Date
July 18, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.033237] ================================================================== [ 15.033325] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 15.033399] Read of size 1 at addr fff00000c3f17880 by task kunit_try_catch/136 [ 15.033494] [ 15.033582] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.033726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.033817] Hardware name: linux,dummy-virt (DT) [ 15.033917] Call trace: [ 15.034007] show_stack+0x20/0x38 (C) [ 15.034156] dump_stack_lvl+0x8c/0xd0 [ 15.034231] print_report+0x118/0x5d0 [ 15.034277] kasan_report+0xdc/0x128 [ 15.034352] __asan_report_load1_noabort+0x20/0x30 [ 15.034403] kmalloc_oob_right+0x5d0/0x660 [ 15.034447] kunit_try_run_case+0x170/0x3f0 [ 15.034519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.034570] kthread+0x328/0x630 [ 15.034612] ret_from_fork+0x10/0x20 [ 15.034657] [ 15.034675] Allocated by task 136: [ 15.034702] kasan_save_stack+0x3c/0x68 [ 15.034740] kasan_save_track+0x20/0x40 [ 15.034776] kasan_save_alloc_info+0x40/0x58 [ 15.034815] __kasan_kmalloc+0xd4/0xd8 [ 15.034850] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.034887] kmalloc_oob_right+0xb0/0x660 [ 15.034921] kunit_try_run_case+0x170/0x3f0 [ 15.034957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.034998] kthread+0x328/0x630 [ 15.035029] ret_from_fork+0x10/0x20 [ 15.035063] [ 15.035081] The buggy address belongs to the object at fff00000c3f17800 [ 15.035081] which belongs to the cache kmalloc-128 of size 128 [ 15.035135] The buggy address is located 13 bytes to the right of [ 15.035135] allocated 115-byte region [fff00000c3f17800, fff00000c3f17873) [ 15.035197] [ 15.035216] The buggy address belongs to the physical page: [ 15.035245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f17 [ 15.035293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.035347] page_type: f5(slab) [ 15.035383] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.035431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.035540] page dumped because: kasan: bad access detected [ 15.035664] [ 15.035682] Memory state around the buggy address: [ 15.035752] fff00000c3f17780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.035810] fff00000c3f17800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.035960] >fff00000c3f17880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.035997] ^ [ 15.036024] fff00000c3f17900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.036065] fff00000c3f17980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.036102] ================================================================== [ 15.015603] ================================================================== [ 15.015929] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 15.016817] Write of size 1 at addr fff00000c3f17873 by task kunit_try_catch/136 [ 15.017199] [ 15.018392] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 15.018850] Tainted: [N]=TEST [ 15.019018] Hardware name: linux,dummy-virt (DT) [ 15.019494] Call trace: [ 15.019964] show_stack+0x20/0x38 (C) [ 15.020920] dump_stack_lvl+0x8c/0xd0 [ 15.021216] print_report+0x118/0x5d0 [ 15.021282] kasan_report+0xdc/0x128 [ 15.021339] __asan_report_store1_noabort+0x20/0x30 [ 15.021391] kmalloc_oob_right+0x5a4/0x660 [ 15.021437] kunit_try_run_case+0x170/0x3f0 [ 15.021488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.021540] kthread+0x328/0x630 [ 15.021760] ret_from_fork+0x10/0x20 [ 15.022870] [ 15.022914] Allocated by task 136: [ 15.023085] kasan_save_stack+0x3c/0x68 [ 15.023159] kasan_save_track+0x20/0x40 [ 15.023196] kasan_save_alloc_info+0x40/0x58 [ 15.023235] __kasan_kmalloc+0xd4/0xd8 [ 15.023271] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.023310] kmalloc_oob_right+0xb0/0x660 [ 15.023358] kunit_try_run_case+0x170/0x3f0 [ 15.023395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.023436] kthread+0x328/0x630 [ 15.023489] ret_from_fork+0x10/0x20 [ 15.023547] [ 15.023681] The buggy address belongs to the object at fff00000c3f17800 [ 15.023681] which belongs to the cache kmalloc-128 of size 128 [ 15.023885] The buggy address is located 0 bytes to the right of [ 15.023885] allocated 115-byte region [fff00000c3f17800, fff00000c3f17873) [ 15.024005] [ 15.024250] The buggy address belongs to the physical page: [ 15.024798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f17 [ 15.025883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.026574] page_type: f5(slab) [ 15.027232] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.027311] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.027480] page dumped because: kasan: bad access detected [ 15.027525] [ 15.027551] Memory state around the buggy address: [ 