Date
July 17, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.003855] ================================================================== [ 15.003902] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 15.003948] Read of size 1 at addr fff00000c122af80 by task kunit_try_catch/137 [ 15.004011] [ 15.004040] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.004117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.004144] Hardware name: linux,dummy-virt (DT) [ 15.004173] Call trace: [ 15.004192] show_stack+0x20/0x38 (C) [ 15.004237] dump_stack_lvl+0x8c/0xd0 [ 15.004283] print_report+0x118/0x5d0 [ 15.004327] kasan_report+0xdc/0x128 [ 15.004371] __asan_report_load1_noabort+0x20/0x30 [ 15.004420] kmalloc_oob_right+0x5d0/0x660 [ 15.004463] kunit_try_run_case+0x170/0x3f0 [ 15.004858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.005287] kthread+0x328/0x630 [ 15.005370] ret_from_fork+0x10/0x20 [ 15.005418] [ 15.005436] Allocated by task 137: [ 15.005462] kasan_save_stack+0x3c/0x68 [ 15.005628] kasan_save_track+0x20/0x40 [ 15.005669] kasan_save_alloc_info+0x40/0x58 [ 15.005820] __kasan_kmalloc+0xd4/0xd8 [ 15.006013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.006160] kmalloc_oob_right+0xb0/0x660 [ 15.006197] kunit_try_run_case+0x170/0x3f0 [ 15.006233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.006274] kthread+0x328/0x630 [ 15.006305] ret_from_fork+0x10/0x20 [ 15.006339] [ 15.006590] The buggy address belongs to the object at fff00000c122af00 [ 15.006590] which belongs to the cache kmalloc-128 of size 128 [ 15.006835] The buggy address is located 13 bytes to the right of [ 15.006835] allocated 115-byte region [fff00000c122af00, fff00000c122af73) [ 15.007043] [ 15.007094] The buggy address belongs to the physical page: [ 15.007127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10122a [ 15.007180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.007255] page_type: f5(slab) [ 15.007292] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.007418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.007574] page dumped because: kasan: bad access detected [ 15.007607] [ 15.007638] Memory state around the buggy address: [ 15.007680] fff00000c122ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007722] fff00000c122af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.007763] >fff00000c122af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007799] ^ [ 15.007831] fff00000c122b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.008213] fff00000c122b080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 15.008343] ================================================================== [ 14.997748] ================================================================== [ 14.997806] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 14.997891] Write of size 1 at addr fff00000c122af78 by task kunit_try_catch/137 [ 14.998007] [ 14.998111] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 14.998191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.998216] Hardware name: linux,dummy-virt (DT) [ 14.998251] Call trace: [ 14.998352] show_stack+0x20/0x38 (C) [ 14.998595] dump_stack_lvl+0x8c/0xd0 [ 14.998697] print_report+0x118/0x5d0 [ 14.998748] kasan_report+0xdc/0x128 [ 14.998863] __asan_report_store1_noabort+0x20/0x30 [ 14.999277] kmalloc_oob_right+0x538/0x660 [ 14.999646] kunit_try_run_case+0x170/0x3f0 [ 14.999710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.999763] kthread+0x328/0x630 [ 14.999803] ret_from_fork+0x10/0x20 [ 14.999848] [ 14.999866] Allocated by task 137: [ 14.999902] kasan_save_stack+0x3c/0x68 [ 14.999942] kasan_save_track+0x20/0x40 [ 15.000133] kasan_save_alloc_info+0x40/0x58 [ 15.000272] __kasan_kmalloc+0xd4/0xd8 [ 15.000437] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.000649] kmalloc_oob_right+0xb0/0x660 [ 15.000716] kunit_try_run_case+0x170/0x3f0 [ 15.000915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.001188] kthread+0x328/0x630 [ 15.001291] ret_from_fork+0x10/0x20 [ 15.001394] [ 15.001436] The buggy address belongs to the object at fff00000c122af00 [ 15.001436] which belongs to the cache kmalloc-128 of size 128 [ 15.001501] The buggy address is located 5 bytes to the right of [ 15.001501] allocated 115-byte region [fff00000c122af00, fff00000c122af73) [ 15.001564] [ 15.001582] The buggy address belongs to the physical page: [ 15.001613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10122a [ 15.001685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.001766] page_type: f5(slab) [ 15.001802] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.001852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.001891] page dumped because: kasan: bad access detected [ 15.001921] [ 15.001939] Memory state around the buggy address: [ 