Date
July 12, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.737171] ================================================================== [ 18.737273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 18.737929] Read of size 1 at addr fff00000c4569980 by task kunit_try_catch/137 [ 18.738097] [ 18.738238] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.738441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.738498] Hardware name: linux,dummy-virt (DT) [ 18.738566] Call trace: [ 18.738607] show_stack+0x20/0x38 (C) [ 18.738748] dump_stack_lvl+0x8c/0xd0 [ 18.738874] print_report+0x118/0x608 [ 18.738977] kasan_report+0xdc/0x128 [ 18.739083] __asan_report_load1_noabort+0x20/0x30 [ 18.739205] kmalloc_oob_right+0x5d0/0x660 [ 18.739313] kunit_try_run_case+0x170/0x3f0 [ 18.739426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.739555] kthread+0x328/0x630 [ 18.739656] ret_from_fork+0x10/0x20 [ 18.739768] [ 18.739809] Allocated by task 137: [ 18.740372] kasan_save_stack+0x3c/0x68 [ 18.740550] kasan_save_track+0x20/0x40 [ 18.740686] kasan_save_alloc_info+0x40/0x58 [ 18.740896] __kasan_kmalloc+0xd4/0xd8 [ 18.740978] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.741256] kmalloc_oob_right+0xb0/0x660 [ 18.741341] kunit_try_run_case+0x170/0x3f0 [ 18.741522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.741697] kthread+0x328/0x630 [ 18.741790] ret_from_fork+0x10/0x20 [ 18.741875] [ 18.741910] The buggy address belongs to the object at fff00000c4569900 [ 18.741910] which belongs to the cache kmalloc-128 of size 128 [ 18.742035] The buggy address is located 13 bytes to the right of [ 18.742035] allocated 115-byte region [fff00000c4569900, fff00000c4569973) [ 18.742485] [ 18.742562] The buggy address belongs to the physical page: [ 18.742732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104569 [ 18.742873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.742986] page_type: f5(slab) [ 18.743079] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.743209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.743303] page dumped because: kasan: bad access detected [ 18.743392] [ 18.743458] Memory state around the buggy address: [ 18.743548] fff00000c4569880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.743692] fff00000c4569900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.743789] >fff00000c4569980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.743915] ^ [ 18.743986] fff00000c4569a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.744129] fff00000c4569a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.744257] ================================================================== [ 18.721008] ================================================================== [ 18.721601] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.723087] Write of size 1 at addr fff00000c4569973 by task kunit_try_catch/137 [ 18.723222] [ 18.724216] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT [ 18.724396] Tainted: [N]=TEST [ 18.724437] Hardware name: linux,dummy-virt (DT) [ 18.724714] Call trace: [ 18.724945] show_stack+0x20/0x38 (C) [ 18.725118] dump_stack_lvl+0x8c/0xd0 [ 18.725227] print_report+0x118/0x608 [ 18.725319] kasan_report+0xdc/0x128 [ 18.725410] __asan_report_store1_noabort+0x20/0x30 [ 18.725511] kmalloc_oob_right+0x5a4/0x660 [ 18.725593] kunit_try_run_case+0x170/0x3f0 [ 18.725648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.725703] kthread+0x328/0x630 [ 18.725750] ret_from_fork+0x10/0x20 [ 18.725967] [ 18.726013] Allocated by task 137: [ 18.726147] kasan_save_stack+0x3c/0x68 [ 18.726228] kasan_save_track+0x20/0x40 [ 18.726273] kasan_save_alloc_info+0x40/0x58 [ 18.726317] __kasan_kmalloc+0xd4/0xd8 [ 18.726356] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.726399] kmalloc_oob_right+0xb0/0x660 [ 18.726437] kunit_try_run_case+0x170/0x3f0 [ 18.726477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.726521] kthread+0x328/0x630 [ 18.726571] ret_from_fork+0x10/0x20 [ 18.726633] [ 18.726704] The buggy address belongs to the object at fff00000c4569900 [ 18.726704] which belongs to the cache kmalloc-128 of size 128 [ 18.726811] The buggy address is located 0 bytes to the right of [ 18.726811] allocated 115-byte region [fff00000c4569900, fff00000c4569973) [ 18.726907] [ 18.727004] The buggy address belongs to the physical page: [ 18.727291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104569 [ 18.727638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.728019] page_type: f5(slab) [ 18.728399] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.728472] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.728599] page dumped because: kasan: bad access detected [ 18.728643] [ 18.728671] Memory state around the buggy address: [ 