Date
July 3, 2025, 11:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.130805] ================================================================== [ 19.130912] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 19.131018] Read of size 1 at addr fff00000c6345680 by task kunit_try_catch/136 [ 19.131148] [ 19.131252] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.131439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.131487] Hardware name: linux,dummy-virt (DT) [ 19.131571] Call trace: [ 19.131620] show_stack+0x20/0x38 (C) [ 19.131718] dump_stack_lvl+0x8c/0xd0 [ 19.131818] print_report+0x118/0x608 [ 19.131911] kasan_report+0xdc/0x128 [ 19.132006] __asan_report_load1_noabort+0x20/0x30 [ 19.132128] kmalloc_oob_right+0x5d0/0x660 [ 19.132225] kunit_try_run_case+0x170/0x3f0 [ 19.132324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.132429] kthread+0x328/0x630 [ 19.132524] ret_from_fork+0x10/0x20 [ 19.132626] [ 19.132666] Allocated by task 136: [ 19.132728] kasan_save_stack+0x3c/0x68 [ 19.132810] kasan_save_track+0x20/0x40 [ 19.132885] kasan_save_alloc_info+0x40/0x58 [ 19.133001] __kasan_kmalloc+0xd4/0xd8 [ 19.133120] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.133250] kmalloc_oob_right+0xb0/0x660 [ 19.133332] kunit_try_run_case+0x170/0x3f0 [ 19.133430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.133564] kthread+0x328/0x630 [ 19.133728] ret_from_fork+0x10/0x20 [ 19.133847] [ 19.133946] The buggy address belongs to the object at fff00000c6345600 [ 19.133946] which belongs to the cache kmalloc-128 of size 128 [ 19.134092] The buggy address is located 13 bytes to the right of [ 19.134092] allocated 115-byte region [fff00000c6345600, fff00000c6345673) [ 19.134214] [ 19.134271] The buggy address belongs to the physical page: [ 19.134329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345 [ 19.134435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.134521] page_type: f5(slab) [ 19.134596] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.134701] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.134782] page dumped because: kasan: bad access detected [ 19.134879] [ 19.134931] Memory state around the buggy address: [ 19.135000] fff00000c6345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.135115] fff00000c6345600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.135207] >fff00000c6345680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.135297] ^ [ 19.135371] fff00000c6345700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.135511] fff00000c6345780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.135636] ================================================================== [ 19.125306] ================================================================== [ 19.125403] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 19.125651] Write of size 1 at addr fff00000c6345678 by task kunit_try_catch/136 [ 19.125772] [ 19.125856] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.126052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.126107] Hardware name: linux,dummy-virt (DT) [ 19.126175] Call trace: [ 19.126219] show_stack+0x20/0x38 (C) [ 19.126314] dump_stack_lvl+0x8c/0xd0 [ 19.126405] print_report+0x118/0x608 [ 19.126507] kasan_report+0xdc/0x128 [ 19.126602] __asan_report_store1_noabort+0x20/0x30 [ 19.126703] kmalloc_oob_right+0x538/0x660 [ 19.126798] kunit_try_run_case+0x170/0x3f0 [ 19.126917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.127075] kthread+0x328/0x630 [ 19.127182] ret_from_fork+0x10/0x20 [ 19.127312] [ 19.127348] Allocated by task 136: [ 19.127419] kasan_save_stack+0x3c/0x68 [ 19.127538] kasan_save_track+0x20/0x40 [ 19.127607] kasan_save_alloc_info+0x40/0x58 [ 19.127679] __kasan_kmalloc+0xd4/0xd8 [ 19.127745] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.127826] kmalloc_oob_right+0xb0/0x660 [ 19.127901] kunit_try_run_case+0x170/0x3f0 [ 19.127974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.128064] kthread+0x328/0x630 [ 19.128130] ret_from_fork+0x10/0x20 [ 19.128193] [ 19.128231] The buggy address belongs to the object at fff00000c6345600 [ 19.128231] which belongs to the cache kmalloc-128 of size 128 [ 19.128351] The buggy address is located 5 bytes to the right of [ 19.128351] allocated 115-byte region [fff00000c6345600, fff00000c6345673) [ 19.128535] [ 19.128586] The buggy address belongs to the physical page: [ 19.128659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345 [ 19.128776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.128874] page_type: f5(slab) [ 19.128955] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.129083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.129178] page dumped because: kasan: bad access detected [ 19.129277] [ 19.129332] Memory state around the buggy address: [ 