Date
July 6, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.752427] ================================================================== [ 17.752750] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.753830] Write of size 1 at addr fff00000c1cf4773 by task kunit_try_catch/136 [ 17.754046] [ 17.755210] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 17.755891] Tainted: [N]=TEST [ 17.756135] Hardware name: linux,dummy-virt (DT) [ 17.756458] Call trace: [ 17.756660] show_stack+0x20/0x38 (C) [ 17.756839] dump_stack_lvl+0x8c/0xd0 [ 17.756916] print_report+0x118/0x608 [ 17.756976] kasan_report+0xdc/0x128 [ 17.757021] __asan_report_store1_noabort+0x20/0x30 [ 17.757068] kmalloc_oob_right+0x5a4/0x660 [ 17.757114] kunit_try_run_case+0x170/0x3f0 [ 17.757164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.757225] kthread+0x328/0x630 [ 17.757268] ret_from_fork+0x10/0x20 [ 17.758045] [ 17.758094] Allocated by task 136: [ 17.758229] kasan_save_stack+0x3c/0x68 [ 17.758594] kasan_save_track+0x20/0x40 [ 17.758684] kasan_save_alloc_info+0x40/0x58 [ 17.758790] __kasan_kmalloc+0xd4/0xd8 [ 17.758889] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.759036] kmalloc_oob_right+0xb0/0x660 [ 17.759201] kunit_try_run_case+0x170/0x3f0 [ 17.759296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.759398] kthread+0x328/0x630 [ 17.759491] ret_from_fork+0x10/0x20 [ 17.759572] [ 17.760007] The buggy address belongs to the object at fff00000c1cf4700 [ 17.760007] which belongs to the cache kmalloc-128 of size 128 [ 17.760609] The buggy address is located 0 bytes to the right of [ 17.760609] allocated 115-byte region [fff00000c1cf4700, fff00000c1cf4773) [ 17.760820] [ 17.761307] The buggy address belongs to the physical page: [ 17.761744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4 [ 17.762506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.763813] page_type: f5(slab) [ 17.765012] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.765131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.765670] page dumped because: kasan: bad access detected [ 17.765862] [ 17.765898] Memory state around the buggy address: [ 17.766579] fff00000c1cf4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.766756] fff00000c1cf4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.767035] >fff00000c1cf4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.767340] ^ [ 17.767631] fff00000c1cf4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.767898] fff00000c1cf4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.768116] ================================================================== [ 17.768925] ================================================================== [ 17.768964] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.769010] Write of size 1 at addr fff00000c1cf4778 by task kunit_try_catch/136 [ 17.769059] [ 17.769092] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.769168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.769449] Hardware name: linux,dummy-virt (DT) [ 17.769483] Call trace: [ 17.769864] show_stack+0x20/0x38 (C) [ 17.769920] dump_stack_lvl+0x8c/0xd0 [ 17.769967] print_report+0x118/0x608 [ 17.770012] kasan_report+0xdc/0x128 [ 17.770163] __asan_report_store1_noabort+0x20/0x30 [ 17.770233] kmalloc_oob_right+0x538/0x660 [ 17.770278] kunit_try_run_case+0x170/0x3f0 [ 17.770324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.770375] kthread+0x328/0x630 [ 17.770415] ret_from_fork+0x10/0x20 [ 17.770468] [ 17.770485] Allocated by task 136: [ 17.770512] kasan_save_stack+0x3c/0x68 [ 17.770551] kasan_save_track+0x20/0x40 [ 17.770587] kasan_save_alloc_info+0x40/0x58 [ 17.770626] __kasan_kmalloc+0xd4/0xd8 [ 17.770660] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.770698] kmalloc_oob_right+0xb0/0x660 [ 17.770846] kunit_try_run_case+0x170/0x3f0 [ 17.770980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.771021] kthread+0x328/0x630 [ 17.771289] ret_from_fork+0x10/0x20 [ 17.771354] [ 17.771399] The buggy address belongs to the object at fff00000c1cf4700 [ 17.771399] which belongs to the cache kmalloc-128 of size 128 [ 17.771594] The buggy address is located 5 bytes to the right of [ 17.771594] allocated 115-byte region [fff00000c1cf4700, fff00000c1cf4773) [ 17.771678] [ 17.771697] The buggy address belongs to the physical page: [ 17.771725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4 [ 17.771773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.772032] page_type: f5(slab) [ 17.772157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.772389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.772428] page dumped because: kasan: bad access detected [ 17.772726] [ 17.772825] Memory state around the buggy address: [ 