Date
June 23, 2025, 1:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 23.888473] ================================================================== [ 23.889150] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 23.889403] Read of size 1 at addr fff00000c63ad780 by task kunit_try_catch/138 [ 23.889531] [ 23.890023] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 23.890259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.890646] Hardware name: linux,dummy-virt (DT) [ 23.891073] Call trace: [ 23.891471] show_stack+0x20/0x38 (C) [ 23.891626] dump_stack_lvl+0x8c/0xd0 [ 23.891752] print_report+0x118/0x608 [ 23.891947] kasan_report+0xdc/0x128 [ 23.892213] __asan_report_load1_noabort+0x20/0x30 [ 23.892352] kmalloc_oob_right+0x5d0/0x660 [ 23.892513] kunit_try_run_case+0x170/0x3f0 [ 23.892708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.892844] kthread+0x328/0x630 [ 23.892954] ret_from_fork+0x10/0x20 [ 23.893075] [ 23.893752] Allocated by task 138: [ 23.893869] kasan_save_stack+0x3c/0x68 [ 23.893972] kasan_save_track+0x20/0x40 [ 23.894192] kasan_save_alloc_info+0x40/0x58 [ 23.894286] __kasan_kmalloc+0xd4/0xd8 [ 23.894369] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.894485] kmalloc_oob_right+0xb0/0x660 [ 23.894964] kunit_try_run_case+0x170/0x3f0 [ 23.895220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.895817] kthread+0x328/0x630 [ 23.896150] ret_from_fork+0x10/0x20 [ 23.896258] [ 23.896308] The buggy address belongs to the object at fff00000c63ad700 [ 23.896308] which belongs to the cache kmalloc-128 of size 128 [ 23.896452] The buggy address is located 13 bytes to the right of [ 23.896452] allocated 115-byte region [fff00000c63ad700, fff00000c63ad773) [ 23.896641] [ 23.896701] The buggy address belongs to the physical page: [ 23.896779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ad [ 23.896888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.896999] page_type: f5(slab) [ 23.897148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.897701] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.897800] page dumped because: kasan: bad access detected [ 23.897873] [ 23.897952] Memory state around the buggy address: [ 23.898144] fff00000c63ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.898247] fff00000c63ad700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.898343] >fff00000c63ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.898454] ^ [ 23.898778] fff00000c63ad800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.898897] fff00000c63ad880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.898999] ================================================================== [ 23.871654] ================================================================== [ 23.871743] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 23.871847] Write of size 1 at addr fff00000c63ad778 by task kunit_try_catch/138 [ 23.871954] [ 23.872028] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 23.873738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.874071] Hardware name: linux,dummy-virt (DT) [ 23.874763] Call trace: [ 23.875428] show_stack+0x20/0x38 (C) [ 23.875704] dump_stack_lvl+0x8c/0xd0 [ 23.875867] print_report+0x118/0x608 [ 23.876290] kasan_report+0xdc/0x128 [ 23.876418] __asan_report_store1_noabort+0x20/0x30 [ 23.876541] kmalloc_oob_right+0x538/0x660 [ 23.876898] kunit_try_run_case+0x170/0x3f0 [ 23.877264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.877481] kthread+0x328/0x630 [ 23.878415] ret_from_fork+0x10/0x20 [ 23.878717] [ 23.878829] Allocated by task 138: [ 23.878914] kasan_save_stack+0x3c/0x68 [ 23.879011] kasan_save_track+0x20/0x40 [ 23.879137] kasan_save_alloc_info+0x40/0x58 [ 23.879305] __kasan_kmalloc+0xd4/0xd8 [ 23.879571] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.879851] kmalloc_oob_right+0xb0/0x660 [ 23.880040] kunit_try_run_case+0x170/0x3f0 [ 23.880493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.880645] kthread+0x328/0x630 [ 23.881151] ret_from_fork+0x10/0x20 [ 23.881325] [ 23.881670] The buggy address belongs to the object at fff00000c63ad700 [ 23.881670] which belongs to the cache kmalloc-128 of size 128 [ 23.882017] The buggy address is located 5 bytes to the right of [ 23.882017] allocated 115-byte region [fff00000c63ad700, fff00000c63ad773) [ 23.882678] [ 23.882741] The buggy address belongs to the physical page: [ 23.882837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ad [ 23.882976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.883256] page_type: f5(slab) [ 23.883635] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.883929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.884276] page dumped because: kasan: bad access detected [ 23.884354] [ 23.884957] Memory state around