Date
July 5, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.778058] ================================================================== [ 17.778425] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.779272] Write of size 1 at addr fff00000c5a07e73 by task kunit_try_catch/136 [ 17.779391] [ 17.780539] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 17.780684] Tainted: [N]=TEST [ 17.780716] Hardware name: linux,dummy-virt (DT) [ 17.780932] Call trace: [ 17.781098] show_stack+0x20/0x38 (C) [ 17.781245] dump_stack_lvl+0x8c/0xd0 [ 17.781306] print_report+0x118/0x608 [ 17.781354] kasan_report+0xdc/0x128 [ 17.781398] __asan_report_store1_noabort+0x20/0x30 [ 17.781672] kmalloc_oob_right+0x5a4/0x660 [ 17.781896] kunit_try_run_case+0x170/0x3f0 [ 17.781960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.782194] kthread+0x328/0x630 [ 17.782304] ret_from_fork+0x10/0x20 [ 17.783144] [ 17.783405] Allocated by task 136: [ 17.783998] kasan_save_stack+0x3c/0x68 [ 17.785018] kasan_save_track+0x20/0x40 [ 17.785099] kasan_save_alloc_info+0x40/0x58 [ 17.785146] __kasan_kmalloc+0xd4/0xd8 [ 17.785209] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.785271] kmalloc_oob_right+0xb0/0x660 [ 17.785337] kunit_try_run_case+0x170/0x3f0 [ 17.785398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.785605] kthread+0x328/0x630 [ 17.786172] ret_from_fork+0x10/0x20 [ 17.786264] [ 17.786332] The buggy address belongs to the object at fff00000c5a07e00 [ 17.786332] which belongs to the cache kmalloc-128 of size 128 [ 17.786430] The buggy address is located 0 bytes to the right of [ 17.786430] allocated 115-byte region [fff00000c5a07e00, fff00000c5a07e73) [ 17.786495] [ 17.786582] The buggy address belongs to the physical page: [ 17.786796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a07 [ 17.787091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.788251] page_type: f5(slab) [ 17.788570] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.788630] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.789683] page dumped because: kasan: bad access detected [ 17.789859] [ 17.790003] Memory state around the buggy address: [ 17.790892] fff00000c5a07d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.790980] fff00000c5a07d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.791036] >fff00000c5a07e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.791091] ^ [ 17.791810] fff00000c5a07e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.791856] fff00000c5a07f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.791926] ================================================================== [ 17.792794] ================================================================== [ 17.792831] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.792877] Write of size 1 at addr fff00000c5a07e78 by task kunit_try_catch/136 [ 17.792923] [ 17.792952] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.793028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.793052] Hardware name: linux,dummy-virt (DT) [ 17.793081] Call trace: [ 17.793101] show_stack+0x20/0x38 (C) [ 17.793147] dump_stack_lvl+0x8c/0xd0 [ 17.793207] print_report+0x118/0x608 [ 17.793251] kasan_report+0xdc/0x128 [ 17.793295] __asan_report_store1_noabort+0x20/0x30 [ 17.793342] kmalloc_oob_right+0x538/0x660 [ 17.793386] kunit_try_run_case+0x170/0x3f0 [ 17.793431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.793481] kthread+0x328/0x630 [ 17.793520] ret_from_fork+0x10/0x20 [ 17.793565] [ 17.793583] Allocated by task 136: [ 17.793608] kasan_save_stack+0x3c/0x68 [ 17.793646] kasan_save_track+0x20/0x40 [ 17.793681] kasan_save_alloc_info+0x40/0x58 [ 17.793719] __kasan_kmalloc+0xd4/0xd8 [ 17.793753] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.793789] kmalloc_oob_right+0xb0/0x660 [ 17.793824] kunit_try_run_case+0x170/0x3f0 [ 17.793862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.793903] kthread+0x328/0x630 [ 17.793934] ret_from_fork+0x10/0x20 [ 17.793968] [ 17.793986] The buggy address belongs to the object at fff00000c5a07e00 [ 17.793986] which belongs to the cache kmalloc-128 of size 128 [ 17.794038] The buggy address is located 5 bytes to the right of [ 17.794038] allocated 115-byte region [fff00000c5a07e00, fff00000c5a07e73) [ 17.794098] [ 17.794116] The buggy address belongs to the physical page: [ 17.794144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a07 [ 17.795014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.795064] page_type: f5(slab) [ 17.795109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.795242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.795297] page dumped because: kasan: bad access detected [ 17.795327] [ 17.795344] Memory state around the buggy address: [ 