Date
July 11, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.292142] ================================================================== [ 16.292183] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.292268] Write of size 1 at addr fff00000c6f3f178 by task kunit_try_catch/137 [ 16.292318] [ 16.292350] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.292581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.292629] Hardware name: linux,dummy-virt (DT) [ 16.292677] Call trace: [ 16.292712] show_stack+0x20/0x38 (C) [ 16.292787] dump_stack_lvl+0x8c/0xd0 [ 16.292835] print_report+0x118/0x608 [ 16.293086] kasan_report+0xdc/0x128 [ 16.293146] __asan_report_store1_noabort+0x20/0x30 [ 16.293205] kmalloc_oob_right+0x538/0x660 [ 16.293308] kunit_try_run_case+0x170/0x3f0 [ 16.293374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.293426] kthread+0x328/0x630 [ 16.293468] ret_from_fork+0x10/0x20 [ 16.293674] [ 16.293701] Allocated by task 137: [ 16.293761] kasan_save_stack+0x3c/0x68 [ 16.293870] kasan_save_track+0x20/0x40 [ 16.293919] kasan_save_alloc_info+0x40/0x58 [ 16.293976] __kasan_kmalloc+0xd4/0xd8 [ 16.294012] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.294108] kmalloc_oob_right+0xb0/0x660 [ 16.294153] kunit_try_run_case+0x170/0x3f0 [ 16.294190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.294252] kthread+0x328/0x630 [ 16.294284] ret_from_fork+0x10/0x20 [ 16.294411] [ 16.294604] The buggy address belongs to the object at fff00000c6f3f100 [ 16.294604] which belongs to the cache kmalloc-128 of size 128 [ 16.294697] The buggy address is located 5 bytes to the right of [ 16.294697] allocated 115-byte region [fff00000c6f3f100, fff00000c6f3f173) [ 16.294930] [ 16.294951] The buggy address belongs to the physical page: [ 16.294981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f [ 16.295050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.295097] page_type: f5(slab) [ 16.295135] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.295183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.295453] page dumped because: kasan: bad access detected [ 16.295490] [ 16.295507] Memory state around the buggy address: [ 16.295597] fff00000c6f3f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.295663] fff00000c6f3f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295712] >fff00000c6f3f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.295747] ^ [ 16.295785] fff00000c6f3f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295826] fff00000c6f3f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295882] ================================================================== [ 16.296612] ================================================================== [ 16.296734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.296788] Read of size 1 at addr fff00000c6f3f180 by task kunit_try_catch/137 [ 16.296836] [ 16.296916] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.297016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.297056] Hardware name: linux,dummy-virt (DT) [ 16.297103] Call trace: [ 16.297142] show_stack+0x20/0x38 (C) [ 16.297189] dump_stack_lvl+0x8c/0xd0 [ 16.297357] print_report+0x118/0x608 [ 16.297536] kasan_report+0xdc/0x128 [ 16.297630] __asan_report_load1_noabort+0x20/0x30 [ 16.297682] kmalloc_oob_right+0x5d0/0x660 [ 16.297727] kunit_try_run_case+0x170/0x3f0 [ 16.297773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.297909] kthread+0x328/0x630 [ 16.297977] ret_from_fork+0x10/0x20 [ 16.298115] [ 16.298167] Allocated by task 137: [ 16.298225] kasan_save_stack+0x3c/0x68 [ 16.298294] kasan_save_track+0x20/0x40 [ 16.298359] kasan_save_alloc_info+0x40/0x58 [ 16.298399] __kasan_kmalloc+0xd4/0xd8 [ 16.298665] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.298771] kmalloc_oob_right+0xb0/0x660 [ 16.298814] kunit_try_run_case+0x170/0x3f0 [ 16.298878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.298920] kthread+0x328/0x630 [ 16.298951] ret_from_fork+0x10/0x20 [ 16.298985] [ 16.299004] The buggy address belongs to the object at fff00000c6f3f100 [ 16.299004] which belongs to the cache kmalloc-128 of size 128 [ 16.299059] The buggy address is located 13 bytes to the right of [ 16.299059] allocated 115-byte region [fff00000c6f3f100, fff00000c6f3f173) [ 16.299121] [ 16.299139] The buggy address belongs to the physical page: [ 16.299167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f [ 16.299216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.299261] page_type: f5(slab) [ 16.299297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.299574] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.299686] page dumped because: kasan: bad access detected [ 16.299800] [ 16.299849] Memory state around the buggy address: [ 