Date
July 2, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.743654] ================================================================== [ 17.744263] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.744885] Read of size 1 at addr fff00000c650e880 by task kunit_try_catch/136 [ 17.744949] [ 17.745275] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.745364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.746120] Hardware name: linux,dummy-virt (DT) [ 17.746518] Call trace: [ 17.746718] show_stack+0x20/0x38 (C) [ 17.746870] dump_stack_lvl+0x8c/0xd0 [ 17.747354] print_report+0x118/0x608 [ 17.747899] kasan_report+0xdc/0x128 [ 17.747958] __asan_report_load1_noabort+0x20/0x30 [ 17.748489] kmalloc_oob_right+0x5d0/0x660 [ 17.748952] kunit_try_run_case+0x170/0x3f0 [ 17.749013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.749815] kthread+0x328/0x630 [ 17.750324] ret_from_fork+0x10/0x20 [ 17.750549] [ 17.750907] Allocated by task 136: [ 17.751000] kasan_save_stack+0x3c/0x68 [ 17.751046] kasan_save_track+0x20/0x40 [ 17.751082] kasan_save_alloc_info+0x40/0x58 [ 17.751557] __kasan_kmalloc+0xd4/0xd8 [ 17.751691] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.751881] kmalloc_oob_right+0xb0/0x660 [ 17.751916] kunit_try_run_case+0x170/0x3f0 [ 17.751953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.752253] kthread+0x328/0x630 [ 17.752340] ret_from_fork+0x10/0x20 [ 17.752381] [ 17.752401] The buggy address belongs to the object at fff00000c650e800 [ 17.752401] which belongs to the cache kmalloc-128 of size 128 [ 17.752736] The buggy address is located 13 bytes to the right of [ 17.752736] allocated 115-byte region [fff00000c650e800, fff00000c650e873) [ 17.752988] [ 17.753013] The buggy address belongs to the physical page: [ 17.753044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10650e [ 17.753301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.753352] page_type: f5(slab) [ 17.753742] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.754060] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.754102] page dumped because: kasan: bad access detected [ 17.754132] [ 17.754497] Memory state around the buggy address: [ 17.754557] fff00000c650e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.754613] fff00000c650e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.754764] >fff00000c650e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.755237] ^ [ 17.755390] fff00000c650e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.755632] fff00000c650e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.755720] ================================================================== [ 17.727535] ================================================================== [ 17.727586] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.727636] Write of size 1 at addr fff00000c650e878 by task kunit_try_catch/136 [ 17.727684] [ 17.727721] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.728217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.728257] Hardware name: linux,dummy-virt (DT) [ 17.728301] Call trace: [ 17.728647] show_stack+0x20/0x38 (C) [ 17.729146] dump_stack_lvl+0x8c/0xd0 [ 17.729203] print_report+0x118/0x608 [ 17.729280] kasan_report+0xdc/0x128 [ 17.729325] __asan_report_store1_noabort+0x20/0x30 [ 17.729712] kmalloc_oob_right+0x538/0x660 [ 17.729852] kunit_try_run_case+0x170/0x3f0 [ 17.730109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.730332] kthread+0x328/0x630 [ 17.730663] ret_from_fork+0x10/0x20 [ 17.730740] [ 17.731058] Allocated by task 136: [ 17.731646] kasan_save_stack+0x3c/0x68 [ 17.731719] kasan_save_track+0x20/0x40 [ 17.732035] kasan_save_alloc_info+0x40/0x58 [ 17.732110] __kasan_kmalloc+0xd4/0xd8 [ 17.732147] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.732185] kmalloc_oob_right+0xb0/0x660 [ 17.732220] kunit_try_run_case+0x170/0x3f0 [ 17.732256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.732297] kthread+0x328/0x630 [ 17.732329] ret_from_fork+0x10/0x20 [ 17.732363] [ 17.732832] The buggy address belongs to the object at fff00000c650e800 [ 17.732832] which belongs to the cache kmalloc-128 of size 128 [ 17.732918] The buggy address is located 5 bytes to the right of [ 17.732918] allocated 115-byte region [fff00000c650e800, fff00000c650e873) [ 17.732985] [ 17.733263] The buggy address belongs to the physical page: [ 17.733380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10650e [ 17.733668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.733719] page_type: f5(slab) [ 17.734143] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.734350] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.734394] page dumped because: kasan: bad access detected [ 17.734861] [ 17.734883] Memory state around the buggy address: [ 