Date
July 10, 2025, 11:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.613779] ================================================================== [ 15.614061] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 15.614189] Read of size 1 at addr fff00000c63f3180 by task kunit_try_catch/136 [ 15.614320] [ 15.614367] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 15.614479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.614514] Hardware name: linux,dummy-virt (DT) [ 15.614544] Call trace: [ 15.614565] show_stack+0x20/0x38 (C) [ 15.614636] dump_stack_lvl+0x8c/0xd0 [ 15.614684] print_report+0x118/0x608 [ 15.614851] kasan_report+0xdc/0x128 [ 15.614925] __asan_report_load1_noabort+0x20/0x30 [ 15.615909] kmalloc_oob_right+0x5d0/0x660 [ 15.617113] kunit_try_run_case+0x170/0x3f0 [ 15.617212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.617269] kthread+0x328/0x630 [ 15.617311] ret_from_fork+0x10/0x20 [ 15.617359] [ 15.617377] Allocated by task 136: [ 15.617903] kasan_save_stack+0x3c/0x68 [ 15.619324] kasan_save_track+0x20/0x40 [ 15.619492] kasan_save_alloc_info+0x40/0x58 [ 15.620109] __kasan_kmalloc+0xd4/0xd8 [ 15.620689] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.620755] kmalloc_oob_right+0xb0/0x660 [ 15.620810] kunit_try_run_case+0x170/0x3f0 [ 15.620901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.620959] kthread+0x328/0x630 [ 15.621022] ret_from_fork+0x10/0x20 [ 15.621761] [ 15.621836] The buggy address belongs to the object at fff00000c63f3100 [ 15.621836] which belongs to the cache kmalloc-128 of size 128 [ 15.622208] The buggy address is located 13 bytes to the right of [ 15.622208] allocated 115-byte region [fff00000c63f3100, fff00000c63f3173) [ 15.622511] [ 15.622731] The buggy address belongs to the physical page: [ 15.623141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f3 [ 15.623198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.623247] page_type: f5(slab) [ 15.623295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.623344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.623382] page dumped because: kasan: bad access detected [ 15.623584] [ 15.623603] Memory state around the buggy address: [ 15.623635] fff00000c63f3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.623735] fff00000c63f3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.623846] >fff00000c63f3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.623938] ^ [ 15.623966] fff00000c63f3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.624013] fff00000c63f3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.624052] ================================================================== [ 15.593700] ================================================================== [ 15.594342] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 15.595622] Write of size 1 at addr fff00000c63f3173 by task kunit_try_catch/136 [ 15.595854] [ 15.597473] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT [ 15.597676] Tainted: [N]=TEST [ 15.597732] Hardware name: linux,dummy-virt (DT) [ 15.598597] Call trace: [ 15.598973] show_stack+0x20/0x38 (C) [ 15.599136] dump_stack_lvl+0x8c/0xd0 [ 15.599231] print_report+0x118/0x608 [ 15.599330] kasan_report+0xdc/0x128 [ 15.599413] __asan_report_store1_noabort+0x20/0x30 [ 15.599482] kmalloc_oob_right+0x5a4/0x660 [ 15.599851] kunit_try_run_case+0x170/0x3f0 [ 15.599973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.600098] kthread+0x328/0x630 [ 15.600167] ret_from_fork+0x10/0x20 [ 15.600674] [ 15.600765] Allocated by task 136: [ 15.600976] kasan_save_stack+0x3c/0x68 [ 15.601393] kasan_save_track+0x20/0x40 [ 15.601505] kasan_save_alloc_info+0x40/0x58 [ 15.601554] __kasan_kmalloc+0xd4/0xd8 [ 15.601629] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.601950] kmalloc_oob_right+0xb0/0x660 [ 15.602124] kunit_try_run_case+0x170/0x3f0 [ 15.602262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.602405] kthread+0x328/0x630 [ 15.602441] ret_from_fork+0x10/0x20 [ 15.602539] [ 15.602605] The buggy address belongs to the object at fff00000c63f3100 [ 15.602605] which belongs to the cache kmalloc-128 of size 128 [ 15.602707] The buggy address is located 0 bytes to the right of [ 15.602707] allocated 115-byte region [fff00000c63f3100, fff00000c63f3173) [ 15.603018] [ 15.603208] The buggy address belongs to the physical page: [ 15.603868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f3 [ 15.604857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.605374] page_type: f5(slab) [ 15.605787] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.605883] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.605996] page dumped because: kasan: bad access detected [ 15.606325] [ 15.606410] Memory state around the buggy address: [ 