Date
May 23, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 26.666047] ================================================================== [ 26.666800] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 26.668056] Write of size 1 at addr fff00000c5a34773 by task kunit_try_catch/138 [ 26.668312] [ 26.670003] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.0-rc7 #1 PREEMPT [ 26.670361] Tainted: [N]=TEST [ 26.670473] Hardware name: linux,dummy-virt (DT) [ 26.670979] Call trace: [ 26.671318] show_stack+0x20/0x38 (C) [ 26.671693] dump_stack_lvl+0x8c/0xd0 [ 26.671848] print_report+0x118/0x608 [ 26.672006] kasan_report+0xdc/0x128 [ 26.672123] __asan_report_store1_noabort+0x20/0x30 [ 26.672249] kmalloc_oob_right+0x5a4/0x660 [ 26.672388] kunit_try_run_case+0x170/0x3f0 [ 26.672514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.672660] kthread+0x328/0x630 [ 26.672785] ret_from_fork+0x10/0x20 [ 26.673080] [ 26.673136] Allocated by task 138: [ 26.673290] kasan_save_stack+0x3c/0x68 [ 26.673384] kasan_save_track+0x20/0x40 [ 26.673439] kasan_save_alloc_info+0x40/0x58 [ 26.673519] __kasan_kmalloc+0xd4/0xd8 [ 26.673568] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.673628] kmalloc_oob_right+0xb0/0x660 [ 26.673681] kunit_try_run_case+0x170/0x3f0 [ 26.673735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.673796] kthread+0x328/0x630 [ 26.673846] ret_from_fork+0x10/0x20 [ 26.673923] [ 26.674005] The buggy address belongs to the object at fff00000c5a34700 [ 26.674005] which belongs to the cache kmalloc-128 of size 128 [ 26.674134] The buggy address is located 0 bytes to the right of [ 26.674134] allocated 115-byte region [fff00000c5a34700, fff00000c5a34773) [ 26.674229] [ 26.674336] The buggy address belongs to the physical page: [ 26.674587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34 [ 26.674951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.675332] page_type: f5(slab) [ 26.675773] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.675865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.676068] page dumped because: kasan: bad access detected [ 26.676171] [ 26.676274] Memory state around the buggy address: [ 26.676588] fff00000c5a34600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.676687] fff00000c5a34680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.676766] >fff00000c5a34700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.676841] ^ [ 26.676955] fff00000c5a34780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.677017] fff00000c5a34800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.677108] ================================================================== [ 26.678362] ================================================================== [ 26.678543] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 26.678738] Write of size 1 at addr fff00000c5a34778 by task kunit_try_catch/138 [ 26.678934] [ 26.679044] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 26.679300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.679416] Hardware name: linux,dummy-virt (DT) [ 26.679515] Call trace: [ 26.679562] show_stack+0x20/0x38 (C) [ 26.679677] dump_stack_lvl+0x8c/0xd0 [ 26.679788] print_report+0x118/0x608 [ 26.679890] kasan_report+0xdc/0x128 [ 26.680006] __asan_report_store1_noabort+0x20/0x30 [ 26.680128] kmalloc_oob_right+0x538/0x660 [ 26.680232] kunit_try_run_case+0x170/0x3f0 [ 26.680345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.680499] kthread+0x328/0x630 [ 26.680668] ret_from_fork+0x10/0x20 [ 26.680851] [ 26.680924] Allocated by task 138: [ 26.681010] kasan_save_stack+0x3c/0x68 [ 26.681172] kasan_save_track+0x20/0x40 [ 26.681312] kasan_save_alloc_info+0x40/0x58 [ 26.681483] __kasan_kmalloc+0xd4/0xd8 [ 26.681619] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.681728] kmalloc_oob_right+0xb0/0x660 [ 26.681817] kunit_try_run_case+0x170/0x3f0 [ 26.683493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.683632] kthread+0x328/0x630 [ 26.683737] ret_from_fork+0x10/0x20 [ 26.683835] [ 26.683884] The buggy address belongs to the object at fff00000c5a34700 [ 26.683884] which belongs to the cache kmalloc-128 of size 128 [ 26.684036] The buggy address is located 5 bytes to the right of [ 26.684036] allocated 115-byte region [fff00000c5a34700, fff00000c5a34773) [ 26.684212] [ 26.684271] The buggy address belongs to the physical page: [ 26.684357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34 [ 26.684512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.684653] page_type: f5(slab) [ 26.684766] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.684915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.685038] page dumped because: kasan: bad access detected [ 26.685130] [ 26.685180] Memory state around the buggy address: [ 