0x490 [ 28.566932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.567594] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.568124] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.569286] ? __kthread_parkme+0x82/0x160 [ 28.569651] ? preempt_count_sub+0x50/0x80 [ 28.570675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.571313] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.572015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.572523] kthread+0x257/0x310 [ 28.573520] ? __pfx_kthread+0x10/0x10 [ 28.573870] ret_from_fork+0x41/0x80 [ 28.574400] ? __pfx_kthread+0x10/0x10 [ 28.575116] ret_from_fork_asm+0x1a/0x30 [ 28.575512] </TASK> [ 28.576348] [ 28.576525] Allocated by task 201: [ 28.576912] kasan_save_stack+0x3d/0x60 [ 28.577226] kasan_save_track+0x18/0x40 [ 28.577642] kasan_save_alloc_info+0x3b/0x50 [ 28.578736] __kasan_kmalloc+0xb7/0xc0 [ 28.579284] __kmalloc_cache_noprof+0x184/0x410 [ 28.579950] ksize_unpoisons_memory+0xc8/0x9b0 [ 28.580995] kunit_try_run_case+0x1b3/0x490 [ 28.581500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.582269] kthread+0x257/0x310 [ 28.582615] ret_from_fork+0x41/0x80 [ 28.583551] ret_from_fork_asm+0x1a/0x30 [ 28.583936] [ 28.584250] The buggy address belongs to the object at ffff888101ab2b00 [ 28.584250] which belongs to the cache kmalloc-128 of size 128 [ 28.585746] The buggy address is located 0 bytes to the right of [ 28.585746] allocated 115-byte region [ffff888101ab2b00, ffff888101ab2b73) [ 28.587224] [ 28.587636] The buggy address belongs to the physical page: [ 28.588665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab2 [ 28.589583] flags: 0x200000000000000(node=0|zone=2) [ 28.590286] page_type: f5(slab) [ 28.590793] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.591960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.592578] page dumped because: kasan: bad access detected [ 28.593443] [ 28.593723] Memory state around the buggy address: [ 28.594426] ffff888101ab2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 28.595585] ffff888101ab2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.596398] >ffff888101ab2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.597671] ^ [ 28.598429] ffff888101ab2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.599455] ffff888101ab2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.600298] ================================================================== [ 28.650518] ================================================================== [ 28.651238] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 28.651718] Read of size 1 at addr ffff888101ab2b7f by task kunit_try_catch/201 [ 28.652666] [ 28.653014] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.654052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.654527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.655138] Call Trace: [ 28.655546] <TASK> [ 28.655944] dump_stack_lvl+0x73/0xb0 [ 28.656401] print_report+0xd1/0x640 [ 28.656700] ? __virt_addr_valid+0x1db/0x2d0 [ 28.657064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.657853] kasan_report+0x102/0x140 [ 28.658634] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 28.659331] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 28.659848] __asan_report_load1_noabort+0x18/0x20 [ 28.660187] ksize_unpoisons_memory+0x7b8/0x9b0 [ 28.660670] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 28.661497] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.662984] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 28.663569] kunit_try_run_case+0x1b3/0x490 [ 28.665413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.666248] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.666725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.667463] ? __kthread_parkme+0x82/0x160 [ 28.668252] ? preempt_count_sub+0x50/0x80 [ 28.668984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.669571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.670485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.671156] kthread+0x257/0x310 [ 28.672214] ? __pfx_kthread+0x10/0x10 [ 28.672553] ret_from_fork+0x41/0x80 [ 28.673439] ? __pfx_kthread+0x10/0x10 [ 28.673631] ret_from_fork_asm+0x1a/0x30 [ 28.674021] </TASK> [ 28.674490] [ 28.674778] Allocated by task 201: [ 28.675575] kasan_save_stack+0x3d/0x60 [ 28.676514] kasan_save_track+0x18/0x40 [ 28.677159] kasan_save_alloc_info+0x3b/0x50 [ 28.678122] __kasan_kmalloc+0xb7/0xc0 [ 28.678472] __kmalloc_cache_noprof+0x184/0x410 [ 28.679542] ksize_unpoisons_memory+0xc8/0x9b0 [ 28.680010] kunit_try_run_case+0x1b3/0x490 [ 28.680668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.682263] kthread+0x257/0x310 [ 28.682612] ret_from_fork+0x41/0x80 [ 28.683025] ret_from_fork_asm+0x1a/0x30 [ 28.683872] [ 28.684283] The buggy address belongs to the object at ffff888101ab2b00 [ 28.684283] which belongs to the cache kmalloc-128 of size 128 [ 28.685587] The buggy address is located 12 bytes to the right of [ 28.685587] allocated 115-byte region [ffff888101ab2b00, ffff888101ab2b73) [ 28.687561] [ 28.688022] The buggy address belongs to the physical page: [ 28.688701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab2 [ 28.689933] flags: 0x200000000000000(node=0|zone=2) [ 28.690373] page_type: f5(slab) [ 28.690698] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.691354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.692474] page dumped because: kasan: bad access detected [ 28.693266] [ 28.693524] Memory state around the buggy address: [ 28.694179] ffff888101ab2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 28.694845] ffff888101ab2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.695605] >ffff888101ab2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.696534] ^ [ 28.697278] ffff888101ab2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.697899] ffff888101ab2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.698635] ==================================================================