Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.216553] ================================================================== [ 20.217391] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0 [ 20.218275] Read of size 1 at addr fff00000c40eff80 by task kunit_try_catch/126 [ 20.219052] [ 20.219396] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.219654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.219733] Hardware name: linux,dummy-virt (DT) [ 20.219866] Call trace: [ 20.219936] dump_backtrace+0x9c/0x128 [ 20.220068] show_stack+0x20/0x38 [ 20.220164] dump_stack_lvl+0x8c/0xd0 [ 20.220264] print_report+0x118/0x5f0 [ 20.220363] kasan_report+0xdc/0x128 [ 20.220458] __asan_report_load1_noabort+0x20/0x30 [ 20.220551] kmalloc_oob_right+0x588/0x5f0 [ 20.220640] kunit_try_run_case+0x170/0x3f0 [ 20.220730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.220849] kthread+0x24c/0x2d0 [ 20.220936] ret_from_fork+0x10/0x20 [ 20.221053] [ 20.229938] Allocated by task 126: [ 20.230528] kasan_save_stack+0x3c/0x68 [ 20.231088] kasan_save_track+0x20/0x40 [ 20.231900] kasan_save_alloc_info+0x40/0x58 [ 20.232942] __kasan_kmalloc+0xd4/0xd8 [ 20.233800] __kmalloc_cache_noprof+0x154/0x320 [ 20.234426] kmalloc_oob_right+0xb8/0x5f0 [ 20.235050] kunit_try_run_case+0x170/0x3f0 [ 20.236157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.236805] kthread+0x24c/0x2d0 [ 20.237248] ret_from_fork+0x10/0x20 [ 20.237691] [ 20.238397] The buggy address belongs to the object at fff00000c40eff00 [ 20.238397] which belongs to the cache kmalloc-128 of size 128 [ 20.239642] The buggy address is located 13 bytes to the right of [ 20.239642] allocated 115-byte region [fff00000c40eff00, fff00000c40eff73) [ 20.241317] [ 20.241644] The buggy address belongs to the physical page: [ 20.242487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef [ 20.243230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.243894] page_type: f5(slab) [ 20.244355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.245465] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.246358] page dumped because: kasan: bad access detected [ 20.246914] [ 20.247253] Memory state around the buggy address: [ 20.247955] fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.248679] fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.249441] >fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.250573] ^ [ 20.251212] fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.252299] fff00000c40f0080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.252866] ================================================================== [ 20.178821] ================================================================== [ 20.179418] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0 [ 20.180231] Write of size 1 at addr fff00000c40eff78 by task kunit_try_catch/126 [ 20.181067] [ 20.181400] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.181615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.181693] Hardware name: linux,dummy-virt (DT) [ 20.181782] Call trace: [ 20.181847] dump_backtrace+0x9c/0x128 [ 20.182139] show_stack+0x20/0x38 [ 20.182253] dump_stack_lvl+0x8c/0xd0 [ 20.182369] print_report+0x118/0x5f0 [ 20.182479] kasan_report+0xdc/0x128 [ 20.182585] __asan_report_store1_noabort+0x20/0x30 [ 20.182711] kmalloc_oob_right+0x528/0x5f0 [ 20.182826] kunit_try_run_case+0x170/0x3f0 [ 20.182885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.182941] kthread+0x24c/0x2d0 [ 20.183017] ret_from_fork+0x10/0x20 [ 20.183068] [ 20.193163] Allocated by task 126: [ 20.193678] kasan_save_stack+0x3c/0x68 [ 20.194242] kasan_save_track+0x20/0x40 [ 20.194869] kasan_save_alloc_info+0x40/0x58 [ 20.195637] __kasan_kmalloc+0xd4/0xd8 [ 20.196140] __kmalloc_cache_noprof+0x154/0x320 [ 20.196710] kmalloc_oob_right+0xb8/0x5f0 [ 20.197271] kunit_try_run_case+0x170/0x3f0 [ 20.197793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.198453] kthread+0x24c/0x2d0 [ 20.198922] ret_from_fork+0x10/0x20 [ 20.200224] [ 20.200483] The buggy address belongs to the object at fff00000c40eff00 [ 20.200483] which belongs to the cache kmalloc-128 of size 128 [ 20.201545] The buggy address is located 5 bytes to the right of [ 20.201545] allocated 115-byte region [fff00000c40eff00, fff00000c40eff73) [ 20.202845] [ 20.203170] The buggy address belongs to the physical page: [ 20.204081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef [ 20.204914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.205727] page_type: f5(slab) [ 20.206217] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.207011] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.208055] page