Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.940046] ================================================================== [ 29.941381] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.942092] Read of size 1 at addr fff00000c6089b80 by task kunit_try_catch/125 [ 29.943003] [ 29.943394] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.944323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.944942] Hardware name: linux,dummy-virt (DT) [ 29.945601] Call trace: [ 29.947045] show_stack+0x20/0x38 (C) [ 29.947619] dump_stack_lvl+0x8c/0xd0 [ 29.948017] print_report+0x118/0x5e0 [ 29.948707] kasan_report+0xc8/0x118 [ 29.949833] __asan_report_load1_noabort+0x20/0x30 [ 29.950498] kmalloc_oob_right+0x5d0/0x660 [ 29.950996] kunit_try_run_case+0x14c/0x3d0 [ 29.951665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.952685] kthread+0x24c/0x2d0 [ 29.953186] ret_from_fork+0x10/0x20 [ 29.953848] [ 29.954140] Allocated by task 125: [ 29.954916] kasan_save_stack+0x3c/0x68 [ 29.955958] kasan_save_track+0x20/0x40 [ 29.956888] kasan_save_alloc_info+0x40/0x58 [ 29.957581] __kasan_kmalloc+0xd4/0xd8 [ 29.958206] __kmalloc_cache_noprof+0x15c/0x3c8 [ 29.958890] kmalloc_oob_right+0xb0/0x660 [ 29.959414] kunit_try_run_case+0x14c/0x3d0 [ 29.959999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.960973] kthread+0x24c/0x2d0 [ 29.961987] ret_from_fork+0x10/0x20 [ 29.962345] [ 29.962637] The buggy address belongs to the object at fff00000c6089b00 [ 29.962637] which belongs to the cache kmalloc-128 of size 128 [ 29.963708] The buggy address is located 13 bytes to the right of [ 29.963708] allocated 115-byte region [fff00000c6089b00, fff00000c6089b73) [ 29.966005] [ 29.966419] The buggy address belongs to the physical page: [ 29.967193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106089 [ 29.968461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.969553] page_type: f5(slab) [ 29.970022] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.971071] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.971981] page dumped because: kasan: bad access detected [ 29.972816] [ 29.973435] Memory state around the buggy address: [ 29.974307] fff00000c6089a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.975386] fff00000c6089b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.976461] >fff00000c6089b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977527] ^ [ 29.978380] fff00000c6089c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.979314] fff00000c6089c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.980163] ================================================================== [ 29.844775] ================================================================== [ 29.846610] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.848854] Write of size 1 at addr fff00000c6089b73 by task kunit_try_catch/125 [ 29.849650] [ 29.851558] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241126 #1 [ 29.853008] Tainted: [N]=TEST [ 29.853484] Hardware name: linux,dummy-virt (DT) [ 29.854580] Call trace: [ 29.856218] show_stack+0x20/0x38 (C) [ 29.857118] dump_stack_lvl+0x8c/0xd0 [ 29.857772] print_report+0x118/0x5e0 [ 29.858312] kasan_report+0xc8/0x118 [ 29.859181] __asan_report_store1_noabort+0x20/0x30 [ 29.860025] kmalloc_oob_right+0x5a4/0x660 [ 29.861500] kunit_try_run_case+0x14c/0x3d0 [ 29.862293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.863022] kthread+0x24c/0x2d0 [ 29.863729] ret_from_fork+0x10/0x20 [ 29.865102] [ 29.865629] Allocated by task 125: [ 29.866548] kasan_save_stack+0x3c/0x68 [ 29.867247] kasan_save_track+0x20/0x40 [ 29.867725] kasan_save_alloc_info+0x40/0x58 [ 29.868333] __kasan_kmalloc+0xd4/0xd8 [ 29.868857] __kmalloc_cache_noprof+0x15c/0x3c8 [ 29.869478] kmalloc_oob_right+0xb0/0x660 [ 29.870054] kunit_try_run_case+0x14c/0x3d0 [ 29.870706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.871682] kthread+0x24c/0x2d0 [ 29.872228] ret_from_fork+0x10/0x20 [ 29.873488] [ 29.874252] The buggy address belongs to the object at fff00000c6089b00 [ 29.874252] which belongs to the cache kmalloc-128 of size 128 [ 29.876127] The buggy address is located 0 bytes to the right of [ 29.876127] allocated 115-byte region [fff00000c6089b00, fff00000c6089b73) [ 29.877550] [ 29.878166] The buggy address belongs to the physical page: [ 29.879416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106089 [ 29.880755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.882270] page_type: f5(slab) [ 29.883432] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.884749] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.885809] page