Date
May 12, 2025, 6:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.735243] ================================================================== [ 17.735957] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.736530] Write of size 1 at addr fff00000c5a05078 by task kunit_try_catch/125 [ 17.738043] [ 17.738400] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.738620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.738692] Hardware name: linux,dummy-virt (DT) [ 17.738771] Call trace: [ 17.738824] show_stack+0x20/0x38 (C) [ 17.738938] dump_stack_lvl+0x8c/0xd0 [ 17.739036] print_report+0x118/0x608 [ 17.739124] kasan_report+0xdc/0x128 [ 17.739217] __asan_report_store1_noabort+0x20/0x30 [ 17.739306] kmalloc_oob_right+0x538/0x660 [ 17.739391] kunit_try_run_case+0x170/0x3f0 [ 17.739490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.739594] kthread+0x318/0x620 [ 17.739682] ret_from_fork+0x10/0x20 [ 17.739757] [ 17.743947] Allocated by task 125: [ 17.744255] kasan_save_stack+0x3c/0x68 [ 17.744767] kasan_save_track+0x20/0x40 [ 17.745217] kasan_save_alloc_info+0x40/0x58 [ 17.745674] __kasan_kmalloc+0xd4/0xd8 [ 17.746044] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.746543] kmalloc_oob_right+0xb0/0x660 [ 17.747010] kunit_try_run_case+0x170/0x3f0 [ 17.747470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.747952] kthread+0x318/0x620 [ 17.748341] ret_from_fork+0x10/0x20 [ 17.748804] [ 17.749025] The buggy address belongs to the object at fff00000c5a05000 [ 17.749025] which belongs to the cache kmalloc-128 of size 128 [ 17.749885] The buggy address is located 5 bytes to the right of [ 17.749885] allocated 115-byte region [fff00000c5a05000, fff00000c5a05073) [ 17.750988] [ 17.751213] The buggy address belongs to the physical page: [ 17.751658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 17.752334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.752931] page_type: f5(slab) [ 17.753277] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.753803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.754480] page dumped because: kasan: bad access detected [ 17.754962] [ 17.755236] Memory state around the buggy address: [ 17.755570] fff00000c5a04f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.756214] fff00000c5a04f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.756821] >fff00000c5a05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.757354] ^ [ 17.757941] fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.758521] fff00000c5a05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.759153] ================================================================== [ 17.699280] ================================================================== [ 17.700291] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.701943] Write of size 1 at addr fff00000c5a05073 by task kunit_try_catch/125 [ 17.703029] [ 17.704607] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.14.7-rc1 #1 [ 17.705534] Tainted: [N]=TEST [ 17.705578] Hardware name: linux,dummy-virt (DT) [ 17.705889] Call trace: [ 17.706094] show_stack+0x20/0x38 (C) [ 17.706277] dump_stack_lvl+0x8c/0xd0 [ 17.706351] print_report+0x118/0x608 [ 17.706407] kasan_report+0xdc/0x128 [ 17.706457] __asan_report_store1_noabort+0x20/0x30 [ 17.706573] kmalloc_oob_right+0x5a4/0x660 [ 17.706662] kunit_try_run_case+0x170/0x3f0 [ 17.706782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.706852] kthread+0x318/0x620 [ 17.706905] ret_from_fork+0x10/0x20 [ 17.707097] [ 17.711373] Allocated by task 125: [ 17.711924] kasan_save_stack+0x3c/0x68 [ 17.712504] kasan_save_track+0x20/0x40 [ 17.713127] kasan_save_alloc_info+0x40/0x58 [ 17.713667] __kasan_kmalloc+0xd4/0xd8 [ 17.714175] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.714884] kmalloc_oob_right+0xb0/0x660 [ 17.715404] kunit_try_run_case+0x170/0x3f0 [ 17.715947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.716505] kthread+0x318/0x620 [ 17.716913] ret_from_fork+0x10/0x20 [ 17.717325] [ 17.717760] The buggy address belongs to the object at fff00000c5a05000 [ 17.717760] which belongs to the cache kmalloc-128 of size 128 [ 17.719095] The buggy address is located 0 bytes to the right of [ 17.719095] allocated 115-byte region [fff00000c5a05000, fff00000c5a05073) [ 17.720123] [ 17.720680] The buggy address belongs to the physical page: [ 17.721678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 17.722675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.723648] page_type: f5(slab) [ 17.724419] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.724986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.725967] page dumped because: kasan: bad access detected [ 17.726645] [ 17.726981] Memory state around the buggy address: [ 