Date
July 19, 2025, 11:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 14.926334] ================================================================== [ 14.926495] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 14.926735] Read of size 1 at addr fff00000c5f9d880 by task kunit_try_catch/136 [ 14.926816] [ 14.926857] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 14.927143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.927177] Hardware name: linux,dummy-virt (DT) [ 14.927207] Call trace: [ 14.927228] show_stack+0x20/0x38 (C) [ 14.927277] dump_stack_lvl+0x8c/0xd0 [ 14.927352] print_report+0x118/0x5d0 [ 14.927398] kasan_report+0xdc/0x128 [ 14.927444] __asan_report_load1_noabort+0x20/0x30 [ 14.927567] kmalloc_oob_right+0x5d0/0x660 [ 14.927617] kunit_try_run_case+0x170/0x3f0 [ 14.927675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.927728] kthread+0x328/0x630 [ 14.927769] ret_from_fork+0x10/0x20 [ 14.927815] [ 14.927832] Allocated by task 136: [ 14.927858] kasan_save_stack+0x3c/0x68 [ 14.927982] kasan_save_track+0x20/0x40 [ 14.928026] kasan_save_alloc_info+0x40/0x58 [ 14.928107] __kasan_kmalloc+0xd4/0xd8 [ 14.928143] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.928179] kmalloc_oob_right+0xb0/0x660 [ 14.928214] kunit_try_run_case+0x170/0x3f0 [ 14.928275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.928374] kthread+0x328/0x630 [ 14.928409] ret_from_fork+0x10/0x20 [ 14.928511] [ 14.928559] The buggy address belongs to the object at fff00000c5f9d800 [ 14.928559] which belongs to the cache kmalloc-128 of size 128 [ 14.928615] The buggy address is located 13 bytes to the right of [ 14.928615] allocated 115-byte region [fff00000c5f9d800, fff00000c5f9d873) [ 14.928721] [ 14.928781] The buggy address belongs to the physical page: [ 14.928828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9d [ 14.928903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.928948] page_type: f5(slab) [ 14.928984] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.929052] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.929092] page dumped because: kasan: bad access detected [ 14.929121] [ 14.929138] Memory state around the buggy address: [ 14.929166] fff00000c5f9d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.929207] fff00000c5f9d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.929247] >fff00000c5f9d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.929282] ^ [ 14.929308] fff00000c5f9d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.929438] fff00000c5f9d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.929491] ================================================================== [ 14.916276] ================================================================== [ 14.916635] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 14.917449] Write of size 1 at addr fff00000c5f9d873 by task kunit_try_catch/136 [ 14.917570] [ 14.918331] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 14.918490] Tainted: [N]=TEST [ 14.918524] Hardware name: linux,dummy-virt (DT) [ 14.918756] Call trace: [ 14.918923] show_stack+0x20/0x38 (C) [ 14.919054] dump_stack_lvl+0x8c/0xd0 [ 14.919115] print_report+0x118/0x5d0 [ 14.919163] kasan_report+0xdc/0x128 [ 14.919208] __asan_report_store1_noabort+0x20/0x30 [ 14.919259] kmalloc_oob_right+0x5a4/0x660 [ 14.919305] kunit_try_run_case+0x170/0x3f0 [ 14.919355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.919407] kthread+0x328/0x630 [ 14.919450] ret_from_fork+0x10/0x20 [ 14.919613] [ 14.919651] Allocated by task 136: [ 14.919788] kasan_save_stack+0x3c/0x68 [ 14.919857] kasan_save_track+0x20/0x40 [ 14.919894] kasan_save_alloc_info+0x40/0x58 [ 14.919933] __kasan_kmalloc+0xd4/0xd8 [ 14.919969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.920008] kmalloc_oob_right+0xb0/0x660 [ 14.920044] kunit_try_run_case+0x170/0x3f0 [ 14.920080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.920121] kthread+0x328/0x630 [ 14.920153] ret_from_fork+0x10/0x20 [ 14.920206] [ 14.920265] The buggy address belongs to the object at fff00000c5f9d800 [ 14.920265] which belongs to the cache kmalloc-128 of size 128 [ 14.920356] The buggy address is located 0 bytes to the right of [ 14.920356] allocated 115-byte region [fff00000c5f9d800, fff00000c5f9d873) [ 14.920421] [ 14.920500] The buggy address belongs to the physical page: [ 14.920714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9d [ 14.920977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.921255] page_type: f5(slab) [ 14.921552] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.921616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.921736] page dumped because: kasan: bad access detected [ 14.921778] [ 14.921824] Memory state around the buggy address: [ 