the buggy address: [ 23.885037] fff00000c63ad600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.885231] fff00000c63ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.885440] >fff00000c63ad700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.885582] ^ [ 23.885840] fff00000c63ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.886136] fff00000c63ad800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.886229] ================================================================== [ 23.861740] ================================================================== [ 23.862164] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 23.863662] Write of size 1 at addr fff00000c63ad773 by task kunit_try_catch/138 [ 23.863802] [ 23.864800] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.4-rc1 #1 PREEMPT [ 23.864985] Tainted: [N]=TEST [ 23.865031] Hardware name: linux,dummy-virt (DT) [ 23.865320] Call trace: [ 23.865560] show_stack+0x20/0x38 (C) [ 23.865745] dump_stack_lvl+0x8c/0xd0 [ 23.865832] print_report+0x118/0x608 [ 23.865895] kasan_report+0xdc/0x128 [ 23.865951] __asan_report_store1_noabort+0x20/0x30 [ 23.866013] kmalloc_oob_right+0x5a4/0x660 [ 23.866070] kunit_try_run_case+0x170/0x3f0 [ 23.866134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.866199] kthread+0x328/0x630 [ 23.866258] ret_from_fork+0x10/0x20 [ 23.866479] [ 23.866534] Allocated by task 138: [ 23.866779] kasan_save_stack+0x3c/0x68 [ 23.866970] kasan_save_track+0x20/0x40 [ 23.867027] kasan_save_alloc_info+0x40/0x58 [ 23.867075] __kasan_kmalloc+0xd4/0xd8 [ 23.867116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.867165] kmalloc_oob_right+0xb0/0x660 [ 23.867211] kunit_try_run_case+0x170/0x3f0 [ 23.867257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.867309] kthread+0x328/0x630 [ 23.867352] ret_from_fork+0x10/0x20 [ 23.867454] [ 23.867533] The buggy address belongs to the object at fff00000c63ad700 [ 23.867533] which belongs to the cache kmalloc-128 of size 128 [ 23.867653] The buggy address is located 0 bytes to the right of [ 23.867653] allocated 115-byte region [fff00000c63ad700, fff00000c63ad773) [ 23.867737] [ 23.867838] The buggy address belongs to the physical page: [ 23.868096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ad [ 23.868439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.868797] page_type: f5(slab) [ 23.869157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.869249] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.869403] page dumped because: kasan: bad access detected [ 23.869464] [ 23.869499] Memory state around the buggy address: [ 23.869755] fff00000c63ad600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.869842] fff00000c63ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.869915] >fff00000c63ad700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.869985] ^ [ 23.870087] fff00000c63ad780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.870140] fff00000c63ad800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.870219] ==================================================================
[ 15.879082] ================================================================== [ 15.879766] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 15.880597] Read of size 1 at addr ffff888102a08e80 by task kunit_try_catch/157 [ 15.881149] [ 15.881432] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 15.881550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.881585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.881652] Call Trace: [ 15.881697] <TASK> [ 15.881735] dump_stack_lvl+0x73/0xb0 [ 15.881815] print_report+0xd1/0x650 [ 15.881892] ? __virt_addr_valid+0x1db/0x2d0 [ 15.881966] ? kmalloc_oob_right+0x68a/0x7f0 [ 15.882037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.882114] ? kmalloc_oob_right+0x68a/0x7f0 [ 15.882189] kasan_report+0x141/0x180 [ 15.882752] ? kmalloc_oob_right+0x68a/0x7f0 [ 15.882847] __asan_report_load1_noabort+0x18/0x20 [ 15.882924] kmalloc_oob_right+0x68a/0x7f0 [ 15.883001] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 15.883078] ? __schedule+0x10cc/0x2b60 [ 15.883155] ? __pfx_read_tsc+0x10/0x10 [ 15.883259] ? ktime_get_ts64+0x86/0x230 [ 15.883311] kunit_try_run_case+0x1a5/0x480 [ 15.883353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.883387] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.883422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.883455] ? __kthread_parkme+0x82/0x180 [ 15.883485] ? preempt_count_sub+0x50/0x80 [ 15.883519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.883554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.883587] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.883673] kthread+0x337/0x6f0 [ 15.883760] ? trace_preempt_on+0x20/0xc0 [ 