17.735217] fff00000c650e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.735749] fff00000c650e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.735833] >fff00000c650e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.736516] ^ [ 17.737106] fff00000c650e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.737209] fff00000c650e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.737247] ================================================================== [ 17.702650] ================================================================== [ 17.702987] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.703812] Write of size 1 at addr fff00000c650e873 by task kunit_try_catch/136 [ 17.703967] [ 17.704797] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 17.704942] Tainted: [N]=TEST [ 17.704975] Hardware name: linux,dummy-virt (DT) [ 17.705193] Call trace: [ 17.706335] show_stack+0x20/0x38 (C) [ 17.706775] dump_stack_lvl+0x8c/0xd0 [ 17.706849] print_report+0x118/0x608 [ 17.706926] kasan_report+0xdc/0x128 [ 17.706971] __asan_report_store1_noabort+0x20/0x30 [ 17.707018] kmalloc_oob_right+0x5a4/0x660 [ 17.707063] kunit_try_run_case+0x170/0x3f0 [ 17.707113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.707173] kthread+0x328/0x630 [ 17.707217] ret_from_fork+0x10/0x20 [ 17.707471] [ 17.707512] Allocated by task 136: [ 17.708476] kasan_save_stack+0x3c/0x68 [ 17.708750] kasan_save_track+0x20/0x40 [ 17.708795] kasan_save_alloc_info+0x40/0x58 [ 17.708833] __kasan_kmalloc+0xd4/0xd8 [ 17.708880] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.708921] kmalloc_oob_right+0xb0/0x660 [ 17.708955] kunit_try_run_case+0x170/0x3f0 [ 17.709008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.709213] kthread+0x328/0x630 [ 17.709255] ret_from_fork+0x10/0x20 [ 17.709324] [ 17.710041] The buggy address belongs to the object at fff00000c650e800 [ 17.710041] which belongs to the cache kmalloc-128 of size 128 [ 17.710713] The buggy address is located 0 bytes to the right of [ 17.710713] allocated 115-byte region [fff00000c650e800, fff00000c650e873) [ 17.711172] [ 17.711549] The buggy address belongs to the physical page: [ 17.713035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10650e [ 17.714220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.715342] page_type: f5(slab) [ 17.717215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.717331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.717714] page dumped because: kasan: bad access detected [ 17.717768] [ 17.718178] Memory state around the buggy address: [ 17.719198] fff00000c650e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.719551] fff00000c650e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.719645] >fff00000c650e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.719976] ^ [ 17.720434] fff00000c650e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.720757] fff00000c650e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.720878] ==================================================================
[ 10.676757] ================================================================== [ 10.677375] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.678118] Write of size 1 at addr ffff888102c7bc73 by task kunit_try_catch/155 [ 10.678511] [ 10.679492] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.679862] Tainted: [N]=TEST [ 10.679895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.680109] Call Trace: [ 10.680177] <TASK> [ 10.680332] dump_stack_lvl+0x73/0xb0 [ 10.680435] print_report+0xd1/0x650 [ 10.680464] ? __virt_addr_valid+0x1db/0x2d0 [ 10.680490] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.680510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.680531] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.680552] kasan_report+0x141/0x180 [ 10.680573] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.680598] __asan_report_store1_noabort+0x1b/0x30 [ 10.680618] kmalloc_oob_right+0x6f0/0x7f0 [ 10.680640] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.680661] ? __schedule+0x10cc/0x2b60 [ 10.680683] ? __pfx_read_tsc+0x10/0x10 [ 10.680704] ? ktime_get_ts64+0x86/0x230 [ 10.680729] kunit_try_run_case+0x1a5/0x480 [ 10.680754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.680775] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.680798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.680819] ? __kthread_parkme+0x82/0x180 [ 10.680840] ? preempt_count_sub+0x50/0x80 [ 10.680864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.680886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.680908] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.680929] kthread+0x337/0x6f0 [ 10.680948] ? trace_preempt_on+0x20/0xc0 [ 10.680971] ? __pfx_kthread+0x10/0x10 [ 