Date
July 1, 2025, 11:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.081916] ================================================================== [ 18.082346] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.083332] Write of size 1 at addr fff00000c5d57e73 by task kunit_try_catch/137 [ 18.083481] [ 18.084385] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 18.084547] Tainted: [N]=TEST [ 18.084584] Hardware name: linux,dummy-virt (DT) [ 18.084824] Call trace: [ 18.085008] show_stack+0x20/0x38 (C) [ 18.085167] dump_stack_lvl+0x8c/0xd0 [ 18.085238] print_report+0x118/0x608 [ 18.085291] kasan_report+0xdc/0x128 [ 18.085346] __asan_report_store1_noabort+0x20/0x30 [ 18.085398] kmalloc_oob_right+0x5a4/0x660 [ 18.085447] kunit_try_run_case+0x170/0x3f0 [ 18.085502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.085562] kthread+0x328/0x630 [ 18.085609] ret_from_fork+0x10/0x20 [ 18.085779] [ 18.085821] Allocated by task 137: [ 18.085949] kasan_save_stack+0x3c/0x68 [ 18.086020] kasan_save_track+0x20/0x40 [ 18.086061] kasan_save_alloc_info+0x40/0x58 [ 18.086103] __kasan_kmalloc+0xd4/0xd8 [ 18.086173] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.086219] kmalloc_oob_right+0xb0/0x660 [ 18.086257] kunit_try_run_case+0x170/0x3f0 [ 18.086297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.086344] kthread+0x328/0x630 [ 18.086378] ret_from_fork+0x10/0x20 [ 18.086439] [ 18.086518] The buggy address belongs to the object at fff00000c5d57e00 [ 18.086518] which belongs to the cache kmalloc-128 of size 128 [ 18.086621] The buggy address is located 0 bytes to the right of [ 18.086621] allocated 115-byte region [fff00000c5d57e00, fff00000c5d57e73) [ 18.086696] [ 18.086786] The buggy address belongs to the physical page: [ 18.087007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d57 [ 18.087409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.087888] page_type: f5(slab) [ 18.088237] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.088307] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.088422] page dumped because: kasan: bad access detected [ 18.088466] [ 18.088494] Memory state around the buggy address: [ 18.088727] fff00000c5d57d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.088799] fff00000c5d57d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.088859] >fff00000c5d57e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.088916] ^ [ 18.089004] fff00000c5d57e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.089051] fff00000c5d57f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.089118] ================================================================== [ 18.090209] ================================================================== [ 18.090260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 18.090317] Write of size 1 at addr fff00000c5d57e78 by task kunit_try_catch/137 [ 18.090396] [ 18.090434] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.090532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.090562] Hardware name: linux,dummy-virt (DT) [ 18.090604] Call trace: [ 18.090628] show_stack+0x20/0x38 (C) [ 18.090681] dump_stack_lvl+0x8c/0xd0 [ 18.090732] print_report+0x118/0x608 [ 18.090781] kasan_report+0xdc/0x128 [ 18.090838] __asan_report_store1_noabort+0x20/0x30 [ 18.090909] kmalloc_oob_right+0x538/0x660 [ 18.090959] kunit_try_run_case+0x170/0x3f0 [ 18.091010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.091076] kthread+0x328/0x630 [ 18.093579] ret_from_fork+0x10/0x20 [ 18.093660] [ 18.093680] Allocated by task 137: [ 18.093710] kasan_save_stack+0x3c/0x68 [ 18.093755] kasan_save_track+0x20/0x40 [ 18.093795] kasan_save_alloc_info+0x40/0x58 [ 18.093836] __kasan_kmalloc+0xd4/0xd8 [ 18.093873] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.093914] kmalloc_oob_right+0xb0/0x660 [ 18.093951] kunit_try_run_case+0x170/0x3f0 [ 18.093991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.094037] kthread+0x328/0x630 [ 18.094070] ret_from_fork+0x10/0x20 [ 18.094107] [ 18.094127] The buggy address belongs to the object at fff00000c5d57e00 [ 18.094127] which belongs to the cache kmalloc-128 of size 128 [ 18.094680] The buggy address is located 5 bytes to the right of [ 18.094680] allocated 115-byte region [fff00000c5d57e00, fff00000c5d57e73) [ 18.094800] [ 18.094911] The buggy address belongs to the physical page: [ 18.094947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d57 [ 18.095010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.095064] page_type: f5(slab) [ 18.095109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.095174] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.095218] page dumped because: kasan: bad access detected [ 18.095282] [ 18.095301] Memory state around the buggy address: [ 