17.772942] fff00000c1cf4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.773052] fff00000c1cf4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.773329] >fff00000c1cf4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.773459] ^ [ 17.773546] fff00000c1cf4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.773592] fff00000c1cf4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.773710] ================================================================== [ 17.774638] ================================================================== [ 17.774716] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.774801] Read of size 1 at addr fff00000c1cf4780 by task kunit_try_catch/136 [ 17.774881] [ 17.774912] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.775072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.775294] Hardware name: linux,dummy-virt (DT) [ 17.775370] Call trace: [ 17.775392] show_stack+0x20/0x38 (C) [ 17.775457] dump_stack_lvl+0x8c/0xd0 [ 17.775532] print_report+0x118/0x608 [ 17.775597] kasan_report+0xdc/0x128 [ 17.775666] __asan_report_load1_noabort+0x20/0x30 [ 17.775716] kmalloc_oob_right+0x5d0/0x660 [ 17.775760] kunit_try_run_case+0x170/0x3f0 [ 17.775805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.775968] kthread+0x328/0x630 [ 17.776117] ret_from_fork+0x10/0x20 [ 17.776236] [ 17.776300] Allocated by task 136: [ 17.776358] kasan_save_stack+0x3c/0x68 [ 17.776416] kasan_save_track+0x20/0x40 [ 17.776452] kasan_save_alloc_info+0x40/0x58 [ 17.776589] __kasan_kmalloc+0xd4/0xd8 [ 17.776766] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.776850] kmalloc_oob_right+0xb0/0x660 [ 17.776913] kunit_try_run_case+0x170/0x3f0 [ 17.776969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.777016] kthread+0x328/0x630 [ 17.777124] ret_from_fork+0x10/0x20 [ 17.777160] [ 17.777178] The buggy address belongs to the object at fff00000c1cf4700 [ 17.777178] which belongs to the cache kmalloc-128 of size 128 [ 17.777260] The buggy address is located 13 bytes to the right of [ 17.777260] allocated 115-byte region [fff00000c1cf4700, fff00000c1cf4773) [ 17.777413] [ 17.777432] The buggy address belongs to the physical page: [ 17.777461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cf4 [ 17.777767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.777895] page_type: f5(slab) [ 17.778007] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.778100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.778140] page dumped because: kasan: bad access detected [ 17.778169] [ 17.778186] Memory state around the buggy address: [ 17.778347] fff00000c1cf4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.778389] fff00000c1cf4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.778434] >fff00000c1cf4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.778471] ^ [ 17.778619] fff00000c1cf4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.778700] fff00000c1cf4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.778750] ==================================================================
[ 10.866986] ================================================================== [ 10.867368] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.868140] Write of size 1 at addr ffff888102794078 by task kunit_try_catch/153 [ 10.868846] [ 10.869030] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.869073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.869085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.869107] Call Trace: [ 10.869125] <TASK> [ 10.869142] dump_stack_lvl+0x73/0xb0 [ 10.869169] print_report+0xd1/0x650 [ 10.869203] ? __virt_addr_valid+0x1db/0x2d0 [ 10.869225] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.869246] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.869267] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.869289] kasan_report+0x141/0x180 [ 10.869310] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.869335] __asan_report_store1_noabort+0x1b/0x30 [ 10.869355] kmalloc_oob_right+0x6bd/0x7f0 [ 10.869378] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.869399] ? __schedule+0x10cc/0x2b60 [ 10.869420] ? __pfx_read_tsc+0x10/0x10 [ 10.869441] ? ktime_get_ts64+0x86/0x230 [ 10.869464] kunit_try_run_case+0x1a5/0x480 [ 10.869487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.869508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.869530] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.869552] ? __kthread_parkme+0x82/0x180 [ 10.869570] ? preempt_count_sub+0x50/0x80 [ 10.869594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.869616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.869638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.869660] kthread+0x337/0x6f0 [ 10.869679] ? trace_preempt_on+0x20/0xc0 [ 10.869701] ? __pfx_kthread+0x10/0x10 [ 