16.299894] fff00000c6f3f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.299963] fff00000c6f3f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.300005] >fff00000c6f3f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300041] ^ [ 16.300068] fff00000c6f3f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300121] fff00000c6f3f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300171] ================================================================== [ 16.275951] ================================================================== [ 16.276434] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.277526] Write of size 1 at addr fff00000c6f3f173 by task kunit_try_catch/137 [ 16.277689] [ 16.278490] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT [ 16.278634] Tainted: [N]=TEST [ 16.278666] Hardware name: linux,dummy-virt (DT) [ 16.279276] Call trace: [ 16.280043] show_stack+0x20/0x38 (C) [ 16.280415] dump_stack_lvl+0x8c/0xd0 [ 16.280767] print_report+0x118/0x608 [ 16.280831] kasan_report+0xdc/0x128 [ 16.280888] __asan_report_store1_noabort+0x20/0x30 [ 16.280939] kmalloc_oob_right+0x5a4/0x660 [ 16.280985] kunit_try_run_case+0x170/0x3f0 [ 16.281036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.281089] kthread+0x328/0x630 [ 16.281170] ret_from_fork+0x10/0x20 [ 16.281585] [ 16.281641] Allocated by task 137: [ 16.282079] kasan_save_stack+0x3c/0x68 [ 16.282260] kasan_save_track+0x20/0x40 [ 16.282341] kasan_save_alloc_info+0x40/0x58 [ 16.282381] __kasan_kmalloc+0xd4/0xd8 [ 16.282632] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.282747] kmalloc_oob_right+0xb0/0x660 [ 16.282824] kunit_try_run_case+0x170/0x3f0 [ 16.282874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.282916] kthread+0x328/0x630 [ 16.282964] ret_from_fork+0x10/0x20 [ 16.283427] [ 16.283662] The buggy address belongs to the object at fff00000c6f3f100 [ 16.283662] which belongs to the cache kmalloc-128 of size 128 [ 16.284185] The buggy address is located 0 bytes to the right of [ 16.284185] allocated 115-byte region [fff00000c6f3f100, fff00000c6f3f173) [ 16.284293] [ 16.284773] The buggy address belongs to the physical page: [ 16.285499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f [ 16.286563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.287396] page_type: f5(slab) [ 16.288283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.288503] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.288935] page dumped because: kasan: bad access detected [ 16.289032] [ 16.289102] Memory state around the buggy address: [ 16.289824] fff00000c6f3f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.290327] fff00000c6f3f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.290449] >fff00000c6f3f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.290643] ^ [ 16.290907] fff00000c6f3f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.290962] fff00000c6f3f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.291034] ==================================================================
[ 11.676520] ================================================================== [ 11.677387] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.678800] Write of size 1 at addr ffff8881029f2973 by task kunit_try_catch/153 [ 11.679342] [ 11.680504] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.680843] Tainted: [N]=TEST [ 11.680873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.681174] Call Trace: [ 11.681245] <TASK> [ 11.681386] dump_stack_lvl+0x73/0xb0 [ 11.681476] print_report+0xd1/0x650 [ 11.681504] ? __virt_addr_valid+0x1db/0x2d0 [ 11.681530] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.681551] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.681574] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.681596] kasan_report+0x141/0x180 [ 11.681618] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.681646] __asan_report_store1_noabort+0x1b/0x30 [ 11.681671] kmalloc_oob_right+0x6f0/0x7f0 [ 11.681695] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.681717] ? __schedule+0x10cc/0x2b60 [ 11.681741] ? __pfx_read_tsc+0x10/0x10 [ 11.681764] ? ktime_get_ts64+0x86/0x230 [ 11.681793] kunit_try_run_case+0x1a5/0x480 [ 11.681819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.681842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.681867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.681890] ? __kthread_parkme+0x82/0x180 [ 11.681912] ? preempt_count_sub+0x50/0x80 [ 11.681951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.681976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.682000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.682025] kthread+0x337/0x6f0 [ 11.682044] ? trace_preempt_on+0x20/0xc0 [ 11.682068] ? __pfx_kthread+0x10/0x10 [ 11.682089] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.682111] ? calculate_sigpending+0x7b/0xa0 [ 11.682135] ? __pfx_kthread+0x10/0x10 [ 11.682157] ret_from_fork+0x116/0x1d0 [ 11.682175] ? __pfx_kthread+0x10/0x10 [ 11.682196] ret_from_fork_asm+0x1a/0x30 [ 11.682253] </TASK> [ 11.682316] [ 11.693851] Allocated by task 153: [ 11.694374] kasan_save_stack+0x45/0x70 [ 11.694602] kasan_save_track+0x18/0x40 [ 11.694810] kasan_save_alloc_info+0x3b/0x50 [ 11.695229] __kasan_kmalloc+0xb7/0xc0 [ 11.695436] __kmalloc_cache_noprof+0x189/0x420 [ 11.695882] kmalloc_oob_right+0xa9/0x7f0 [ 11.696316] kunit_try_run_case+0x1a5/0x480 [ 11.696618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.697096] kthread+0x337/0x6f0 [ 11.697351] ret_from_fork+0x116/0x1d0 [ 11.697587] ret_from_fork_asm+0x1a/0x30 [ 11.697977] [ 11.698373] The buggy address belongs to the object at ffff8881029f2900 [ 11.698373] which belongs to the cache kmalloc-128 of size 128 [ 11.699258] The buggy address is located 0 bytes to the right of [ 11.699258] allocated 115-byte region [ffff8881029f2900, ffff8881029f2973) [ 11.700098] [ 11.700356] The buggy address belongs to the physical page: [ 11.700763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2 [ 11.701331] flags: 0x200000000000000(node=0|zone=2) [ 11.701957] page_type: f5(slab) [ 11.702435] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.702762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.703244] page dumped because: kasan: bad access detected [ 11.703486] [ 11.703567] Memory state around the buggy address: [ 11.704022] ffff8881029f2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.704464] ffff8881029f2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.704792] >ffff8881029f2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.705216] ^ [ 11.705539] ffff8881029f2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.705801] ffff8881029f2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.706347] ================================================================== [ 11.707397] ================================================================== [ 11.707625] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.707842] Write of size 1 at addr ffff8881029f2978 by task kunit_try_catch/153 [ 11.708078] [ 11.708159] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.708198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.708209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.708228] Call Trace: [ 11.708243] <TASK> [ 11.708257] dump_stack_lvl+0x73/0xb0 [ 11.708283] print_report+0xd1/0x650 [ 11.708305] ? __virt_addr_valid+0x1db/0x2d0 [ 11.708326] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.708346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.708368] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.708389] kasan_report+0x141/0x180 [ 11.708410] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.708436] __asan_report_store1_noabort+0x1b/0x30 [ 11.708460] kmalloc_oob_right+0x6bd/0x7f0 [ 11.708481] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.708503] ? __schedule+0x10cc/0x2b60 [ 11.708524] ? __pfx_read_tsc+0x10/0x10 [ 11.708544] ? ktime_get_ts64+0x86/0x230 [ 11.708567] kunit_try_run_case+0x1a5/0x480 [ 11.708590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.708611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.708633] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.708656] ? __kthread_parkme+0x82/0x180 [ 11.708675] ? preempt_count_sub+0x50/0x80 [ 11.708697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.708721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.708743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.708766] kthread+0x337/0x6f0 [ 11.708785] ? trace_preempt_on+0x20/0xc0 [ 11.708807] ? __pfx_kthread+0x10/0x10 [ 11.708827] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.708915] ? calculate_sigpending+0x7b/0xa0 [ 11.708952] ? __pfx_kthread+0x10/0x10 [ 11.708974] ret_from_fork+0x116/0x1d0 [ 11.708993] ? __pfx_kthread+0x10/0x10 [ 11.709050] ret_from_fork_asm+0x1a/0x30 [ 11.709082] </TASK> [ 11.709091] [ 11.716678] Allocated by task 153: [ 11.716807] kasan_save_stack+0x45/0x70 [ 11.717067] kasan_save_track+0x18/0x40 [ 11.717274] kasan_save_alloc_info+0x3b/0x50 [ 11.717490] __kasan_kmalloc+0xb7/0xc0 [ 11.717680] __kmalloc_cache_noprof+0x189/0x420 [ 11.717890] kmalloc_oob_right+0xa9/0x7f0 [ 11.718268] kunit_try_run_case+0x1a5/0x480 [ 11.718425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.718610] kthread+0x337/0x6f0 [ 11.718730] ret_from_fork+0x116/0x1d0 [ 11.718860] ret_from_fork_asm+0x1a/0x30 [ 11.719015] [ 11.719108] The buggy address belongs to the object at ffff8881029f2900 [ 11.719108] which belongs to the cache kmalloc-128 of size 128 [ 11.719632] The buggy address is located 5 bytes to the right of [ 11.719632] allocated 