18.728949] fff00000c4569800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.729027] fff00000c4569880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.729086] >fff00000c4569900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.729167] ^ [ 18.729348] fff00000c4569980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.729445] fff00000c4569a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.729572] ================================================================== [ 18.731169] ================================================================== [ 18.731299] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 18.731456] Write of size 1 at addr fff00000c4569978 by task kunit_try_catch/137 [ 18.731579] [ 18.731654] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.731936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.732023] Hardware name: linux,dummy-virt (DT) [ 18.732120] Call trace: [ 18.732187] show_stack+0x20/0x38 (C) [ 18.732340] dump_stack_lvl+0x8c/0xd0 [ 18.732491] print_report+0x118/0x608 [ 18.732640] kasan_report+0xdc/0x128 [ 18.732763] __asan_report_store1_noabort+0x20/0x30 [ 18.732890] kmalloc_oob_right+0x538/0x660 [ 18.732986] kunit_try_run_case+0x170/0x3f0 [ 18.733093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.733249] kthread+0x328/0x630 [ 18.733335] ret_from_fork+0x10/0x20 [ 18.733448] [ 18.733494] Allocated by task 137: [ 18.733558] kasan_save_stack+0x3c/0x68 [ 18.733640] kasan_save_track+0x20/0x40 [ 18.733713] kasan_save_alloc_info+0x40/0x58 [ 18.733791] __kasan_kmalloc+0xd4/0xd8 [ 18.733888] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.733964] kmalloc_oob_right+0xb0/0x660 [ 18.734045] kunit_try_run_case+0x170/0x3f0 [ 18.734123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.734204] kthread+0x328/0x630 [ 18.734267] ret_from_fork+0x10/0x20 [ 18.734337] [ 18.734377] The buggy address belongs to the object at fff00000c4569900 [ 18.734377] which belongs to the cache kmalloc-128 of size 128 [ 18.734513] The buggy address is located 5 bytes to the right of [ 18.734513] allocated 115-byte region [fff00000c4569900, fff00000c4569973) [ 18.734711] [ 18.734782] The buggy address belongs to the physical page: [ 18.734901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104569 [ 18.735037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.735160] page_type: f5(slab) [ 18.735291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.735462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.735608] page dumped because: kasan: bad access detected [ 18.735875] [ 18.735921] Memory state around the buggy address: [ 18.735994] fff00000c4569800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.736105] fff00000c4569880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.736192] >fff00000c4569900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.736273] ^ [ 18.736353] fff00000c4569980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.736444] fff00000c4569a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.736533] ==================================================================
[ 11.984047] ================================================================== [ 11.984539] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.984953] Read of size 1 at addr ffff888102655080 by task kunit_try_catch/154 [ 11.985261] [ 11.985370] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.985410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.985421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.985441] Call Trace: [ 11.985453] <TASK> [ 11.985468] dump_stack_lvl+0x73/0xb0 [ 11.985493] print_report+0xd1/0x650 [ 11.985515] ? __virt_addr_valid+0x1db/0x2d0 [ 11.985536] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.985557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.985580] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.985601] kasan_report+0x141/0x180 [ 11.985622] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.985647] __asan_report_load1_noabort+0x18/0x20 [ 11.985719] kmalloc_oob_right+0x68a/0x7f0 [ 11.985741] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.985773] ? __schedule+0x10cc/0x2b60 [ 11.985794] ? __pfx_read_tsc+0x10/0x10 [ 11.985814] ? ktime_get_ts64+0x86/0x230 [ 11.985837] kunit_try_run_case+0x1a5/0x480 [ 11.985861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.985883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.985905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.985929] ? __kthread_parkme+0x82/0x180 [ 11.985948] ? preempt_count_sub+0x50/0x80 [ 11.985971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.985995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.986018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.986043] kthread+0x337/0x6f0 [ 11.986061] ? trace_preempt_on+0x20/0xc0 [ 11.986083] ? __pfx_kthread+0x10/0x10 [ 