18.095336] fff00000c5d57d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.095383] fff00000c5d57d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.095429] >fff00000c5d57e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.095469] ^ [ 18.095511] fff00000c5d57e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.095556] fff00000c5d57f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.095597] ================================================================== [ 18.095940] ================================================================== [ 18.096019] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 18.096071] Read of size 1 at addr fff00000c5d57e80 by task kunit_try_catch/137 [ 18.096124] [ 18.096172] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.096262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.096331] Hardware name: linux,dummy-virt (DT) [ 18.096367] Call trace: [ 18.096389] show_stack+0x20/0x38 (C) [ 18.096440] dump_stack_lvl+0x8c/0xd0 [ 18.096492] print_report+0x118/0x608 [ 18.096542] kasan_report+0xdc/0x128 [ 18.096590] __asan_report_load1_noabort+0x20/0x30 [ 18.096643] kmalloc_oob_right+0x5d0/0x660 [ 18.096691] kunit_try_run_case+0x170/0x3f0 [ 18.096740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.096826] kthread+0x328/0x630 [ 18.096889] ret_from_fork+0x10/0x20 [ 18.096970] [ 18.097006] Allocated by task 137: [ 18.097036] kasan_save_stack+0x3c/0x68 [ 18.097148] kasan_save_track+0x20/0x40 [ 18.097251] kasan_save_alloc_info+0x40/0x58 [ 18.097300] __kasan_kmalloc+0xd4/0xd8 [ 18.097338] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.097501] kmalloc_oob_right+0xb0/0x660 [ 18.097598] kunit_try_run_case+0x170/0x3f0 [ 18.097638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.097684] kthread+0x328/0x630 [ 18.097813] ret_from_fork+0x10/0x20 [ 18.097888] [ 18.097908] The buggy address belongs to the object at fff00000c5d57e00 [ 18.097908] which belongs to the cache kmalloc-128 of size 128 [ 18.098019] The buggy address is located 13 bytes to the right of [ 18.098019] allocated 115-byte region [fff00000c5d57e00, fff00000c5d57e73) [ 18.098116] [ 18.098188] The buggy address belongs to the physical page: [ 18.098222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d57 [ 18.098279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.098404] page_type: f5(slab) [ 18.098517] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.098572] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.098747] page dumped because: kasan: bad access detected [ 18.098804] [ 18.098823] Memory state around the buggy address: [ 18.098939] fff00000c5d57d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.099029] fff00000c5d57e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.099076] >fff00000c5d57e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.099162] ^ [ 18.099420] fff00000c5d57f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.099592] fff00000c5d57f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.099836] ==================================================================
[ 10.804651] ================================================================== [ 10.805428] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.806340] Write of size 1 at addr ffff888102ef5573 by task kunit_try_catch/153 [ 10.806693] [ 10.807897] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.808254] Tainted: [N]=TEST [ 10.808286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.808517] Call Trace: [ 10.808596] <TASK> [ 10.808759] dump_stack_lvl+0x73/0xb0 [ 10.808850] print_report+0xd1/0x650 [ 10.808879] ? __virt_addr_valid+0x1db/0x2d0 [ 10.808904] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.808924] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.808945] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.808965] kasan_report+0x141/0x180 [ 10.808986] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.809011] __asan_report_store1_noabort+0x1b/0x30 [ 10.809030] kmalloc_oob_right+0x6f0/0x7f0 [ 10.809051] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.809071] ? __schedule+0x10cc/0x2b60 [ 10.809093] ? __pfx_read_tsc+0x10/0x10 [ 10.809114] ? ktime_get_ts64+0x86/0x230 [ 10.809139] kunit_try_run_case+0x1a5/0x480 [ 10.809164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.809184] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.809207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.809228] ? __kthread_parkme+0x82/0x180 [ 10.809248] ? preempt_count_sub+0x50/0x80 [ 10.809272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.809293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.809315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.809336] kthread+0x337/0x6f0 [ 10.809354] ? trace_preempt_on+0x20/0xc0 [ 10.809388] ? __pfx_kthread+0x10/0x10 [ 