dumped because: kasan: bad access detected [ 29.886530] [ 29.886879] Memory state around the buggy address: [ 29.888122] fff00000c6089a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.889022] fff00000c6089a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.889759] >fff00000c6089b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.891016] ^ [ 29.892098] fff00000c6089b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.893202] fff00000c6089c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.894258] ================================================================== [ 29.898685] ================================================================== [ 29.899516] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.900327] Write of size 1 at addr fff00000c6089b78 by task kunit_try_catch/125 [ 29.901846] [ 29.902166] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.902958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.903549] Hardware name: linux,dummy-virt (DT) [ 29.904059] Call trace: [ 29.904802] show_stack+0x20/0x38 (C) [ 29.905470] dump_stack_lvl+0x8c/0xd0 [ 29.906545] print_report+0x118/0x5e0 [ 29.907639] kasan_report+0xc8/0x118 [ 29.908176] __asan_report_store1_noabort+0x20/0x30 [ 29.909271] kmalloc_oob_right+0x538/0x660 [ 29.909846] kunit_try_run_case+0x14c/0x3d0 [ 29.910492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.911357] kthread+0x24c/0x2d0 [ 29.911813] ret_from_fork+0x10/0x20 [ 29.912711] [ 29.913133] Allocated by task 125: [ 29.913681] kasan_save_stack+0x3c/0x68 [ 29.914313] kasan_save_track+0x20/0x40 [ 29.914798] kasan_save_alloc_info+0x40/0x58 [ 29.915640] __kasan_kmalloc+0xd4/0xd8 [ 29.916269] __kmalloc_cache_noprof+0x15c/0x3c8 [ 29.917147] kmalloc_oob_right+0xb0/0x660 [ 29.917925] kunit_try_run_case+0x14c/0x3d0 [ 29.918413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.919320] kthread+0x24c/0x2d0 [ 29.919931] ret_from_fork+0x10/0x20 [ 29.920686] [ 29.921145] The buggy address belongs to the object at fff00000c6089b00 [ 29.921145] which belongs to the cache kmalloc-128 of size 128 [ 29.922190] The buggy address is located 5 bytes to the right of [ 29.922190] allocated 115-byte region [fff00000c6089b00, fff00000c6089b73) [ 29.923781] [ 29.924276] The buggy address belongs to the physical page: [ 29.925081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106089 [ 29.926589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.927345] page_type: f5(slab) [ 29.928164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.929654] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.930626] page dumped because: kasan: bad access detected [ 29.931339] [ 29.931677] Memory state around the buggy address: [ 29.932418] fff00000c6089a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.933279] fff00000c6089a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.934099] >fff00000c6089b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.935612] ^ [ 29.936441] fff00000c6089b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.937786] fff00000c6089c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.938580] ==================================================================
[ 29.787485] ================================================================== [ 29.789023] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.791798] Write of size 1 at addr fff00000c64ec673 by task kunit_try_catch/125 [ 29.792648] [ 29.794687] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241126 #1 [ 29.796112] Tainted: [N]=TEST [ 29.796617] Hardware name: linux,dummy-virt (DT) [ 29.797781] Call trace: [ 29.798664] show_stack+0x20/0x38 (C) [ 29.799547] dump_stack_lvl+0x8c/0xd0 [ 29.800228] print_report+0x118/0x5e0 [ 29.800755] kasan_report+0xc8/0x118 [ 29.801371] __asan_report_store1_noabort+0x20/0x30 [ 29.802115] kmalloc_oob_right+0x5a4/0x660 [ 29.802795] kunit_try_run_case+0x14c/0x3d0 [ 29.803206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.804019] kthread+0x24c/0x2d0 [ 29.804559] ret_from_fork+0x10/0x20 [ 29.805509] [ 29.806360] Allocated by task 125: [ 29.807238] kasan_save_stack+0x3c/0x68 [ 29.807924] kasan_save_track+0x20/0x40 [ 29.808445] kasan_save_alloc_info+0x40/0x58 [ 29.809170] __kasan_kmalloc+0xd4/0xd8 [ 29.809733] __kmalloc_cache_noprof+0x15c/0x3c8 [ 29.810440] kmalloc_oob_right+0xb0/0x660 [ 29.812002] kunit_try_run_case+0x14c/0x3d0 [ 29.812630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.813300] kthread+0x24c/0x2d0 [ 29.814518] ret_from_fork+0x10/0x20 [ 29.815163] [ 29.815667] The