14.922044] fff00000c5f9d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.922108] fff00000c5f9d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.922161] >fff00000c5f9d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.922214] ^ [ 14.922293] fff00000c5f9d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.922334] fff00000c5f9d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.922393] ================================================================== [ 14.922960] ================================================================== [ 14.923029] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 14.923076] Write of size 1 at addr fff00000c5f9d878 by task kunit_try_catch/136 [ 14.923174] [ 14.923255] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 14.923334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.923360] Hardware name: linux,dummy-virt (DT) [ 14.923389] Call trace: [ 14.923419] show_stack+0x20/0x38 (C) [ 14.923467] dump_stack_lvl+0x8c/0xd0 [ 14.923511] print_report+0x118/0x5d0 [ 14.923598] kasan_report+0xdc/0x128 [ 14.923652] __asan_report_store1_noabort+0x20/0x30 [ 14.923703] kmalloc_oob_right+0x538/0x660 [ 14.924098] kunit_try_run_case+0x170/0x3f0 [ 14.924176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.924230] kthread+0x328/0x630 [ 14.924271] ret_from_fork+0x10/0x20 [ 14.924317] [ 14.924334] Allocated by task 136: [ 14.924361] kasan_save_stack+0x3c/0x68 [ 14.924429] kasan_save_track+0x20/0x40 [ 14.924468] kasan_save_alloc_info+0x40/0x58 [ 14.924508] __kasan_kmalloc+0xd4/0xd8 [ 14.924553] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.924592] kmalloc_oob_right+0xb0/0x660 [ 14.924627] kunit_try_run_case+0x170/0x3f0 [ 14.924663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.924718] kthread+0x328/0x630 [ 14.924782] ret_from_fork+0x10/0x20 [ 14.924903] [ 14.924979] The buggy address belongs to the object at fff00000c5f9d800 [ 14.924979] which belongs to the cache kmalloc-128 of size 128 [ 14.925106] The buggy address is located 5 bytes to the right of [ 14.925106] allocated 115-byte region [fff00000c5f9d800, fff00000c5f9d873) [ 14.925168] [ 14.925187] The buggy address belongs to the physical page: [ 14.925217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9d [ 14.925276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.925323] page_type: f5(slab) [ 14.925360] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.925416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.925455] page dumped because: kasan: bad access detected [ 14.925484] [ 14.925512] Memory state around the buggy address: [ 14.925552] fff00000c5f9d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.925593] fff00000c5f9d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.925633] >fff00000c5f9d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.925669] ^ [ 14.925706] fff00000c5f9d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.925837] fff00000c5f9d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.925876] ==================================================================
[ 11.366679] ================================================================== [ 11.367551] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.368455] Write of size 1 at addr ffff8881027e4078 by task kunit_try_catch/154 [ 11.369161] [ 11.369360] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.369406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.369418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.369439] Call Trace: [ 11.369459] <TASK> [ 11.369478] dump_stack_lvl+0x73/0xb0 [ 11.369520] print_report+0xd1/0x610 [ 11.369542] ? __virt_addr_valid+0x1db/0x2d0 [ 11.369564] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.369744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.369771] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.369793] kasan_report+0x141/0x180 [ 11.369814] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.369877] __asan_report_store1_noabort+0x1b/0x30 [ 11.369902] kmalloc_oob_right+0x6bd/0x7f0 [ 11.369923] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.369945] ? __schedule+0x10cc/0x2b60 [ 11.369967] ? __pfx_read_tsc+0x10/0x10 [ 11.369988] ? ktime_get_ts64+0x86/0x230 [ 11.370013] kunit_try_run_case+0x1a5/0x480 [ 11.370037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.370059] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.370083] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.370105] ? __kthread_parkme+0x82/0x180 [ 11.370125] ? preempt_count_sub+0x50/0x80 [ 11.370148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.370171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.370198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.370221] kthread+0x337/0x6f0 [ 11.370241] ? trace_preempt_on+0x20/0xc0 [ 11.370264] ? __pfx_kthread+0x10/0x10 [ 