10.809408] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.809427] ? calculate_sigpending+0x7b/0xa0 [ 10.809450] ? __pfx_kthread+0x10/0x10 [ 10.809470] ret_from_fork+0x116/0x1d0 [ 10.809487] ? __pfx_kthread+0x10/0x10 [ 10.809506] ret_from_fork_asm+0x1a/0x30 [ 10.809558] </TASK> [ 10.809624] [ 10.820576] Allocated by task 153: [ 10.820933] kasan_save_stack+0x45/0x70 [ 10.821195] kasan_save_track+0x18/0x40 [ 10.821440] kasan_save_alloc_info+0x3b/0x50 [ 10.821638] __kasan_kmalloc+0xb7/0xc0 [ 10.821834] __kmalloc_cache_noprof+0x189/0x420 [ 10.822052] kmalloc_oob_right+0xa9/0x7f0 [ 10.822188] kunit_try_run_case+0x1a5/0x480 [ 10.822356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.822633] kthread+0x337/0x6f0 [ 10.822963] ret_from_fork+0x116/0x1d0 [ 10.823170] ret_from_fork_asm+0x1a/0x30 [ 10.823413] [ 10.823597] The buggy address belongs to the object at ffff888102ef5500 [ 10.823597] which belongs to the cache kmalloc-128 of size 128 [ 10.824203] The buggy address is located 0 bytes to the right of [ 10.824203] allocated 115-byte region [ffff888102ef5500, ffff888102ef5573) [ 10.824868] [ 10.825036] The buggy address belongs to the physical page: [ 10.825573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef5 [ 10.826215] flags: 0x200000000000000(node=0|zone=2) [ 10.826860] page_type: f5(slab) [ 10.827321] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.827659] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.828075] page dumped because: kasan: bad access detected [ 10.828306] [ 10.828430] Memory state around the buggy address: [ 10.828838] ffff888102ef5400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.829206] ffff888102ef5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.829495] >ffff888102ef5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.829859] ^ [ 10.830153] ffff888102ef5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.830443] ffff888102ef5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.830777] ================================================================== [ 10.848788] ================================================================== [ 10.849144] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.849500] Read of size 1 at addr ffff888102ef5580 by task kunit_try_catch/153 [ 10.849766] [ 10.849854] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.849897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.849908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.849929] Call Trace: [ 10.849941] <TASK> [ 10.849956] dump_stack_lvl+0x73/0xb0 [ 10.849982] print_report+0xd1/0x650 [ 10.850004] ? __virt_addr_valid+0x1db/0x2d0 [ 10.850026] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.850045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.850065] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.850085] kasan_report+0x141/0x180 [ 10.850106] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.850130] __asan_report_load1_noabort+0x18/0x20 [ 10.850152] kmalloc_oob_right+0x68a/0x7f0 [ 10.850173] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.850193] ? __schedule+0x10cc/0x2b60 [ 10.850214] ? __pfx_read_tsc+0x10/0x10 [ 10.850234] ? ktime_get_ts64+0x86/0x230 [ 10.850257] kunit_try_run_case+0x1a5/0x480 [ 10.850280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.850300] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.850321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.850342] ? __kthread_parkme+0x82/0x180 [ 10.850361] ? preempt_count_sub+0x50/0x80 [ 10.850395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.850417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.850437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.850459] kthread+0x337/0x6f0 [ 10.850476] ? trace_preempt_on+0x20/0xc0 [ 10.850499] ? __pfx_kthread+0x10/0x10 [ 10.850518] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.850537] ? calculate_sigpending+0x7b/0xa0 [ 10.850560] ? __pfx_kthread+0x10/0x10 [ 10.850580] ret_from_fork+0x116/0x1d0 [ 10.850597] ? __pfx_kthread+0x10/0x10 [ 10.850617] ret_from_fork_asm+0x1a/0x30 [ 10.850646] </TASK> [ 10.850669] [ 10.857272] Allocated by task 153: [ 10.857420] kasan_save_stack+0x45/0x70 [ 10.857590] kasan_save_track+0x18/0x40 [ 10.857783] kasan_save_alloc_info+0x3b/0x50 [ 10.857992] __kasan_kmalloc+0xb7/0xc0 [ 10.858181] __kmalloc_cache_noprof+0x189/0x420 [ 10.858414] kmalloc_oob_right+0xa9/0x7f0 [ 10.858684] kunit_try_run_case+0x1a5/0x480 [ 10.858891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.859065] kthread+0x337/0x6f0 [ 10.859221] ret_from_fork+0x116/0x1d0 [ 10.859416] ret_from_fork_asm+0x1a/0x30 [ 10.859662] [ 10.859747] The buggy address belongs to the object at ffff888102ef5500 [ 10.859747] which belongs to the cache kmalloc-128 of size 128 [ 10.860207] The buggy address is located 13 bytes to the right of [ 10.860207] allocated 