Date
May 26, 2025, 9:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.764230] ================================================================== [ 16.764662] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.765597] Write of size 1 at addr fff00000c3ef0a73 by task kunit_try_catch/136 [ 16.765714] [ 16.767069] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.767407] Tainted: [N]=TEST [ 16.767480] Hardware name: linux,dummy-virt (DT) [ 16.767803] Call trace: [ 16.767999] show_stack+0x20/0x38 (C) [ 16.768165] dump_stack_lvl+0x8c/0xd0 [ 16.768248] print_report+0x118/0x608 [ 16.768308] kasan_report+0xdc/0x128 [ 16.768391] __asan_report_store1_noabort+0x20/0x30 [ 16.768458] kmalloc_oob_right+0x5a4/0x660 [ 16.768520] kunit_try_run_case+0x170/0x3f0 [ 16.768583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.768643] kthread+0x328/0x630 [ 16.768695] ret_from_fork+0x10/0x20 [ 16.768870] [ 16.768913] Allocated by task 136: [ 16.769093] kasan_save_stack+0x3c/0x68 [ 16.769169] kasan_save_track+0x20/0x40 [ 16.769207] kasan_save_alloc_info+0x40/0x58 [ 16.769245] __kasan_kmalloc+0xd4/0xd8 [ 16.769279] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.769330] kmalloc_oob_right+0xb0/0x660 [ 16.769369] kunit_try_run_case+0x170/0x3f0 [ 16.769405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.769445] kthread+0x328/0x630 [ 16.769476] ret_from_fork+0x10/0x20 [ 16.769532] [ 16.769597] The buggy address belongs to the object at fff00000c3ef0a00 [ 16.769597] which belongs to the cache kmalloc-128 of size 128 [ 16.769696] The buggy address is located 0 bytes to the right of [ 16.769696] allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73) [ 16.769759] [ 16.769854] The buggy address belongs to the physical page: [ 16.770083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 16.770403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.770732] page_type: f5(slab) [ 16.771278] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.771429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.771625] page dumped because: kasan: bad access detected [ 16.771709] [ 16.771746] Memory state around the buggy address: [ 16.772007] fff00000c3ef0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.772082] fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.772139] >fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.772195] ^ [ 16.772283] fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.772351] fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.772422] ================================================================== [ 16.786382] ================================================================== [ 16.786479] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.786585] Read of size 1 at addr fff00000c3ef0a80 by task kunit_try_catch/136 [ 16.786697] [ 16.786996] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.787181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.787469] Hardware name: linux,dummy-virt (DT) [ 16.787537] Call trace: [ 16.787586] show_stack+0x20/0x38 (C) [ 16.787698] dump_stack_lvl+0x8c/0xd0 [ 16.787821] print_report+0x118/0x608 [ 16.787943] kasan_report+0xdc/0x128 [ 16.788046] __asan_report_load1_noabort+0x20/0x30 [ 16.788211] kmalloc_oob_right+0x5d0/0x660 [ 16.788416] kunit_try_run_case+0x170/0x3f0 [ 16.788609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.788741] kthread+0x328/0x630 [ 16.789028] ret_from_fork+0x10/0x20 [ 16.789410] [ 16.789455] Allocated by task 136: [ 16.789711] kasan_save_stack+0x3c/0x68 [ 16.789891] kasan_save_track+0x20/0x40 [ 16.789977] kasan_save_alloc_info+0x40/0x58 [ 16.790061] __kasan_kmalloc+0xd4/0xd8 [ 16.790456] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.790594] kmalloc_oob_right+0xb0/0x660 [ 16.790682] kunit_try_run_case+0x170/0x3f0 [ 16.790816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.790949] kthread+0x328/0x630 [ 16.791194] ret_from_fork+0x10/0x20 [ 16.791278] [ 16.791316] The buggy address belongs to the object at fff00000c3ef0a00 [ 16.791316] which belongs to the cache kmalloc-128 of size 128 [ 16.791429] The buggy address is located 13 bytes to the right of [ 16.791429] allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73) [ 16.791551] [ 16.791589] The buggy address belongs to the physical page: [ 16.791645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 16.792001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.792164] page_type: f5(slab) [ 16.792275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.792390] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.792532] page dumped because: kasan: bad access detected [ 16.792639] [ 16.792692] Memory state around the buggy address: [ 