Date
July 20, 2025, 11:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.119678] ================================================================== [ 15.119726] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 15.119775] Write of size 1 at addr fff00000c3fc2778 by task kunit_try_catch/136 [ 15.119865] [ 15.119897] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.119975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.120001] Hardware name: linux,dummy-virt (DT) [ 15.120030] Call trace: [ 15.120051] show_stack+0x20/0x38 (C) [ 15.120097] dump_stack_lvl+0x8c/0xd0 [ 15.120142] print_report+0x118/0x5d0 [ 15.120186] kasan_report+0xdc/0x128 [ 15.120230] __asan_report_store1_noabort+0x20/0x30 [ 15.120314] kmalloc_oob_right+0x538/0x660 [ 15.120362] kunit_try_run_case+0x170/0x3f0 [ 15.120427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.120623] kthread+0x328/0x630 [ 15.120807] ret_from_fork+0x10/0x20 [ 15.120886] [ 15.121065] Allocated by task 136: [ 15.121099] kasan_save_stack+0x3c/0x68 [ 15.121176] kasan_save_track+0x20/0x40 [ 15.121263] kasan_save_alloc_info+0x40/0x58 [ 15.121305] __kasan_kmalloc+0xd4/0xd8 [ 15.121340] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.121377] kmalloc_oob_right+0xb0/0x660 [ 15.121643] kunit_try_run_case+0x170/0x3f0 [ 15.121715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.121758] kthread+0x328/0x630 [ 15.121790] ret_from_fork+0x10/0x20 [ 15.121825] [ 15.121902] The buggy address belongs to the object at fff00000c3fc2700 [ 15.121902] which belongs to the cache kmalloc-128 of size 128 [ 15.122000] The buggy address is located 5 bytes to the right of [ 15.122000] allocated 115-byte region [fff00000c3fc2700, fff00000c3fc2773) [ 15.122142] [ 15.122211] The buggy address belongs to the physical page: [ 15.122304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2 [ 15.122359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.122406] page_type: f5(slab) [ 15.122459] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.122508] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.122547] page dumped because: kasan: bad access detected [ 15.122576] [ 15.122593] Memory state around the buggy address: [ 15.122634] fff00000c3fc2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.122687] fff00000c3fc2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.122727] >fff00000c3fc2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.122763] ^ [ 15.122802] fff00000c3fc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.122851] fff00000c3fc2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.122888] ================================================================== [ 15.112116] ================================================================== [ 15.112455] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 15.113314] Write of size 1 at addr fff00000c3fc2773 by task kunit_try_catch/136 [ 15.113426] [ 15.114306] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 15.114480] Tainted: [N]=TEST [ 15.114515] Hardware name: linux,dummy-virt (DT) [ 15.114757] Call trace: [ 15.114938] show_stack+0x20/0x38 (C) [ 15.115193] dump_stack_lvl+0x8c/0xd0 [ 15.115267] print_report+0x118/0x5d0 [ 15.115314] kasan_report+0xdc/0x128 [ 15.115359] __asan_report_store1_noabort+0x20/0x30 [ 15.115410] kmalloc_oob_right+0x5a4/0x660 [ 15.115454] kunit_try_run_case+0x170/0x3f0 [ 15.115509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.115563] kthread+0x328/0x630 [ 15.115606] ret_from_fork+0x10/0x20 [ 15.115785] [ 15.115824] Allocated by task 136: [ 15.115942] kasan_save_stack+0x3c/0x68 [ 15.116009] kasan_save_track+0x20/0x40 [ 15.116046] kasan_save_alloc_info+0x40/0x58 [ 15.116085] __kasan_kmalloc+0xd4/0xd8 [ 15.116120] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.116159] kmalloc_oob_right+0xb0/0x660 [ 15.116194] kunit_try_run_case+0x170/0x3f0 [ 15.116229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.116271] kthread+0x328/0x630 [ 15.116302] ret_from_fork+0x10/0x20 [ 15.116353] [ 15.116418] The buggy address belongs to the object at fff00000c3fc2700 [ 15.116418] which belongs to the cache kmalloc-128 of size 128 [ 15.116512] The buggy address is located 0 bytes to the right of [ 15.116512] allocated 115-byte region [fff00000c3fc2700, fff00000c3fc2773) [ 15.116577] [ 15.116656] The buggy address belongs to the physical page: [ 15.116876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2 [ 15.117150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.117441] page_type: f5(slab) [ 15.117758] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.117822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.117929] page dumped because: kasan: bad access detected [ 15.117969] [ 15.117994] Memory state around the buggy address: [ 