115-byte region [ffff888102ef5500, ffff888102ef5573) [ 10.860590] [ 10.860661] The buggy address belongs to the physical page: [ 10.860830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef5 [ 10.861071] flags: 0x200000000000000(node=0|zone=2) [ 10.861234] page_type: f5(slab) [ 10.861356] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.861713] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.862066] page dumped because: kasan: bad access detected [ 10.862326] [ 10.862427] Memory state around the buggy address: [ 10.862731] ffff888102ef5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.863041] ffff888102ef5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.863252] >ffff888102ef5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.863472] ^ [ 10.863604] ffff888102ef5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.863916] ffff888102ef5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.864233] ================================================================== [ 10.832107] ================================================================== [ 10.832436] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.832823] Write of size 1 at addr ffff888102ef5578 by task kunit_try_catch/153 [ 10.833108] [ 10.833204] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.833251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.833262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.833285] Call Trace: [ 10.833303] <TASK> [ 10.833322] dump_stack_lvl+0x73/0xb0 [ 10.833349] print_report+0xd1/0x650 [ 10.833384] ? __virt_addr_valid+0x1db/0x2d0 [ 10.833407] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.833427] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.833447] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.833467] kasan_report+0x141/0x180 [ 10.833488] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.833513] __asan_report_store1_noabort+0x1b/0x30 [ 10.833532] kmalloc_oob_right+0x6bd/0x7f0 [ 10.833552] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.833574] ? __schedule+0x10cc/0x2b60 [ 10.833594] ? __pfx_read_tsc+0x10/0x10 [ 10.833614] ? ktime_get_ts64+0x86/0x230 [ 10.833637] kunit_try_run_case+0x1a5/0x480 [ 10.833661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.833681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.833703] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.833724] ? __kthread_parkme+0x82/0x180 [ 10.833743] ? preempt_count_sub+0x50/0x80 [ 10.833766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.833788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.833809] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.833830] kthread+0x337/0x6f0 [ 10.833847] ? trace_preempt_on+0x20/0xc0 [ 10.833870] ? __pfx_kthread+0x10/0x10 [ 10.833889] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.833908] ? calculate_sigpending+0x7b/0xa0 [ 10.833930] ? __pfx_kthread+0x10/0x10 [ 10.833950] ret_from_fork+0x116/0x1d0 [ 10.833967] ? __pfx_kthread+0x10/0x10 [ 10.833986] ret_from_fork_asm+0x1a/0x30 [ 10.834015] </TASK> [ 10.834027] [ 10.840640] Allocated by task 153: [ 10.840830] kasan_save_stack+0x45/0x70 [ 10.841048] kasan_save_track+0x18/0x40 [ 10.841196] kasan_save_alloc_info+0x3b/0x50 [ 10.841404] __kasan_kmalloc+0xb7/0xc0 [ 10.841534] __kmalloc_cache_noprof+0x189/0x420 [ 10.841912] kmalloc_oob_right+0xa9/0x7f0 [ 10.842088] kunit_try_run_case+0x1a5/0x480 [ 10.842236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.842419] kthread+0x337/0x6f0 [ 10.842584] ret_from_fork+0x116/0x1d0 [ 10.842779] ret_from_fork_asm+0x1a/0x30 [ 10.842979] [ 10.843076] The buggy address belongs to the object at ffff888102ef5500 [ 10.843076] which belongs to the cache kmalloc-128 of size 128 [ 10.843612] The buggy address is located 5 bytes to the right of [ 10.843612] allocated 115-byte region [ffff888102ef5500, ffff888102ef5573) [ 10.844087] [ 10.844159] The buggy address belongs to the physical page: [ 10.844332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef5 [ 10.844594] flags: 0x200000000000000(node=0|zone=2) [ 10.844828] page_type: f5(slab) [ 10.844993] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.845411] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.845711] page dumped because: kasan: bad access detected [ 10.845920] [ 10.845988] Memory state around the buggy address: [ 10.846141] ffff888102ef5400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.846354] ffff888102ef5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.846821] >ffff888102ef5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.847145] ^ [ 10.847473] ffff888102ef5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.847770] ffff888102ef5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.848007] ==================================================================