11.986104] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.986124] ? calculate_sigpending+0x7b/0xa0 [ 11.986147] ? __pfx_kthread+0x10/0x10 [ 11.986168] ret_from_fork+0x116/0x1d0 [ 11.986186] ? __pfx_kthread+0x10/0x10 [ 11.986206] ret_from_fork_asm+0x1a/0x30 [ 11.986235] </TASK> [ 11.986245] [ 11.993427] Allocated by task 154: [ 11.993553] kasan_save_stack+0x45/0x70 [ 11.993700] kasan_save_track+0x18/0x40 [ 11.993926] kasan_save_alloc_info+0x3b/0x50 [ 11.994140] __kasan_kmalloc+0xb7/0xc0 [ 11.994332] __kmalloc_cache_noprof+0x189/0x420 [ 11.994562] kmalloc_oob_right+0xa9/0x7f0 [ 11.994774] kunit_try_run_case+0x1a5/0x480 [ 11.994989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.995333] kthread+0x337/0x6f0 [ 11.995481] ret_from_fork+0x116/0x1d0 [ 11.995612] ret_from_fork_asm+0x1a/0x30 [ 11.995775] [ 11.995866] The buggy address belongs to the object at ffff888102655000 [ 11.995866] which belongs to the cache kmalloc-128 of size 128 [ 11.996875] The buggy address is located 13 bytes to the right of [ 11.996875] allocated 115-byte region [ffff888102655000, ffff888102655073) [ 11.997259] [ 11.997330] The buggy address belongs to the physical page: [ 11.997523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655 [ 11.997887] flags: 0x200000000000000(node=0|zone=2) [ 11.998122] page_type: f5(slab) [ 11.998288] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.998912] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.999186] page dumped because: kasan: bad access detected [ 11.999356] [ 11.999423] Memory state around the buggy address: [ 11.999575] ffff888102654f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.999802] ffff888102655000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.000065] >ffff888102655080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.000380] ^ [ 12.000541] ffff888102655100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.000876] ffff888102655180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.001195] ================================================================== [ 11.961589] ================================================================== [ 11.961873] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.963159] Write of size 1 at addr ffff888102655078 by task kunit_try_catch/154 [ 11.963396] [ 11.963485] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.963528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.963539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.963560] Call Trace: [ 11.963573] <TASK> [ 11.963587] dump_stack_lvl+0x73/0xb0 [ 11.963616] print_report+0xd1/0x650 [ 11.963646] ? __virt_addr_valid+0x1db/0x2d0 [ 11.963669] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.963690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.963712] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.963734] kasan_report+0x141/0x180 [ 11.963764] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.963791] __asan_report_store1_noabort+0x1b/0x30 [ 11.963816] kmalloc_oob_right+0x6bd/0x7f0 [ 11.963838] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.963860] ? __schedule+0x10cc/0x2b60 [ 11.963881] ? __pfx_read_tsc+0x10/0x10 [ 11.963901] ? ktime_get_ts64+0x86/0x230 [ 11.963924] kunit_try_run_case+0x1a5/0x480 [ 11.963947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.963969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.963992] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.964015] ? __kthread_parkme+0x82/0x180 [ 11.964035] ? preempt_count_sub+0x50/0x80 [ 11.964057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.964081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.964105] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.964130] kthread+0x337/0x6f0 [ 11.964148] ? trace_preempt_on+0x20/0xc0 [ 11.964171] ? __pfx_kthread+0x10/0x10 [ 11.964190] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.964211] ? calculate_sigpending+0x7b/0xa0 [ 11.964234] ? __pfx_kthread+0x10/0x10 [ 11.964255] ret_from_fork+0x116/0x1d0 [ 11.964273] ? __pfx_kthread+0x10/0x10 [ 11.964293] ret_from_fork_asm+0x1a/0x30 [ 11.964323] </TASK> [ 11.964332] [ 11.975614] Allocated by task 154: [ 11.975968] kasan_save_stack+0x45/0x70 [ 11.976150] kasan_save_track+0x18/0x40 [ 11.976338] kasan_save_alloc_info+0x3b/0x50 [ 11.976510] __kasan_kmalloc+0xb7/0xc0 [ 11.976803] __kmalloc_cache_noprof+0x189/0x420 [ 11.976996] kmalloc_oob_right+0xa9/0x7f0 [ 11.977182] kunit_try_run_case+0x1a5/0x480 [ 11.977329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.977506] kthread+0x337/0x6f0 [ 11.977625] ret_from_fork+0x116/0x1d0 [ 11.977902] ret_from_fork_asm+0x1a/0x30 [ 11.978105] [ 11.978199] The buggy address belongs to the object at ffff888102655000 [ 11.978199] which belongs to the cache kmalloc-128 of size 128 [ 11.978891] The buggy address is located 5 bytes to the right