15.001968] fff00000c122ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.002263] fff00000c122ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.002321] >fff00000c122af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.002358] ^ [ 15.002404] fff00000c122af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.002465] fff00000c122b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.002504] ================================================================== [ 14.978526] ================================================================== [ 14.978883] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 14.979711] Write of size 1 at addr fff00000c122af73 by task kunit_try_catch/137 [ 14.980103] [ 14.982662] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 14.982954] Tainted: [N]=TEST [ 14.983072] Hardware name: linux,dummy-virt (DT) [ 14.983605] Call trace: [ 14.984370] show_stack+0x20/0x38 (C) [ 14.985043] dump_stack_lvl+0x8c/0xd0 [ 14.985171] print_report+0x118/0x5d0 [ 14.985329] kasan_report+0xdc/0x128 [ 14.985422] __asan_report_store1_noabort+0x20/0x30 [ 14.985476] kmalloc_oob_right+0x5a4/0x660 [ 14.985555] kunit_try_run_case+0x170/0x3f0 [ 14.985606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.985698] kthread+0x328/0x630 [ 14.986116] ret_from_fork+0x10/0x20 [ 14.986682] [ 14.987025] Allocated by task 137: [ 14.987410] kasan_save_stack+0x3c/0x68 [ 14.987597] kasan_save_track+0x20/0x40 [ 14.987635] kasan_save_alloc_info+0x40/0x58 [ 14.987950] __kasan_kmalloc+0xd4/0xd8 [ 14.988009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.988050] kmalloc_oob_right+0xb0/0x660 [ 14.988188] kunit_try_run_case+0x170/0x3f0 [ 14.988369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.988543] kthread+0x328/0x630 [ 14.988574] ret_from_fork+0x10/0x20 [ 14.989101] [ 14.989171] The buggy address belongs to the object at fff00000c122af00 [ 14.989171] which belongs to the cache kmalloc-128 of size 128 [ 14.989551] The buggy address is located 0 bytes to the right of [ 14.989551] allocated 115-byte region [fff00000c122af00, fff00000c122af73) [ 14.989629] [ 14.989929] The buggy address belongs to the physical page: [ 14.990551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10122a [ 14.991316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.992609] page_type: f5(slab) [ 14.993291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.993614] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.993843] page dumped because: kasan: bad access detected [ 14.993885] [ 14.993911] Memory state around the buggy address: [ 14.994625] fff00000c122ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.995084] fff00000c122ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.995164] >fff00000c122af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.995293] ^ [ 14.995672] fff00000c122af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.995719] fff00000c122b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.995793] ==================================================================
[ 12.322795] ================================================================== [ 12.323109] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.323569] Write of size 1 at addr ffff8881025bdd78 by task kunit_try_catch/153 [ 12.323951] [ 12.324048] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.324090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.324103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.324123] Call Trace: [ 12.324138] <TASK> [ 12.324154] dump_stack_lvl+0x73/0xb0 [ 12.324181] print_report+0xd1/0x610 [ 12.324203] ? __virt_addr_valid+0x1db/0x2d0 [ 12.324225] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.324247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.324270] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.324291] kasan_report+0x141/0x180 [ 12.324313] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.324339] __asan_report_store1_noabort+0x1b/0x30 [ 12.324364] kmalloc_oob_right+0x6bd/0x7f0 [ 12.324386] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.324419] ? __schedule+0x10cc/0x2b60 [ 12.324441] ? __pfx_read_tsc+0x10/0x10 [ 12.324462] ? ktime_get_ts64+0x86/0x230 [ 12.324487] kunit_try_run_case+0x1a5/0x480 [ 12.324510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.324533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.324566] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.324590] ? __kthread_parkme+0x82/0x180 [ 12.324609] ? preempt_count_sub+0x50/0x80 [ 12.324633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.324658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.324702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.324737] kthread+0x337/0x6f0 [ 12.324756] ? trace_preempt_on+0x20/0xc0 [ 12.324779] ? __pfx_kthread+0x10/0x10 [ 