17.727953] fff00000c5a04f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.728699] fff00000c5a04f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.729453] >fff00000c5a05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.730023] ^ [ 17.730783] fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.731519] fff00000c5a05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.732324] ================================================================== [ 17.761800] ================================================================== [ 17.762342] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.762982] Read of size 1 at addr fff00000c5a05080 by task kunit_try_catch/125 [ 17.763651] [ 17.763959] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.764158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.764223] Hardware name: linux,dummy-virt (DT) [ 17.764299] Call trace: [ 17.764353] show_stack+0x20/0x38 (C) [ 17.764477] dump_stack_lvl+0x8c/0xd0 [ 17.764581] print_report+0x118/0x608 [ 17.764692] kasan_report+0xdc/0x128 [ 17.764823] __asan_report_load1_noabort+0x20/0x30 [ 17.764930] kmalloc_oob_right+0x5d0/0x660 [ 17.765032] kunit_try_run_case+0x170/0x3f0 [ 17.765097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.765151] kthread+0x318/0x620 [ 17.765197] ret_from_fork+0x10/0x20 [ 17.765249] [ 17.769334] Allocated by task 125: [ 17.769710] kasan_save_stack+0x3c/0x68 [ 17.770194] kasan_save_track+0x20/0x40 [ 17.770623] kasan_save_alloc_info+0x40/0x58 [ 17.771066] __kasan_kmalloc+0xd4/0xd8 [ 17.771434] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.771928] kmalloc_oob_right+0xb0/0x660 [ 17.772381] kunit_try_run_case+0x170/0x3f0 [ 17.772752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.773348] kthread+0x318/0x620 [ 17.773781] ret_from_fork+0x10/0x20 [ 17.774236] [ 17.774465] The buggy address belongs to the object at fff00000c5a05000 [ 17.774465] which belongs to the cache kmalloc-128 of size 128 [ 17.775364] The buggy address is located 13 bytes to the right of [ 17.775364] allocated 115-byte region [fff00000c5a05000, fff00000c5a05073) [ 17.776378] [ 17.776610] The buggy address belongs to the physical page: [ 17.777183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 17.777863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.778369] page_type: f5(slab) [ 17.778821] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.779437] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.779979] page dumped because: kasan: bad access detected [ 17.780394] [ 17.780648] Memory state around the buggy address: [ 17.781009] fff00000c5a04f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.781576] fff00000c5a05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.782104] >fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.782721] ^ [ 17.783061] fff00000c5a05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.783596] fff00000c5a05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.784138] ==================================================================
[ 11.645528] ================================================================== [ 11.646466] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 11.647261] Write of size 1 at addr ffff888102ac8b73 by task kunit_try_catch/144 [ 11.647644] [ 11.648458] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G N 6.14.7-rc1 #1 [ 11.648748] Tainted: [N]=TEST [ 11.648772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.649011] Call Trace: [ 11.649081] <TASK> [ 11.649226] dump_stack_lvl+0x73/0xb0 [ 11.649311] print_report+0xd1/0x650 [ 11.649338] ? __virt_addr_valid+0x1db/0x2d0 [ 11.649362] ? kmalloc_oob_right+0x6f2/0x7f0 [ 11.649382] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.649406] ? kmalloc_oob_right+0x6f2/0x7f0 [ 11.649428] kasan_report+0x140/0x180 [ 11.649450] ? kmalloc_oob_right+0x6f2/0x7f0 [ 11.649474] __asan_report_store1_noabort+0x1b/0x30 [ 11.649497] kmalloc_oob_right+0x6f2/0x7f0 [ 11.649518] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.649539] ? __schedule+0xce8/0x2840 [ 11.649565] ? __pfx_read_tsc+0x10/0x10 [ 11.649587] ? ktime_get_ts64+0x86/0x230 [ 11.649614] kunit_try_run_case+0x1a6/0x480 [ 11.649639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.649659] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 11.649680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.649704] ? __kthread_parkme+0x82/0x160 [ 11.649727] ? preempt_count_sub+0x50/0x80 [ 11.649760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.649782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.649806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.649831] kthread+0x324/0x6e0 [ 11.649863] ? trace_preempt_on+0x20/0xc0 [ 11.649887] ? __pfx_kthread+0x10/0x10 [ 