10.869721] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.869741] ? calculate_sigpending+0x7b/0xa0 [ 10.869764] ? __pfx_kthread+0x10/0x10 [ 10.869785] ret_from_fork+0x116/0x1d0 [ 10.869802] ? __pfx_kthread+0x10/0x10 [ 10.869822] ret_from_fork_asm+0x1a/0x30 [ 10.869851] </TASK> [ 10.869862] [ 10.879546] Allocated by task 153: [ 10.879687] kasan_save_stack+0x45/0x70 [ 10.879941] kasan_save_track+0x18/0x40 [ 10.880329] kasan_save_alloc_info+0x3b/0x50 [ 10.880716] __kasan_kmalloc+0xb7/0xc0 [ 10.881066] __kmalloc_cache_noprof+0x189/0x420 [ 10.881620] kmalloc_oob_right+0xa9/0x7f0 [ 10.882011] kunit_try_run_case+0x1a5/0x480 [ 10.882500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.882986] kthread+0x337/0x6f0 [ 10.883330] ret_from_fork+0x116/0x1d0 [ 10.883676] ret_from_fork_asm+0x1a/0x30 [ 10.884037] [ 10.884210] The buggy address belongs to the object at ffff888102794000 [ 10.884210] which belongs to the cache kmalloc-128 of size 128 [ 10.885260] The buggy address is located 5 bytes to the right of [ 10.885260] allocated 115-byte region [ffff888102794000, ffff888102794073) [ 10.886368] [ 10.886528] The buggy address belongs to the physical page: [ 10.887020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102794 [ 10.887708] flags: 0x200000000000000(node=0|zone=2) [ 10.888179] page_type: f5(slab) [ 10.888487] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.889140] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.889526] page dumped because: kasan: bad access detected [ 10.889698] [ 10.889768] Memory state around the buggy address: [ 10.889924] ffff888102793f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.890159] ffff888102793f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.890782] >ffff888102794000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.891459] ^ [ 10.891674] ffff888102794080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.891885] ffff888102794100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.892133] ================================================================== [ 10.838258] ================================================================== [ 10.839325] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.840518] Write of size 1 at addr ffff888102794073 by task kunit_try_catch/153 [ 10.840949] [ 10.842313] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.842667] Tainted: [N]=TEST [ 10.842700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.842911] Call Trace: [ 10.842990] <TASK> [ 10.843137] dump_stack_lvl+0x73/0xb0 [ 10.843226] print_report+0xd1/0x650 [ 10.843254] ? __virt_addr_valid+0x1db/0x2d0 [ 10.843280] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.843301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.843324] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.843345] kasan_report+0x141/0x180 [ 10.843367] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.843393] __asan_report_store1_noabort+0x1b/0x30 [ 10.843412] kmalloc_oob_right+0x6f0/0x7f0 [ 10.843434] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.843456] ? __schedule+0x10cc/0x2b60 [ 10.843478] ? __pfx_read_tsc+0x10/0x10 [ 10.843500] ? ktime_get_ts64+0x86/0x230 [ 10.843525] kunit_try_run_case+0x1a5/0x480 [ 10.843551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.843573] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.843598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.843620] ? __kthread_parkme+0x82/0x180 [ 10.843642] ? preempt_count_sub+0x50/0x80 [ 10.843666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.843689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.843711] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.843733] kthread+0x337/0x6f0 [ 10.843752] ? trace_preempt_on+0x20/0xc0 [ 10.843776] ? __pfx_kthread+0x10/0x10 [ 10.843796] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.843816] ? calculate_sigpending+0x7b/0xa0 [ 10.843840] ? __pfx_kthread+0x10/0x10 [ 10.843861] ret_from_fork+0x116/0x1d0 [ 10.843879] ? __pfx_kthread+0x10/0x10 [ 10.843899] ret_from_fork_asm+0x1a/0x30 [ 10.843962] </TASK> [ 10.844028] [ 10.856023] Allocated by task 153: [ 10.856486] kasan_save_stack+0x45/0x70 [ 10.856687] kasan_save_track+0x18/0x40 [ 10.856834] kasan_save_alloc_info+0x3b/0x50 [ 10.857003] __kasan_kmalloc+0xb7/0xc0 [ 10.857230] __kmalloc_cache_noprof+0x189/0x420 [ 10.857423] kmalloc_oob_right+0xa9/0x7f0 [ 10.857577] kunit_try_run_case+0x1a5/0x480 [ 10.857916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.858170] kthread+0x337/0x6f0 [ 10.858288] ret_from_fork+0x116/0x1d0 [ 10.858476] ret_from_fork_asm+0x1a/0x30 [ 10.858705] [ 10.858844] The buggy address belongs to the object at ffff888102794000 [ 10.858844] which belongs to the cache kmalloc-128 of size 128 [ 10.859502] The buggy address is located 0 bytes to the right of [ 10.859502] allocated 115-byte region [ffff888102794000, ffff888102794073) [ 10.860148] [ 10.860306] The buggy address belongs to the physical page: [ 10.860737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102794 [ 10.861463] flags: 0x200000000000000(node=0|zone=2) [ 10.862054] page_type: f5(slab) [ 10.862531] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.862869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.863523] page dumped because: kasan: bad access detected [ 10.863711] [ 10.863791] Memory state around the buggy address: [ 10.864208] ffff888102793f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.864637] ffff888102793f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.864874] >ffff888102794000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.865169] ^ [ 10.865460] ffff888102794080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.865678] ffff888102794100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.865918] ================================================================== [ 10.892725] ================================================================== [ 10.892992] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.893354] Read of size 1 at addr ffff888102794080 by task kunit_try_catch/153 [ 10.893879] [ 10.894074] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.894118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.894130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.894151] Call Trace: [ 10.894166] <TASK> [ 10.894183] dump_stack_lvl+0x73/0xb0 [ 10.894209] print_report+0xd1/0x650 [ 10.894242] ? __virt_addr_valid+0x1db/0x2d0 [ 10.894265] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.894285] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.894306] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.894327] kasan_report+0x141/0x180 [ 10.894349] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.894374] __asan_report_load1_noabort+0x18/0x20 [ 10.894398] kmalloc_oob_right+0x68a/0x7f0 [ 10.894419] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.894441] ? __schedule+0x10cc/0x2b60 [ 10.894463] ? __pfx_read_tsc+0x10/0x10 [ 10.894483] ? ktime_get_ts64+0x86/0x230 [ 10.894506] kunit_try_run_case+0x1a5/0x480 [ 10.894529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.894550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.894572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.894594] ? __kthread_parkme+0x82/0x180 [ 10.894613] ? preempt_count_sub+0x50/0x80 [ 10.894635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.894658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.894679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.894701] kthread+0x337/0x6f0 [ 10.894720] ? trace_preempt_on+0x20/0xc0 [ 10.894743] ? __pfx_kthread+0x10/0x10 [ 10.894763] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.894783] ? calculate_sigpending+0x7b/0xa0 [ 10.894806] ? __pfx_kthread+0x10/0x10 [ 10.894827] ret_from_fork+0x116/0x1d0 [ 10.894844] ? __pfx_kthread+0x10/0x10 [ 10.894864] ret_from_fork_asm+0x1a/0x30 [ 10.894894] </TASK> [ 10.894904] [ 10.903130] Allocated by task 153: [ 10.903289] kasan_save_stack+0x45/0x70 [ 10.903433] kasan_save_track+0x18/0x40 [ 10.903569] kasan_save_alloc_info+0x3b/0x50 [ 10.903717] __kasan_kmalloc+0xb7/0xc0 [ 10.903850] __kmalloc_cache_noprof+0x189/0x420 [ 10.904033] kmalloc_oob_right+0xa9/0x7f0 [ 10.904264] kunit_try_run_case+0x1a5/0x480 [ 10.904422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.904598] kthread+0x337/0x6f0 [ 10.904718] ret_from_fork+0x116/0x1d0 [ 10.904850] ret_from_fork_asm+0x1a/0x30 [ 10.904999] [ 10.905094] The buggy address belongs to the object at ffff888102794000 [ 10.905094] which belongs to the cache kmalloc-128 of size 128 [ 10.906132] The buggy address is located 13 bytes to the right of [ 10.906132] allocated 115-byte region [ffff888102794000, ffff888102794073) [ 10.907250] [ 10.907420] The buggy address belongs to the physical page: [ 10.907972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102794 [ 10.908758] flags: 0x200000000000000(node=0|zone=2) [ 10.909204] page_type: f5(slab) [ 10.909536] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.909788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.910023] page dumped because: kasan: bad access detected [ 10.910218] [ 10.910363] Memory state around the buggy address: [ 10.910656] ffff888102793f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.910869] ffff888102794000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.911131] >ffff888102794080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.911431] ^ [ 10.911546] ffff888102794100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.911759] ffff888102794180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.911983] ==================================================================