Date
June 18, 2025, 6:43 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.682120] ================================================================== [ 19.682220] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 19.682324] Read of size 1 at addr fff00000c6423380 by task kunit_try_catch/146 [ 19.682437] [ 19.682632] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.682873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.682943] Hardware name: linux,dummy-virt (DT) [ 19.683072] Call trace: [ 19.683116] show_stack+0x20/0x38 (C) [ 19.683432] dump_stack_lvl+0x8c/0xd0 [ 19.683584] print_report+0x118/0x608 [ 19.683659] kasan_report+0xdc/0x128 [ 19.683747] __asan_report_load1_noabort+0x20/0x30 [ 19.683841] kmalloc_oob_right+0x5d0/0x660 [ 19.683927] kunit_try_run_case+0x170/0x3f0 [ 19.684032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.684182] kthread+0x328/0x630 [ 19.684330] ret_from_fork+0x10/0x20 [ 19.684486] [ 19.684571] Allocated by task 146: [ 19.684647] kasan_save_stack+0x3c/0x68 [ 19.684741] kasan_save_track+0x20/0x40 [ 19.684821] kasan_save_alloc_info+0x40/0x58 [ 19.684913] __kasan_kmalloc+0xd4/0xd8 [ 19.685000] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.685103] kmalloc_oob_right+0xb0/0x660 [ 19.685185] kunit_try_run_case+0x170/0x3f0 [ 19.685280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.685413] kthread+0x328/0x630 [ 19.685494] ret_from_fork+0x10/0x20 [ 19.685576] [ 19.685642] The buggy address belongs to the object at fff00000c6423300 [ 19.685642] which belongs to the cache kmalloc-128 of size 128 [ 19.685801] The buggy address is located 13 bytes to the right of [ 19.685801] allocated 115-byte region [fff00000c6423300, fff00000c6423373) [ 19.686006] [ 19.686341] The buggy address belongs to the physical page: [ 19.686594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 19.686870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.686988] page_type: f5(slab) [ 19.687095] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.687259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.687377] page dumped because: kasan: bad access detected [ 19.687446] [ 19.687482] Memory state around the buggy address: [ 19.688038] fff00000c6423280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688157] fff00000c6423300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.688252] >fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688348] ^ [ 19.688417] fff00000c6423400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688597] fff00000c6423480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688695] ================================================================== [ 19.662873] ================================================================== [ 19.663439] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 19.664547] Write of size 1 at addr fff00000c6423373 by task kunit_try_catch/146 [ 19.664686] [ 19.665756] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.665932] Tainted: [N]=TEST [ 19.665972] Hardware name: linux,dummy-virt (DT) [ 19.666405] Call trace: [ 19.666687] show_stack+0x20/0x38 (C) [ 19.666869] dump_stack_lvl+0x8c/0xd0 [ 19.666942] print_report+0x118/0x608 [ 19.666997] kasan_report+0xdc/0x128 [ 19.667079] __asan_report_store1_noabort+0x20/0x30 [ 19.667138] kmalloc_oob_right+0x5a4/0x660 [ 19.667189] kunit_try_run_case+0x170/0x3f0 [ 19.667246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667303] kthread+0x328/0x630 [ 19.667351] ret_from_fork+0x10/0x20 [ 19.667546] [ 19.667595] Allocated by task 146: [ 19.667737] kasan_save_stack+0x3c/0x68 [ 19.667818] kasan_save_track+0x20/0x40 [ 19.667863] kasan_save_alloc_info+0x40/0x58 [ 19.667905] __kasan_kmalloc+0xd4/0xd8 [ 19.667944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.667986] kmalloc_oob_right+0xb0/0x660 [ 19.668037] kunit_try_run_case+0x170/0x3f0 [ 19.668081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.668125] kthread+0x328/0x630 [ 19.668159] ret_from_fork+0x10/0x20 [ 19.668224] [ 19.668296] The buggy address belongs to the object at fff00000c6423300 [ 19.668296] which belongs to the cache kmalloc-128 of size 128 [ 19.668406] The buggy address is located 0 bytes to the right of [ 19.668406] allocated 115-byte region [fff00000c6423300, fff00000c6423373) [ 19.668477] [ 19.668591] The buggy address belongs to the physical page: [ 19.668896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 19.669261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.669601] page_type: f5(slab) [ 19.669977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.670056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.670279] page dumped because: kasan: bad access detected [ 19.670364] [ 19.670411] Memory state around the buggy address: [ 