Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.638709] ================================================================== [ 17.638755] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.638800] Write of size 1 at addr fff00000c5c44f78 by task kunit_try_catch/136 [ 17.638846] [ 17.638874] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.638967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.638992] Hardware name: linux,dummy-virt (DT) [ 17.639020] Call trace: [ 17.639041] show_stack+0x20/0x38 (C) [ 17.639954] dump_stack_lvl+0x8c/0xd0 [ 17.640025] print_report+0x118/0x608 [ 17.640399] kasan_report+0xdc/0x128 [ 17.640495] __asan_report_store1_noabort+0x20/0x30 [ 17.640556] kmalloc_oob_right+0x538/0x660 [ 17.640768] kunit_try_run_case+0x170/0x3f0 [ 17.640897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.641061] kthread+0x328/0x630 [ 17.641112] ret_from_fork+0x10/0x20 [ 17.641172] [ 17.641191] Allocated by task 136: [ 17.641219] kasan_save_stack+0x3c/0x68 [ 17.641258] kasan_save_track+0x20/0x40 [ 17.641294] kasan_save_alloc_info+0x40/0x58 [ 17.641331] __kasan_kmalloc+0xd4/0xd8 [ 17.641376] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.641417] kmalloc_oob_right+0xb0/0x660 [ 17.641697] kunit_try_run_case+0x170/0x3f0 [ 17.642050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.642320] kthread+0x328/0x630 [ 17.642363] ret_from_fork+0x10/0x20 [ 17.642883] [ 17.643056] The buggy address belongs to the object at fff00000c5c44f00 [ 17.643056] which belongs to the cache kmalloc-128 of size 128 [ 17.643600] The buggy address is located 5 bytes to the right of [ 17.643600] allocated 115-byte region [fff00000c5c44f00, fff00000c5c44f73) [ 17.644315] [ 17.644433] The buggy address belongs to the physical page: [ 17.644565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c44 [ 17.644892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.645471] page_type: f5(slab) [ 17.645518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.646109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.646461] page dumped because: kasan: bad access detected [ 17.647150] [ 17.647475] Memory state around the buggy address: [ 17.647554] fff00000c5c44e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.647865] fff00000c5c44e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.647909] >fff00000c5c44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.647946] ^ [ 17.648313] fff00000c5c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.649058] fff00000c5c45000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.649947] ================================================================== [ 17.655673] ================================================================== [ 17.655805] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.655855] Read of size 1 at addr fff00000c5c44f80 by task kunit_try_catch/136 [ 17.655907] [ 17.655940] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.657134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.657342] Hardware name: linux,dummy-virt (DT) [ 17.657696] Call trace: [ 17.658226] show_stack+0x20/0x38 (C) [ 17.658796] dump_stack_lvl+0x8c/0xd0 [ 17.659551] print_report+0x118/0x608 [ 17.659921] kasan_report+0xdc/0x128 [ 17.660390] __asan_report_load1_noabort+0x20/0x30 [ 17.660931] kmalloc_oob_right+0x5d0/0x660 [ 17.661318] kunit_try_run_case+0x170/0x3f0 [ 17.662113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.662307] kthread+0x328/0x630 [ 17.662888] ret_from_fork+0x10/0x20 [ 17.663569] [ 17.663685] Allocated by task 136: [ 17.663715] kasan_save_stack+0x3c/0x68 [ 17.663770] kasan_save_track+0x20/0x40 [ 17.663807] kasan_save_alloc_info+0x40/0x58 [ 17.663844] __kasan_kmalloc+0xd4/0xd8 [ 17.664752] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.664802] kmalloc_oob_right+0xb0/0x660 [ 17.664838] kunit_try_run_case+0x170/0x3f0 [ 17.665563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.665662] kthread+0x328/0x630 [ 17.665764] ret_from_fork+0x10/0x20 [ 17.666135] [ 17.666389] The buggy address belongs to the object at fff00000c5c44f00 [ 17.666389] which belongs to the cache kmalloc-128 of size 128 [ 17.667080] The buggy address is located 13 bytes to the right of [ 17.667080] allocated 115-byte region [fff00000c5c44f00, fff00000c5c44f73) [ 17.667763] [ 17.667788] The buggy address belongs to the physical page: [ 17.668540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c44 [ 17.668786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.668844] page_type: f5(slab) [ 17.668898] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.669976] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.670663] page dumped because: kasan: bad access detected [ 17.670869] [ 17.670989] Memory