dumped because: kasan: bad access detected [ 20.208712] [ 20.209039] Memory state around the buggy address: [ 20.209499] fff00000c40efe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.210741] fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.211576] >fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.212393] ^ [ 20.212996] fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.213782] fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.214488] ================================================================== [ 20.128681] ================================================================== [ 20.130740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0 [ 20.136356] Write of size 1 at addr fff00000c40eff73 by task kunit_try_catch/126 [ 20.137937] [ 20.140420] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G N 6.12.33-rc1 #1 [ 20.141341] Tainted: [N]=TEST [ 20.141393] Hardware name: linux,dummy-virt (DT) [ 20.141692] Call trace: [ 20.141742] dump_backtrace+0x9c/0x128 [ 20.141835] show_stack+0x20/0x38 [ 20.141883] dump_stack_lvl+0x8c/0xd0 [ 20.141938] print_report+0x118/0x5f0 [ 20.142019] kasan_report+0xdc/0x128 [ 20.142066] __asan_report_store1_noabort+0x20/0x30 [ 20.142117] kmalloc_oob_right+0x56c/0x5f0 [ 20.142165] kunit_try_run_case+0x170/0x3f0 [ 20.142216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.142268] kthread+0x24c/0x2d0 [ 20.142315] ret_from_fork+0x10/0x20 [ 20.142462] [ 20.150748] Allocated by task 126: [ 20.151629] kasan_save_stack+0x3c/0x68 [ 20.152224] kasan_save_track+0x20/0x40 [ 20.152671] kasan_save_alloc_info+0x40/0x58 [ 20.153257] __kasan_kmalloc+0xd4/0xd8 [ 20.153777] __kmalloc_cache_noprof+0x154/0x320 [ 20.154836] kmalloc_oob_right+0xb8/0x5f0 [ 20.155571] kunit_try_run_case+0x170/0x3f0 [ 20.156250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.156870] kthread+0x24c/0x2d0 [ 20.157451] ret_from_fork+0x10/0x20 [ 20.158072] [ 20.158394] The buggy address belongs to the object at fff00000c40eff00 [ 20.158394] which belongs to the cache kmalloc-128 of size 128 [ 20.160303] The buggy address is located 0 bytes to the right of [ 20.160303] allocated 115-byte region [fff00000c40eff00, fff00000c40eff73) [ 20.161447] [ 20.161942] The buggy address belongs to the physical page: [ 20.162875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef [ 20.164284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.165375] page_type: f5(slab) [ 20.166353] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.167075] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.168120] page dumped because: kasan: bad access detected [ 20.169011] [ 20.169406] Memory state around the buggy address: [ 20.170212] fff00000c40efe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.170933] fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.172023] >fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.172691] ^ [ 20.173322] fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.174096] fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.174884] ==================================================================
[ 16.287994] ================================================================== [ 16.288466] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 16.290248] Read of size 1 at addr ffff888102304f80 by task kunit_try_catch/143 [ 16.290901] [ 16.291112] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 16.291244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.291295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.291338] Call Trace: [ 16.291361] <TASK> [ 16.291382] dump_stack_lvl+0x73/0xb0 [ 16.291420] print_report+0xd1/0x640 [ 16.291455] ? __virt_addr_valid+0x1db/0x2d0 [ 16.291564] ? kmalloc_oob_right+0x68c/0x7f0 [ 16.291642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.291716] ? kmalloc_oob_right+0x68c/0x7f0 [ 16.291787] kasan_report+0x140/0x180 [ 16.291864] ? kmalloc_oob_right+0x68c/0x7f0 [ 16.291949] __asan_report_load1_noabort+0x18/0x20 [ 16.292018] kmalloc_oob_right+0x68c/0x7f0 [ 16.292134] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.292236] ? __schedule+0xc49/0x27a0 [ 16.292273] ? __pfx_read_tsc+0x10/0x10 [ 16.292301] ? ktime_get_ts64+0x84/0x230 [ 16.292336] kunit_try_run_case+0x1a6/0x480 [ 16.292367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.292395] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.292422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.292673] ? __kthread_parkme+0x82/0x160 [ 16.292708] ? preempt_count_sub+0x50/0x80 [ 