16.792760] fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.792855] fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.792947] >fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.793031] ^ [ 16.793092] fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.793189] fff00000c3ef0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.793307] ================================================================== [ 16.773787] ================================================================== [ 16.773868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.773971] Write of size 1 at addr fff00000c3ef0a78 by task kunit_try_catch/136 [ 16.774076] [ 16.774142] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 16.774332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.774392] Hardware name: linux,dummy-virt (DT) [ 16.774457] Call trace: [ 16.774508] show_stack+0x20/0x38 (C) [ 16.774633] dump_stack_lvl+0x8c/0xd0 [ 16.774747] print_report+0x118/0x608 [ 16.774859] kasan_report+0xdc/0x128 [ 16.774971] __asan_report_store1_noabort+0x20/0x30 [ 16.775094] kmalloc_oob_right+0x538/0x660 [ 16.775208] kunit_try_run_case+0x170/0x3f0 [ 16.777881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.778105] kthread+0x328/0x630 [ 16.778616] ret_from_fork+0x10/0x20 [ 16.779103] [ 16.779154] Allocated by task 136: [ 16.779211] kasan_save_stack+0x3c/0x68 [ 16.779596] kasan_save_track+0x20/0x40 [ 16.779905] kasan_save_alloc_info+0x40/0x58 [ 16.780017] __kasan_kmalloc+0xd4/0xd8 [ 16.780099] __kmalloc_cache_noprof+0x15c/0x3c0 [ 16.780797] kmalloc_oob_right+0xb0/0x660 [ 16.781198] kunit_try_run_case+0x170/0x3f0 [ 16.781288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.781616] kthread+0x328/0x630 [ 16.781878] ret_from_fork+0x10/0x20 [ 16.781957] [ 16.782423] The buggy address belongs to the object at fff00000c3ef0a00 [ 16.782423] which belongs to the cache kmalloc-128 of size 128 [ 16.782575] The buggy address is located 5 bytes to the right of [ 16.782575] allocated 115-byte region [fff00000c3ef0a00, fff00000c3ef0a73) [ 16.782959] [ 16.783014] The buggy address belongs to the physical page: [ 16.783413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef0 [ 16.783544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.783645] page_type: f5(slab) [ 16.784003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.784194] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.784566] page dumped because: kasan: bad access detected [ 16.784822] [ 16.785057] Memory state around the buggy address: [ 16.785368] fff00000c3ef0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.785476] fff00000c3ef0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.785566] >fff00000c3ef0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.785654] ^ [ 16.785743] fff00000c3ef0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.785839] fff00000c3ef0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.785924] ==================================================================
[ 10.250442] ================================================================== [ 10.251481] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.252609] Write of size 1 at addr ffff888102a7a973 by task kunit_try_catch/154 [ 10.253417] [ 10.254481] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.254831] Tainted: [N]=TEST [ 10.254862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.255092] Call Trace: [ 10.255160] <TASK> [ 10.255302] dump_stack_lvl+0x73/0xb0 [ 10.255398] print_report+0xd1/0x650 [ 10.255427] ? __virt_addr_valid+0x1db/0x2d0 [ 10.255452] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.255473] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.255496] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.255517] kasan_report+0x141/0x180 [ 10.255540] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.255566] __asan_report_store1_noabort+0x1b/0x30 [ 10.255587] kmalloc_oob_right+0x6f0/0x7f0 [ 10.255609] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.255632] ? __schedule+0x10cc/0x2b60 [ 10.255656] ? __pfx_read_tsc+0x10/0x10 [ 10.255677] ? ktime_get_ts64+0x86/0x230 [ 10.255703] kunit_try_run_case+0x1a5/0x480 [ 10.255735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.255754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.255780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.255804] ? __kthread_parkme+0x82/0x180 [ 10.255826] ? preempt_count_sub+0x50/0x80 [ 10.255850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.255871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.255895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.255919] kthread+0x337/0x6f0 [ 10.255938] ? trace_preempt_on+0x20/0xc0 [ 10.255964] ? __pfx_kthread+0x10/0x10 [ 10.255984] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.256016] ? calculate_sigpending+0x7b/0xa0 [ 