12.324800] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.324821] ? calculate_sigpending+0x7b/0xa0 [ 12.324855] ? __pfx_kthread+0x10/0x10 [ 12.324876] ret_from_fork+0x116/0x1d0 [ 12.324894] ? __pfx_kthread+0x10/0x10 [ 12.324914] ret_from_fork_asm+0x1a/0x30 [ 12.324945] </TASK> [ 12.324954] [ 12.332020] Allocated by task 153: [ 12.332207] kasan_save_stack+0x45/0x70 [ 12.332504] kasan_save_track+0x18/0x40 [ 12.332655] kasan_save_alloc_info+0x3b/0x50 [ 12.332805] __kasan_kmalloc+0xb7/0xc0 [ 12.332936] __kmalloc_cache_noprof+0x189/0x420 [ 12.333094] kmalloc_oob_right+0xa9/0x7f0 [ 12.333318] kunit_try_run_case+0x1a5/0x480 [ 12.333671] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.333925] kthread+0x337/0x6f0 [ 12.334214] ret_from_fork+0x116/0x1d0 [ 12.334598] ret_from_fork_asm+0x1a/0x30 [ 12.334777] [ 12.334853] The buggy address belongs to the object at ffff8881025bdd00 [ 12.334853] which belongs to the cache kmalloc-128 of size 128 [ 12.335339] The buggy address is located 5 bytes to the right of [ 12.335339] allocated 115-byte region [ffff8881025bdd00, ffff8881025bdd73) [ 12.336044] [ 12.336116] The buggy address belongs to the physical page: [ 12.336289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025bd [ 12.336649] flags: 0x200000000000000(node=0|zone=2) [ 12.336935] page_type: f5(slab) [ 12.337124] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.337456] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.337734] page dumped because: kasan: bad access detected [ 12.338000] [ 12.338177] Memory state around the buggy address: [ 12.338400] ffff8881025bdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.338659] ffff8881025bdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.338875] >ffff8881025bdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.339086] ^ [ 12.339295] ffff8881025bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.339748] ffff8881025bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.340066] ================================================================== [ 12.340590] ================================================================== [ 12.341195] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.341533] Read of size 1 at addr ffff8881025bdd80 by task kunit_try_catch/153 [ 12.341817] [ 12.341924] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.341964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.341974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.341995] Call Trace: [ 12.342009] <TASK> [ 12.342023] dump_stack_lvl+0x73/0xb0 [ 12.342050] print_report+0xd1/0x610 [ 12.342072] ? __virt_addr_valid+0x1db/0x2d0 [ 12.342094] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.342115] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.342138] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.342160] kasan_report+0x141/0x180 [ 12.342182] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.342208] __asan_report_load1_noabort+0x18/0x20 [ 12.342233] kmalloc_oob_right+0x68a/0x7f0 [ 12.342255] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.342277] ? __schedule+0x10cc/0x2b60 [ 12.342299] ? __pfx_read_tsc+0x10/0x10 [ 12.342320] ? ktime_get_ts64+0x86/0x230 [ 12.342344] kunit_try_run_case+0x1a5/0x480 [ 12.342369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.342393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.342417] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.342443] ? __kthread_parkme+0x82/0x180 [ 12.342464] ? preempt_count_sub+0x50/0x80 [ 12.342488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.342513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.342537] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.342574] kthread+0x337/0x6f0 [ 12.342592] ? trace_preempt_on+0x20/0xc0 [ 12.342617] ? __pfx_kthread+0x10/0x10 [ 12.342637] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.342659] ? calculate_sigpending+0x7b/0xa0 [ 12.342683] ? __pfx_kthread+0x10/0x10 [ 12.342705] ret_from_fork+0x116/0x1d0 [ 12.342723] ? __pfx_kthread+0x10/0x10 [ 12.342743] ret_from_fork_asm+0x1a/0x30 [ 12.342774] </TASK> [ 12.342782] [ 12.350045] Allocated by task 153: [ 12.350176] kasan_save_stack+0x45/0x70 [ 12.350317] kasan_save_track+0x18/0x40 [ 12.350622] kasan_save_alloc_info+0x3b/0x50 [ 12.350835] __kasan_kmalloc+0xb7/0xc0 [ 12.351023] __kmalloc_cache_noprof+0x189/0x420 [ 12.351265] kmalloc_oob_right+0xa9/0x7f0 [ 12.351674] kunit_try_run_case+0x1a5/0x480 [ 12.351885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.352140] kthread+0x337/0x6f0 [ 12.352362] ret_from_fork+0x116/0x1d0 [ 12.352570] ret_from_fork_asm+0x1a/0x30 [ 12.352737] [ 12.352832] The buggy address belongs to the object at ffff8881025bdd00 [ 12.352832] which belongs to the cache kmalloc-128 of size 128 [ 12.353540] The buggy address is located 13 bytes to the