buggy address belongs to the object at fff00000c64ec600 [ 29.815667] which belongs to the cache kmalloc-128 of size 128 [ 29.817080] The buggy address is located 0 bytes to the right of [ 29.817080] allocated 115-byte region [fff00000c64ec600, fff00000c64ec673) [ 29.818668] [ 29.819296] The buggy address belongs to the physical page: [ 29.820578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec [ 29.822213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.823498] page_type: f5(slab) [ 29.824694] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.825587] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.826992] page dumped because: kasan: bad access detected [ 29.827735] [ 29.828081] Memory state around the buggy address: [ 29.829350] fff00000c64ec500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.830357] fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.831583] >fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.832730] ^ [ 29.833809] fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.834977] fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.836099] ================================================================== [ 29.840499] ================================================================== [ 29.841259] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.842432] Write of size 1 at addr fff00000c64ec678 by task kunit_try_catch/125 [ 29.844063] [ 29.844480] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.846094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.846763] Hardware name: linux,dummy-virt (DT) [ 29.847456] Call trace: [ 29.847942] show_stack+0x20/0x38 (C) [ 29.848602] dump_stack_lvl+0x8c/0xd0 [ 29.849220] print_report+0x118/0x5e0 [ 29.849997] kasan_report+0xc8/0x118 [ 29.850818] __asan_report_store1_noabort+0x20/0x30 [ 29.851466] kmalloc_oob_right+0x538/0x660 [ 29.851786] kunit_try_run_case+0x14c/0x3d0 [ 29.852212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.853078] kthread+0x24c/0x2d0 [ 29.853698] ret_from_fork+0x10/0x20 [ 29.854289] [ 29.854912] Allocated by task 125: [ 29.855422] kasan_save_stack+0x3c/0x68 [ 29.855991] kasan_save_track+0x20/0x40 [ 29.856631] kasan_save_alloc_info+0x40/0x58 [ 29.857292] __kasan_kmalloc+0xd4/0xd8 [ 29.858213] __kmalloc_cache_noprof+0x15c/0x3c8 [ 29.858807] kmalloc_oob_right+0xb0/0x660 [ 29.859453] kunit_try_run_case+0x14c/0x3d0 [ 29.860122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.860925] kthread+0x24c/0x2d0 [ 29.861445] ret_from_fork+0x10/0x20 [ 29.862985] [ 29.863336] The buggy address belongs to the object at fff00000c64ec600 [ 29.863336] which belongs to the cache kmalloc-128 of size 128 [ 29.864845] The buggy address is located 5 bytes to the right of [ 29.864845] allocated 115-byte region [fff00000c64ec600, fff00000c64ec673) [ 29.866673] [ 29.867093] The buggy address belongs to the physical page: [ 29.867799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec [ 29.868687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.869624] page_type: f5(slab) [ 29.870486] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.871558] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.872231] page dumped because: kasan: bad access detected [ 29.873135] [ 29.873311] Memory state around the buggy address: [ 29.873995] fff00000c64ec500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.874723] fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.875724] >fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.876663] ^ [ 29.877661] fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.878865] fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.879565] ================================================================== [ 29.880837] ================================================================== [ 29.881610] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.882307] Read of size 1 at addr fff00000c64ec680 by task kunit_try_catch/125 [ 29.883164] [ 29.883797] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.885175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.886394] Hardware name: linux,dummy-virt (DT) [ 29.887202] Call trace: [ 29.887634] show_stack+0x20/0x38 (C) [ 29.888299] dump_stack_lvl+0x8c/0xd0 [ 29.889018] print_report+0x118/0x5e0 [ 29.889891] kasan_report+0xc8/0x118 [ 29.890367] __asan_report_load1_noabort+0x20/0x30 [ 29.891156] kmalloc_oob_right+0x5d0/0x660 [ 29.891943] kunit_try_run_case+0x14c/0x3d0 [ 29.892696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.893498] kthread+0x24c/0x2d0 [ 29.894354] ret_from_fork+0x10/0x20 [ 29.895024] [ 