15.028131] fff00000c3f17700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.028201] fff00000c3f17780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.028255] >fff00000c3f17800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.028586] ^ [ 15.028985] fff00000c3f17880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.029029] fff00000c3f17900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.029135] ================================================================== [ 15.030370] ================================================================== [ 15.030412] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 15.030485] Write of size 1 at addr fff00000c3f17878 by task kunit_try_catch/136 [ 15.030657] [ 15.030729] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.030832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.030859] Hardware name: linux,dummy-virt (DT) [ 15.030926] Call trace: [ 15.030955] show_stack+0x20/0x38 (C) [ 15.031022] dump_stack_lvl+0x8c/0xd0 [ 15.031077] print_report+0x118/0x5d0 [ 15.031178] kasan_report+0xdc/0x128 [ 15.031242] __asan_report_store1_noabort+0x20/0x30 [ 15.031294] kmalloc_oob_right+0x538/0x660 [ 15.031350] kunit_try_run_case+0x170/0x3f0 [ 15.031399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.031450] kthread+0x328/0x630 [ 15.031515] ret_from_fork+0x10/0x20 [ 15.031562] [ 15.031579] Allocated by task 136: [ 15.031606] kasan_save_stack+0x3c/0x68 [ 15.031663] kasan_save_track+0x20/0x40 [ 15.031700] kasan_save_alloc_info+0x40/0x58 [ 15.031766] __kasan_kmalloc+0xd4/0xd8 [ 15.031842] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.031898] kmalloc_oob_right+0xb0/0x660 [ 15.031934] kunit_try_run_case+0x170/0x3f0 [ 15.032020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.032063] kthread+0x328/0x630 [ 15.032160] ret_from_fork+0x10/0x20 [ 15.032203] [ 15.032221] The buggy address belongs to the object at fff00000c3f17800 [ 15.032221] which belongs to the cache kmalloc-128 of size 128 [ 15.032283] The buggy address is located 5 bytes to the right of [ 15.032283] allocated 115-byte region [fff00000c3f17800, fff00000c3f17873) [ 15.032353] [ 15.032372] The buggy address belongs to the physical page: [ 15.032402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f17 [ 15.032452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.032520] page_type: f5(slab) [ 15.032557] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.032605] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.032644] page dumped because: kasan: bad access detected [ 15.032673] [ 15.032690] Memory state around the buggy address: [ 15.032759] fff00000c3f17700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.032826] fff00000c3f17780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032869] >fff00000c3f17800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.032906] ^ [ 15.032966] fff00000c3f17880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.033044] fff00000c3f17900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.033109] ==================================================================
[ 11.335711] ================================================================== [ 11.336720] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.337768] Write of size 1 at addr ffff8881029c3e73 by task kunit_try_catch/155 [ 11.338575] [ 11.339719] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.340072] Tainted: [N]=TEST [ 11.340106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.340330] Call Trace: [ 11.340399] <TASK> [ 11.340553] dump_stack_lvl+0x73/0xb0 [ 11.340643] print_report+0xd1/0x610 [ 11.340672] ? __virt_addr_valid+0x1db/0x2d0 [ 11.340696] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.340717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.340739] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.340760] kasan_report+0x141/0x180 [ 11.340781] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.340807] __asan_report_store1_noabort+0x1b/0x30 [ 11.340832] kmalloc_oob_right+0x6f0/0x7f0 [ 11.340854] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.340877] ? __schedule+0x10cc/0x2b60 [ 11.340900] ? __pfx_read_tsc+0x10/0x10 [ 11.340933] ? ktime_get_ts64+0x86/0x230 [ 11.340959] kunit_try_run_case+0x1a5/0x480 [ 11.340985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.341006] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.341031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.341054] ? __kthread_parkme+0x82/0x180 [ 11.341075] ? preempt_count_sub+0x50/0x80 [ 11.341099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.341122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.341145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.341168] kthread+0x337/0x6f0 [ 11.341188] ? trace_preempt_on+0x20/0xc0 [ 11.341212] ? __pfx_kthread+0x10/0x10 [ 