10.680991] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.681011] ? calculate_sigpending+0x7b/0xa0 [ 10.681035] ? __pfx_kthread+0x10/0x10 [ 10.681055] ret_from_fork+0x116/0x1d0 [ 10.681072] ? __pfx_kthread+0x10/0x10 [ 10.681092] ret_from_fork_asm+0x1a/0x30 [ 10.681143] </TASK> [ 10.681208] [ 10.689471] Allocated by task 155: [ 10.689793] kasan_save_stack+0x45/0x70 [ 10.690275] kasan_save_track+0x18/0x40 [ 10.690503] kasan_save_alloc_info+0x3b/0x50 [ 10.690795] __kasan_kmalloc+0xb7/0xc0 [ 10.690954] __kmalloc_cache_noprof+0x189/0x420 [ 10.691162] kmalloc_oob_right+0xa9/0x7f0 [ 10.691337] kunit_try_run_case+0x1a5/0x480 [ 10.691533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.691863] kthread+0x337/0x6f0 [ 10.691989] ret_from_fork+0x116/0x1d0 [ 10.692124] ret_from_fork_asm+0x1a/0x30 [ 10.692366] [ 10.692530] The buggy address belongs to the object at ffff888102c7bc00 [ 10.692530] which belongs to the cache kmalloc-128 of size 128 [ 10.693548] The buggy address is located 0 bytes to the right of [ 10.693548] allocated 115-byte region [ffff888102c7bc00, ffff888102c7bc73) [ 10.694102] [ 10.694255] The buggy address belongs to the physical page: [ 10.694932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c7b [ 10.695618] flags: 0x200000000000000(node=0|zone=2) [ 10.696242] page_type: f5(slab) [ 10.696731] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.697121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.697537] page dumped because: kasan: bad access detected [ 10.697987] [ 10.698113] Memory state around the buggy address: [ 10.698538] ffff888102c7bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.699024] ffff888102c7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.699348] >ffff888102c7bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.699668] ^ [ 10.700001] ffff888102c7bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.700287] ffff888102c7bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.700613] ================================================================== [ 10.719794] ================================================================== [ 10.720364] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.720653] Read of size 1 at addr ffff888102c7bc80 by task kunit_try_catch/155 [ 10.720872] [ 10.720953] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.720991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.721002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.721021] Call Trace: [ 10.721034] <TASK> [ 10.721047] dump_stack_lvl+0x73/0xb0 [ 10.721091] print_report+0xd1/0x650 [ 10.721113] ? __virt_addr_valid+0x1db/0x2d0 [ 10.721134] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.721153] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.721174] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.721194] kasan_report+0x141/0x180 [ 10.721215] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.721239] __asan_report_load1_noabort+0x18/0x20 [ 10.721263] kmalloc_oob_right+0x68a/0x7f0 [ 10.721284] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.721305] ? __schedule+0x10cc/0x2b60 [ 10.721326] ? __pfx_read_tsc+0x10/0x10 [ 10.721345] ? ktime_get_ts64+0x86/0x230 [ 10.721367] kunit_try_run_case+0x1a5/0x480 [ 10.721400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.721420] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.721441] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.721462] ? __kthread_parkme+0x82/0x180 [ 10.721482] ? preempt_count_sub+0x50/0x80 [ 10.721504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.721525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.721546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.721568] kthread+0x337/0x6f0 [ 10.721586] ? trace_preempt_on+0x20/0xc0 [ 10.721608] ? __pfx_kthread+0x10/0x10 [ 10.721627] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.721646] ? calculate_sigpending+0x7b/0xa0 [ 10.721669] ? __pfx_kthread+0x10/0x10 [ 10.721689] ret_from_fork+0x116/0x1d0 [ 10.721706] ? __pfx_kthread+0x10/0x10 [ 10.721725] ret_from_fork_asm+0x1a/0x30 [ 10.721753] </TASK> [ 10.721763] [ 10.731245] Allocated by task 155: [ 10.731404] kasan_save_stack+0x45/0x70 [ 10.732088] kasan_save_track+0x18/0x40 [ 10.732439] kasan_save_alloc_info+0x3b/0x50 [ 10.732914] __kasan_kmalloc+0xb7/0xc0 [ 10.733427] __kmalloc_cache_noprof+0x189/0x420 [ 10.734023] kmalloc_oob_right+0xa9/0x7f0 [ 10.734375] kunit_try_run_case+0x1a5/0x480 [ 10.734869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.735445] kthread+0x337/0x6f0 [ 10.735855] ret_from_fork+0x116/0x1d0 [ 10.736242] ret_from_fork_asm+0x1a/0x30 [ 10.736680] [ 10.736907] The buggy address belongs to the object at ffff888102c7bc00 [ 10.736907] which belongs to the cache kmalloc-128 of size 128 [ 10.738142] The buggy address is located 13 bytes to the right of [ 10.738142] allocated 