29.895397] Allocated by task 125: [ 29.895865] kasan_save_stack+0x3c/0x68 [ 29.896547] kasan_save_track+0x20/0x40 [ 29.897110] kasan_save_alloc_info+0x40/0x58 [ 29.898086] __kasan_kmalloc+0xd4/0xd8 [ 29.898646] __kmalloc_cache_noprof+0x15c/0x3c8 [ 29.899473] kmalloc_oob_right+0xb0/0x660 [ 29.900082] kunit_try_run_case+0x14c/0x3d0 [ 29.900731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.901407] kthread+0x24c/0x2d0 [ 29.902485] ret_from_fork+0x10/0x20 [ 29.903226] [ 29.903574] The buggy address belongs to the object at fff00000c64ec600 [ 29.903574] which belongs to the cache kmalloc-128 of size 128 [ 29.905424] The buggy address is located 13 bytes to the right of [ 29.905424] allocated 115-byte region [fff00000c64ec600, fff00000c64ec673) [ 29.907245] [ 29.907590] The buggy address belongs to the physical page: [ 29.908315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec [ 29.909355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.910494] page_type: f5(slab) [ 29.910993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.911983] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.912905] page dumped because: kasan: bad access detected [ 29.913577] [ 29.914257] Memory state around the buggy address: [ 29.914930] fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.915742] fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.916662] >fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.917463] ^ [ 29.918354] fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.919184] fff00000c64ec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.920052] ==================================================================
[ 23.788757] ================================================================== [ 23.789573] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 23.791214] Write of size 1 at addr ffff888102933573 by task kunit_try_catch/143 [ 23.791891] [ 23.793791] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241126 #1 [ 23.794653] Tainted: [N]=TEST [ 23.795060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.796205] Call Trace: [ 23.796790] <TASK> [ 23.797512] dump_stack_lvl+0x73/0xb0 [ 23.798021] print_report+0xd1/0x640 [ 23.798413] ? __virt_addr_valid+0x1db/0x2d0 [ 23.798913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.799468] kasan_report+0x102/0x140 [ 23.799816] ? kmalloc_oob_right+0x6f2/0x7f0 [ 23.800294] ? kmalloc_oob_right+0x6f2/0x7f0 [ 23.800820] __asan_report_store1_noabort+0x1b/0x30 [ 23.801320] kmalloc_oob_right+0x6f2/0x7f0 [ 23.801681] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 23.802137] ? __schedule+0xc3e/0x2790 [ 23.802603] ? __pfx_read_tsc+0x10/0x10 [ 23.803087] ? ktime_get_ts64+0x84/0x230 [ 23.803485] kunit_try_run_case+0x1b3/0x490 [ 23.803981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.804524] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.805199] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.805614] ? __kthread_parkme+0x82/0x160 [ 23.806218] ? preempt_count_sub+0x50/0x80 [ 23.806568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.806915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.807649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.808151] kthread+0x257/0x310 [ 23.808435] ? __pfx_kthread+0x10/0x10 [ 23.808900] ret_from_fork+0x41/0x80 [ 23.809450] ? __pfx_kthread+0x10/0x10 [ 23.809951] ret_from_fork_asm+0x1a/0x30 [ 23.810458] </TASK> [ 23.810933] [ 23.811279] Allocated by task 143: [ 23.812032] kasan_save_stack+0x3d/0x60 [ 23.812605] kasan_save_track+0x18/0x40 [ 23.813079] kasan_save_alloc_info+0x3b/0x50 [ 23.813490] __kasan_kmalloc+0xb7/0xc0 [ 23.813856] __kmalloc_cache_noprof+0x184/0x410 [ 23.814352] kmalloc_oob_right+0xaa/0x7f0 [ 23.814814] kunit_try_run_case+0x1b3/0x490 [ 23.815095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.815653] kthread+0x257/0x310 [ 23.816081] ret_from_fork+0x41/0x80 [ 23.816486] ret_from_fork_asm+0x1a/0x30 [ 23.817065] [ 23.817501] The buggy address belongs to the object at ffff888102933500 [ 23.817501] which belongs to the cache kmalloc-128 of size 128 [ 23.818856] The buggy address is located 0 bytes to the right of [ 23.818856] allocated 115-byte region [ffff888102933500, ffff888102933573) [ 23.820186] [ 23.820795] The buggy address belongs to the physical page: [ 23.821739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102933 [ 23.822983] flags: 0x200000000000000(node=0|zone=2) [ 23.824507] page_type: f5(slab) [ 23.825779] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.826544] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.827735] page