Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 46.174499] ================================================================== [ 46.181762] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6c0/0x744 [ 46.188781] Read of size 1 at addr cc228680 by task kunit_try_catch/192 [ 46.195434] [ 46.196960] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 46.196960] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 46.196990] Hardware name: Generic DRA74X (Flattened Device Tree) [ 46.196990] Call trace: [ 46.196990] unwind_backtrace from show_stack+0x18/0x1c [ 46.197021] show_stack from dump_stack_lvl+0x70/0x90 [ 46.197052] dump_stack_lvl from print_report+0x158/0x528 [ 46.197082] print_report from kasan_report+0xdc/0x118 [ 46.197082] kasan_report from kmalloc_oob_right+0x6c0/0x744 [ 46.197113] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 46.197143] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.197174] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 46.197204] kthread from ret_from_fork+0x14/0x20 [ 46.197204] Exception stack(0xf22d3fb0 to 0xf22d3ff8) [ 46.197235] 3fa0: 00000000 00000000 00000000 00000000 [ 46.197235] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 46.197265] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 46.197265] [ 46.302154] Allocated by task 192: [ 46.305572] kasan_save_track+0x30/0x5c [ 46.309417] __kasan_kmalloc+0x8c/0x94 [ 46.313201] kmalloc_oob_right+0xcc/0x744 [ 46.317260] kunit_try_run_case+0x22c/0x5a8 [ 46.321472] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.326995] kthread+0x464/0x810 [ 46.330261] ret_from_fork+0x14/0x20 [ 46.333862] [ 46.335357] The buggy address belongs to the object at cc228600 [ 46.335357] which belongs to the cache kmalloc-128 of size 128 [ 46.347259] The buggy address is located 13 bytes to the right of [ 46.347259] allocated 115-byte region [cc228600, cc228673) [ 46.358978] [ 46.360504] The buggy address belongs to the physical page: [ 46.366088] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 46.373382] flags: 0x0(zone=0) [ 46.376434] page_type: f5(slab) [ 46.379608] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 46.387756] raw: 00000000 [ 46.390411] page dumped because: kasan: bad access detected [ 46.395996] [ 46.397491] Memory state around the buggy address: [ 46.402313] cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.408905] cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.415466] >cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.422027] ^ [ 46.424591] cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.431152] cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.437713] ================================================================== [ 45.899719] ================================================================== [ 45.907012] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x660/0x744 [ 45.914001] Write of size 1 at addr cc228678 by task kunit_try_catch/192 [ 45.920776] [ 45.922271] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 45.922302] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 45.922302] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.922332] Call trace: [ 45.922332] unwind_backtrace from show_stack+0x18/0x1c [ 45.922363] show_stack from dump_stack_lvl+0x70/0x90 [ 45.922363] dump_stack_lvl from print_report+0x158/0x528 [ 45.922393] print_report from kasan_report+0xdc/0x118 [ 45.922424] kasan_report from kmalloc_oob_right+0x660/0x744 [ 45.922454] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.922454] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.922485] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.922515] kthread from ret_from_fork+0x14/0x20 [ 45.922546] Exception stack(0xf22d3fb0 to 0xf22d3ff8) [ 45.922546] 3fa0: 00000000 00000000 00000000 00000000 [ 45.922576] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.922576] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.922607] [ 46.027465] Allocated by task 192: [ 46.030883] kasan_save_track+0x30/0x5c [ 46.034759] __kasan_kmalloc+0x8c/0x94 [ 46.038543] kmalloc_oob_right+0xcc/0x744 [ 46.042602] kunit_try_run_case+0x22c/0x5a8 [ 46.046813] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.052337] kthread+0x464/0x810 [ 46.055603] ret_from_fork+0x14/0x20 [ 46.059204] [ 46.060699] The buggy address belongs to the object at cc228600 [ 46.060699] which belongs to the cache kmalloc-128 of size 128 [ 46.072601] The buggy address is located 5 bytes to the right of [ 46.072601] allocated 115-byte region [cc228600, cc228673) [ 46.084228] [ 46.085723] The buggy address belongs to the physical page: [ 46.091339] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 46.098602] flags: 0x0(zone=0) [ 46.101684] page_type: f5(slab) [ 