11.370283] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.370303] ? calculate_sigpending+0x7b/0xa0 [ 11.370327] ? __pfx_kthread+0x10/0x10 [ 11.370346] ret_from_fork+0x116/0x1d0 [ 11.370364] ? __pfx_kthread+0x10/0x10 [ 11.370383] ret_from_fork_asm+0x1a/0x30 [ 11.370413] </TASK> [ 11.370423] [ 11.381969] Allocated by task 154: [ 11.382356] kasan_save_stack+0x45/0x70 [ 11.382827] kasan_save_track+0x18/0x40 [ 11.383223] kasan_save_alloc_info+0x3b/0x50 [ 11.383644] __kasan_kmalloc+0xb7/0xc0 [ 11.384000] __kmalloc_cache_noprof+0x189/0x420 [ 11.384461] kmalloc_oob_right+0xa9/0x7f0 [ 11.384902] kunit_try_run_case+0x1a5/0x480 [ 11.385363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.385700] kthread+0x337/0x6f0 [ 11.385824] ret_from_fork+0x116/0x1d0 [ 11.385958] ret_from_fork_asm+0x1a/0x30 [ 11.386101] [ 11.386175] The buggy address belongs to the object at ffff8881027e4000 [ 11.386175] which belongs to the cache kmalloc-128 of size 128 [ 11.387306] The buggy address is located 5 bytes to the right of [ 11.387306] allocated 115-byte region [ffff8881027e4000, ffff8881027e4073) [ 11.388432] [ 11.388612] The buggy address belongs to the physical page: [ 11.389090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4 [ 11.389593] flags: 0x200000000000000(node=0|zone=2) [ 11.389889] page_type: f5(slab) [ 11.390011] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.390263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.390485] page dumped because: kasan: bad access detected [ 11.390665] [ 11.390731] Memory state around the buggy address: [ 11.390882] ffff8881027e3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.391090] ffff8881027e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.391386] >ffff8881027e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.391703] ^ [ 11.391996] ffff8881027e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.392208] ffff8881027e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.392519] ================================================================== [ 11.393330] ================================================================== [ 11.393895] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.394282] Read of size 1 at addr ffff8881027e4080 by task kunit_try_catch/154 [ 11.394613] [ 11.394713] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.394756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.394767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.394788] Call Trace: [ 11.394805] <TASK> [ 11.394821] dump_stack_lvl+0x73/0xb0 [ 11.394848] print_report+0xd1/0x610 [ 11.394870] ? __virt_addr_valid+0x1db/0x2d0 [ 11.394902] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.394923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.394944] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.394976] kasan_report+0x141/0x180 [ 11.394997] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.395022] __asan_report_load1_noabort+0x18/0x20 [ 11.395045] kmalloc_oob_right+0x68a/0x7f0 [ 11.395066] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.395088] ? __schedule+0x10cc/0x2b60 [ 11.395109] ? __pfx_read_tsc+0x10/0x10 [ 11.395129] ? ktime_get_ts64+0x86/0x230 [ 11.395166] kunit_try_run_case+0x1a5/0x480 [ 11.395200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.395222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.395256] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.395278] ? __kthread_parkme+0x82/0x180 [ 11.395298] ? preempt_count_sub+0x50/0x80 [ 11.395321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.395343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.395374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.395397] kthread+0x337/0x6f0 [ 11.395416] ? trace_preempt_on+0x20/0xc0 [ 11.395448] ? __pfx_kthread+0x10/0x10 [ 11.395467] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.395487] ? calculate_sigpending+0x7b/0xa0 [ 11.395520] ? __pfx_kthread+0x10/0x10 [ 11.395540] ret_from_fork+0x116/0x1d0 [ 11.395558] ? __pfx_kthread+0x10/0x10 [ 11.395577] ret_from_fork_asm+0x1a/0x30 [ 11.395607] </TASK> [ 11.395617] [ 11.402200] Allocated by task 154: [ 11.402321] kasan_save_stack+0x45/0x70 [ 11.402457] kasan_save_track+0x18/0x40 [ 11.402852] kasan_save_alloc_info+0x3b/0x50 [ 11.403064] __kasan_kmalloc+0xb7/0xc0 [ 11.403352] __kmalloc_cache_noprof+0x189/0x420 [ 11.403611] kmalloc_oob_right+0xa9/0x7f0 [ 11.403792] kunit_try_run_case+0x1a5/0x480 [ 11.404019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.404320] kthread+0x337/0x6f0 [ 11.404468] ret_from_fork+0x116/0x1d0 [ 11.404642] ret_from_fork_asm+0x1a/0x30 [ 11.404825] [ 11.404921] The buggy address belongs to the object at ffff8881027e4000 [ 11.404921] which belongs to the cache kmalloc-128 of size 128 [ 11.405436] The buggy address is located 13 bytes