15.118211] fff00000c3fc2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.118275] fff00000c3fc2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.118329] >fff00000c3fc2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.118381] ^ [ 15.118462] fff00000c3fc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.118503] fff00000c3fc2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.118562] ================================================================== [ 15.124046] ================================================================== [ 15.124112] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 15.124159] Read of size 1 at addr fff00000c3fc2780 by task kunit_try_catch/136 [ 15.124305] [ 15.124339] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.124454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.124513] Hardware name: linux,dummy-virt (DT) [ 15.124544] Call trace: [ 15.124566] show_stack+0x20/0x38 (C) [ 15.124620] dump_stack_lvl+0x8c/0xd0 [ 15.124675] print_report+0x118/0x5d0 [ 15.124719] kasan_report+0xdc/0x128 [ 15.124764] __asan_report_load1_noabort+0x20/0x30 [ 15.125077] kmalloc_oob_right+0x5d0/0x660 [ 15.125378] kunit_try_run_case+0x170/0x3f0 [ 15.125451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.125571] kthread+0x328/0x630 [ 15.125634] ret_from_fork+0x10/0x20 [ 15.125846] [ 15.125987] Allocated by task 136: [ 15.126059] kasan_save_stack+0x3c/0x68 [ 15.126164] kasan_save_track+0x20/0x40 [ 15.126205] kasan_save_alloc_info+0x40/0x58 [ 15.126243] __kasan_kmalloc+0xd4/0xd8 [ 15.126278] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.126471] kmalloc_oob_right+0xb0/0x660 [ 15.126525] kunit_try_run_case+0x170/0x3f0 [ 15.126624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.126680] kthread+0x328/0x630 [ 15.126731] ret_from_fork+0x10/0x20 [ 15.126804] [ 15.126883] The buggy address belongs to the object at fff00000c3fc2700 [ 15.126883] which belongs to the cache kmalloc-128 of size 128 [ 15.126945] The buggy address is located 13 bytes to the right of [ 15.126945] allocated 115-byte region [fff00000c3fc2700, fff00000c3fc2773) [ 15.127339] [ 15.127421] The buggy address belongs to the physical page: [ 15.127544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc2 [ 15.127597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.127644] page_type: f5(slab) [ 15.127875] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.127972] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.128247] page dumped because: kasan: bad access detected [ 15.128318] [ 15.128337] Memory state around the buggy address: [ 15.128367] fff00000c3fc2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.128679] fff00000c3fc2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.128843] >fff00000c3fc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.128997] ^ [ 15.129056] fff00000c3fc2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.129240] fff00000c3fc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.129438] ==================================================================
[ 11.517744] ================================================================== [ 11.518768] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.519847] Write of size 1 at addr ffff888102ad4073 by task kunit_try_catch/153 [ 11.520269] [ 11.521243] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.521576] Tainted: [N]=TEST [ 11.521605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.522038] Call Trace: [ 11.522112] <TASK> [ 11.522257] dump_stack_lvl+0x73/0xb0 [ 11.522415] print_report+0xd1/0x610 [ 11.522455] ? __virt_addr_valid+0x1db/0x2d0 [ 11.522479] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.522499] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.522520] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.522540] kasan_report+0x141/0x180 [ 11.522561] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.522586] __asan_report_store1_noabort+0x1b/0x30 [ 11.522608] kmalloc_oob_right+0x6f0/0x7f0 [ 11.522629] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.522650] ? __schedule+0x10cc/0x2b60 [ 11.522673] ? __pfx_read_tsc+0x10/0x10 [ 11.522694] ? ktime_get_ts64+0x86/0x230 [ 11.522719] kunit_try_run_case+0x1a5/0x480 [ 11.522744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.522765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.522788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.522810] ? __kthread_parkme+0x82/0x180 [ 11.522830] ? preempt_count_sub+0x50/0x80 [ 11.522853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.522876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.522897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.522931] kthread+0x337/0x6f0 [ 11.522950] ? trace_preempt_on+0x20/0xc0 [ 11.522973] ? __pfx_kthread+0x10/0x10 [ 