state around the buggy address: [ 17.671023] fff00000c5c44e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.671066] fff00000c5c44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.671107] >fff00000c5c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.671656] ^ [ 17.672569] fff00000c5c45000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.672661] fff00000c5c45080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 17.672699] ================================================================== [ 17.626952] ================================================================== [ 17.627287] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.628085] Write of size 1 at addr fff00000c5c44f73 by task kunit_try_catch/136 [ 17.628199] [ 17.629072] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 17.629273] Tainted: [N]=TEST [ 17.629687] Hardware name: linux,dummy-virt (DT) [ 17.630323] Call trace: [ 17.630525] show_stack+0x20/0x38 (C) [ 17.631347] dump_stack_lvl+0x8c/0xd0 [ 17.631770] print_report+0x118/0x608 [ 17.631968] kasan_report+0xdc/0x128 [ 17.632087] __asan_report_store1_noabort+0x20/0x30 [ 17.632250] kmalloc_oob_right+0x5a4/0x660 [ 17.632296] kunit_try_run_case+0x170/0x3f0 [ 17.632371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.632492] kthread+0x328/0x630 [ 17.632743] ret_from_fork+0x10/0x20 [ 17.633020] [ 17.633082] Allocated by task 136: [ 17.633501] kasan_save_stack+0x3c/0x68 [ 17.633796] kasan_save_track+0x20/0x40 [ 17.633850] kasan_save_alloc_info+0x40/0x58 [ 17.633888] __kasan_kmalloc+0xd4/0xd8 [ 17.633937] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.633976] kmalloc_oob_right+0xb0/0x660 [ 17.634020] kunit_try_run_case+0x170/0x3f0 [ 17.634062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.634111] kthread+0x328/0x630 [ 17.634154] ret_from_fork+0x10/0x20 [ 17.634219] [ 17.634303] The buggy address belongs to the object at fff00000c5c44f00 [ 17.634303] which belongs to the cache kmalloc-128 of size 128 [ 17.634425] The buggy address is located 0 bytes to the right of [ 17.634425] allocated 115-byte region [fff00000c5c44f00, fff00000c5c44f73) [ 17.634491] [ 17.634574] The buggy address belongs to the physical page: [ 17.634986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c44 [ 17.635828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.636326] page_type: f5(slab) [ 17.636951] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.637014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.637520] page dumped because: kasan: bad access detected [ 17.637568] [ 17.637593] Memory state around the buggy address: [ 17.637832] fff00000c5c44e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.637898] fff00000c5c44e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.637950] >fff00000c5c44f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.638001] ^ [ 17.638082] fff00000c5c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.638123] fff00000c5c45000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.638196] ==================================================================
[ 13.189834] ================================================================== [ 13.190750] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 13.191714] Write of size 1 at addr ffff8881022f9b73 by task kunit_try_catch/154 [ 13.192125] [ 13.194033] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.194385] Tainted: [N]=TEST [ 13.194425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.194682] Call Trace: [ 13.194761] <TASK> [ 13.194924] dump_stack_lvl+0x73/0xb0 [ 13.195030] print_report+0xd1/0x650 [ 13.195062] ? __virt_addr_valid+0x1db/0x2d0 [ 13.195089] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.195111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.195132] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.195153] kasan_report+0x141/0x180 [ 13.195175] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.195202] __asan_report_store1_noabort+0x1b/0x30 [ 13.195234] kmalloc_oob_right+0x6f0/0x7f0 [ 13.195258] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.195282] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.195307] kunit_try_run_case+0x1a5/0x480 [ 13.195332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.195353] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.195375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.195395] ? __kthread_parkme+0x82/0x180 [ 13.195415] ? preempt_count_sub+0x50/0x80 [ 13.195440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.195460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.195480] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.195500] kthread+0x337/0x6f0 [ 13.195518] ? trace_preempt_on+0x20/0xc0 [ 13.195540] ? __pfx_kthread+0x10/0x10 [ 13.195559] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.195579] ? calculate_sigpending+0x7b/0xa0 [ 13.195602] ? __pfx_kthread+0x10/0x10 [ 13.195622] ret_from_fork+0x116/0x1d0 [ 13.195641] ? __pfx_kthread+0x10/0x10 [ 13.195659] ret_from_fork_asm+0x1a/0x30 [ 13.195712] </TASK> [ 13.195779] [ 13.203612] Allocated by task 154: [ 13.204091] kasan_save_stack+0x45/0x70 [ 13.204487] kasan_save_track+0x18/0x40 [ 13.204821] kasan_save_alloc_info+0x3b/0x50 [ 13.205144] __kasan_kmalloc+0xb7/0xc0 [ 13.205361] __kmalloc_cache_noprof+0x189/0x420 [ 13.205671] kmalloc_oob_right+0xa9/0x7f0 [ 13.205991] kunit_try_run_case+0x1a5/0x480 [ 13.206275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.206679] kthread+0x337/0x6f0 [ 13.206908] ret_from_fork+0x116/0x1d0 [ 13.207114] ret_from_fork_asm+0x1a/0x30 [ 13.207527] [ 13.207767] The buggy address belongs to the object at ffff8881022f9b00 [ 13.207767] which belongs to the cache kmalloc-128 of size 128 [ 13.208268] The buggy address is located 0 bytes to the right of [ 13.208268] allocated 115-byte region [ffff8881022f9b00, ffff8881022f9b73) [ 13.208714] [ 13.208945] The buggy address belongs to the physical page: [ 13.209782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 13.210834] flags: 0x200000000000000(node=0|zone=2) [ 13.211893] page_type: f5(slab) [ 13.212731] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.213270] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.213919] page dumped because: kasan: bad access detected [ 13.214314] [ 13.214494] Memory state around the buggy address: [ 13.215175] ffff8881022f9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.215760] ffff8881022f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.216307] >ffff8881022f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.216825] ^ [ 13.217295] ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.217571] ffff8881022f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.218057] ================================================================== [ 13.221209] ================================================================== [ 13.221767] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 13.222052] Write of size 1 at addr ffff8881022f9b78 by task kunit_try_catch/154 [ 13.222271] [ 13.222381] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.222434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.222449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.222470] Call Trace: [ 13.222494] <TASK> [ 13.222516] dump_stack_lvl+0x73/0xb0 [ 13.222546] print_report+0xd1/0x650 [ 13.222569] ? __virt_addr_valid+0x1db/0x2d0 [ 13.222592] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.222612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.222633] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.222653] kasan_report+0x141/0x180 [ 13.222674] ? kmalloc_oob_right+0x6bd/0x7f0 [ 13.222700] __asan_report_store1_noabort+0x1b/0x30 [ 13.222720] kmalloc_oob_right+0x6bd/0x7f0 [ 13.222741] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.222765] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.222790] kunit_try_run_case+0x1a5/0x480 [ 13.222813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.222833] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.222855] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.222876] ? __kthread_parkme+0x82/0x180 [ 13.222896] ? preempt_count_sub+0x50/0x80 [ 13.222920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.222942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.222963] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.222984] kthread+0x337/0x6f0 [ 13.223002] ? trace_preempt_on+0x20/0xc0 [ 13.223025] ? __pfx_kthread+0x10/0x10 [ 13.223045] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.223065] ? calculate_sigpending+0x7b/0xa0 [ 13.223087] ? __pfx_kthread+0x10/0x10 [ 13.223108] ret_from_fork+0x116/0x1d0 [ 13.223127] ? __pfx_kthread+0x10/0x10 [ 13.223146] ret_from_fork_asm+0x1a/0x30 [ 13.223178] </TASK> [ 13.223189] [ 13.232304] Allocated by task 154: [ 13.232611] kasan_save_stack+0x45/0x70 [ 13.232959] kasan_save_track+0x18/0x40 [ 13.233189] kasan_save_alloc_info+0x3b/0x50 [ 13.233382] __kasan_kmalloc+0xb7/0xc0 [ 13.233552] __kmalloc_cache_noprof+0x189/0x420 [ 13.233738] kmalloc_oob_right+0xa9/0x7f0 [ 13.233915] kunit_try_run_case+0x1a5/0x480 [ 13.234097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.234512] kthread+0x337/0x6f0 [ 13.234835] ret_from_fork+0x116/0x1d0 [ 13.235167] ret_from_fork_asm+0x1a/0x30 [ 13.235499] [ 13.235676] The buggy address belongs to the object at ffff8881022f9b00 [ 13.235676] which belongs to the cache kmalloc-128 of size 128 [ 13.236550] The buggy address is located 5 bytes to the