10.256040] ? __pfx_kthread+0x10/0x10 [ 10.256061] ret_from_fork+0x116/0x1d0 [ 10.256079] ? __pfx_kthread+0x10/0x10 [ 10.256099] ret_from_fork_asm+0x1a/0x30 [ 10.256151] </TASK> [ 10.256213] [ 10.267292] Allocated by task 154: [ 10.267689] kasan_save_stack+0x45/0x70 [ 10.268153] kasan_save_track+0x18/0x40 [ 10.268529] kasan_save_alloc_info+0x3b/0x50 [ 10.268755] __kasan_kmalloc+0xb7/0xc0 [ 10.269016] __kmalloc_cache_noprof+0x189/0x420 [ 10.269482] kmalloc_oob_right+0xa9/0x7f0 [ 10.269923] kunit_try_run_case+0x1a5/0x480 [ 10.270101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.270618] kthread+0x337/0x6f0 [ 10.270960] ret_from_fork+0x116/0x1d0 [ 10.271231] ret_from_fork_asm+0x1a/0x30 [ 10.271564] [ 10.271690] The buggy address belongs to the object at ffff888102a7a900 [ 10.271690] which belongs to the cache kmalloc-128 of size 128 [ 10.272347] The buggy address is located 0 bytes to the right of [ 10.272347] allocated 115-byte region [ffff888102a7a900, ffff888102a7a973) [ 10.273590] [ 10.273867] The buggy address belongs to the physical page: [ 10.274684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a7a [ 10.275739] flags: 0x200000000000000(node=0|zone=2) [ 10.276654] page_type: f5(slab) [ 10.277272] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.277532] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.277912] page dumped because: kasan: bad access detected [ 10.278561] [ 10.278733] Memory state around the buggy address: [ 10.279525] ffff888102a7a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.280281] ffff888102a7a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.281130] >ffff888102a7a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.281948] ^ [ 10.282675] ffff888102a7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.283438] ffff888102a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.283957] ================================================================== [ 10.317198] ================================================================== [ 10.318104] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.318776] Read of size 1 at addr ffff888102a7a980 by task kunit_try_catch/154 [ 10.319341] [ 10.319539] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.319585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.319597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.319619] Call Trace: [ 10.319634] <TASK> [ 10.319650] dump_stack_lvl+0x73/0xb0 [ 10.319674] print_report+0xd1/0x650 [ 10.319695] ? __virt_addr_valid+0x1db/0x2d0 [ 10.319718] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.319738] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.319760] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.319783] kasan_report+0x141/0x180 [ 10.319804] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.319830] __asan_report_load1_noabort+0x18/0x20 [ 10.319851] kmalloc_oob_right+0x68a/0x7f0 [ 10.319873] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.319895] ? __schedule+0x10cc/0x2b60 [ 10.319918] ? __pfx_read_tsc+0x10/0x10 [ 10.319938] ? ktime_get_ts64+0x86/0x230 [ 10.319961] kunit_try_run_case+0x1a5/0x480 [ 10.319981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.320000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.320024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.320047] ? __kthread_parkme+0x82/0x180 [ 10.320067] ? preempt_count_sub+0x50/0x80 [ 10.320124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.320145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.320169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.320194] kthread+0x337/0x6f0 [ 10.320213] ? trace_preempt_on+0x20/0xc0 [ 10.320235] ? __pfx_kthread+0x10/0x10 [ 10.320255] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.320278] ? calculate_sigpending+0x7b/0xa0 [ 10.320301] ? __pfx_kthread+0x10/0x10 [ 10.320322] ret_from_fork+0x116/0x1d0 [ 10.320355] ? __pfx_kthread+0x10/0x10 [ 10.320387] ret_from_fork_asm+0x1a/0x30 [ 10.320420] </TASK> [ 10.320431] [ 10.330483] Allocated by task 154: [ 10.330703] kasan_save_stack+0x45/0x70 [ 10.330938] kasan_save_track+0x18/0x40 [ 10.331249] kasan_save_alloc_info+0x3b/0x50 [ 10.331484] __kasan_kmalloc+0xb7/0xc0 [ 10.331621] __kmalloc_cache_noprof+0x189/0x420 [ 10.331819] kmalloc_oob_right+0xa9/0x7f0 [ 10.332211] kunit_try_run_case+0x1a5/0x480 [ 10.332437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.332672] kthread+0x337/0x6f0 [ 10.332793] ret_from_fork+0x116/0x1d0 [ 10.332983] ret_from_fork_asm+0x1a/0x30 [ 10.333293] [ 10.333398] The buggy address belongs to the object at ffff888102a7a900 [ 10.333398] which belongs to the cache kmalloc-128 of size 128 [ 10.333983] The buggy address is located 13 bytes to the right of [ 10.333983] allocated 115-byte region [ffff888102a7a900, ffff888102a7a973) [ 10.334574] [ 10.334648] The buggy address belongs to the physical page: [ 10.334924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a7a [ 10.335329] flags: 0x200000000000000(node=0|zone=2) [ 10.335509] page_type: f5(slab) [ 10.335675] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.336205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.336549] page dumped because: kasan: bad access detected [ 10.336798] [ 10.336889] Memory state around the buggy address: [ 10.337167] ffff888102a7a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.337975] ffff888102a7a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.338567] >ffff888102a7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.339033] ^ [ 10.339347] ffff888102a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.339857] ffff888102a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.340482] ================================================================== [ 10.285727] ================================================================== [ 10.286320] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.286800] Write of size 1 at addr ffff888102a7a978 by task kunit_try_catch/154 [ 10.287026] [ 10.287113] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 10.287161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.287189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.287213] Call Trace: [ 10.287230] <TASK> [ 10.287245] dump_stack_lvl+0x73/0xb0 [ 10.287283] print_report+0xd1/0x650 [ 10.287306] ? __virt_addr_valid+0x1db/0x2d0 [ 10.287328] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.287348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.287370] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.287413] kasan_report+0x141/0x180 [ 10.287436] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.287462] __asan_report_store1_noabort+0x1b/0x30 [ 10.287483] kmalloc_oob_right+0x6bd/0x7f0 [ 10.287505] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.287528] ? __schedule+0x10cc/0x2b60 [ 10.287550] ? __pfx_read_tsc+0x10/0x10 [ 10.287570] ? ktime_get_ts64+0x86/0x230 [ 10.287594] kunit_try_run_case+0x1a5/0x480 [ 10.287614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.287647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.287681] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.287705] ? __kthread_parkme+0x82/0x180 [ 10.287757] ? preempt_count_sub+0x50/0x80 [ 10.287780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.287800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.287824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.287848] kthread+0x337/0x6f0 [ 10.287867] ? trace_preempt_on+0x20/0xc0 [ 10.287889] ? __pfx_kthread+0x10/0x10 [ 10.287909] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.287930] ? calculate_sigpending+0x7b/0xa0 [ 10.287953] ? __pfx_kthread+0x10/0x10 [ 10.287974] ret_from_fork+0x116/0x1d0 [ 10.287992] ? __pfx_kthread+0x10/0x10 [ 10.288024] ret_from_fork_asm+0x1a/0x30 [ 10.288053] </TASK> [ 10.288063] [ 10.302062] Allocated by task 154: [ 10.302426] kasan_save_stack+0x45/0x70 [ 10.302574] kasan_save_track+0x18/0x40 [ 10.302713] kasan_save_alloc_info+0x3b/0x50 [ 10.303170] __kasan_kmalloc+0xb7/0xc0 [ 10.303587] __kmalloc_cache_noprof+0x189/0x420 [ 10.304103] kmalloc_oob_right+0xa9/0x7f0 [ 10.304514] kunit_try_run_case+0x1a5/0x480 [ 10.305088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.305569] kthread+0x337/0x6f0 [ 10.305761] ret_from_fork+0x116/0x1d0 [ 10.306193] ret_from_fork_asm+0x1a/0x30 [ 10.306513] [ 10.306591] The buggy address belongs to the object at ffff888102a7a900 [ 10.306591] which belongs to the cache kmalloc-128 of size 128 [ 10.307603] The buggy address is located 5 bytes to the right of [ 10.307603] allocated 115-byte region [ffff888102a7a900, ffff888102a7a973) [ 10.308628] [ 10.308756] The buggy address belongs to the physical page: [ 10.309251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a7a [ 10.309501] flags: 0x200000000000000(node=0|zone=2) [ 10.309661] page_type: f5(slab) [ 10.309944] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.310867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.311667] page dumped because: kasan: bad access detected [ 10.312309] [ 10.312482] Memory state around the buggy address: [ 10.313041] ffff888102a7a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.313734] ffff888102a7a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.313947] >ffff888102a7a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.314451] ^ [ 10.315166] ffff888102a7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.315892] ffff888102a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.316448] ==================================================================