11.522992] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.523012] ? calculate_sigpending+0x7b/0xa0 [ 11.523035] ? __pfx_kthread+0x10/0x10 [ 11.523059] ret_from_fork+0x116/0x1d0 [ 11.523077] ? __pfx_kthread+0x10/0x10 [ 11.523096] ret_from_fork_asm+0x1a/0x30 [ 11.523151] </TASK> [ 11.523216] [ 11.534165] Allocated by task 153: [ 11.534956] kasan_save_stack+0x45/0x70 [ 11.535197] kasan_save_track+0x18/0x40 [ 11.535656] kasan_save_alloc_info+0x3b/0x50 [ 11.535959] __kasan_kmalloc+0xb7/0xc0 [ 11.536422] __kmalloc_cache_noprof+0x189/0x420 [ 11.536648] kmalloc_oob_right+0xa9/0x7f0 [ 11.537015] kunit_try_run_case+0x1a5/0x480 [ 11.537352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.538138] kthread+0x337/0x6f0 [ 11.538313] ret_from_fork+0x116/0x1d0 [ 11.538679] ret_from_fork_asm+0x1a/0x30 [ 11.538936] [ 11.539092] The buggy address belongs to the object at ffff888102ad4000 [ 11.539092] which belongs to the cache kmalloc-128 of size 128 [ 11.540201] The buggy address is located 0 bytes to the right of [ 11.540201] allocated 115-byte region [ffff888102ad4000, ffff888102ad4073) [ 11.541441] [ 11.541804] The buggy address belongs to the physical page: [ 11.542529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 11.543395] flags: 0x200000000000000(node=0|zone=2) [ 11.544195] page_type: f5(slab) [ 11.544902] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.545252] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.546167] page dumped because: kasan: bad access detected [ 11.546689] [ 11.546965] Memory state around the buggy address: [ 11.547606] ffff888102ad3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.548323] ffff888102ad3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.548895] >ffff888102ad4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.549309] ^ [ 11.550308] ffff888102ad4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.551073] ffff888102ad4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.551848] ================================================================== [ 11.552896] ================================================================== [ 11.553242] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.553594] Write of size 1 at addr ffff888102ad4078 by task kunit_try_catch/153 [ 11.553903] [ 11.554100] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.554142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.554154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.554173] Call Trace: [ 11.554187] <TASK> [ 11.554202] dump_stack_lvl+0x73/0xb0 [ 11.554228] print_report+0xd1/0x610 [ 11.554247] ? __virt_addr_valid+0x1db/0x2d0 [ 11.554268] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.554287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.554308] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.554328] kasan_report+0x141/0x180 [ 11.554348] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.554374] __asan_report_store1_noabort+0x1b/0x30 [ 11.554396] kmalloc_oob_right+0x6bd/0x7f0 [ 11.554417] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.554490] ? __schedule+0x10cc/0x2b60 [ 11.554511] ? __pfx_read_tsc+0x10/0x10 [ 11.554530] ? ktime_get_ts64+0x86/0x230 [ 11.554573] kunit_try_run_case+0x1a5/0x480 [ 11.554596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.554617] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.554638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.554659] ? __kthread_parkme+0x82/0x180 [ 11.554678] ? preempt_count_sub+0x50/0x80 [ 11.554701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.554723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.554744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.554766] kthread+0x337/0x6f0 [ 11.554784] ? trace_preempt_on+0x20/0xc0 [ 11.554805] ? __pfx_kthread+0x10/0x10 [ 11.554825] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.554891] ? calculate_sigpending+0x7b/0xa0 [ 11.554930] ? __pfx_kthread+0x10/0x10 [ 11.554950] ret_from_fork+0x116/0x1d0 [ 11.554968] ? __pfx_kthread+0x10/0x10 [ 11.554987] ret_from_fork_asm+0x1a/0x30 [ 11.555065] </TASK> [ 11.555076] [ 11.565349] Allocated by task 153: [ 11.565677] kasan_save_stack+0x45/0x70 [ 11.565883] kasan_save_track+0x18/0x40 [ 11.566286] kasan_save_alloc_info+0x3b/0x50 [ 11.566737] __kasan_kmalloc+0xb7/0xc0 [ 11.567185] __kmalloc_cache_noprof+0x189/0x420 [ 11.567381] kmalloc_oob_right+0xa9/0x7f0 [ 11.567848] kunit_try_run_case+0x1a5/0x480 [ 11.568335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.568589] kthread+0x337/0x6f0 [ 11.568996] ret_from_fork+0x116/0x1d0 [ 11.569195] ret_from_fork_asm+0x1a/0x30 [ 11.569632] [ 11.569779] The buggy address belongs to the object at ffff888102ad4000 [ 11.569779] which belongs to the cache kmalloc-128 of size 128 [ 11.570649] The buggy address is located 5 bytes to the right of [ 11.570649] allocated 