46.104858] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 46.113006] raw: 00000000 [ 46.115661] page dumped because: kasan: bad access detected [ 46.121246] [ 46.122741] Memory state around the buggy address: [ 46.127593] cc228500: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc [ 46.134155] cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.140716] >cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.147277] ^ [ 46.153778] cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.160339] cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.166900] ================================================================== [ 45.621215] ================================================================== [ 45.628509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6a4/0x744 [ 45.635528] Write of size 1 at addr cc228673 by task kunit_try_catch/192 [ 45.642272] [ 45.643768] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G W N 6.15.0-rc3 #1 NONE [ 45.643798] Tainted: [W]=WARN, [N]=TEST [ 45.643829] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.643829] Call trace: [ 45.643829] unwind_backtrace from show_stack+0x18/0x1c [ 45.643859] show_stack from dump_stack_lvl+0x70/0x90 [ 45.643890] dump_stack_lvl from print_report+0x158/0x528 [ 45.643920] print_report from kasan_report+0xdc/0x118 [ 45.643951] kasan_report from kmalloc_oob_right+0x6a4/0x744 [ 45.643951] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.643981] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.644012] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.644042] kthread from ret_from_fork+0x14/0x20 [ 45.644073] Exception stack(0xf22d3fb0 to 0xf22d3ff8) [ 45.644073] 3fa0: 00000000 00000000 00000000 00000000 [ 45.644104] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.644104] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.644134] [ 45.747772] Allocated by task 192: [ 45.751220] kasan_save_track+0x30/0x5c [ 45.755065] __kasan_kmalloc+0x8c/0x94 [ 45.758850] kmalloc_oob_right+0xcc/0x744 [ 45.762908] kunit_try_run_case+0x22c/0x5a8 [ 45.767120] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.772644] kthread+0x464/0x810 [ 45.775909] ret_from_fork+0x14/0x20 [ 45.779510] [ 45.781005] The buggy address belongs to the object at cc228600 [ 45.781005] which belongs to the cache kmalloc-128 of size 128 [ 45.792907] The buggy address is located 0 bytes to the right of [ 45.792907] allocated 115-byte region [cc228600, cc228673) [ 45.804534] [ 45.806060] The buggy address belongs to the physical page: [ 45.811645] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 45.818939] flags: 0x0(zone=0) [ 45.822021] page_type: f5(slab) [ 45.825195] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 45.833312] raw: 00000000 [ 45.835968] page dumped because: kasan: bad access detected [ 45.841583] [ 45.843078] Memory state around the buggy address: [ 45.847900] cc228500: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc [ 45.854461] cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.861053] >cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 45.867614] ^ [ 45.873840] cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.880401] cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.886962] ==================================================================
[ 13.282470] ================================================================== [ 13.289702] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 13.296678] Write of size 1 at addr ffff888104ee9073 by task kunit_try_catch/179 [ 13.304080] [ 13.305580] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.305588] Tainted: [N]=TEST [ 13.305590] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 13.305594] Call Trace: [ 13.305596] <TASK> [ 13.305598] dump_stack_lvl+0x73/0xb0 [ 13.305602] print_report+0xd1/0x650 [ 13.305607] ? __virt_addr_valid+0x1db/0x2d0 [ 13.305612] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.305616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.305620] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.305624] kasan_report+0x141/0x180 [ 13.305628] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.305633] __asan_report_store1_noabort+0x1b/0x30 [ 13.305637] kmalloc_oob_right+0x6f0/0x7f0 [ 13.305641] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.305645] ? __schedule+0x10cc/0x2b30 [ 13.305650] ? ktime_get_ts64+0x83/0x230 [ 13.305655] kunit_try_run_case+0x1a2/0x480 [ 13.305660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.305664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.305669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.305674] ? __kthread_parkme+0x82/0x180 [ 13.305678] ? preempt_count_sub+0x50/0x80 [ 13.305683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.305687] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 