26.685316] fff00000c5a34600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.685430] fff00000c5a34680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.685556] >fff00000c5a34700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.685648] ^ [ 26.685801] fff00000c5a34780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.686041] fff00000c5a34800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.686159] ================================================================== [ 26.687553] ================================================================== [ 26.687792] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 26.688129] Read of size 1 at addr fff00000c5a34780 by task kunit_try_catch/138 [ 26.688337] [ 26.688652] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 26.689251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.689347] Hardware name: linux,dummy-virt (DT) [ 26.689434] Call trace: [ 26.689513] show_stack+0x20/0x38 (C) [ 26.689652] dump_stack_lvl+0x8c/0xd0 [ 26.689814] print_report+0x118/0x608 [ 26.689950] kasan_report+0xdc/0x128 [ 26.690258] __asan_report_load1_noabort+0x20/0x30 [ 26.690499] kmalloc_oob_right+0x5d0/0x660 [ 26.690662] kunit_try_run_case+0x170/0x3f0 [ 26.690801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.690963] kthread+0x328/0x630 [ 26.691098] ret_from_fork+0x10/0x20 [ 26.691241] [ 26.691799] Allocated by task 138: [ 26.692049] kasan_save_stack+0x3c/0x68 [ 26.692352] kasan_save_track+0x20/0x40 [ 26.692518] kasan_save_alloc_info+0x40/0x58 [ 26.692622] __kasan_kmalloc+0xd4/0xd8 [ 26.692714] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.692823] kmalloc_oob_right+0xb0/0x660 [ 26.693174] kunit_try_run_case+0x170/0x3f0 [ 26.693502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.693697] kthread+0x328/0x630 [ 26.693995] ret_from_fork+0x10/0x20 [ 26.694293] [ 26.694568] The buggy address belongs to the object at fff00000c5a34700 [ 26.694568] which belongs to the cache kmalloc-128 of size 128 [ 26.694852] The buggy address is located 13 bytes to the right of [ 26.694852] allocated 115-byte region [fff00000c5a34700, fff00000c5a34773) [ 26.695188] [ 26.695260] The buggy address belongs to the physical page: [ 26.695651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34 [ 26.696055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.696317] page_type: f5(slab) [ 26.696585] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.696718] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.696817] page dumped because: kasan: bad access detected [ 26.696898] [ 26.696945] Memory state around the buggy address: [ 26.697034] fff00000c5a34680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.697659] fff00000c5a34700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.698116] >fff00000c5a34780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.698429] ^ [ 26.698667] fff00000c5a34800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.698861] fff00000c5a34880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.699288] ==================================================================
[ 11.981279] ================================================================== [ 11.981758] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.982074] Read of size 1 at addr ffff888102a2d180 by task kunit_try_catch/155 [ 11.982434] [ 11.982526] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 11.982567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.982579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.982597] Call Trace: [ 11.982611] <TASK> [ 11.982625] dump_stack_lvl+0x73/0xb0 [ 11.982649] print_report+0xd1/0x650 [ 11.982678] ? __virt_addr_valid+0x1db/0x2d0 [ 11.982697] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.982718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.982740] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.982761] kasan_report+0x141/0x180 [ 11.982783] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.982809] __asan_report_load1_noabort+0x18/0x20 [ 11.982829] kmalloc_oob_right+0x68a/0x7f0 [ 11.982851] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.982873] ? __schedule+0x10cc/0x2b30 [ 11.982894] ? __pfx_read_tsc+0x10/0x10 [ 11.982912] ? ktime_get_ts64+0x86/0x230 [ 11.982936] kunit_try_run_case+0x1a5/0x480 [ 11.982970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.982991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.983013] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.983035] ? __kthread_parkme+0x82/0x180 [ 11.983055] ? preempt_count_sub+0x50/0x80 [ 11.983079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.983101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.983122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.983144] kthread+0x337/0x6f0 [ 11.983161] ? trace_preempt_on+0x20/0xc0 [ 