11.341231] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.341252] ? calculate_sigpending+0x7b/0xa0 [ 11.341287] ? __pfx_kthread+0x10/0x10 [ 11.341308] ret_from_fork+0x116/0x1d0 [ 11.341326] ? __pfx_kthread+0x10/0x10 [ 11.341345] ret_from_fork_asm+0x1a/0x30 [ 11.341399] </TASK> [ 11.341477] [ 11.353219] Allocated by task 155: [ 11.353504] kasan_save_stack+0x45/0x70 [ 11.353907] kasan_save_track+0x18/0x40 [ 11.354335] kasan_save_alloc_info+0x3b/0x50 [ 11.354808] __kasan_kmalloc+0xb7/0xc0 [ 11.355199] __kmalloc_cache_noprof+0x189/0x420 [ 11.355661] kmalloc_oob_right+0xa9/0x7f0 [ 11.356154] kunit_try_run_case+0x1a5/0x480 [ 11.356661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.356862] kthread+0x337/0x6f0 [ 11.357229] ret_from_fork+0x116/0x1d0 [ 11.357666] ret_from_fork_asm+0x1a/0x30 [ 11.358021] [ 11.358323] The buggy address belongs to the object at ffff8881029c3e00 [ 11.358323] which belongs to the cache kmalloc-128 of size 128 [ 11.358950] The buggy address is located 0 bytes to the right of [ 11.358950] allocated 115-byte region [ffff8881029c3e00, ffff8881029c3e73) [ 11.359784] [ 11.359932] The buggy address belongs to the physical page: [ 11.360457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c3 [ 11.361665] flags: 0x200000000000000(node=0|zone=2) [ 11.362519] page_type: f5(slab) [ 11.363201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.363981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.364625] page dumped because: kasan: bad access detected [ 11.365127] [ 11.365401] Memory state around the buggy address: [ 11.366057] ffff8881029c3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.366611] ffff8881029c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.367134] >ffff8881029c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.367821] ^ [ 11.368330] ffff8881029c3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.368823] ffff8881029c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.369284] ================================================================== [ 11.401735] ================================================================== [ 11.402490] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.403133] Read of size 1 at addr ffff8881029c3e80 by task kunit_try_catch/155 [ 11.403529] [ 11.403728] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.403768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.403779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.403817] Call Trace: [ 11.403832] <TASK> [ 11.403845] dump_stack_lvl+0x73/0xb0 [ 11.403871] print_report+0xd1/0x610 [ 11.403903] ? __virt_addr_valid+0x1db/0x2d0 [ 11.403923] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.403944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.403965] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.403986] kasan_report+0x141/0x180 [ 11.404007] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.404033] __asan_report_load1_noabort+0x18/0x20 [ 11.404056] kmalloc_oob_right+0x68a/0x7f0 [ 11.404078] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.404100] ? __schedule+0x10cc/0x2b60 [ 11.404334] ? __pfx_read_tsc+0x10/0x10 [ 11.404353] ? ktime_get_ts64+0x86/0x230 [ 11.404378] kunit_try_run_case+0x1a5/0x480 [ 11.404410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.404432] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.404454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.404487] ? __kthread_parkme+0x82/0x180 [ 11.404506] ? preempt_count_sub+0x50/0x80 [ 11.404529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.404553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.404576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.404599] kthread+0x337/0x6f0 [ 11.404617] ? trace_preempt_on+0x20/0xc0 [ 11.404639] ? __pfx_kthread+0x10/0x10 [ 11.404658] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.404678] ? calculate_sigpending+0x7b/0xa0 [ 11.404701] ? __pfx_kthread+0x10/0x10 [ 11.404722] ret_from_fork+0x116/0x1d0 [ 11.404739] ? __pfx_kthread+0x10/0x10 [ 11.404758] ret_from_fork_asm+0x1a/0x30 [ 11.404788] </TASK> [ 11.404798] [ 11.414236] Allocated by task 155: [ 11.414484] kasan_save_stack+0x45/0x70 [ 11.414688] kasan_save_track+0x18/0x40 [ 11.414876] kasan_save_alloc_info+0x3b/0x50 [ 11.415094] __kasan_kmalloc+0xb7/0xc0 [ 11.415475] __kmalloc_cache_noprof+0x189/0x420 [ 11.415689] kmalloc_oob_right+0xa9/0x7f0 [ 11.415887] kunit_try_run_case+0x1a5/0x480 [ 11.416090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.416416] kthread+0x337/0x6f0 [ 11.416613] ret_from_fork+0x116/0x1d0 [ 11.416810] ret_from_fork_asm+0x1a/0x30 [ 11.416995] [ 11.417087] The buggy address belongs to the object at ffff8881029c3e00 [ 11.417087] which belongs to the cache kmalloc-128 of size 128 [ 11.417565] The buggy address is located 13 bytes to the right of [ 