115-byte region [ffff888102c7bc00, ffff888102c7bc73) [ 10.739404] [ 10.739597] The buggy address belongs to the physical page: [ 10.740134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c7b [ 10.740915] flags: 0x200000000000000(node=0|zone=2) [ 10.741559] page_type: f5(slab) [ 10.741746] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.742371] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.742625] page dumped because: kasan: bad access detected [ 10.743004] [ 10.743124] Memory state around the buggy address: [ 10.743442] ffff888102c7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.744193] ffff888102c7bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.744729] >ffff888102c7bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.745414] ^ [ 10.745538] ffff888102c7bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.746372] ffff888102c7bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.746972] ================================================================== [ 10.702162] ================================================================== [ 10.702469] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.702918] Write of size 1 at addr ffff888102c7bc78 by task kunit_try_catch/155 [ 10.703232] [ 10.703329] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.703370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.703395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.703414] Call Trace: [ 10.703426] <TASK> [ 10.703441] dump_stack_lvl+0x73/0xb0 [ 10.703469] print_report+0xd1/0x650 [ 10.703491] ? __virt_addr_valid+0x1db/0x2d0 [ 10.703512] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.703533] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.703554] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.703626] kasan_report+0x141/0x180 [ 10.703650] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.703675] __asan_report_store1_noabort+0x1b/0x30 [ 10.703699] kmalloc_oob_right+0x6bd/0x7f0 [ 10.703722] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.703743] ? __schedule+0x10cc/0x2b60 [ 10.703764] ? __pfx_read_tsc+0x10/0x10 [ 10.703791] ? ktime_get_ts64+0x86/0x230 [ 10.703815] kunit_try_run_case+0x1a5/0x480 [ 10.703838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.703858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.703880] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.703901] ? __kthread_parkme+0x82/0x180 [ 10.703920] ? preempt_count_sub+0x50/0x80 [ 10.703943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.703965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.703986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.704007] kthread+0x337/0x6f0 [ 10.704025] ? trace_preempt_on+0x20/0xc0 [ 10.704048] ? __pfx_kthread+0x10/0x10 [ 10.704068] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.704087] ? calculate_sigpending+0x7b/0xa0 [ 10.704109] ? __pfx_kthread+0x10/0x10 [ 10.704129] ret_from_fork+0x116/0x1d0 [ 10.704146] ? __pfx_kthread+0x10/0x10 [ 10.704165] ret_from_fork_asm+0x1a/0x30 [ 10.704194] </TASK> [ 10.704204] [ 10.711277] Allocated by task 155: [ 10.711415] kasan_save_stack+0x45/0x70 [ 10.711557] kasan_save_track+0x18/0x40 [ 10.711717] kasan_save_alloc_info+0x3b/0x50 [ 10.712363] __kasan_kmalloc+0xb7/0xc0 [ 10.712621] __kmalloc_cache_noprof+0x189/0x420 [ 10.712925] kmalloc_oob_right+0xa9/0x7f0 [ 10.713129] kunit_try_run_case+0x1a5/0x480 [ 10.713336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.713565] kthread+0x337/0x6f0 [ 10.713766] ret_from_fork+0x116/0x1d0 [ 10.713927] ret_from_fork_asm+0x1a/0x30 [ 10.714080] [ 10.714179] The buggy address belongs to the object at ffff888102c7bc00 [ 10.714179] which belongs to the cache kmalloc-128 of size 128 [ 10.714751] The buggy address is located 5 bytes to the right of [ 10.714751] allocated 115-byte region [ffff888102c7bc00, ffff888102c7bc73) [ 10.715129] [ 10.715201] The buggy address belongs to the physical page: [ 10.715372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c7b [ 10.715740] flags: 0x200000000000000(node=0|zone=2) [ 10.715972] page_type: f5(slab) [ 10.716157] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.716503] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.716906] page dumped because: kasan: bad access detected [ 10.717080] [ 10.717148] Memory state around the buggy address: [ 10.717317] ffff888102c7bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.717889] ffff888102c7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.718222] >ffff888102c7bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.718550] ^ [ 10.718909] ffff888102c7bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.719125] ffff888102c7bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.719336] ==================================================================