15.606774] fff00000c63f3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.607044] fff00000c63f3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.607156] >fff00000c63f3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.607256] ^ [ 15.607426] fff00000c63f3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.607693] fff00000c63f3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.607983] ================================================================== [ 15.609709] ================================================================== [ 15.609828] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 15.609999] Write of size 1 at addr fff00000c63f3178 by task kunit_try_catch/136 [ 15.610048] [ 15.610130] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 15.610234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.610259] Hardware name: linux,dummy-virt (DT) [ 15.610290] Call trace: [ 15.610312] show_stack+0x20/0x38 (C) [ 15.610361] dump_stack_lvl+0x8c/0xd0 [ 15.610409] print_report+0x118/0x608 [ 15.610457] kasan_report+0xdc/0x128 [ 15.610504] __asan_report_store1_noabort+0x20/0x30 [ 15.610713] kmalloc_oob_right+0x538/0x660 [ 15.610770] kunit_try_run_case+0x170/0x3f0 [ 15.610842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.610940] kthread+0x328/0x630 [ 15.611001] ret_from_fork+0x10/0x20 [ 15.611099] [ 15.611125] Allocated by task 136: [ 15.611153] kasan_save_stack+0x3c/0x68 [ 15.611222] kasan_save_track+0x20/0x40 [ 15.611269] kasan_save_alloc_info+0x40/0x58 [ 15.611308] __kasan_kmalloc+0xd4/0xd8 [ 15.611344] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.611556] kmalloc_oob_right+0xb0/0x660 [ 15.611635] kunit_try_run_case+0x170/0x3f0 [ 15.611709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.611793] kthread+0x328/0x630 [ 15.611866] ret_from_fork+0x10/0x20 [ 15.611903] [ 15.611922] The buggy address belongs to the object at fff00000c63f3100 [ 15.611922] which belongs to the cache kmalloc-128 of size 128 [ 15.612151] The buggy address is located 5 bytes to the right of [ 15.612151] allocated 115-byte region [fff00000c63f3100, fff00000c63f3173) [ 15.612249] [ 15.612286] The buggy address belongs to the physical page: [ 15.612356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f3 [ 15.612455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.612563] page_type: f5(slab) [ 15.612603] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.612651] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.612700] page dumped because: kasan: bad access detected [ 15.612849] [ 15.612989] Memory state around the buggy address: [ 15.613043] fff00000c63f3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.613103] fff00000c63f3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.613150] >fff00000c63f3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.613186] ^ [ 15.613225] fff00000c63f3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.613275] fff00000c63f3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.613321] ==================================================================
[ 12.068819] ================================================================== [ 12.069400] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 12.070123] Write of size 1 at addr ffff8881027a3373 by task kunit_try_catch/153 [ 12.070531] [ 12.071532] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.071870] Tainted: [N]=TEST [ 12.071900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.072108] Call Trace: [ 12.072172] <TASK> [ 12.072317] dump_stack_lvl+0x73/0xb0 [ 12.072442] print_report+0xd1/0x650 [ 12.072474] ? __virt_addr_valid+0x1db/0x2d0 [ 12.072500] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.072521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.072544] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.072566] kasan_report+0x141/0x180 [ 12.072588] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.072615] __asan_report_store1_noabort+0x1b/0x30 [ 12.072641] kmalloc_oob_right+0x6f0/0x7f0 [ 12.072663] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.072686] ? __schedule+0x10cc/0x2b60 [ 12.072709] ? __pfx_read_tsc+0x10/0x10 [ 12.072731] ? ktime_get_ts64+0x86/0x230 [ 12.072757] kunit_try_run_case+0x1a5/0x480 [ 12.072784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.072806] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.072831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.072854] ? __kthread_parkme+0x82/0x180 [ 12.072876] ? preempt_count_sub+0x50/0x80 [ 12.072901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.072925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.072949] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.072974] kthread+0x337/0x6f0 [ 12.072992] ? trace_preempt_on+0x20/0xc0 [ 12.073017] ? __pfx_kthread+0x10/0x10 [ 