right of [ 12.353540] allocated 115-byte region [ffff8881025bdd00, ffff8881025bdd73) [ 12.354185] [ 12.354256] The buggy address belongs to the physical page: [ 12.354429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025bd [ 12.354679] flags: 0x200000000000000(node=0|zone=2) [ 12.354839] page_type: f5(slab) [ 12.354958] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.355374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.355882] page dumped because: kasan: bad access detected [ 12.356272] [ 12.356342] Memory state around the buggy address: [ 12.356493] ffff8881025bdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.356717] ffff8881025bdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.356933] >ffff8881025bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.357144] ^ [ 12.357259] ffff8881025bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.357474] ffff8881025bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.358010] ================================================================== [ 12.298412] ================================================================== [ 12.299048] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 12.299758] Write of size 1 at addr ffff8881025bdd73 by task kunit_try_catch/153 [ 12.300144] [ 12.301159] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.301536] Tainted: [N]=TEST [ 12.301582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.301802] Call Trace: [ 12.301870] <TASK> [ 12.302017] dump_stack_lvl+0x73/0xb0 [ 12.302105] print_report+0xd1/0x610 [ 12.302134] ? __virt_addr_valid+0x1db/0x2d0 [ 12.302160] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.302181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.302204] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.302226] kasan_report+0x141/0x180 [ 12.302257] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.302284] __asan_report_store1_noabort+0x1b/0x30 [ 12.302310] kmalloc_oob_right+0x6f0/0x7f0 [ 12.302332] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.302355] ? __schedule+0x10cc/0x2b60 [ 12.302412] ? __pfx_read_tsc+0x10/0x10 [ 12.302459] ? ktime_get_ts64+0x86/0x230 [ 12.302486] kunit_try_run_case+0x1a5/0x480 [ 12.302513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.302536] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.302572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.302596] ? __kthread_parkme+0x82/0x180 [ 12.302617] ? preempt_count_sub+0x50/0x80 [ 12.302642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.302667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.302691] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.302716] kthread+0x337/0x6f0 [ 12.302735] ? trace_preempt_on+0x20/0xc0 [ 12.302760] ? __pfx_kthread+0x10/0x10 [ 12.302780] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.302802] ? calculate_sigpending+0x7b/0xa0 [ 12.302827] ? __pfx_kthread+0x10/0x10 [ 12.302849] ret_from_fork+0x116/0x1d0 [ 12.302868] ? __pfx_kthread+0x10/0x10 [ 12.302889] ret_from_fork_asm+0x1a/0x30 [ 12.302945] </TASK> [ 12.303015] [ 12.310235] Allocated by task 153: [ 12.310509] kasan_save_stack+0x45/0x70 [ 12.311287] kasan_save_track+0x18/0x40 [ 12.311479] kasan_save_alloc_info+0x3b/0x50 [ 12.311700] __kasan_kmalloc+0xb7/0xc0 [ 12.312047] __kmalloc_cache_noprof+0x189/0x420 [ 12.312250] kmalloc_oob_right+0xa9/0x7f0 [ 12.312494] kunit_try_run_case+0x1a5/0x480 [ 12.312692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.312956] kthread+0x337/0x6f0 [ 12.313079] ret_from_fork+0x116/0x1d0 [ 12.313213] ret_from_fork_asm+0x1a/0x30 [ 12.313531] [ 12.313702] The buggy address belongs to the object at ffff8881025bdd00 [ 12.313702] which belongs to the cache kmalloc-128 of size 128 [ 12.314341] The buggy address is located 0 bytes to the right of [ 12.314341] allocated 115-byte region [ffff8881025bdd00, ffff8881025bdd73) [ 12.314896] [ 12.315066] The buggy address belongs to the physical page: [ 12.315623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025bd [ 12.316266] flags: 0x200000000000000(node=0|zone=2) [ 12.316928] page_type: f5(slab) [ 12.317408] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.317771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.318184] page dumped because: kasan: bad access detected [ 12.318600] [ 12.318691] Memory state around the buggy address: [ 12.319124] ffff8881025bdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.319472] ffff8881025bdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.320381] >ffff8881025bdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.320858] ^ [ 12.321191] ffff8881025bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.321467] ffff8881025bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.321771] ==================================================================