19.129433] fff00000c6345500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.129528] fff00000c6345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.129621] >fff00000c6345600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.129731] ^ [ 19.129811] fff00000c6345680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.129903] fff00000c6345700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.129983] ================================================================== [ 19.116806] ================================================================== [ 19.117219] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 19.118506] Write of size 1 at addr fff00000c6345673 by task kunit_try_catch/136 [ 19.118632] [ 19.119562] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 19.119723] Tainted: [N]=TEST [ 19.119761] Hardware name: linux,dummy-virt (DT) [ 19.120016] Call trace: [ 19.120233] show_stack+0x20/0x38 (C) [ 19.120408] dump_stack_lvl+0x8c/0xd0 [ 19.120480] print_report+0x118/0x608 [ 19.120553] kasan_report+0xdc/0x128 [ 19.120605] __asan_report_store1_noabort+0x20/0x30 [ 19.120655] kmalloc_oob_right+0x5a4/0x660 [ 19.120704] kunit_try_run_case+0x170/0x3f0 [ 19.120760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.120816] kthread+0x328/0x630 [ 19.120865] ret_from_fork+0x10/0x20 [ 19.121064] [ 19.121114] Allocated by task 136: [ 19.121278] kasan_save_stack+0x3c/0x68 [ 19.121354] kasan_save_track+0x20/0x40 [ 19.121395] kasan_save_alloc_info+0x40/0x58 [ 19.121435] __kasan_kmalloc+0xd4/0xd8 [ 19.121471] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.121511] kmalloc_oob_right+0xb0/0x660 [ 19.121545] kunit_try_run_case+0x170/0x3f0 [ 19.121582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.121622] kthread+0x328/0x630 [ 19.121654] ret_from_fork+0x10/0x20 [ 19.121781] [ 19.121882] The buggy address belongs to the object at fff00000c6345600 [ 19.121882] which belongs to the cache kmalloc-128 of size 128 [ 19.122004] The buggy address is located 0 bytes to the right of [ 19.122004] allocated 115-byte region [fff00000c6345600, fff00000c6345673) [ 19.122094] [ 19.122186] The buggy address belongs to the physical page: [ 19.122432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345 [ 19.122736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.123073] page_type: f5(slab) [ 19.123433] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.123500] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.123629] page dumped because: kasan: bad access detected [ 19.123676] [ 19.123704] Memory state around the buggy address: [ 19.123941] fff00000c6345500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.124016] fff00000c6345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.124093] >fff00000c6345600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.124150] ^ [ 19.124245] fff00000c6345680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.124288] fff00000c6345700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.124354] ==================================================================
[ 10.826760] ================================================================== [ 10.827474] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.827741] Write of size 1 at addr ffff888103173c78 by task kunit_try_catch/153 [ 10.828404] [ 10.828574] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.828616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.828635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.828655] Call Trace: [ 10.828672] <TASK> [ 10.828688] dump_stack_lvl+0x73/0xb0 [ 10.828713] print_report+0xd1/0x650 [ 10.828735] ? __virt_addr_valid+0x1db/0x2d0 [ 10.828758] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.828777] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.828798] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.828819] kasan_report+0x141/0x180 [ 10.828839] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.828864] __asan_report_store1_noabort+0x1b/0x30 [ 10.828883] kmalloc_oob_right+0x6bd/0x7f0 [ 10.828904] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.828926] ? __schedule+0x10cc/0x2b60 [ 10.828946] ? __pfx_read_tsc+0x10/0x10 [ 10.828966] ? ktime_get_ts64+0x86/0x230 [ 10.828989] kunit_try_run_case+0x1a5/0x480 [ 10.829013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.829033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.829056] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.829077] ? __kthread_parkme+0x82/0x180 [ 10.829097] ? preempt_count_sub+0x50/0x80 [ 10.829131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.829153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.829175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.829197] kthread+0x337/0x6f0 [ 10.829215] ? trace_preempt_on+0x20/0xc0 [ 10.829237] ? __pfx_kthread+0x10/0x10 [ 