to the right of [ 11.405436] allocated 115-byte region [ffff8881027e4000, ffff8881027e4073) [ 11.405965] [ 11.406051] The buggy address belongs to the physical page: [ 11.406365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4 [ 11.406686] flags: 0x200000000000000(node=0|zone=2) [ 11.406881] page_type: f5(slab) [ 11.407021] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.407370] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.407639] page dumped because: kasan: bad access detected [ 11.407803] [ 11.407868] Memory state around the buggy address: [ 11.408017] ffff8881027e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.408233] ffff8881027e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.408449] >ffff8881027e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.408788] ^ [ 11.408948] ffff8881027e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.409373] ffff8881027e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.409687] ================================================================== [ 11.330506] ================================================================== [ 11.331576] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.332380] Write of size 1 at addr ffff8881027e4073 by task kunit_try_catch/154 [ 11.332702] [ 11.333726] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.334165] Tainted: [N]=TEST [ 11.334206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.334415] Call Trace: [ 11.334478] <TASK> [ 11.334629] dump_stack_lvl+0x73/0xb0 [ 11.334717] print_report+0xd1/0x610 [ 11.334745] ? __virt_addr_valid+0x1db/0x2d0 [ 11.334769] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.334789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.334811] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.334832] kasan_report+0x141/0x180 [ 11.334853] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.334878] __asan_report_store1_noabort+0x1b/0x30 [ 11.334902] kmalloc_oob_right+0x6f0/0x7f0 [ 11.334923] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.334945] ? __schedule+0x10cc/0x2b60 [ 11.334967] ? __pfx_read_tsc+0x10/0x10 [ 11.334987] ? ktime_get_ts64+0x86/0x230 [ 11.335013] kunit_try_run_case+0x1a5/0x480 [ 11.335065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.335088] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.335112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.335135] ? __kthread_parkme+0x82/0x180 [ 11.335170] ? preempt_count_sub+0x50/0x80 [ 11.335194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.335216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.335239] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.335262] kthread+0x337/0x6f0 [ 11.335281] ? trace_preempt_on+0x20/0xc0 [ 11.335304] ? __pfx_kthread+0x10/0x10 [ 11.335323] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.335344] ? calculate_sigpending+0x7b/0xa0 [ 11.335368] ? __pfx_kthread+0x10/0x10 [ 11.335388] ret_from_fork+0x116/0x1d0 [ 11.335407] ? __pfx_kthread+0x10/0x10 [ 11.335426] ret_from_fork_asm+0x1a/0x30 [ 11.335483] </TASK> [ 11.335554] [ 11.349037] Allocated by task 154: [ 11.349565] kasan_save_stack+0x45/0x70 [ 11.350124] kasan_save_track+0x18/0x40 [ 11.350520] kasan_save_alloc_info+0x3b/0x50 [ 11.350920] __kasan_kmalloc+0xb7/0xc0 [ 11.351316] __kmalloc_cache_noprof+0x189/0x420 [ 11.351619] kmalloc_oob_right+0xa9/0x7f0 [ 11.351984] kunit_try_run_case+0x1a5/0x480 [ 11.352190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.352423] kthread+0x337/0x6f0 [ 11.352768] ret_from_fork+0x116/0x1d0 [ 11.353141] ret_from_fork_asm+0x1a/0x30 [ 11.353465] [ 11.353600] The buggy address belongs to the object at ffff8881027e4000 [ 11.353600] which belongs to the cache kmalloc-128 of size 128 [ 11.354038] The buggy address is located 0 bytes to the right of [ 11.354038] allocated 115-byte region [ffff8881027e4000, ffff8881027e4073) [ 11.355075] [ 11.355359] The buggy address belongs to the physical page: [ 11.356385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4 [ 11.357386] flags: 0x200000000000000(node=0|zone=2) [ 11.358289] page_type: f5(slab) [ 11.358999] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.359769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.360642] page dumped because: kasan: bad access detected [ 11.361220] [ 11.361395] Memory state around the buggy address: [ 11.361909] ffff8881027e3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.362352] ffff8881027e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.362604] >ffff8881027e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.362837] ^ [ 11.363421] ffff8881027e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.363671] ffff8881027e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.363930] ==================================================================