12.073037] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.073058] ? calculate_sigpending+0x7b/0xa0 [ 12.073083] ? __pfx_kthread+0x10/0x10 [ 12.073104] ret_from_fork+0x116/0x1d0 [ 12.073122] ? __pfx_kthread+0x10/0x10 [ 12.073143] ret_from_fork_asm+0x1a/0x30 [ 12.073196] </TASK> [ 12.073258] [ 12.080375] Allocated by task 153: [ 12.080628] kasan_save_stack+0x45/0x70 [ 12.081211] kasan_save_track+0x18/0x40 [ 12.081521] kasan_save_alloc_info+0x3b/0x50 [ 12.081751] __kasan_kmalloc+0xb7/0xc0 [ 12.081920] __kmalloc_cache_noprof+0x189/0x420 [ 12.082121] kmalloc_oob_right+0xa9/0x7f0 [ 12.082308] kunit_try_run_case+0x1a5/0x480 [ 12.082627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.082885] kthread+0x337/0x6f0 [ 12.083013] ret_from_fork+0x116/0x1d0 [ 12.083146] ret_from_fork_asm+0x1a/0x30 [ 12.083398] [ 12.083640] The buggy address belongs to the object at ffff8881027a3300 [ 12.083640] which belongs to the cache kmalloc-128 of size 128 [ 12.084207] The buggy address is located 0 bytes to the right of [ 12.084207] allocated 115-byte region [ffff8881027a3300, ffff8881027a3373) [ 12.085088] [ 12.085250] The buggy address belongs to the physical page: [ 12.085611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a3 [ 12.086200] flags: 0x200000000000000(node=0|zone=2) [ 12.086926] page_type: f5(slab) [ 12.087483] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.087855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.088246] page dumped because: kasan: bad access detected [ 12.088660] [ 12.088772] Memory state around the buggy address: [ 12.089217] ffff8881027a3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.089636] ffff8881027a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.089968] >ffff8881027a3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.090208] ^ [ 12.090726] ffff8881027a3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.091066] ffff8881027a3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.091495] ================================================================== [ 12.092729] ================================================================== [ 12.093038] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.093317] Write of size 1 at addr ffff8881027a3378 by task kunit_try_catch/153 [ 12.093688] [ 12.093999] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.094044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.094055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.094077] Call Trace: [ 12.094088] <TASK> [ 12.094102] dump_stack_lvl+0x73/0xb0 [ 12.094131] print_report+0xd1/0x650 [ 12.094153] ? __virt_addr_valid+0x1db/0x2d0 [ 12.094174] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.094195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.094218] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.094239] kasan_report+0x141/0x180 [ 12.094261] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.094288] __asan_report_store1_noabort+0x1b/0x30 [ 12.094315] kmalloc_oob_right+0x6bd/0x7f0 [ 12.094337] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.094361] ? __schedule+0x10cc/0x2b60 [ 12.094398] ? __pfx_read_tsc+0x10/0x10 [ 12.094419] ? ktime_get_ts64+0x86/0x230 [ 12.094460] kunit_try_run_case+0x1a5/0x480 [ 12.094483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.094506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.094529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.094553] ? __kthread_parkme+0x82/0x180 [ 12.094572] ? preempt_count_sub+0x50/0x80 [ 12.094595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.094619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.094644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.094669] kthread+0x337/0x6f0 [ 12.094687] ? trace_preempt_on+0x20/0xc0 [ 12.094710] ? __pfx_kthread+0x10/0x10 [ 12.094730] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.094751] ? calculate_sigpending+0x7b/0xa0 [ 12.094775] ? __pfx_kthread+0x10/0x10 [ 12.094796] ret_from_fork+0x116/0x1d0 [ 12.094814] ? __pfx_kthread+0x10/0x10 [ 12.094834] ret_from_fork_asm+0x1a/0x30 [ 12.094864] </TASK> [ 12.094873] [ 12.102232] Allocated by task 153: [ 12.102513] kasan_save_stack+0x45/0x70 [ 12.102670] kasan_save_track+0x18/0x40 [ 12.102807] kasan_save_alloc_info+0x3b/0x50 [ 12.102959] __kasan_kmalloc+0xb7/0xc0 [ 12.103111] __kmalloc_cache_noprof+0x189/0x420 [ 12.103331] kmalloc_oob_right+0xa9/0x7f0 [ 12.103540] kunit_try_run_case+0x1a5/0x480 [ 12.103746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.104025] kthread+0x337/0x6f0 [ 12.104209] ret_from_fork+0x116/0x1d0 [ 12.104405] ret_from_fork_asm+0x1a/0x30 [ 12.104623] [ 12.104696] The buggy address belongs to the object at ffff8881027a3300 [ 12.104696] which belongs to the cache kmalloc-128 of size 128 [ 12.105204] The buggy address is located 5 bytes to the right of [ 12.105204] allocated 