11.983183] ? __pfx_kthread+0x10/0x10 [ 11.983200] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.983220] ? calculate_sigpending+0x7b/0xa0 [ 11.983241] ? __pfx_kthread+0x10/0x10 [ 11.983259] ret_from_fork+0x41/0x80 [ 11.983279] ? __pfx_kthread+0x10/0x10 [ 11.983307] ret_from_fork_asm+0x1a/0x30 [ 11.983338] </TASK> [ 11.983349] [ 11.989942] Allocated by task 155: [ 11.990067] kasan_save_stack+0x45/0x70 [ 11.990210] kasan_save_track+0x18/0x40 [ 11.990383] kasan_save_alloc_info+0x3b/0x50 [ 11.990593] __kasan_kmalloc+0xb7/0xc0 [ 11.990793] __kmalloc_cache_noprof+0x189/0x420 [ 11.991010] kmalloc_oob_right+0xa9/0x7f0 [ 11.991208] kunit_try_run_case+0x1a5/0x480 [ 11.991430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.991672] kthread+0x337/0x6f0 [ 11.991811] ret_from_fork+0x41/0x80 [ 11.991941] ret_from_fork_asm+0x1a/0x30 [ 11.992079] [ 11.992149] The buggy address belongs to the object at ffff888102a2d100 [ 11.992149] which belongs to the cache kmalloc-128 of size 128 [ 11.992777] The buggy address is located 13 bytes to the right of [ 11.992777] allocated 115-byte region [ffff888102a2d100, ffff888102a2d173) [ 11.993352] [ 11.993486] The buggy address belongs to the physical page: [ 11.993749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d [ 11.994086] flags: 0x200000000000000(node=0|zone=2) [ 11.994325] page_type: f5(slab) [ 11.994515] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.994821] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.995122] page dumped because: kasan: bad access detected [ 11.995343] [ 11.995437] Memory state around the buggy address: [ 11.995610] ffff888102a2d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.995900] ffff888102a2d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.996176] >ffff888102a2d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.996467] ^ [ 11.996626] ffff888102a2d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.996877] ffff888102a2d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.997090] ================================================================== [ 11.918091] ================================================================== [ 11.918846] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.919601] Write of size 1 at addr ffff888102a2d173 by task kunit_try_catch/155 [ 11.920406] [ 11.921610] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 11.921924] Tainted: [N]=TEST [ 11.921959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.922179] Call Trace: [ 11.922247] <TASK> [ 11.922404] dump_stack_lvl+0x73/0xb0 [ 11.922506] print_report+0xd1/0x650 [ 11.922536] ? __virt_addr_valid+0x1db/0x2d0 [ 11.922560] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.922581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.922603] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.922625] kasan_report+0x141/0x180 [ 11.922648] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.922680] __asan_report_store1_noabort+0x1b/0x30 [ 11.922701] kmalloc_oob_right+0x6f0/0x7f0 [ 11.922723] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.922745] ? __schedule+0x10cc/0x2b30 [ 11.922768] ? __pfx_read_tsc+0x10/0x10 [ 11.922788] ? ktime_get_ts64+0x86/0x230 [ 11.922815] kunit_try_run_case+0x1a5/0x480 [ 11.922841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.922862] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.922886] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.922908] ? __kthread_parkme+0x82/0x180 [ 11.922930] ? preempt_count_sub+0x50/0x80 [ 11.922957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.922979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.923000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.923022] kthread+0x337/0x6f0 [ 11.923039] ? trace_preempt_on+0x20/0xc0 [ 11.923063] ? __pfx_kthread+0x10/0x10 [ 11.923081] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.923101] ? calculate_sigpending+0x7b/0xa0 [ 11.923123] ? __pfx_kthread+0x10/0x10 [ 11.923141] ret_from_fork+0x41/0x80 [ 11.923161] ? __pfx_kthread+0x10/0x10 [ 11.923179] ret_from_fork_asm+0x1a/0x30 [ 11.923230] </TASK> [ 11.923304] [ 11.939197] Allocated by task 155: [ 11.939901] kasan_save_stack+0x45/0x70 [ 11.940383] kasan_save_track+0x18/0x40 [ 11.940894] kasan_save_alloc_info+0x3b/0x50 [ 11.941472] __kasan_kmalloc+0xb7/0xc0 [ 11.941966] __kmalloc_cache_noprof+0x189/0x420 [ 11.942523] kmalloc_oob_right+0xa9/0x7f0 [ 11.943078] kunit_try_run_case+0x1a5/0x480 [ 11.943603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.944123] kthread+0x337/0x6f0 [ 11.944250] ret_from_fork+0x41/0x80 [ 11.944394] ret_from_fork_asm+0x1a/0x30 [ 11.945002] [ 11.945419] The buggy address belongs to the object at ffff888102a2d100 [ 11.945419] which belongs to the cache kmalloc-128 of size 128 [ 11.946806] The buggy address is located 0 bytes to the right of [ 