11.649909] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.649931] ? calculate_sigpending+0x7b/0xa0 [ 11.649953] ? __pfx_kthread+0x10/0x10 [ 11.649975] ret_from_fork+0x41/0x80 [ 11.649993] ? __pfx_kthread+0x10/0x10 [ 11.650029] ret_from_fork_asm+0x1a/0x30 [ 11.650084] </TASK> [ 11.650147] [ 11.657635] Allocated by task 144: [ 11.657964] kasan_save_stack+0x45/0x70 [ 11.658145] kasan_save_track+0x18/0x40 [ 11.658345] kasan_save_alloc_info+0x3b/0x50 [ 11.658554] __kasan_kmalloc+0xb7/0xc0 [ 11.658736] __kmalloc_cache_noprof+0x18a/0x420 [ 11.659077] kmalloc_oob_right+0xaa/0x7f0 [ 11.659216] kunit_try_run_case+0x1a6/0x480 [ 11.659359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.660019] kthread+0x324/0x6e0 [ 11.660214] ret_from_fork+0x41/0x80 [ 11.660396] ret_from_fork_asm+0x1a/0x30 [ 11.660629] [ 11.660777] The buggy address belongs to the object at ffff888102ac8b00 [ 11.660777] which belongs to the cache kmalloc-128 of size 128 [ 11.661801] The buggy address is located 0 bytes to the right of [ 11.661801] allocated 115-byte region [ffff888102ac8b00, ffff888102ac8b73) [ 11.662536] [ 11.662708] The buggy address belongs to the physical page: [ 11.663127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac8 [ 11.663747] flags: 0x200000000000000(node=0|zone=2) [ 11.664471] page_type: f5(slab) [ 11.664928] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.665680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.666248] page dumped because: kasan: bad access detected [ 11.666502] [ 11.666604] Memory state around the buggy address: [ 11.667130] ffff888102ac8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.667467] ffff888102ac8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.667764] >ffff888102ac8b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.668184] ^ [ 11.668510] ffff888102ac8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.668788] ffff888102ac8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.669082] ================================================================== [ 11.688911] ================================================================== [ 11.689252] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 11.689575] Read of size 1 at addr ffff888102ac8b80 by task kunit_try_catch/144 [ 11.690290] [ 11.690424] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 11.690471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.690483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.690504] Call Trace: [ 11.690524] <TASK> [ 11.690543] dump_stack_lvl+0x73/0xb0 [ 11.690573] print_report+0xd1/0x650 [ 11.690595] ? __virt_addr_valid+0x1db/0x2d0 [ 11.690617] ? kmalloc_oob_right+0x68c/0x7f0 [ 11.690637] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.690662] ? kmalloc_oob_right+0x68c/0x7f0 [ 11.690682] kasan_report+0x140/0x180 [ 11.690702] ? kmalloc_oob_right+0x68c/0x7f0 [ 11.690727] __asan_report_load1_noabort+0x18/0x20 [ 11.690749] kmalloc_oob_right+0x68c/0x7f0 [ 11.690770] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.690790] ? __schedule+0xce8/0x2840 [ 11.690815] ? __pfx_read_tsc+0x10/0x10 [ 11.690849] ? ktime_get_ts64+0x86/0x230 [ 11.690874] kunit_try_run_case+0x1a6/0x480 [ 11.690897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.690917] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 11.690937] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.690962] ? __kthread_parkme+0x82/0x160 [ 11.690983] ? preempt_count_sub+0x50/0x80 [ 11.691086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.691113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.691139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.691164] kthread+0x324/0x6e0 [ 11.691185] ? trace_preempt_on+0x20/0xc0 [ 11.691208] ? __pfx_kthread+0x10/0x10 [ 11.691229] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.691252] ? calculate_sigpending+0x7b/0xa0 [ 11.691273] ? __pfx_kthread+0x10/0x10 [ 11.691295] ret_from_fork+0x41/0x80 [ 11.691313] ? __pfx_kthread+0x10/0x10 [ 11.691335] ret_from_fork_asm+0x1a/0x30 [ 11.691366] </TASK> [ 11.691377] [ 11.698760] Allocated by task 144: [ 11.699219] kasan_save_stack+0x45/0x70 [ 11.699451] kasan_save_track+0x18/0x40 [ 11.699920] kasan_save_alloc_info+0x3b/0x50 [ 11.700387] __kasan_kmalloc+0xb7/0xc0 [ 11.700553] __kmalloc_cache_noprof+0x18a/0x420 [ 11.700754] kmalloc_oob_right+0xaa/0x7f0 [ 11.700944] kunit_try_run_case+0x1a6/0x480 [ 11.701251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.701475] kthread+0x324/0x6e0 [ 11.701600] ret_from_fork+0x41/0x80 [ 11.701755] ret_from_fork_asm+0x1a/0x30 [ 11.701975] [ 11.702132] The buggy address belongs to the object at ffff888102ac8b00 [ 11.702132] which belongs to the cache kmalloc-128 of size 128 [ 11.702682] The buggy address is located 13 bytes to the right of [ 11.702682] allocated 