13.305692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.305696] kthread+0x334/0x6f0 [ 13.305700] ? trace_preempt_on+0x20/0xc0 [ 13.305705] ? __pfx_kthread+0x10/0x10 [ 13.305709] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.305713] ? calculate_sigpending+0x7b/0xa0 [ 13.305717] ? __pfx_kthread+0x10/0x10 [ 13.305722] ret_from_fork+0x3e/0x80 [ 13.305726] ? __pfx_kthread+0x10/0x10 [ 13.305730] ret_from_fork_asm+0x1a/0x30 [ 13.305736] </TASK> [ 13.305738] [ 13.467369] Allocated by task 179: [ 13.470773] kasan_save_stack+0x45/0x70 [ 13.474612] kasan_save_track+0x18/0x40 [ 13.478452] kasan_save_alloc_info+0x3b/0x50 [ 13.482726] __kasan_kmalloc+0xb7/0xc0 [ 13.486477] __kmalloc_cache_noprof+0x189/0x420 [ 13.491008] kmalloc_oob_right+0xa9/0x7f0 [ 13.495021] kunit_try_run_case+0x1a2/0x480 [ 13.499209] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 13.504606] kthread+0x334/0x6f0 [ 13.507841] ret_from_fork+0x3e/0x80 [ 13.511426] ret_from_fork_asm+0x1a/0x30 [ 13.515354] [ 13.516852] The buggy address belongs to the object at ffff888104ee9000 [ 13.516852] which belongs to the cache kmalloc-128 of size 128 [ 13.529366] The buggy address is located 0 bytes to the right of [ 13.529366] allocated 115-byte region [ffff888104ee9000, ffff888104ee9073) [ 13.542315] [ 13.543813] The buggy address belongs to the physical page: [ 13.549385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 13.557394] flags: 0x200000000000000(node=0|zone=2) [ 13.562282] page_type: f5(slab) [ 13.565429] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 13.573175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.580914] page dumped because: kasan: bad access detected [ 13.586486] [ 13.587985] Memory state around the buggy address: [ 13.592777] ffff888104ee8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.599999] ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.607226] >ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.614450] ^ [ 13.621325] ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.628545] ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.635762] ================================================================== [ 14.010421] ================================================================== [ 14.017651] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 14.024634] Read of size 1 at addr ffff888104ee9080 by task kunit_try_catch/179 [ 14.031942] [ 14.033441] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.033448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.033450] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 14.033453] Call Trace: [ 14.033455] <TASK> [ 14.033457] dump_stack_lvl+0x73/0xb0 [ 14.033460] print_report+0xd1/0x650 [ 14.033464] ? __virt_addr_valid+0x1db/0x2d0 [ 14.033468] ? kmalloc_oob_right+0x68a/0x7f0 [ 14.033472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.033476] ? kmalloc_oob_right+0x68a/0x7f0 [ 14.033480] kasan_report+0x141/0x180 [ 14.033484] ? kmalloc_oob_right+0x68a/0x7f0 [ 14.033489] __asan_report_load1_noabort+0x18/0x20 [ 14.033493] kmalloc_oob_right+0x68a/0x7f0 [ 14.033497] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 14.033502] ? __schedule+0x10cc/0x2b30 [ 14.033506] ? ktime_get_ts64+0x83/0x230 [ 14.033511] kunit_try_run_case+0x1a2/0x480 [ 14.033515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.033524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.033528] ? __kthread_parkme+0x82/0x180 [ 14.033532] ? preempt_count_sub+0x50/0x80 [ 14.033537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033541] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.033545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.033548] kthread+0x334/0x6f0 [ 14.033552] ? trace_preempt_on+0x20/0xc0 [ 14.033557] ? __pfx_kthread+0x10/0x10 [ 14.033561] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.033565] ? calculate_sigpending+0x7b/0xa0 [ 14.033569] ? __pfx_kthread+0x10/0x10 [ 14.033573] ret_from_fork+0x3e/0x80 [ 14.033577] ? __pfx_kthread+0x10/0x10 [ 14.033581] ret_from_fork_asm+0x1a/0x30 [ 14.033587] </TASK> [ 14.033588] [ 14.196425] Allocated by task 179: [ 14.199834] kasan_save_stack+0x45/0x70 [ 14.203699] kasan_save_track+0x18/0x40 [ 14.207545] kasan_save_alloc_info+0x3b/0x50 [ 14.211818] __kasan_kmalloc+0xb7/0xc0 [ 14.215569] __kmalloc_cache_noprof+0x189/0x420 [ 14.220104] kmalloc_oob_right+0xa9/0x7f0 [ 14.224124] kunit_try_run_case+0x1a2/0x480 [ 14.228310] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.233722] kthread+0x334/0x6f0 [ 14.236958] ret_from_fork+0x3e/0x80 [ 14.240538] ret_from_fork_asm+0x1a/0x30 [ 14.244463] [ 14.245962] The buggy address belongs to the object at ffff888104ee9000 [ 14.245962] which belongs to the cache kmalloc-128 