11.946806] allocated 115-byte region [ffff888102a2d100, ffff888102a2d173) [ 11.947887] [ 11.948057] The buggy address belongs to the physical page: [ 11.949066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d [ 11.950107] flags: 0x200000000000000(node=0|zone=2) [ 11.951076] page_type: f5(slab) [ 11.951908] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.952265] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.952623] page dumped because: kasan: bad access detected [ 11.953423] [ 11.953731] Memory state around the buggy address: [ 11.954671] ffff888102a2d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.955422] ffff888102a2d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.956127] >ffff888102a2d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.956664] ^ [ 11.956926] ffff888102a2d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.957673] ffff888102a2d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.958502] ================================================================== [ 11.960884] ================================================================== [ 11.961586] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.961819] Write of size 1 at addr ffff888102a2d178 by task kunit_try_catch/155 [ 11.962079] [ 11.962175] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 11.962220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.962231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.962252] Call Trace: [ 11.962265] <TASK> [ 11.962281] dump_stack_lvl+0x73/0xb0 [ 11.962321] print_report+0xd1/0x650 [ 11.962343] ? __virt_addr_valid+0x1db/0x2d0 [ 11.962364] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.962384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.962406] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.962610] kasan_report+0x141/0x180 [ 11.962638] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.962670] __asan_report_store1_noabort+0x1b/0x30 [ 11.962756] kmalloc_oob_right+0x6bd/0x7f0 [ 11.962779] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.962802] ? __schedule+0x10cc/0x2b30 [ 11.962824] ? __pfx_read_tsc+0x10/0x10 [ 11.962843] ? ktime_get_ts64+0x86/0x230 [ 11.962868] kunit_try_run_case+0x1a5/0x480 [ 11.962892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.962915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.962937] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.962959] ? __kthread_parkme+0x82/0x180 [ 11.962980] ? preempt_count_sub+0x50/0x80 [ 11.963004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.963026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.963047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.963069] kthread+0x337/0x6f0 [ 11.963085] ? trace_preempt_on+0x20/0xc0 [ 11.963108] ? __pfx_kthread+0x10/0x10 [ 11.963126] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.963145] ? calculate_sigpending+0x7b/0xa0 [ 11.963166] ? __pfx_kthread+0x10/0x10 [ 11.963184] ret_from_fork+0x41/0x80 [ 11.963203] ? __pfx_kthread+0x10/0x10 [ 11.963220] ret_from_fork_asm+0x1a/0x30 [ 11.963251] </TASK> [ 11.963262] [ 11.972787] Allocated by task 155: [ 11.972970] kasan_save_stack+0x45/0x70 [ 11.973168] kasan_save_track+0x18/0x40 [ 11.973319] kasan_save_alloc_info+0x3b/0x50 [ 11.973658] __kasan_kmalloc+0xb7/0xc0 [ 11.973815] __kmalloc_cache_noprof+0x189/0x420 [ 11.974001] kmalloc_oob_right+0xa9/0x7f0 [ 11.974142] kunit_try_run_case+0x1a5/0x480 [ 11.974358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.974741] kthread+0x337/0x6f0 [ 11.974864] ret_from_fork+0x41/0x80 [ 11.974996] ret_from_fork_asm+0x1a/0x30 [ 11.975239] [ 11.975346] The buggy address belongs to the object at ffff888102a2d100 [ 11.975346] which belongs to the cache kmalloc-128 of size 128 [ 11.976036] The buggy address is located 5 bytes to the right of [ 11.976036] allocated 115-byte region [ffff888102a2d100, ffff888102a2d173) [ 11.976457] [ 11.976529] The buggy address belongs to the physical page: [ 11.976700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d [ 11.977147] flags: 0x200000000000000(node=0|zone=2) [ 11.977390] page_type: f5(slab) [ 11.977558] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.977978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.978295] page dumped because: kasan: bad access detected [ 11.978508] [ 11.978607] Memory state around the buggy address: [ 11.978803] ffff888102a2d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.979020] ffff888102a2d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.979330] >ffff888102a2d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.979904] ^ [ 11.980181] ffff888102a2d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.980408] ffff888102a2d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.980657] ==================================================================