115-byte region [ffff8881027a3300, ffff8881027a3373) [ 12.105872] [ 12.105973] The buggy address belongs to the physical page: [ 12.106196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a3 [ 12.106618] flags: 0x200000000000000(node=0|zone=2) [ 12.106809] page_type: f5(slab) [ 12.106929] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.107157] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.107611] page dumped because: kasan: bad access detected [ 12.107931] [ 12.108072] Memory state around the buggy address: [ 12.108295] ffff8881027a3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.108682] ffff8881027a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.108962] >ffff8881027a3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.109218] ^ [ 12.109440] ffff8881027a3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.109653] ffff8881027a3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.110024] ================================================================== [ 12.110838] ================================================================== [ 12.111180] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.111507] Read of size 1 at addr ffff8881027a3380 by task kunit_try_catch/153 [ 12.111812] [ 12.111893] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.111932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.111944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.111964] Call Trace: [ 12.112010] <TASK> [ 12.112024] dump_stack_lvl+0x73/0xb0 [ 12.112051] print_report+0xd1/0x650 [ 12.112073] ? __virt_addr_valid+0x1db/0x2d0 [ 12.112094] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.112115] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.112138] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.112160] kasan_report+0x141/0x180 [ 12.112188] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.112214] __asan_report_load1_noabort+0x18/0x20 [ 12.112240] kmalloc_oob_right+0x68a/0x7f0 [ 12.112262] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.112285] ? __schedule+0x10cc/0x2b60 [ 12.112306] ? __pfx_read_tsc+0x10/0x10 [ 12.112327] ? ktime_get_ts64+0x86/0x230 [ 12.112350] kunit_try_run_case+0x1a5/0x480 [ 12.112383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.112406] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.112428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.112517] ? __kthread_parkme+0x82/0x180 [ 12.112541] ? preempt_count_sub+0x50/0x80 [ 12.112565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.112589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.112614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.112639] kthread+0x337/0x6f0 [ 12.112657] ? trace_preempt_on+0x20/0xc0 [ 12.112680] ? __pfx_kthread+0x10/0x10 [ 12.112700] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.112721] ? calculate_sigpending+0x7b/0xa0 [ 12.112745] ? __pfx_kthread+0x10/0x10 [ 12.112766] ret_from_fork+0x116/0x1d0 [ 12.112784] ? __pfx_kthread+0x10/0x10 [ 12.112804] ret_from_fork_asm+0x1a/0x30 [ 12.112835] </TASK> [ 12.112845] [ 12.120755] Allocated by task 153: [ 12.120915] kasan_save_stack+0x45/0x70 [ 12.121100] kasan_save_track+0x18/0x40 [ 12.121261] kasan_save_alloc_info+0x3b/0x50 [ 12.121425] __kasan_kmalloc+0xb7/0xc0 [ 12.121682] __kmalloc_cache_noprof+0x189/0x420 [ 12.121913] kmalloc_oob_right+0xa9/0x7f0 [ 12.122114] kunit_try_run_case+0x1a5/0x480 [ 12.122332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.122612] kthread+0x337/0x6f0 [ 12.122954] ret_from_fork+0x116/0x1d0 [ 12.123124] ret_from_fork_asm+0x1a/0x30 [ 12.123266] [ 12.123421] The buggy address belongs to the object at ffff8881027a3300 [ 12.123421] which belongs to the cache kmalloc-128 of size 128 [ 12.123966] The buggy address is located 13 bytes to the right of [ 12.123966] allocated 115-byte region [ffff8881027a3300, ffff8881027a3373) [ 12.124589] [ 12.124703] The buggy address belongs to the physical page: [ 12.124909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a3 [ 12.125230] flags: 0x200000000000000(node=0|zone=2) [ 12.125561] page_type: f5(slab) [ 12.125721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.126035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.126292] page dumped because: kasan: bad access detected [ 12.126474] [ 12.126543] Memory state around the buggy address: [ 12.126696] ffff8881027a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.126924] ffff8881027a3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.127240] >ffff8881027a3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.128023] ^ [ 12.128154] ffff8881027a3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.128401] ffff8881027a3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.129095] ==================================================================