right of [ 13.236550] allocated 115-byte region [ffff8881022f9b00, ffff8881022f9b73) [ 13.237131] [ 13.237256] The buggy address belongs to the physical page: [ 13.237465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 13.237735] flags: 0x200000000000000(node=0|zone=2) [ 13.237935] page_type: f5(slab) [ 13.238097] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.238654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.239211] page dumped because: kasan: bad access detected [ 13.239646] [ 13.239816] Memory state around the buggy address: [ 13.240175] ffff8881022f9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.240533] ffff8881022f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.240770] >ffff8881022f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.240996] ^ [ 13.241231] ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.241719] ffff8881022f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.242207] ================================================================== [ 13.243400] ================================================================== [ 13.244001] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 13.244277] Read of size 1 at addr ffff8881022f9b80 by task kunit_try_catch/154 [ 13.244824] [ 13.244997] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 13.245086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.245109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.245159] Call Trace: [ 13.245198] <TASK> [ 13.245257] dump_stack_lvl+0x73/0xb0 [ 13.245315] print_report+0xd1/0x650 [ 13.245365] ? __virt_addr_valid+0x1db/0x2d0 [ 13.245410] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.245464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.245504] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.245545] kasan_report+0x141/0x180 [ 13.245585] ? kmalloc_oob_right+0x68a/0x7f0 [ 13.245636] __asan_report_load1_noabort+0x18/0x20 [ 13.245676] kmalloc_oob_right+0x68a/0x7f0 [ 13.245709] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.245734] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.245758] kunit_try_run_case+0x1a5/0x480 [ 13.245781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.245801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.245823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.245853] ? __kthread_parkme+0x82/0x180 [ 13.245887] ? preempt_count_sub+0x50/0x80 [ 13.245923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.245961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.246001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.246037] kthread+0x337/0x6f0 [ 13.246068] ? trace_preempt_on+0x20/0xc0 [ 13.246107] ? __pfx_kthread+0x10/0x10 [ 13.246144] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.246182] ? calculate_sigpending+0x7b/0xa0 [ 13.246235] ? __pfx_kthread+0x10/0x10 [ 13.246276] ret_from_fork+0x116/0x1d0 [ 13.246309] ? __pfx_kthread+0x10/0x10 [ 13.246354] ret_from_fork_asm+0x1a/0x30 [ 13.246418] </TASK> [ 13.246439] [ 13.254806] Allocated by task 154: [ 13.255059] kasan_save_stack+0x45/0x70 [ 13.255419] kasan_save_track+0x18/0x40 [ 13.255640] kasan_save_alloc_info+0x3b/0x50 [ 13.255958] __kasan_kmalloc+0xb7/0xc0 [ 13.256267] __kmalloc_cache_noprof+0x189/0x420 [ 13.256498] kmalloc_oob_right+0xa9/0x7f0 [ 13.256823] kunit_try_run_case+0x1a5/0x480 [ 13.257000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.257198] kthread+0x337/0x6f0 [ 13.257366] ret_from_fork+0x116/0x1d0 [ 13.257584] ret_from_fork_asm+0x1a/0x30 [ 13.257911] [ 13.258079] The buggy address belongs to the object at ffff8881022f9b00 [ 13.258079] which belongs to the cache kmalloc-128 of size 128 [ 13.258908] The buggy address is located 13 bytes to the right of [ 13.258908] allocated 115-byte region [ffff8881022f9b00, ffff8881022f9b73) [ 13.259522] [ 13.259696] The buggy address belongs to the physical page: [ 13.259944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022f9 [ 13.260453] flags: 0x200000000000000(node=0|zone=2) [ 13.260747] page_type: f5(slab) [ 13.261024] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.261414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.261798] page dumped because: kasan: bad access detected [ 13.262124] [ 13.262265] Memory state around the buggy address: [ 13.262617] ffff8881022f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.262895] ffff8881022f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.263127] >ffff8881022f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.263556] ^ [ 13.263879] ffff8881022f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.264357] ffff8881022f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.264730] ==================================================================