16.292738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.292765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.292801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.292864] kthread+0x257/0x310 [ 16.292893] ? __pfx_kthread+0x10/0x10 [ 16.292919] ret_from_fork+0x41/0x80 [ 16.292951] ? __pfx_kthread+0x10/0x10 [ 16.292976] ret_from_fork_asm+0x1a/0x30 [ 16.293015] </TASK> [ 16.293028] [ 16.316011] Allocated by task 143: [ 16.316447] kasan_save_stack+0x45/0x70 [ 16.317235] kasan_save_track+0x18/0x40 [ 16.318186] kasan_save_alloc_info+0x3b/0x50 [ 16.318959] __kasan_kmalloc+0xb7/0xc0 [ 16.319245] __kmalloc_cache_noprof+0x168/0x350 [ 16.319926] kmalloc_oob_right+0xaa/0x7f0 [ 16.320381] kunit_try_run_case+0x1a6/0x480 [ 16.320785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.321883] kthread+0x257/0x310 [ 16.322263] ret_from_fork+0x41/0x80 [ 16.322807] ret_from_fork_asm+0x1a/0x30 [ 16.323250] [ 16.323870] The buggy address belongs to the object at ffff888102304f00 [ 16.323870] which belongs to the cache kmalloc-128 of size 128 [ 16.324992] The buggy address is located 13 bytes to the right of [ 16.324992] allocated 115-byte region [ffff888102304f00, ffff888102304f73) [ 16.326176] [ 16.326868] The buggy address belongs to the physical page: [ 16.327468] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102304 [ 16.328532] flags: 0x200000000000000(node=0|zone=2) [ 16.329023] page_type: f5(slab) [ 16.329395] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.330480] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 16.331425] page dumped because: kasan: bad access detected [ 16.332526] [ 16.333047] Memory state around the buggy address: [ 16.333877] ffff888102304e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.334613] ffff888102304f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.335295] >ffff888102304f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.335917] ^ [ 16.336304] ffff888102305000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 16.336951] ffff888102305080: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 16.337572] ================================================================== [ 16.244855] ================================================================== [ 16.245802] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 16.246758] Write of size 1 at addr ffff888102304f78 by task kunit_try_catch/143 [ 16.247279] [ 16.247533] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 16.247651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.247677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.247708] Call Trace: [ 16.247726] <TASK> [ 16.247746] dump_stack_lvl+0x73/0xb0 [ 16.247783] print_report+0xd1/0x640 [ 16.247846] ? __virt_addr_valid+0x1db/0x2d0 [ 16.248154] ? kmalloc_oob_right+0x6bf/0x7f0 [ 16.248244] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.248318] ? kmalloc_oob_right+0x6bf/0x7f0 [ 16.248388] kasan_report+0x140/0x180 [ 16.248633] ? kmalloc_oob_right+0x6bf/0x7f0 [ 16.248726] __asan_report_store1_noabort+0x1b/0x30 [ 16.248794] kmalloc_oob_right+0x6bf/0x7f0 [ 16.248873] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.248908] ? __schedule+0xc49/0x27a0 [ 16.248935] ? __pfx_read_tsc+0x10/0x10 [ 16.248960] ? ktime_get_ts64+0x84/0x230 [ 16.248994] kunit_try_run_case+0x1a6/0x480 [ 16.249024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.249052] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.249079] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.249114] ? __kthread_parkme+0x82/0x160 [ 16.249143] ? preempt_count_sub+0x50/0x80 [ 16.249171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.249198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.249262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.249299] kthread+0x257/0x310 [ 16.249324] ? __pfx_kthread+0x10/0x10 [ 16.249350] ret_from_fork+0x41/0x80 [ 16.249378] ? __pfx_kthread+0x10/0x10 [ 16.249403] ret_from_fork_asm+0x1a/0x30 [ 16.249448] </TASK> [ 16.249506] [ 16.265859] Allocated by task 143: [ 16.266342] kasan_save_stack+0x45/0x70 [ 16.266977] kasan_save_track+0x18/0x40 [ 16.267423] kasan_save_alloc_info+0x3b/0x50 [ 16.268065] __kasan_kmalloc+0xb7/0xc0 [ 16.268856] __kmalloc_cache_noprof+0x168/0x350 [ 16.269324] kmalloc_oob_right+0xaa/0x7f0 [ 16.269712] kunit_try_run_case+0x1a6/0x480 [ 16.270132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.271011] kthread+0x257/0x310 [ 16.271331] ret_from_fork+0x41/0x80 [ 16.271957] ret_from_fork_asm+0x1a/0x30 [ 16.272425] [ 16.273014] The buggy address belongs to the object at ffff888102304f00 [ 16.273014] which belongs to the cache kmalloc-128 of size 128 [ 16.274241] The buggy address is located 5 bytes to the