15.883830] ? __pfx_kthread+0x10/0x10 [ 15.883860] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.883893] ? calculate_sigpending+0x7b/0xa0 [ 15.883924] ? __pfx_kthread+0x10/0x10 [ 15.883949] ret_from_fork+0x41/0x80 [ 15.883981] ? __pfx_kthread+0x10/0x10 [ 15.884006] ret_from_fork_asm+0x1a/0x30 [ 15.884048] </TASK> [ 15.884061] [ 15.900299] Allocated by task 157: [ 15.900676] kasan_save_stack+0x45/0x70 [ 15.901087] kasan_save_track+0x18/0x40 [ 15.901507] kasan_save_alloc_info+0x3b/0x50 [ 15.902296] __kasan_kmalloc+0xb7/0xc0 [ 15.902826] __kmalloc_cache_noprof+0x189/0x420 [ 15.903331] kmalloc_oob_right+0xa9/0x7f0 [ 15.903890] kunit_try_run_case+0x1a5/0x480 [ 15.904278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.904876] kthread+0x337/0x6f0 [ 15.905236] ret_from_fork+0x41/0x80 [ 15.906164] ret_from_fork_asm+0x1a/0x30 [ 15.906752] [ 15.906995] The buggy address belongs to the object at ffff888102a08e00 [ 15.906995] which belongs to the cache kmalloc-128 of size 128 [ 15.907892] The buggy address is located 13 bytes to the right of [ 15.907892] allocated 115-byte region [ffff888102a08e00, ffff888102a08e73) [ 15.908917] [ 15.909140] The buggy address belongs to the physical page: [ 15.910108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08 [ 15.910951] flags: 0x200000000000000(node=0|zone=2) [ 15.911391] page_type: f5(slab) [ 15.911841] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.912538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.913185] page dumped because: kasan: bad access detected [ 15.914153] [ 15.914384] Memory state around the buggy address: [ 15.914857] ffff888102a08d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.915394] ffff888102a08e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.916124] >ffff888102a08e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.916901] ^ [ 15.917246] ffff888102a08f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.918285] ffff888102a08f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.918988] ================================================================== [ 15.834069] ================================================================== [ 15.835025] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 15.835570] Write of size 1 at addr ffff888102a08e78 by task kunit_try_catch/157 [ 15.836285] [ 15.836512] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 15.836769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.836810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.836875] Call Trace: [ 15.836936] <TASK> [ 15.836980] dump_stack_lvl+0x73/0xb0 [ 15.837052] print_report+0xd1/0x650 [ 15.837127] ? __virt_addr_valid+0x1db/0x2d0 [ 15.837196] ? kmalloc_oob_right+0x6bd/0x7f0 [ 15.837265] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.837335] ? kmalloc_oob_right+0x6bd/0x7f0 [ 15.837407] kasan_report+0x141/0x180 [ 15.837485] ? kmalloc_oob_right+0x6bd/0x7f0 [ 15.837572] __asan_report_store1_noabort+0x1b/0x30 [ 15.837666] kmalloc_oob_right+0x6bd/0x7f0 [ 15.837745] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 15.837834] ? __schedule+0x10cc/0x2b60 [ 15.837911] ? __pfx_read_tsc+0x10/0x10 [ 15.837971] ? ktime_get_ts64+0x86/0x230 [ 15.838050] kunit_try_run_case+0x1a5/0x480 [ 15.838108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.838143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.838178] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.838217] ? __kthread_parkme+0x82/0x180 [ 15.838274] ? preempt_count_sub+0x50/0x80 [ 15.838314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.838352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.838388] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.838423] kthread+0x337/0x6f0 [ 15.838447] ? trace_preempt_on+0x20/0xc0 [ 15.838482] ? __pfx_kthread+0x10/0x10 [ 15.838508] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.838540] ? calculate_sigpending+0x7b/0xa0 [ 15.838572] ? __pfx_kthread+0x10/0x10 [ 15.838601] ret_from_fork+0x41/0x80 [ 15.838687] ? __pfx_kthread+0x10/0x10 [ 15.838748] ret_from_fork_asm+0x1a/0x30 [ 15.838794] </TASK> [ 15.838807] [ 15.857750] Allocated by task 157: [ 15.858182] kasan_save_stack+0x45/0x70 [ 15.858654] kasan_save_track+0x18/0x40 [ 15.858968] kasan_save_alloc_info+0x3b/0x50 [ 15.859287] __kasan_kmalloc+0xb7/0xc0 [ 15.859915] __kmalloc_cache_noprof+0x189/0x420 [ 15.860468] kmalloc_oob_right+0xa9/0x7f0 [ 15.861286] kunit_try_run_case+0x1a5/0x480 [ 15.861920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.862511] kthread+0x337/0x6f0 [ 15.862935] ret_from_fork+0x41/0x80 [ 15.863379] ret_from_fork_asm+0x1a/0x30 [ 15.864008] [ 15.864274] The buggy address belongs to the object at ffff888102a08e00 [ 15.864274] which belongs to the cache kmalloc-128 of size 128 [ 15.865442] The buggy address is located 