115-byte region [ffff8881029f2900, ffff8881029f2973) [ 11.720460] [ 11.720533] The buggy address belongs to the physical page: [ 11.720702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2 [ 11.721503] flags: 0x200000000000000(node=0|zone=2) [ 11.721719] page_type: f5(slab) [ 11.721930] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.722491] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.722755] page dumped because: kasan: bad access detected [ 11.722938] [ 11.723007] Memory state around the buggy address: [ 11.723160] ffff8881029f2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.723476] ffff8881029f2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.723707] >ffff8881029f2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.724037] ^ [ 11.724805] ffff8881029f2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.725351] ffff8881029f2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.725674] ================================================================== [ 11.726338] ================================================================== [ 11.726663] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.726885] Read of size 1 at addr ffff8881029f2980 by task kunit_try_catch/153 [ 11.729012] [ 11.729132] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.729173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.729185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.729204] Call Trace: [ 11.729218] <TASK> [ 11.729234] dump_stack_lvl+0x73/0xb0 [ 11.729265] print_report+0xd1/0x650 [ 11.729286] ? __virt_addr_valid+0x1db/0x2d0 [ 11.729308] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.729328] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.729349] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.729370] kasan_report+0x141/0x180 [ 11.729391] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.729417] __asan_report_load1_noabort+0x18/0x20 [ 11.729440] kmalloc_oob_right+0x68a/0x7f0 [ 11.729462] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.729484] ? __schedule+0x10cc/0x2b60 [ 11.729505] ? __pfx_read_tsc+0x10/0x10 [ 11.729524] ? ktime_get_ts64+0x86/0x230 [ 11.729547] kunit_try_run_case+0x1a5/0x480 [ 11.729571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.729592] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.729614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.729637] ? __kthread_parkme+0x82/0x180 [ 11.729655] ? preempt_count_sub+0x50/0x80 [ 11.729679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.729702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.729725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.729748] kthread+0x337/0x6f0 [ 11.729766] ? trace_preempt_on+0x20/0xc0 [ 11.729788] ? __pfx_kthread+0x10/0x10 [ 11.729808] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.729829] ? calculate_sigpending+0x7b/0xa0 [ 11.729852] ? __pfx_kthread+0x10/0x10 [ 11.729873] ret_from_fork+0x116/0x1d0 [ 11.729891] ? __pfx_kthread+0x10/0x10 [ 11.729910] ret_from_fork_asm+0x1a/0x30 [ 11.729955] </TASK> [ 11.729964] [ 11.741782] Allocated by task 153: [ 11.741972] kasan_save_stack+0x45/0x70 [ 11.742246] kasan_save_track+0x18/0x40 [ 11.742408] kasan_save_alloc_info+0x3b/0x50 [ 11.742563] __kasan_kmalloc+0xb7/0xc0 [ 11.742736] __kmalloc_cache_noprof+0x189/0x420 [ 11.742997] kmalloc_oob_right+0xa9/0x7f0 [ 11.743354] kunit_try_run_case+0x1a5/0x480 [ 11.743555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.743769] kthread+0x337/0x6f0 [ 11.743955] ret_from_fork+0x116/0x1d0 [ 11.744257] ret_from_fork_asm+0x1a/0x30 [ 11.744458] [ 11.744529] The buggy address belongs to the object at ffff8881029f2900 [ 11.744529] which belongs to the cache kmalloc-128 of size 128 [ 11.745117] The buggy address is located 13 bytes to the right of [ 11.745117] allocated 115-byte region [ffff8881029f2900, ffff8881029f2973) [ 11.745631] [ 11.745703] The buggy address belongs to the physical page: [ 11.745888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2 [ 11.746229] flags: 0x200000000000000(node=0|zone=2) [ 11.746463] page_type: f5(slab) [ 11.747436] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.747799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.748156] page dumped because: kasan: bad access detected [ 11.748414] [ 11.748510] Memory state around the buggy address: [ 11.748755] ffff8881029f2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.749101] ffff8881029f2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.749435] >ffff8881029f2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.749664] ^ [ 11.749797] ffff8881029f2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.750197] ffff8881029f2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.750522] ==================================================================