115-byte region [ffff888102ac8b00, ffff888102ac8b73) [ 11.703557] [ 11.703671] The buggy address belongs to the physical page: [ 11.703874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac8 [ 11.704398] flags: 0x200000000000000(node=0|zone=2) [ 11.704633] page_type: f5(slab) [ 11.704767] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.705079] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.705302] page dumped because: kasan: bad access detected [ 11.705472] [ 11.705541] Memory state around the buggy address: [ 11.705944] ffff888102ac8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.706540] ffff888102ac8b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.706757] >ffff888102ac8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.707587] ^ [ 11.707771] ffff888102ac8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.708282] ffff888102ac8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.708567] ================================================================== [ 11.670320] ================================================================== [ 11.670570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 11.671058] Write of size 1 at addr ffff888102ac8b78 by task kunit_try_catch/144 [ 11.671502] [ 11.671619] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 11.671663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.671675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.671696] Call Trace: [ 11.671717] <TASK> [ 11.671738] dump_stack_lvl+0x73/0xb0 [ 11.671767] print_report+0xd1/0x650 [ 11.671788] ? __virt_addr_valid+0x1db/0x2d0 [ 11.671812] ? kmalloc_oob_right+0x6bf/0x7f0 [ 11.671832] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.671870] ? kmalloc_oob_right+0x6bf/0x7f0 [ 11.671890] kasan_report+0x140/0x180 [ 11.671911] ? kmalloc_oob_right+0x6bf/0x7f0 [ 11.671935] __asan_report_store1_noabort+0x1b/0x30 [ 11.671958] kmalloc_oob_right+0x6bf/0x7f0 [ 11.671978] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.672051] ? __schedule+0xce8/0x2840 [ 11.672082] ? __pfx_read_tsc+0x10/0x10 [ 11.672106] ? ktime_get_ts64+0x86/0x230 [ 11.672131] kunit_try_run_case+0x1a6/0x480 [ 11.672154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.672174] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 11.672195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.672219] ? __kthread_parkme+0x82/0x160 [ 11.672241] ? preempt_count_sub+0x50/0x80 [ 11.672266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.672287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.672312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.672337] kthread+0x324/0x6e0 [ 11.672358] ? trace_preempt_on+0x20/0xc0 [ 11.672381] ? __pfx_kthread+0x10/0x10 [ 11.672402] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.672424] ? calculate_sigpending+0x7b/0xa0 [ 11.672445] ? __pfx_kthread+0x10/0x10 [ 11.672467] ret_from_fork+0x41/0x80 [ 11.672485] ? __pfx_kthread+0x10/0x10 [ 11.672506] ret_from_fork_asm+0x1a/0x30 [ 11.672537] </TASK> [ 11.672547] [ 11.680056] Allocated by task 144: [ 11.680284] kasan_save_stack+0x45/0x70 [ 11.680504] kasan_save_track+0x18/0x40 [ 11.680698] kasan_save_alloc_info+0x3b/0x50 [ 11.680879] __kasan_kmalloc+0xb7/0xc0 [ 11.681016] __kmalloc_cache_noprof+0x18a/0x420 [ 11.681250] kmalloc_oob_right+0xaa/0x7f0 [ 11.681446] kunit_try_run_case+0x1a6/0x480 [ 11.681654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.681903] kthread+0x324/0x6e0 [ 11.682087] ret_from_fork+0x41/0x80 [ 11.682236] ret_from_fork_asm+0x1a/0x30 [ 11.682403] [ 11.682478] The buggy address belongs to the object at ffff888102ac8b00 [ 11.682478] which belongs to the cache kmalloc-128 of size 128 [ 11.683062] The buggy address is located 5 bytes to the right of [ 11.683062] allocated 115-byte region [ffff888102ac8b00, ffff888102ac8b73) [ 11.683441] [ 11.683516] The buggy address belongs to the physical page: [ 11.683689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac8 [ 11.684314] flags: 0x200000000000000(node=0|zone=2) [ 11.684824] page_type: f5(slab) [ 11.685013] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.685447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.685744] page dumped because: kasan: bad access detected [ 11.685925] [ 11.685996] Memory state around the buggy address: [ 11.686371] ffff888102ac8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.686695] ffff888102ac8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.687028] >ffff888102ac8b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.687411] ^ [ 11.687713] ffff888102ac8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.687995] ffff888102ac8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.688329] ==================================================================