of size 128 [ 14.258468] The buggy address is located 13 bytes to the right of [ 14.258468] allocated 115-byte region [ffff888104ee9000, ffff888104ee9073) [ 14.271502] [ 14.273002] The buggy address belongs to the physical page: [ 14.278575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 14.286581] flags: 0x200000000000000(node=0|zone=2) [ 14.291459] page_type: f5(slab) [ 14.294609] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 14.302354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.310094] page dumped because: kasan: bad access detected [ 14.315689] [ 14.317209] Memory state around the buggy address: [ 14.322000] ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.329221] ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.336437] >ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.343673] ^ [ 14.346933] ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.354152] ffff888104ee9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.361372] ================================================================== [ 13.648445] ================================================================== [ 13.655679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 13.662645] Write of size 1 at addr ffff888104ee9078 by task kunit_try_catch/179 [ 13.670047] [ 13.671545] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.671553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.671555] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 13.671559] Call Trace: [ 13.671560] <TASK> [ 13.671562] dump_stack_lvl+0x73/0xb0 [ 13.671566] print_report+0xd1/0x650 [ 13.671570] ? __virt_addr_valid+0x1db/0x2d0 [ 13.671573] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.671577] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.671581] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.671585] kasan_report+0x141/0x180 [ 13.671590] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.671595] __asan_report_store1_noabort+0x1b/0x30 [ 13.671598] kmalloc_oob_right+0x6bd/0x7f0 [ 13.671602] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.671607] ? __schedule+0x10cc/0x2b30 [ 13.671611] ? ktime_get_ts64+0x83/0x230 [ 13.671616] kunit_try_run_case+0x1a2/0x480 [ 13.671620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.671624] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.671629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.671633] ? __kthread_parkme+0x82/0x180 [ 13.671637] ? preempt_count_sub+0x50/0x80 [ 13.671642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.671646] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 13.671650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.671654] kthread+0x334/0x6f0 [ 13.671658] ? trace_preempt_on+0x20/0xc0 [ 13.671662] ? __pfx_kthread+0x10/0x10 [ 13.671666] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.671670] ? calculate_sigpending+0x7b/0xa0 [ 13.671674] ? __pfx_kthread+0x10/0x10 [ 13.671678] ret_from_fork+0x3e/0x80 [ 13.671682] ? __pfx_kthread+0x10/0x10 [ 13.671686] ret_from_fork_asm+0x1a/0x30 [ 13.671692] </TASK> [ 13.671694] [ 13.834549] Allocated by task 179: [ 13.837955] kasan_save_stack+0x45/0x70 [ 13.841793] kasan_save_track+0x18/0x40 [ 13.845633] kasan_save_alloc_info+0x3b/0x50 [ 13.849907] __kasan_kmalloc+0xb7/0xc0 [ 13.853657] __kmalloc_cache_noprof+0x189/0x420 [ 13.858191] kmalloc_oob_right+0xa9/0x7f0 [ 13.862204] kunit_try_run_case+0x1a2/0x480 [ 13.866388] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 13.871787] kthread+0x334/0x6f0 [ 13.875022] ret_from_fork+0x3e/0x80 [ 13.878607] ret_from_fork_asm+0x1a/0x30 [ 13.882535] [ 13.884035] The buggy address belongs to the object at ffff888104ee9000 [ 13.884035] which belongs to the cache kmalloc-128 of size 128 [ 13.896549] The buggy address is located 5 bytes to the right of [ 13.896549] allocated 115-byte region [ffff888104ee9000, ffff888104ee9073) [ 13.909496] [ 13.910993] The buggy address belongs to the physical page: [ 13.916567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 13.924575] flags: 0x200000000000000(node=0|zone=2) [ 13.929452] page_type: f5(slab) [ 13.932599] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 13.940341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.948086] page dumped because: kasan: bad access detected [ 13.953658] [ 13.955158] Memory state around the buggy address: [ 13.959950] ffff888104ee8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.967170] ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.974389] >ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.981608] ^ [ 13.988739] ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.995959] ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.003178] ==================================================================