dumped because: kasan: bad access detected [ 23.828339] [ 23.828557] Memory state around the buggy address: [ 23.829904] ffff888102933400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.830556] ffff888102933480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.831132] >ffff888102933500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.831942] ^ [ 23.832584] ffff888102933580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.833224] ffff888102933600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.834035] ================================================================== [ 23.873574] ================================================================== [ 23.874546] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 23.875347] Read of size 1 at addr ffff888102933580 by task kunit_try_catch/143 [ 23.876141] [ 23.876411] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.877402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.877922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.878835] Call Trace: [ 23.879174] <TASK> [ 23.879483] dump_stack_lvl+0x73/0xb0 [ 23.880033] print_report+0xd1/0x640 [ 23.880488] ? __virt_addr_valid+0x1db/0x2d0 [ 23.881175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.881831] kasan_report+0x102/0x140 [ 23.882290] ? kmalloc_oob_right+0x68c/0x7f0 [ 23.882831] ? kmalloc_oob_right+0x68c/0x7f0 [ 23.883200] __asan_report_load1_noabort+0x18/0x20 [ 23.883759] kmalloc_oob_right+0x68c/0x7f0 [ 23.884262] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 23.884802] ? __schedule+0xc3e/0x2790 [ 23.885264] ? __pfx_read_tsc+0x10/0x10 [ 23.885801] ? ktime_get_ts64+0x84/0x230 [ 23.886254] kunit_try_run_case+0x1b3/0x490 [ 23.886560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.887022] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.887331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.887645] ? __kthread_parkme+0x82/0x160 [ 23.887959] ? preempt_count_sub+0x50/0x80 [ 23.888284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.888589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.888997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.889349] kthread+0x257/0x310 [ 23.889607] ? __pfx_kthread+0x10/0x10 [ 23.889920] ret_from_fork+0x41/0x80 [ 23.890189] ? __pfx_kthread+0x10/0x10 [ 23.890460] ret_from_fork_asm+0x1a/0x30 [ 23.891505] </TASK> [ 23.891900] [ 23.892313] Allocated by task 143: [ 23.892548] kasan_save_stack+0x3d/0x60 [ 23.893083] kasan_save_track+0x18/0x40 [ 23.893546] kasan_save_alloc_info+0x3b/0x50 [ 23.893970] __kasan_kmalloc+0xb7/0xc0 [ 23.894277] __kmalloc_cache_noprof+0x184/0x410 [ 23.894874] kmalloc_oob_right+0xaa/0x7f0 [ 23.895373] kunit_try_run_case+0x1b3/0x490 [ 23.895942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.896587] kthread+0x257/0x310 [ 23.897098] ret_from_fork+0x41/0x80 [ 23.897579] ret_from_fork_asm+0x1a/0x30 [ 23.898137] [ 23.898425] The buggy address belongs to the object at ffff888102933500 [ 23.898425] which belongs to the cache kmalloc-128 of size 128 [ 23.899158] The buggy address is located 13 bytes to the right of [ 23.899158] allocated 115-byte region [ffff888102933500, ffff888102933573) [ 23.899510] [ 23.899597] The buggy address belongs to the physical page: [ 23.899894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102933 [ 23.900292] flags: 0x200000000000000(node=0|zone=2) [ 23.901068] page_type: f5(slab) [ 23.901482] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.902367] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.903216] page dumped because: kasan: bad access detected [ 23.903767] [ 23.903983] Memory state around the buggy address: [ 23.904520] ffff888102933480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.905057] ffff888102933500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.905613] >ffff888102933580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.906434] ^ [ 23.906932] ffff888102933600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.907682] ffff888102933680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.908178] ================================================================== [ 23.838112] ================================================================== [ 23.838792] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 23.839406] Write of size 1 at addr ffff888102933578 by task kunit_try_catch/143 [ 23.839982] [ 23.840167] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.841081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.841503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.842060] Call