10.829257] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.829276] ? calculate_sigpending+0x7b/0xa0 [ 10.829299] ? __pfx_kthread+0x10/0x10 [ 10.829319] ret_from_fork+0x116/0x1d0 [ 10.829336] ? __pfx_kthread+0x10/0x10 [ 10.829356] ret_from_fork_asm+0x1a/0x30 [ 10.829386] </TASK> [ 10.829396] [ 10.836518] Allocated by task 153: [ 10.836665] kasan_save_stack+0x45/0x70 [ 10.836909] kasan_save_track+0x18/0x40 [ 10.837093] kasan_save_alloc_info+0x3b/0x50 [ 10.837340] __kasan_kmalloc+0xb7/0xc0 [ 10.837474] __kmalloc_cache_noprof+0x189/0x420 [ 10.837629] kmalloc_oob_right+0xa9/0x7f0 [ 10.837926] kunit_try_run_case+0x1a5/0x480 [ 10.838151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.838496] kthread+0x337/0x6f0 [ 10.838723] ret_from_fork+0x116/0x1d0 [ 10.838908] ret_from_fork_asm+0x1a/0x30 [ 10.839105] [ 10.839226] The buggy address belongs to the object at ffff888103173c00 [ 10.839226] which belongs to the cache kmalloc-128 of size 128 [ 10.839626] The buggy address is located 5 bytes to the right of [ 10.839626] allocated 115-byte region [ffff888103173c00, ffff888103173c73) [ 10.840091] [ 10.840171] The buggy address belongs to the physical page: [ 10.840568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173 [ 10.841730] flags: 0x200000000000000(node=0|zone=2) [ 10.841944] page_type: f5(slab) [ 10.842087] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.842376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.842607] page dumped because: kasan: bad access detected [ 10.842779] [ 10.842848] Memory state around the buggy address: [ 10.843005] ffff888103173b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.843596] ffff888103173b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.844272] >ffff888103173c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.844885] ^ [ 10.845175] ffff888103173c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.845390] ffff888103173d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.845695] ================================================================== [ 10.846689] ================================================================== [ 10.847278] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.847571] Read of size 1 at addr ffff888103173c80 by task kunit_try_catch/153 [ 10.848070] [ 10.848187] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.848226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.848257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.848278] Call Trace: [ 10.848303] <TASK> [ 10.848315] dump_stack_lvl+0x73/0xb0 [ 10.848354] print_report+0xd1/0x650 [ 10.848375] ? __virt_addr_valid+0x1db/0x2d0 [ 10.848397] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.848430] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.848451] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.848485] kasan_report+0x141/0x180 [ 10.848519] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.848557] __asan_report_load1_noabort+0x18/0x20 [ 10.848580] kmalloc_oob_right+0x68a/0x7f0 [ 10.848601] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.848622] ? __schedule+0x10cc/0x2b60 [ 10.848643] ? __pfx_read_tsc+0x10/0x10 [ 10.848662] ? ktime_get_ts64+0x86/0x230 [ 10.848685] kunit_try_run_case+0x1a5/0x480 [ 10.848708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.848728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.848750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.848771] ? __kthread_parkme+0x82/0x180 [ 10.849577] ? preempt_count_sub+0x50/0x80 [ 10.849614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.849739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.849763] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.849785] kthread+0x337/0x6f0 [ 10.849803] ? trace_preempt_on+0x20/0xc0 [ 10.849825] ? __pfx_kthread+0x10/0x10 [ 10.849845] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.849865] ? calculate_sigpending+0x7b/0xa0 [ 10.849887] ? __pfx_kthread+0x10/0x10 [ 10.849909] ret_from_fork+0x116/0x1d0 [ 10.849927] ? __pfx_kthread+0x10/0x10 [ 10.849946] ret_from_fork_asm+0x1a/0x30 [ 10.849974] </TASK> [ 10.849985] [ 10.861604] Allocated by task 153: [ 10.861768] kasan_save_stack+0x45/0x70 [ 10.862025] kasan_save_track+0x18/0x40 [ 10.862330] kasan_save_alloc_info+0x3b/0x50 [ 10.862527] __kasan_kmalloc+0xb7/0xc0 [ 10.862712] __kmalloc_cache_noprof+0x189/0x420 [ 10.862926] kmalloc_oob_right+0xa9/0x7f0 [ 10.863110] kunit_try_run_case+0x1a5/0x480 [ 10.863420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.863606] kthread+0x337/0x6f0 [ 10.863775] ret_from_fork+0x116/0x1d0 [ 10.864007] ret_from_fork_asm+0x1a/0x30 [ 10.864245] [ 10.864318] The buggy address belongs to the object at ffff888103173c00 [ 10.864318] which belongs to the cache kmalloc-128 of size 128 [ 10.864790] The buggy address is located 13 bytes to the