of [ 11.978891] allocated 115-byte region [ffff888102655000, ffff888102655073) [ 11.979389] [ 11.979461] The buggy address belongs to the physical page: [ 11.979632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655 [ 11.979902] flags: 0x200000000000000(node=0|zone=2) [ 11.980144] page_type: f5(slab) [ 11.980312] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.980669] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.981029] page dumped because: kasan: bad access detected [ 11.981359] [ 11.981457] Memory state around the buggy address: [ 11.981722] ffff888102654f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.981969] ffff888102654f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.982183] >ffff888102655000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.982398] ^ [ 11.982708] ffff888102655080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.983033] ffff888102655100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.983352] ================================================================== [ 11.933302] ================================================================== [ 11.933908] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.934758] Write of size 1 at addr ffff888102655073 by task kunit_try_catch/154 [ 11.935236] [ 11.936589] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.936954] Tainted: [N]=TEST [ 11.936986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.937194] Call Trace: [ 11.937257] <TASK> [ 11.937398] dump_stack_lvl+0x73/0xb0 [ 11.937486] print_report+0xd1/0x650 [ 11.937515] ? __virt_addr_valid+0x1db/0x2d0 [ 11.937541] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.937562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.937585] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.937607] kasan_report+0x141/0x180 [ 11.937628] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.937673] __asan_report_store1_noabort+0x1b/0x30 [ 11.937698] kmalloc_oob_right+0x6f0/0x7f0 [ 11.937720] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.937764] ? __schedule+0x10cc/0x2b60 [ 11.937787] ? __pfx_read_tsc+0x10/0x10 [ 11.937823] ? ktime_get_ts64+0x86/0x230 [ 11.937848] kunit_try_run_case+0x1a5/0x480 [ 11.937876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.937899] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.937924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.937947] ? __kthread_parkme+0x82/0x180 [ 11.937969] ? preempt_count_sub+0x50/0x80 [ 11.937994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.938018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.938042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.938067] kthread+0x337/0x6f0 [ 11.938086] ? trace_preempt_on+0x20/0xc0 [ 11.938111] ? __pfx_kthread+0x10/0x10 [ 11.938131] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.938153] ? calculate_sigpending+0x7b/0xa0 [ 11.938178] ? __pfx_kthread+0x10/0x10 [ 11.938199] ret_from_fork+0x116/0x1d0 [ 11.938218] ? __pfx_kthread+0x10/0x10 [ 11.938238] ret_from_fork_asm+0x1a/0x30 [ 11.938295] </TASK> [ 11.938365] [ 11.948715] Allocated by task 154: [ 11.949040] kasan_save_stack+0x45/0x70 [ 11.949355] kasan_save_track+0x18/0x40 [ 11.949537] kasan_save_alloc_info+0x3b/0x50 [ 11.949926] __kasan_kmalloc+0xb7/0xc0 [ 11.950069] __kmalloc_cache_noprof+0x189/0x420 [ 11.950460] kmalloc_oob_right+0xa9/0x7f0 [ 11.950812] kunit_try_run_case+0x1a5/0x480 [ 11.951265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.951554] kthread+0x337/0x6f0 [ 11.951972] ret_from_fork+0x116/0x1d0 [ 11.952145] ret_from_fork_asm+0x1a/0x30 [ 11.952358] [ 11.952505] The buggy address belongs to the object at ffff888102655000 [ 11.952505] which belongs to the cache kmalloc-128 of size 128 [ 11.953288] The buggy address is located 0 bytes to the right of [ 11.953288] allocated 115-byte region [ffff888102655000, ffff888102655073) [ 11.954023] [ 11.954259] The buggy address belongs to the physical page: [ 11.954876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655 [ 11.955414] flags: 0x200000000000000(node=0|zone=2) [ 11.956152] page_type: f5(slab) [ 11.956600] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.957104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.957522] page dumped because: kasan: bad access detected [ 11.957729] [ 11.957861] Memory state around the buggy address: [ 11.958306] ffff888102654f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.958601] ffff888102654f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.958961] >ffff888102655000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.959309] ^ [ 11.959737] ffff888102655080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.960162] ffff888102655100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.960447] ==================================================================