11.417565] allocated 115-byte region [ffff8881029c3e00, ffff8881029c3e73) [ 11.417940] [ 11.418017] The buggy address belongs to the physical page: [ 11.418272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c3 [ 11.418936] flags: 0x200000000000000(node=0|zone=2) [ 11.419169] page_type: f5(slab) [ 11.419413] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.419766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.420156] page dumped because: kasan: bad access detected [ 11.420349] [ 11.420418] Memory state around the buggy address: [ 11.420587] ffff8881029c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.420888] ffff8881029c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.421405] >ffff8881029c3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.421730] ^ [ 11.421874] ffff8881029c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.422345] ffff8881029c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.422848] ================================================================== [ 11.370925] ================================================================== [ 11.371687] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.372168] Write of size 1 at addr ffff8881029c3e78 by task kunit_try_catch/155 [ 11.372769] [ 11.372870] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.372911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.372931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.372951] Call Trace: [ 11.372962] <TASK> [ 11.372976] dump_stack_lvl+0x73/0xb0 [ 11.373002] print_report+0xd1/0x610 [ 11.373022] ? __virt_addr_valid+0x1db/0x2d0 [ 11.373044] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.373064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.373086] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.373107] kasan_report+0x141/0x180 [ 11.373128] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.373154] __asan_report_store1_noabort+0x1b/0x30 [ 11.373178] kmalloc_oob_right+0x6bd/0x7f0 [ 11.373200] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.373221] ? __schedule+0x10cc/0x2b60 [ 11.373242] ? __pfx_read_tsc+0x10/0x10 [ 11.373261] ? ktime_get_ts64+0x86/0x230 [ 11.373294] kunit_try_run_case+0x1a5/0x480 [ 11.373317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.373338] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.373360] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.373383] ? __kthread_parkme+0x82/0x180 [ 11.373401] ? preempt_count_sub+0x50/0x80 [ 11.373424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.373461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.373491] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.373514] kthread+0x337/0x6f0 [ 11.373543] ? trace_preempt_on+0x20/0xc0 [ 11.373566] ? __pfx_kthread+0x10/0x10 [ 11.373596] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.373746] ? calculate_sigpending+0x7b/0xa0 [ 11.373780] ? __pfx_kthread+0x10/0x10 [ 11.373800] ret_from_fork+0x116/0x1d0 [ 11.373817] ? __pfx_kthread+0x10/0x10 [ 11.373836] ret_from_fork_asm+0x1a/0x30 [ 11.373866] </TASK> [ 11.373876] [ 11.387029] Allocated by task 155: [ 11.387190] kasan_save_stack+0x45/0x70 [ 11.387590] kasan_save_track+0x18/0x40 [ 11.388073] kasan_save_alloc_info+0x3b/0x50 [ 11.388490] __kasan_kmalloc+0xb7/0xc0 [ 11.388839] __kmalloc_cache_noprof+0x189/0x420 [ 11.389309] kmalloc_oob_right+0xa9/0x7f0 [ 11.389651] kunit_try_run_case+0x1a5/0x480 [ 11.389824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.390237] kthread+0x337/0x6f0 [ 11.390666] ret_from_fork+0x116/0x1d0 [ 11.390945] ret_from_fork_asm+0x1a/0x30 [ 11.391392] [ 11.391608] The buggy address belongs to the object at ffff8881029c3e00 [ 11.391608] which belongs to the cache kmalloc-128 of size 128 [ 11.392491] The buggy address is located 5 bytes to the right of [ 11.392491] allocated 115-byte region [ffff8881029c3e00, ffff8881029c3e73) [ 11.393039] [ 11.393113] The buggy address belongs to the physical page: [ 11.393294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c3 [ 11.394340] flags: 0x200000000000000(node=0|zone=2) [ 11.394893] page_type: f5(slab) [ 11.395195] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.396041] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.396830] page dumped because: kasan: bad access detected [ 11.397010] [ 11.397081] Memory state around the buggy address: [ 11.397348] ffff8881029c3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.398068] ffff8881029c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.398725] >ffff8881029c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.399538] ^ [ 11.400167] ffff8881029c3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.400452] ffff8881029c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.400856] ==================================================================