right of [ 10.864790] allocated 115-byte region [ffff888103173c00, ffff888103173c73) [ 10.865434] [ 10.865531] The buggy address belongs to the physical page: [ 10.865918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173 [ 10.866422] flags: 0x200000000000000(node=0|zone=2) [ 10.866650] page_type: f5(slab) [ 10.866804] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.867195] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.867454] page dumped because: kasan: bad access detected [ 10.867708] [ 10.867803] Memory state around the buggy address: [ 10.868035] ffff888103173b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.868412] ffff888103173c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.868681] >ffff888103173c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.869044] ^ [ 10.869292] ffff888103173d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.869562] ffff888103173d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.869881] ================================================================== [ 10.790248] ================================================================== [ 10.791390] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.792393] Write of size 1 at addr ffff888103173c73 by task kunit_try_catch/153 [ 10.793214] [ 10.794183] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.794539] Tainted: [N]=TEST [ 10.794571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.794784] Call Trace: [ 10.794848] <TASK> [ 10.794995] dump_stack_lvl+0x73/0xb0 [ 10.795079] print_report+0xd1/0x650 [ 10.795108] ? __virt_addr_valid+0x1db/0x2d0 [ 10.795147] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.795167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.795188] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.795209] kasan_report+0x141/0x180 [ 10.795230] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.795255] __asan_report_store1_noabort+0x1b/0x30 [ 10.795275] kmalloc_oob_right+0x6f0/0x7f0 [ 10.795296] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.795320] ? __schedule+0x10cc/0x2b60 [ 10.795343] ? __pfx_read_tsc+0x10/0x10 [ 10.795365] ? ktime_get_ts64+0x86/0x230 [ 10.795390] kunit_try_run_case+0x1a5/0x480 [ 10.795416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.795437] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.795460] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.795481] ? __kthread_parkme+0x82/0x180 [ 10.795502] ? preempt_count_sub+0x50/0x80 [ 10.795526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.795548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.795570] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.795592] kthread+0x337/0x6f0 [ 10.795610] ? trace_preempt_on+0x20/0xc0 [ 10.795633] ? __pfx_kthread+0x10/0x10 [ 10.795653] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.795672] ? calculate_sigpending+0x7b/0xa0 [ 10.795696] ? __pfx_kthread+0x10/0x10 [ 10.795716] ret_from_fork+0x116/0x1d0 [ 10.795734] ? __pfx_kthread+0x10/0x10 [ 10.795753] ret_from_fork_asm+0x1a/0x30 [ 10.795810] </TASK> [ 10.795873] [ 10.808485] Allocated by task 153: [ 10.808985] kasan_save_stack+0x45/0x70 [ 10.809336] kasan_save_track+0x18/0x40 [ 10.809728] kasan_save_alloc_info+0x3b/0x50 [ 10.810022] __kasan_kmalloc+0xb7/0xc0 [ 10.810450] __kmalloc_cache_noprof+0x189/0x420 [ 10.810748] kmalloc_oob_right+0xa9/0x7f0 [ 10.810938] kunit_try_run_case+0x1a5/0x480 [ 10.811390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.811973] kthread+0x337/0x6f0 [ 10.812345] ret_from_fork+0x116/0x1d0 [ 10.812731] ret_from_fork_asm+0x1a/0x30 [ 10.813095] [ 10.813290] The buggy address belongs to the object at ffff888103173c00 [ 10.813290] which belongs to the cache kmalloc-128 of size 128 [ 10.814531] The buggy address is located 0 bytes to the right of [ 10.814531] allocated 115-byte region [ffff888103173c00, ffff888103173c73) [ 10.815597] [ 10.815831] The buggy address belongs to the physical page: [ 10.816402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173 [ 10.817383] flags: 0x200000000000000(node=0|zone=2) [ 10.818151] page_type: f5(slab) [ 10.818587] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.818835] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.819150] page dumped because: kasan: bad access detected [ 10.819694] [ 10.819933] Memory state around the buggy address: [ 10.820671] ffff888103173b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.821347] ffff888103173b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.822107] >ffff888103173c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.822887] ^ [ 10.823658] ffff888103173c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.824389] ffff888103173d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.825016] ==================================================================