5 bytes to the right of [ 15.865442] allocated 115-byte region [ffff888102a08e00, ffff888102a08e73) [ 15.866944] [ 15.867252] The buggy address belongs to the physical page: [ 15.867902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08 [ 15.868990] flags: 0x200000000000000(node=0|zone=2) [ 15.869479] page_type: f5(slab) [ 15.869933] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.870837] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.871451] page dumped because: kasan: bad access detected [ 15.872088] [ 15.872368] Memory state around the buggy address: [ 15.873252] ffff888102a08d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.873957] ffff888102a08d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.874789] >ffff888102a08e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.875332] ^ [ 15.876126] ffff888102a08e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.877133] ffff888102a08f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.877788] ================================================================== [ 15.780804] ================================================================== [ 15.782044] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 15.783170] Write of size 1 at addr ffff888102a08e73 by task kunit_try_catch/157 [ 15.783944] [ 15.786042] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 15.786426] Tainted: [N]=TEST [ 15.786472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.786830] Call Trace: [ 15.786922] <TASK> [ 15.787095] dump_stack_lvl+0x73/0xb0 [ 15.787204] print_report+0xd1/0x650 [ 15.787249] ? __virt_addr_valid+0x1db/0x2d0 [ 15.787286] ? kmalloc_oob_right+0x6f0/0x7f0 [ 15.787348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.787385] ? kmalloc_oob_right+0x6f0/0x7f0 [ 15.787418] kasan_report+0x141/0x180 [ 15.787451] ? kmalloc_oob_right+0x6f0/0x7f0 [ 15.787491] __asan_report_store1_noabort+0x1b/0x30 [ 15.787521] kmalloc_oob_right+0x6f0/0x7f0 [ 15.787555] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 15.787589] ? __schedule+0x10cc/0x2b60 [ 15.787672] ? __pfx_read_tsc+0x10/0x10 [ 15.787743] ? ktime_get_ts64+0x86/0x230 [ 15.787785] kunit_try_run_case+0x1a5/0x480 [ 15.787824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.787857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.787893] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.787926] ? __kthread_parkme+0x82/0x180 [ 15.787958] ? preempt_count_sub+0x50/0x80 [ 15.787993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.788027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.788060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.788093] kthread+0x337/0x6f0 [ 15.788116] ? trace_preempt_on+0x20/0xc0 [ 15.788150] ? __pfx_kthread+0x10/0x10 [ 15.788174] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.788204] ? calculate_sigpending+0x7b/0xa0 [ 15.788234] ? __pfx_kthread+0x10/0x10 [ 15.788258] ret_from_fork+0x41/0x80 [ 15.788287] ? __pfx_kthread+0x10/0x10 [ 15.788346] ret_from_fork_asm+0x1a/0x30 [ 15.788433] </TASK> [ 15.788516] [ 15.806931] Allocated by task 157: [ 15.807544] kasan_save_stack+0x45/0x70 [ 15.808159] kasan_save_track+0x18/0x40 [ 15.808583] kasan_save_alloc_info+0x3b/0x50 [ 15.809060] __kasan_kmalloc+0xb7/0xc0 [ 15.809501] __kmalloc_cache_noprof+0x189/0x420 [ 15.810314] kmalloc_oob_right+0xa9/0x7f0 [ 15.810920] kunit_try_run_case+0x1a5/0x480 [ 15.811385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.812020] kthread+0x337/0x6f0 [ 15.812452] ret_from_fork+0x41/0x80 [ 15.812967] ret_from_fork_asm+0x1a/0x30 [ 15.813484] [ 15.814210] The buggy address belongs to the object at ffff888102a08e00 [ 15.814210] which belongs to the cache kmalloc-128 of size 128 [ 15.815424] The buggy address is located 0 bytes to the right of [ 15.815424] allocated 115-byte region [ffff888102a08e00, ffff888102a08e73) [ 15.816803] [ 15.817189] The buggy address belongs to the physical page: [ 15.818080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08 [ 15.819602] flags: 0x200000000000000(node=0|zone=2) [ 15.820767] page_type: f5(slab) [ 15.821715] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.822348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.823470] page dumped because: kasan: bad access detected [ 15.824049] [ 15.824450] Memory state around the buggy address: [ 15.825797] ffff888102a08d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.826414] ffff888102a08d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.827541] >ffff888102a08e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.828544] ^ [ 15.829142] ffff888102a08e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.830171] ffff888102a08f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.830985] ==================================================================