Trace: [ 23.842398] <TASK> [ 23.842675] dump_stack_lvl+0x73/0xb0 [ 23.843147] print_report+0xd1/0x640 [ 23.843572] ? __virt_addr_valid+0x1db/0x2d0 [ 23.844106] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.844646] kasan_report+0x102/0x140 [ 23.845075] ? kmalloc_oob_right+0x6bf/0x7f0 [ 23.845481] ? kmalloc_oob_right+0x6bf/0x7f0 [ 23.845952] __asan_report_store1_noabort+0x1b/0x30 [ 23.846456] kmalloc_oob_right+0x6bf/0x7f0 [ 23.847252] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 23.847637] ? __schedule+0xc3e/0x2790 [ 23.848088] ? __pfx_read_tsc+0x10/0x10 [ 23.848456] ? ktime_get_ts64+0x84/0x230 [ 23.848859] kunit_try_run_case+0x1b3/0x490 [ 23.849260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.849762] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.850431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.850801] ? __kthread_parkme+0x82/0x160 [ 23.851096] ? preempt_count_sub+0x50/0x80 [ 23.851396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.851618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.852195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.852865] kthread+0x257/0x310 [ 23.853296] ? __pfx_kthread+0x10/0x10 [ 23.853824] ret_from_fork+0x41/0x80 [ 23.854268] ? __pfx_kthread+0x10/0x10 [ 23.854768] ret_from_fork_asm+0x1a/0x30 [ 23.855268] </TASK> [ 23.855586] [ 23.855921] Allocated by task 143: [ 23.856327] kasan_save_stack+0x3d/0x60 [ 23.856860] kasan_save_track+0x18/0x40 [ 23.857319] kasan_save_alloc_info+0x3b/0x50 [ 23.857864] __kasan_kmalloc+0xb7/0xc0 [ 23.858302] __kmalloc_cache_noprof+0x184/0x410 [ 23.858894] kmalloc_oob_right+0xaa/0x7f0 [ 23.859362] kunit_try_run_case+0x1b3/0x490 [ 23.859899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.860459] kthread+0x257/0x310 [ 23.860922] ret_from_fork+0x41/0x80 [ 23.861367] ret_from_fork_asm+0x1a/0x30 [ 23.861879] [ 23.862119] The buggy address belongs to the object at ffff888102933500 [ 23.862119] which belongs to the cache kmalloc-128 of size 128 [ 23.863281] The buggy address is located 5 bytes to the right of [ 23.863281] allocated 115-byte region [ffff888102933500, ffff888102933573) [ 23.864483] [ 23.864809] The buggy address belongs to the physical page: [ 23.865369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102933 [ 23.866015] flags: 0x200000000000000(node=0|zone=2) [ 23.866528] page_type: f5(slab) [ 23.867000] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.867435] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.867865] page dumped because: kasan: bad access detected [ 23.868157] [ 23.868276] Memory state around the buggy address: [ 23.868435] ffff888102933400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.868640] ffff888102933480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.869333] >ffff888102933500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.870047] ^ [ 23.870754] ffff888102933580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.871446] ffff888102933600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.872236] ==================================================================
[ 19.111914] ================================================================== [ 19.112300] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 19.112776] Read of size 1 at addr ffff888102956880 by task kunit_try_catch/143 [ 19.113154] [ 19.113336] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 19.114368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.115024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.115904] Call Trace: [ 19.116308] <TASK> [ 19.116740] dump_stack_lvl+0x73/0xb0 [ 19.117162] print_report+0xd1/0x640 [ 19.117749] ? __virt_addr_valid+0x1db/0x2d0 [ 19.118231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.118683] kasan_report+0x102/0x140 [ 19.119247] ? kmalloc_oob_right+0x68c/0x7f0 [ 19.119864] ? kmalloc_oob_right+0x68c/0x7f0 [ 19.120333] __asan_report_load1_noabort+0x18/0x20 [ 19.120976] kmalloc_oob_right+0x68c/0x7f0 [ 19.121458] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 19.121945] ? __schedule+0xc3e/0x2790 [ 19.122419] ? __pfx_read_tsc+0x10/0x10 [ 19.122954] ? ktime_get_ts64+0x84/0x230 [ 19.123406] kunit_try_run_case+0x1b3/0x490 [ 19.123932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.124423] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.124914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.125289] ? __kthread_parkme+0x82/0x160 [ 19.125603] ? preempt_count_sub+0x50/0x80 [ 