17.795374] fff00000c5a07d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.795415] fff00000c5a07d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.795464] >fff00000c5a07e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.795503] ^ [ 17.795543] fff00000c5a07e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.795586] fff00000c5a07f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.795632] ================================================================== [ 17.795790] ================================================================== [ 17.795839] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.796185] Read of size 1 at addr fff00000c5a07e80 by task kunit_try_catch/136 [ 17.796238] [ 17.796265] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.796850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.796887] Hardware name: linux,dummy-virt (DT) [ 17.797178] Call trace: [ 17.797323] show_stack+0x20/0x38 (C) [ 17.797506] dump_stack_lvl+0x8c/0xd0 [ 17.797597] print_report+0x118/0x608 [ 17.797786] kasan_report+0xdc/0x128 [ 17.798038] __asan_report_load1_noabort+0x20/0x30 [ 17.798091] kmalloc_oob_right+0x5d0/0x660 [ 17.798431] kunit_try_run_case+0x170/0x3f0 [ 17.798860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.799094] kthread+0x328/0x630 [ 17.799256] ret_from_fork+0x10/0x20 [ 17.799342] [ 17.799383] Allocated by task 136: [ 17.799410] kasan_save_stack+0x3c/0x68 [ 17.799451] kasan_save_track+0x20/0x40 [ 17.799495] kasan_save_alloc_info+0x40/0x58 [ 17.799534] __kasan_kmalloc+0xd4/0xd8 [ 17.799575] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.799622] kmalloc_oob_right+0xb0/0x660 [ 17.799672] kunit_try_run_case+0x170/0x3f0 [ 17.799709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.799751] kthread+0x328/0x630 [ 17.799797] ret_from_fork+0x10/0x20 [ 17.799831] [ 17.799857] The buggy address belongs to the object at fff00000c5a07e00 [ 17.799857] which belongs to the cache kmalloc-128 of size 128 [ 17.800128] The buggy address is located 13 bytes to the right of [ 17.800128] allocated 115-byte region [fff00000c5a07e00, fff00000c5a07e73) [ 17.800476] [ 17.800846] The buggy address belongs to the physical page: [ 17.801001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a07 [ 17.801215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.801267] page_type: f5(slab) [ 17.801340] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.801412] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.801460] page dumped because: kasan: bad access detected [ 17.801499] [ 17.801517] Memory state around the buggy address: [ 17.801557] fff00000c5a07d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.801601] fff00000c5a07e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.801650] >fff00000c5a07e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.801689] ^ [ 17.801717] fff00000c5a07f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.801758] fff00000c5a07f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.801809] ==================================================================
[ 12.744092] ================================================================== [ 12.744528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.744892] Read of size 1 at addr ffff8881029e8c80 by task kunit_try_catch/154 [ 12.745243] [ 12.745400] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.745450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.745464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.745490] Call Trace: [ 12.745512] <TASK> [ 12.745535] dump_stack_lvl+0x73/0xb0 [ 12.745568] print_report+0xd1/0x650 [ 12.745594] ? __virt_addr_valid+0x1db/0x2d0 [ 12.745620] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.745643] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.745667] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.745691] kasan_report+0x141/0x180 [ 12.745715] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.745744] __asan_report_load1_noabort+0x18/0x20 [ 12.745771] kmalloc_oob_right+0x68a/0x7f0 [ 12.745807] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.745832] ? __schedule+0x10cc/0x2b60 [ 12.745857] ? __pfx_read_tsc+0x10/0x10 [ 12.745881] ? ktime_get_ts64+0x86/0x230 [ 12.745908] kunit_try_run_case+0x1a5/0x480 [ 12.745935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.745959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.745984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.746009] ? __kthread_parkme+0x82/0x180 [ 12.746031] ? preempt_count_sub+0x50/0x80 [ 12.746058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.746084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.746108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.746336] kthread+0x337/0x6f0 [ 12.746363] ? trace_preempt_on+0x20/0xc0 [ 12.746392] ? __pfx_kthread+0x10/0x10 [ 