right of [ 16.274241] allocated 115-byte region [ffff888102304f00, ffff888102304f73) [ 16.275428] [ 16.275849] The buggy address belongs to the physical page: [ 16.276386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102304 [ 16.277423] flags: 0x200000000000000(node=0|zone=2) [ 16.277898] page_type: f5(slab) [ 16.278207] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.279199] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 16.280101] page dumped because: kasan: bad access detected [ 16.280578] [ 16.281478] Memory state around the buggy address: [ 16.282443] ffff888102304e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 16.283180] ffff888102304e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.284132] >ffff888102304f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.285013] ^ [ 16.285625] ffff888102304f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.286374] ffff888102305000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 16.287067] ================================================================== [ 16.190628] ================================================================== [ 16.192059] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 16.193230] Write of size 1 at addr ffff888102304f73 by task kunit_try_catch/143 [ 16.193861] [ 16.195663] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G N 6.12.33-rc1 #1 [ 16.196081] Tainted: [N]=TEST [ 16.196117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.196418] Call Trace: [ 16.196584] <TASK> [ 16.196773] dump_stack_lvl+0x73/0xb0 [ 16.196928] print_report+0xd1/0x640 [ 16.196987] ? __virt_addr_valid+0x1db/0x2d0 [ 16.197030] ? kmalloc_oob_right+0x6f2/0x7f0 [ 16.197061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.197094] ? kmalloc_oob_right+0x6f2/0x7f0 [ 16.197125] kasan_report+0x140/0x180 [ 16.197159] ? kmalloc_oob_right+0x6f2/0x7f0 [ 16.197197] __asan_report_store1_noabort+0x1b/0x30 [ 16.197256] kmalloc_oob_right+0x6f2/0x7f0 [ 16.197291] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.197324] ? __schedule+0xc49/0x27a0 [ 16.197353] ? __pfx_read_tsc+0x10/0x10 [ 16.197381] ? ktime_get_ts64+0x84/0x230 [ 16.197418] kunit_try_run_case+0x1a6/0x480 [ 16.197491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.197565] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.197601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.197667] ? __kthread_parkme+0x82/0x160 [ 16.197698] ? preempt_count_sub+0x50/0x80 [ 16.197745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.197776] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.197823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.197898] kthread+0x257/0x310 [ 16.197947] ? __pfx_kthread+0x10/0x10 [ 16.197982] ret_from_fork+0x41/0x80 [ 16.198015] ? __pfx_kthread+0x10/0x10 [ 16.198059] ret_from_fork_asm+0x1a/0x30 [ 16.198156] </TASK> [ 16.198278] [ 16.216833] Allocated by task 143: [ 16.217412] kasan_save_stack+0x45/0x70 [ 16.218094] kasan_save_track+0x18/0x40 [ 16.218653] kasan_save_alloc_info+0x3b/0x50 [ 16.219100] __kasan_kmalloc+0xb7/0xc0 [ 16.219430] __kmalloc_cache_noprof+0x168/0x350 [ 16.220647] kmalloc_oob_right+0xaa/0x7f0 [ 16.221260] kunit_try_run_case+0x1a6/0x480 [ 16.221570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.222465] kthread+0x257/0x310 [ 16.222916] ret_from_fork+0x41/0x80 [ 16.223305] ret_from_fork_asm+0x1a/0x30 [ 16.224278] [ 16.224681] The buggy address belongs to the object at ffff888102304f00 [ 16.224681] which belongs to the cache kmalloc-128 of size 128 [ 16.226184] The buggy address is located 0 bytes to the right of [ 16.226184] allocated 115-byte region [ffff888102304f00, ffff888102304f73) [ 16.227734] [ 16.228143] The buggy address belongs to the physical page: [ 16.229194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102304 [ 16.230314] flags: 0x200000000000000(node=0|zone=2) [ 16.231421] page_type: f5(slab) [ 16.232687] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.233394] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 16.234854] page dumped because: kasan: bad access detected [ 16.235325] [ 16.235917] Memory state around the buggy address: [ 16.237126] ffff888102304e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 16.237718] ffff888102304e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.238283] >ffff888102304f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.239240] ^ [ 16.239972] ffff888102304f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.240808] ffff888102305000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 16.241807] ==================================================================