19.126074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.126760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.127444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.128109] kthread+0x257/0x310 [ 19.128655] ? __pfx_kthread+0x10/0x10 [ 19.129097] ret_from_fork+0x41/0x80 [ 19.129556] ? __pfx_kthread+0x10/0x10 [ 19.129895] ret_from_fork_asm+0x1a/0x30 [ 19.130354] </TASK> [ 19.130758] [ 19.130984] Allocated by task 143: [ 19.131424] kasan_save_stack+0x3d/0x60 [ 19.131911] kasan_save_track+0x18/0x40 [ 19.132408] kasan_save_alloc_info+0x3b/0x50 [ 19.132981] __kasan_kmalloc+0xb7/0xc0 [ 19.133340] __kmalloc_cache_noprof+0x184/0x410 [ 19.133801] kmalloc_oob_right+0xaa/0x7f0 [ 19.134262] kunit_try_run_case+0x1b3/0x490 [ 19.134647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.135086] kthread+0x257/0x310 [ 19.135473] ret_from_fork+0x41/0x80 [ 19.135969] ret_from_fork_asm+0x1a/0x30 [ 19.136397] [ 19.136687] The buggy address belongs to the object at ffff888102956800 [ 19.136687] which belongs to the cache kmalloc-128 of size 128 [ 19.137769] The buggy address is located 13 bytes to the right of [ 19.137769] allocated 115-byte region [ffff888102956800, ffff888102956873) [ 19.138957] [ 19.139279] The buggy address belongs to the physical page: [ 19.139897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102956 [ 19.140691] flags: 0x200000000000000(node=0|zone=2) [ 19.141186] page_type: f5(slab) [ 19.141632] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.142314] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.143031] page dumped because: kasan: bad access detected [ 19.143625] [ 19.143885] Memory state around the buggy address: [ 19.144288] ffff888102956780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.145042] ffff888102956800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.145796] >ffff888102956880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.146266] ^ [ 19.146623] ffff888102956900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.147307] ffff888102956980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.148088] ================================================================== [ 19.022570] ================================================================== [ 19.023903] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 19.025118] Write of size 1 at addr ffff888102956873 by task kunit_try_catch/143 [ 19.025995] [ 19.028128] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241126 #1 [ 19.029264] Tainted: [N]=TEST [ 19.029621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.030797] Call Trace: [ 19.031249] <TASK> [ 19.031861] dump_stack_lvl+0x73/0xb0 [ 19.032547] print_report+0xd1/0x640 [ 19.033126] ? __virt_addr_valid+0x1db/0x2d0 [ 19.033424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.034032] kasan_report+0x102/0x140 [ 19.034394] ? kmalloc_oob_right+0x6f2/0x7f0 [ 19.034968] ? kmalloc_oob_right+0x6f2/0x7f0 [ 19.035476] __asan_report_store1_noabort+0x1b/0x30 [ 19.036139] kmalloc_oob_right+0x6f2/0x7f0 [ 19.036527] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 19.036906] ? __schedule+0xc3e/0x2790 [ 19.037377] ? __pfx_read_tsc+0x10/0x10 [ 19.037943] ? ktime_get_ts64+0x84/0x230 [ 19.038261] kunit_try_run_case+0x1b3/0x490 [ 19.038851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.039225] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.039739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.041097] ? __kthread_parkme+0x82/0x160 [ 19.041415] ? preempt_count_sub+0x50/0x80 [ 19.041934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.042391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.042973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.043463] kthread+0x257/0x310 [ 19.043842] ? __pfx_kthread+0x10/0x10 [ 19.044419] ret_from_fork+0x41/0x80 [ 19.045392] ? __pfx_kthread+0x10/0x10 [ 19.045775] ret_from_fork_asm+0x1a/0x30 [ 19.046970] </TASK> [ 19.047372] [ 19.047633] Allocated by task 143: [ 19.048366] kasan_save_stack+0x3d/0x60 [ 19.048853] kasan_save_track+0x18/0x40 [ 19.049430] kasan_save_alloc_info+0x3b/0x50 [ 19.049958] __kasan_kmalloc+0xb7/0xc0 [ 19.050347] __kmalloc_cache_noprof+0x184/0x410 [ 19.050847] kmalloc_oob_right+0xaa/0x7f0 [ 19.051661] kunit_try_run_case+0x1b3/0x490 [ 19.051965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.052354] kthread+0x257/0x310 [ 19.052751] ret_from_fork+0x41/0x80 [ 19.053123] ret_from_fork_asm+0x1a/0x30 [ 19.053623] [ 19.054001] The buggy address belongs to the object at ffff888102956800 [ 19.054001] which belongs to the cache kmalloc-128 of size 128 [ 19.055675] The buggy address is located 0 bytes to the right of [ 