12.746415] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.746439] ? calculate_sigpending+0x7b/0xa0 [ 12.746466] ? __pfx_kthread+0x10/0x10 [ 12.746490] ret_from_fork+0x116/0x1d0 [ 12.746511] ? __pfx_kthread+0x10/0x10 [ 12.746534] ret_from_fork_asm+0x1a/0x30 [ 12.746569] </TASK> [ 12.746583] [ 12.754948] Allocated by task 154: [ 12.755171] kasan_save_stack+0x45/0x70 [ 12.755503] kasan_save_track+0x18/0x40 [ 12.755705] kasan_save_alloc_info+0x3b/0x50 [ 12.755935] __kasan_kmalloc+0xb7/0xc0 [ 12.756246] __kmalloc_cache_noprof+0x189/0x420 [ 12.756486] kmalloc_oob_right+0xa9/0x7f0 [ 12.756672] kunit_try_run_case+0x1a5/0x480 [ 12.756850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.757129] kthread+0x337/0x6f0 [ 12.757419] ret_from_fork+0x116/0x1d0 [ 12.757648] ret_from_fork_asm+0x1a/0x30 [ 12.757896] [ 12.757982] The buggy address belongs to the object at ffff8881029e8c00 [ 12.757982] which belongs to the cache kmalloc-128 of size 128 [ 12.758841] The buggy address is located 13 bytes to the right of [ 12.758841] allocated 115-byte region [ffff8881029e8c00, ffff8881029e8c73) [ 12.759627] [ 12.759749] The buggy address belongs to the physical page: [ 12.760050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8 [ 12.760540] flags: 0x200000000000000(node=0|zone=2) [ 12.760735] page_type: f5(slab) [ 12.760940] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.761452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.761866] page dumped because: kasan: bad access detected [ 12.762347] [ 12.762477] Memory state around the buggy address: [ 12.762693] ffff8881029e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.763067] ffff8881029e8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.763507] >ffff8881029e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.763839] ^ [ 12.764036] ffff8881029e8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.764355] ffff8881029e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.764663] ================================================================== [ 12.715492] ================================================================== [ 12.715780] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.716073] Write of size 1 at addr ffff8881029e8c78 by task kunit_try_catch/154 [ 12.716348] [ 12.716456] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.716508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.716522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.716549] Call Trace: [ 12.716571] <TASK> [ 12.716593] dump_stack_lvl+0x73/0xb0 [ 12.717521] print_report+0xd1/0x650 [ 12.717565] ? __virt_addr_valid+0x1db/0x2d0 [ 12.717610] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.717634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.717658] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.717682] kasan_report+0x141/0x180 [ 12.717707] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.717737] __asan_report_store1_noabort+0x1b/0x30 [ 12.717760] kmalloc_oob_right+0x6bd/0x7f0 [ 12.717797] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.717833] ? __schedule+0x10cc/0x2b60 [ 12.717858] ? __pfx_read_tsc+0x10/0x10 [ 12.717882] ? ktime_get_ts64+0x86/0x230 [ 12.717910] kunit_try_run_case+0x1a5/0x480 [ 12.717937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.717961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.717987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.718011] ? __kthread_parkme+0x82/0x180 [ 12.718035] ? preempt_count_sub+0x50/0x80 [ 12.718062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.718087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.718112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.718136] kthread+0x337/0x6f0 [ 12.718157] ? trace_preempt_on+0x20/0xc0 [ 12.718311] ? __pfx_kthread+0x10/0x10 [ 12.718335] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.718359] ? calculate_sigpending+0x7b/0xa0 [ 12.718386] ? __pfx_kthread+0x10/0x10 [ 12.718410] ret_from_fork+0x116/0x1d0 [ 12.718431] ? __pfx_kthread+0x10/0x10 [ 12.718454] ret_from_fork_asm+0x1a/0x30 [ 12.718490] </TASK> [ 12.718503] [ 12.732030] Allocated by task 154: [ 12.732542] kasan_save_stack+0x45/0x70 [ 12.733002] kasan_save_track+0x18/0x40 [ 12.733503] kasan_save_alloc_info+0x3b/0x50 [ 12.733686] __kasan_kmalloc+0xb7/0xc0 [ 12.733856] __kmalloc_cache_noprof+0x189/0x420 [ 12.734046] kmalloc_oob_right+0xa9/0x7f0 [ 12.734699] kunit_try_run_case+0x1a5/0x480 [ 12.735212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.735832] kthread+0x337/0x6f0 [ 12.736293] ret_from_fork+0x116/0x1d0 [ 12.736690] ret_from_fork_asm+0x1a/0x30 [ 12.737200] [ 12.737302] The buggy address belongs to the object at ffff8881029e8c00 [ 12.737302] which belongs to the cache kmalloc-128 of size 128 [ 12.737705] The buggy address is located 5 bytes to the right