19.670839] fff00000c6423200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.670984] fff00000c6423280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671107] >fff00000c6423300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.671242] ^ [ 19.671412] fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671464] fff00000c6423400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671547] ================================================================== [ 19.673133] ================================================================== [ 19.673229] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 19.673351] Write of size 1 at addr fff00000c6423378 by task kunit_try_catch/146 [ 19.673464] [ 19.673541] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.673746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.673796] Hardware name: linux,dummy-virt (DT) [ 19.673854] Call trace: [ 19.673898] show_stack+0x20/0x38 (C) [ 19.673994] dump_stack_lvl+0x8c/0xd0 [ 19.674620] print_report+0x118/0x608 [ 19.674716] kasan_report+0xdc/0x128 [ 19.674813] __asan_report_store1_noabort+0x20/0x30 [ 19.675035] kmalloc_oob_right+0x538/0x660 [ 19.675136] kunit_try_run_case+0x170/0x3f0 [ 19.675245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.675352] kthread+0x328/0x630 [ 19.675936] ret_from_fork+0x10/0x20 [ 19.676165] [ 19.676220] Allocated by task 146: [ 19.676304] kasan_save_stack+0x3c/0x68 [ 19.676401] kasan_save_track+0x20/0x40 [ 19.676484] kasan_save_alloc_info+0x40/0x58 [ 19.676590] __kasan_kmalloc+0xd4/0xd8 [ 19.676680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.676770] kmalloc_oob_right+0xb0/0x660 [ 19.676852] kunit_try_run_case+0x170/0x3f0 [ 19.677296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.677640] kthread+0x328/0x630 [ 19.677938] ret_from_fork+0x10/0x20 [ 19.678104] [ 19.678152] The buggy address belongs to the object at fff00000c6423300 [ 19.678152] which belongs to the cache kmalloc-128 of size 128 [ 19.678482] The buggy address is located 5 bytes to the right of [ 19.678482] allocated 115-byte region [fff00000c6423300, fff00000c6423373) [ 19.678616] [ 19.678656] The buggy address belongs to the physical page: [ 19.678718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 19.678806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.678962] page_type: f5(slab) [ 19.679102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.679331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.679450] page dumped because: kasan: bad access detected [ 19.679522] [ 19.679709] Memory state around the buggy address: [ 19.679934] fff00000c6423200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.680088] fff00000c6423280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.680334] >fff00000c6423300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.680538] ^ [ 19.680662] fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.680962] fff00000c6423400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.681178] ==================================================================
[ 10.450335] ================================================================== [ 10.450985] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.451303] Write of size 1 at addr ffff888102c54678 by task kunit_try_catch/162 [ 10.451613] [ 10.451723] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 10.451769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.451781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.451856] Call Trace: [ 10.451870] <TASK> [ 10.451883] dump_stack_lvl+0x73/0xb0 [ 10.451910] print_report+0xd1/0x650 [ 10.451930] ? __virt_addr_valid+0x1db/0x2d0 [ 10.451951] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.451970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.451994] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.452014] kasan_report+0x141/0x180 [ 10.452034] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.452080] __asan_report_store1_noabort+0x1b/0x30 [ 10.452103] kmalloc_oob_right+0x6bd/0x7f0 [ 10.452123] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.452144] ? __schedule+0x10cc/0x2b60 [ 10.452164] ? __pfx_read_tsc+0x10/0x10 [ 10.452184] ? ktime_get_ts64+0x86/0x230 [ 10.452222] kunit_try_run_case+0x1a5/0x480 [ 10.452243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.452280] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.452301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.452322] ? __kthread_parkme+0x82/0x180 [ 10.452340] ? preempt_count_sub+0x50/0x80 [ 10.452362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.452383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.452404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.452425] kthread+0x337/0x6f0 [ 10.452481] ? trace_preempt_on+0x20/0xc0 [ 10.452505] ? __pfx_kthread+0x10/0x10 [ 10.452524] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.452543] ? calculate_sigpending+0x7b/0xa0 [ 10.452566] ? __pfx_kthread+0x10/0x10 [ 10.452586] ret_from_fork+0x116/0x1d0 [ 10.452604] ? __pfx_kthread+0x10/0x10 [ 10.452623] ret_from_fork_asm+0x1a/0x30 [ 10.452656] </TASK> [ 10.452665] [ 10.462420] Allocated by task 162: [ 10.462587] kasan_save_stack+0x45/0x70 [ 10.462829] kasan_save_track+0x18/0x40 [ 10.463343] kasan_save_alloc_info+0x3b/0x50 [ 10.463653] __kasan_kmalloc+0xb7/0xc0 [ 10.463842] __kmalloc_cache_noprof+0x189/0x420 [ 10.464241] kmalloc_oob_right+0xa9/0x7f0 [ 10.464562] kunit_try_run_case+0x1a5/0x480 [ 10.464872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.465192] kthread+0x337/0x6f0 [ 10.465402] ret_from_fork+0x116/0x1d0 [ 10.465704] ret_from_fork_asm+0x1a/0x30 [ 10.466105] [ 10.466224] The buggy address belongs to the object at ffff888102c54600 [ 10.466224] which belongs to the cache kmalloc-128 of size 128 [ 10.467061] The buggy address is located 5 bytes to the right of [ 10.467061] allocated 115-byte region [ffff888102c54600, ffff888102c54673) [ 10.467913] [ 10.468160] The buggy address belongs to the physical page: [ 10.468514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c54 [ 10.469058] flags: 0x200000000000000(node=0|zone=2) [ 10.469309] page_type: f5(slab) [ 10.469688] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.470001] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.470523] page dumped because: kasan: bad access detected [ 10.470865] [ 10.470961] Memory state around the buggy address: [ 10.471301] ffff888102c54500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.471993] ffff888102c54580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.472320] >ffff888102c54600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.472734] ^ [ 10.473153] ffff888102c54680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.473556] ffff888102c54700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.473914] ================================================================== [ 10.419453] ================================================================== [ 10.420005] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.420818] Write of size 1 at addr ffff888102c54673 by task kunit_try_catch/162 [ 10.421267] [ 10.422252] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 10.422626] Tainted: [N]=TEST [ 10.422657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.422886] Call Trace: [ 10.422953] <TASK> [ 10.423095] dump_stack_lvl+0x73/0xb0 [ 10.423195] print_report+0xd1/0x650 [ 10.423237] ? __virt_addr_valid+0x1db/0x2d0 [ 10.423263] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.423283] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.423307] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.423327] kasan_report+0x141/0x180 [ 10.423348] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.423372] __asan_report_store1_noabort+0x1b/0x30 [ 10.423395] kmalloc_oob_right+0x6f0/0x7f0 [ 10.423415] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.423436] ? __schedule+0x10cc/0x2b60 [ 10.423458] ? __pfx_read_tsc+0x10/0x10 [ 10.423479] ? ktime_get_ts64+0x86/0x230 [ 10.423506] kunit_try_run_case+0x1a5/0x480 [ 10.423531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.423552] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.423575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.423596] ? __kthread_parkme+0x82/0x180 [ 10.423617] ? preempt_count_sub+0x50/0x80 [ 10.423640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.423662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.423683] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.423705] kthread+0x337/0x6f0 [ 10.423724] ? trace_preempt_on+0x20/0xc0 [ 10.423747] ? __pfx_kthread+0x10/0x10 [ 10.423767] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.423786] ? calculate_sigpending+0x7b/0xa0 [ 10.423809] ? __pfx_kthread+0x10/0x10 [ 10.423829] ret_from_fork+0x116/0x1d0 [ 10.423847] ? __pfx_kthread+0x10/0x10 [ 10.423866] ret_from_fork_asm+0x1a/0x30 [ 10.423917] </TASK> [ 10.423980] [ 10.434618] Allocated by task 162: [ 10.434919] kasan_save_stack+0x45/0x70 [ 10.435106] kasan_save_track+0x18/0x40 [ 10.435608] kasan_save_alloc_info+0x3b/0x50 [ 10.435793] __kasan_kmalloc+0xb7/0xc0 [ 10.436063] __kmalloc_cache_noprof+0x189/0x420 [ 10.436317] kmalloc_oob_right+0xa9/0x7f0 [ 10.436768] kunit_try_run_case+0x1a5/0x480 [ 10.436966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.437441] kthread+0x337/0x6f0 [ 10.437624] ret_from_fork+0x116/0x1d0 [ 10.437997] ret_from_fork_asm+0x1a/0x30 [ 10.438234] [ 10.438643] The buggy address belongs to the object at ffff888102c54600 [ 10.438643] which belongs to the cache kmalloc-128 of size 128 [ 10.439569] The buggy address is located 0 bytes to the right of [ 10.439569] allocated 115-byte region [ffff888102c54600, ffff888102c54673) [ 10.440284] [ 10.440441] The buggy address belongs to the physical page: [ 10.441144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c54 [ 10.441821] flags: 0x200000000000000(node=0|zone=2) [ 10.442575] page_type: f5(slab) [ 10.443234] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.443569] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.444127] page dumped because: kasan: bad access detected [ 10.444430] [ 10.444850] Memory state around the buggy address: [ 10.445463] ffff888102c54500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.445782] ffff888102c54580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.446220] >ffff888102c54600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.446699] ^ [ 10.447156] ffff888102c54680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.447675] ffff888102c54700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.448130] ================================================================== [ 10.475135] ================================================================== [ 10.475529] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.475842] Read of size 1 at addr ffff888102c54680 by task kunit_try_catch/162 [ 10.476381] [ 10.476543] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 10.476590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.476745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.476767] Call Trace: [ 10.476779] <TASK> [ 10.476794] dump_stack_lvl+0x73/0xb0 [ 10.476821] print_report+0xd1/0x650 [ 10.476841] ? __virt_addr_valid+0x1db/0x2d0 [ 10.476863] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.476882] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.476906] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.476926] kasan_report+0x141/0x180 [ 10.476946] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.476970] __asan_report_load1_noabort+0x18/0x20 [ 10.476993] kmalloc_oob_right+0x68a/0x7f0 [ 10.477013] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.477033] ? __schedule+0x10cc/0x2b60 [ 10.477053] ? __pfx_read_tsc+0x10/0x10 [ 10.477073] ? ktime_get_ts64+0x86/0x230 [ 10.477097] kunit_try_run_case+0x1a5/0x480 [ 10.477119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.477140] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.477160] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.477181] ? __kthread_parkme+0x82/0x180 [ 10.477200] ? preempt_count_sub+0x50/0x80 [ 10.477233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.477256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.477276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.477298] kthread+0x337/0x6f0 [ 10.477316] ? trace_preempt_on+0x20/0xc0 [ 10.477337] ? __pfx_kthread+0x10/0x10 [ 10.477357] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.477375] ? calculate_sigpending+0x7b/0xa0 [ 10.477398] ? __pfx_kthread+0x10/0x10 [ 10.477418] ret_from_fork+0x116/0x1d0 [ 10.477481] ? __pfx_kthread+0x10/0x10 [ 10.477502] ret_from_fork_asm+0x1a/0x30 [ 10.477531] </TASK> [ 10.477541] [ 10.487805] Allocated by task 162: [ 10.488184] kasan_save_stack+0x45/0x70 [ 10.488387] kasan_save_track+0x18/0x40 [ 10.488644] kasan_save_alloc_info+0x3b/0x50 [ 10.488867] __kasan_kmalloc+0xb7/0xc0 [ 10.489056] __kmalloc_cache_noprof+0x189/0x420 [ 10.489298] kmalloc_oob_right+0xa9/0x7f0 [ 10.489486] kunit_try_run_case+0x1a5/0x480 [ 10.489743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.489971] kthread+0x337/0x6f0 [ 10.490132] ret_from_fork+0x116/0x1d0 [ 10.490376] ret_from_fork_asm+0x1a/0x30 [ 10.490811] [ 10.490922] The buggy address belongs to the object at ffff888102c54600 [ 10.490922] which belongs to the cache kmalloc-128 of size 128 [ 10.491461] The buggy address is located 13 bytes to the right of [ 10.491461] allocated 115-byte region [ffff888102c54600, ffff888102c54673) [ 10.492114] [ 10.492241] The buggy address belongs to the physical page: [ 10.492417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c54 [ 10.492749] flags: 0x200000000000000(node=0|zone=2) [ 10.492902] page_type: f5(slab) [ 10.493060] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.493577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.493860] page dumped because: kasan: bad access detected [ 10.494025] [ 10.494087] Memory state around the buggy address: [ 10.494385] ffff888102c54580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.494900] ffff888102c54600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.495247] >ffff888102c54680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.495739] ^ [ 10.496018] ffff888102c54700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.496369] ffff888102c54780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.496770] ==================================================================