19.055675] allocated 115-byte region [ffff888102956800, ffff888102956873) [ 19.057453] [ 19.057972] The buggy address belongs to the physical page: [ 19.059226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102956 [ 19.060514] flags: 0x200000000000000(node=0|zone=2) [ 19.061605] page_type: f5(slab) [ 19.062828] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.063511] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.064237] page dumped because: kasan: bad access detected [ 19.064625] [ 19.064938] Memory state around the buggy address: [ 19.066217] ffff888102956700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.066881] ffff888102956780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.067541] >ffff888102956800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.068171] ^ [ 19.068971] ffff888102956880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.069673] ffff888102956900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.071017] ================================================================== [ 19.073851] ================================================================== [ 19.074685] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 19.075394] Write of size 1 at addr ffff888102956878 by task kunit_try_catch/143 [ 19.076384] [ 19.076617] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 19.077474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.077998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.078671] Call Trace: [ 19.078983] <TASK> [ 19.079355] dump_stack_lvl+0x73/0xb0 [ 19.079810] print_report+0xd1/0x640 [ 19.080294] ? __virt_addr_valid+0x1db/0x2d0 [ 19.081291] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.081961] kasan_report+0x102/0x140 [ 19.082456] ? kmalloc_oob_right+0x6bf/0x7f0 [ 19.082844] ? kmalloc_oob_right+0x6bf/0x7f0 [ 19.083326] __asan_report_store1_noabort+0x1b/0x30 [ 19.083858] kmalloc_oob_right+0x6bf/0x7f0 [ 19.084212] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 19.084787] ? __schedule+0xc3e/0x2790 [ 19.085105] ? __pfx_read_tsc+0x10/0x10 [ 19.085718] ? ktime_get_ts64+0x84/0x230 [ 19.086092] kunit_try_run_case+0x1b3/0x490 [ 19.086655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.087007] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.087392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.088033] ? __kthread_parkme+0x82/0x160 [ 19.088474] ? preempt_count_sub+0x50/0x80 [ 19.089009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.089324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.090015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.090637] kthread+0x257/0x310 [ 19.091012] ? __pfx_kthread+0x10/0x10 [ 19.091293] ret_from_fork+0x41/0x80 [ 19.091779] ? __pfx_kthread+0x10/0x10 [ 19.092258] ret_from_fork_asm+0x1a/0x30 [ 19.092768] </TASK> [ 19.093050] [ 19.093257] Allocated by task 143: [ 19.093543] kasan_save_stack+0x3d/0x60 [ 19.094027] kasan_save_track+0x18/0x40 [ 19.094473] kasan_save_alloc_info+0x3b/0x50 [ 19.094879] __kasan_kmalloc+0xb7/0xc0 [ 19.095350] __kmalloc_cache_noprof+0x184/0x410 [ 19.095897] kmalloc_oob_right+0xaa/0x7f0 [ 19.096236] kunit_try_run_case+0x1b3/0x490 [ 19.096724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.097239] kthread+0x257/0x310 [ 19.097509] ret_from_fork+0x41/0x80 [ 19.097994] ret_from_fork_asm+0x1a/0x30 [ 19.098434] [ 19.098748] The buggy address belongs to the object at ffff888102956800 [ 19.098748] which belongs to the cache kmalloc-128 of size 128 [ 19.099568] The buggy address is located 5 bytes to the right of [ 19.099568] allocated 115-byte region [ffff888102956800, ffff888102956873) [ 19.100543] [ 19.100856] The buggy address belongs to the physical page: [ 19.101301] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102956 [ 19.101956] flags: 0x200000000000000(node=0|zone=2) [ 19.102432] page_type: f5(slab) [ 19.102866] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.103364] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.104057] page dumped because: kasan: bad access detected [ 19.104359] [ 19.104536] Memory state around the buggy address: [ 19.105084] ffff888102956700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.105832] ffff888102956780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.106510] >ffff888102956800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.107084] ^ [ 19.107447] ffff888102956880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.107889] ffff888102956900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.110329] ==================================================================