of [ 12.737705] allocated 115-byte region [ffff8881029e8c00, ffff8881029e8c73) [ 12.738452] [ 12.738554] The buggy address belongs to the physical page: [ 12.738838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8 [ 12.739262] flags: 0x200000000000000(node=0|zone=2) [ 12.739487] page_type: f5(slab) [ 12.739644] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.740009] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.740311] page dumped because: kasan: bad access detected [ 12.740595] [ 12.740702] Memory state around the buggy address: [ 12.741026] ffff8881029e8b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.741444] ffff8881029e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.741821] >ffff8881029e8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.742360] ^ [ 12.742697] ffff8881029e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.743041] ffff8881029e8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.743439] ================================================================== [ 12.681833] ================================================================== [ 12.682592] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 12.683437] Write of size 1 at addr ffff8881029e8c73 by task kunit_try_catch/154 [ 12.683912] [ 12.685066] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.685545] Tainted: [N]=TEST [ 12.685586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.685835] Call Trace: [ 12.685913] <TASK> [ 12.686098] dump_stack_lvl+0x73/0xb0 [ 12.686224] print_report+0xd1/0x650 [ 12.686258] ? __virt_addr_valid+0x1db/0x2d0 [ 12.686286] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.686310] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.686335] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.686359] kasan_report+0x141/0x180 [ 12.686383] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.686412] __asan_report_store1_noabort+0x1b/0x30 [ 12.686435] kmalloc_oob_right+0x6f0/0x7f0 [ 12.686460] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.686484] ? __schedule+0x10cc/0x2b60 [ 12.686510] ? __pfx_read_tsc+0x10/0x10 [ 12.686534] ? ktime_get_ts64+0x86/0x230 [ 12.686563] kunit_try_run_case+0x1a5/0x480 [ 12.686593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.686617] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.686644] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.686669] ? __kthread_parkme+0x82/0x180 [ 12.686693] ? preempt_count_sub+0x50/0x80 [ 12.686720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.686745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.686770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.686809] kthread+0x337/0x6f0 [ 12.686831] ? trace_preempt_on+0x20/0xc0 [ 12.686859] ? __pfx_kthread+0x10/0x10 [ 12.686881] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.686904] ? calculate_sigpending+0x7b/0xa0 [ 12.686931] ? __pfx_kthread+0x10/0x10 [ 12.686954] ret_from_fork+0x116/0x1d0 [ 12.686975] ? __pfx_kthread+0x10/0x10 [ 12.686997] ret_from_fork_asm+0x1a/0x30 [ 12.687060] </TASK> [ 12.687177] [ 12.696209] Allocated by task 154: [ 12.697274] kasan_save_stack+0x45/0x70 [ 12.697842] kasan_save_track+0x18/0x40 [ 12.698013] kasan_save_alloc_info+0x3b/0x50 [ 12.698625] __kasan_kmalloc+0xb7/0xc0 [ 12.698816] __kmalloc_cache_noprof+0x189/0x420 [ 12.699118] kmalloc_oob_right+0xa9/0x7f0 [ 12.699369] kunit_try_run_case+0x1a5/0x480 [ 12.700037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.700458] kthread+0x337/0x6f0 [ 12.700618] ret_from_fork+0x116/0x1d0 [ 12.701086] ret_from_fork_asm+0x1a/0x30 [ 12.701629] [ 12.702050] The buggy address belongs to the object at ffff8881029e8c00 [ 12.702050] which belongs to the cache kmalloc-128 of size 128 [ 12.703154] The buggy address is located 0 bytes to the right of [ 12.703154] allocated 115-byte region [ffff8881029e8c00, ffff8881029e8c73) [ 12.704002] [ 12.704584] The buggy address belongs to the physical page: [ 12.705277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8 [ 12.706114] flags: 0x200000000000000(node=0|zone=2) [ 12.706857] page_type: f5(slab) [ 12.707434] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.707749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.708304] page dumped because: kasan: bad access detected [ 12.708631] [ 12.708756] Memory state around the buggy address: [ 12.709599] ffff8881029e8b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.710287] ffff8881029e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.711160] >ffff8881029e8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.711932] ^ [ 12.712481] ffff8881029e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.713291] ffff8881029e8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.714238] ==================================================================