115-byte region [ffff888102ad4000, ffff888102ad4073) [ 11.571556] [ 11.571666] The buggy address belongs to the physical page: [ 11.572326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 11.572818] flags: 0x200000000000000(node=0|zone=2) [ 11.573018] page_type: f5(slab) [ 11.573564] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.574201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.574842] page dumped because: kasan: bad access detected [ 11.575102] [ 11.575198] Memory state around the buggy address: [ 11.575776] ffff888102ad3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.576066] ffff888102ad3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.576588] >ffff888102ad4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.577082] ^ [ 11.577545] ffff888102ad4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.578103] ffff888102ad4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.578639] ================================================================== [ 11.580523] ================================================================== [ 11.580947] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.581257] Read of size 1 at addr ffff888102ad4080 by task kunit_try_catch/153 [ 11.581779] [ 11.581950] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.581994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.582005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.582025] Call Trace: [ 11.582038] <TASK> [ 11.582052] dump_stack_lvl+0x73/0xb0 [ 11.582079] print_report+0xd1/0x610 [ 11.582099] ? __virt_addr_valid+0x1db/0x2d0 [ 11.582119] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.582138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.582159] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.582179] kasan_report+0x141/0x180 [ 11.582199] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.582224] __asan_report_load1_noabort+0x18/0x20 [ 11.582284] kmalloc_oob_right+0x68a/0x7f0 [ 11.582324] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.582346] ? __schedule+0x10cc/0x2b60 [ 11.582559] ? __pfx_read_tsc+0x10/0x10 [ 11.582580] ? ktime_get_ts64+0x86/0x230 [ 11.582604] kunit_try_run_case+0x1a5/0x480 [ 11.582627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.582648] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.582669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.582705] ? __kthread_parkme+0x82/0x180 [ 11.582723] ? preempt_count_sub+0x50/0x80 [ 11.582746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.582768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.582789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.582811] kthread+0x337/0x6f0 [ 11.582829] ? trace_preempt_on+0x20/0xc0 [ 11.582850] ? __pfx_kthread+0x10/0x10 [ 11.582869] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.582889] ? calculate_sigpending+0x7b/0xa0 [ 11.582922] ? __pfx_kthread+0x10/0x10 [ 11.582943] ret_from_fork+0x116/0x1d0 [ 11.582960] ? __pfx_kthread+0x10/0x10 [ 11.582980] ret_from_fork_asm+0x1a/0x30 [ 11.583008] </TASK> [ 11.583018] [ 11.591712] Allocated by task 153: [ 11.591883] kasan_save_stack+0x45/0x70 [ 11.592151] kasan_save_track+0x18/0x40 [ 11.592303] kasan_save_alloc_info+0x3b/0x50 [ 11.592475] __kasan_kmalloc+0xb7/0xc0 [ 11.592650] __kmalloc_cache_noprof+0x189/0x420 [ 11.592881] kmalloc_oob_right+0xa9/0x7f0 [ 11.593088] kunit_try_run_case+0x1a5/0x480 [ 11.593297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.593511] kthread+0x337/0x6f0 [ 11.593630] ret_from_fork+0x116/0x1d0 [ 11.593791] ret_from_fork_asm+0x1a/0x30 [ 11.594135] [ 11.594232] The buggy address belongs to the object at ffff888102ad4000 [ 11.594232] which belongs to the cache kmalloc-128 of size 128 [ 11.595095] The buggy address is located 13 bytes to the right of [ 11.595095] allocated 115-byte region [ffff888102ad4000, ffff888102ad4073) [ 11.595774] [ 11.595902] The buggy address belongs to the physical page: [ 11.596133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad4 [ 11.596447] flags: 0x200000000000000(node=0|zone=2) [ 11.596744] page_type: f5(slab) [ 11.596949] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.597429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.597826] page dumped because: kasan: bad access detected [ 11.598107] [ 11.598177] Memory state around the buggy address: [ 11.598600] ffff888102ad3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.598998] ffff888102ad4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.599418] >ffff888102ad4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.599686] ^ [ 11.599890] ffff888102ad4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.600229] ffff888102ad4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.600621] ==================================================================