Date
May 29, 2025, 7:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.860844] ================================================================== [ 20.861283] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 20.862369] Write of size 1 at addr fff00000c5d6e973 by task kunit_try_catch/136 [ 20.862659] [ 20.864070] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250529 #1 PREEMPT [ 20.864266] Tainted: [N]=TEST [ 20.864308] Hardware name: linux,dummy-virt (DT) [ 20.864621] Call trace: [ 20.864841] show_stack+0x20/0x38 (C) [ 20.865022] dump_stack_lvl+0x8c/0xd0 [ 20.865102] print_report+0x118/0x608 [ 20.865160] kasan_report+0xdc/0x128 [ 20.865212] __asan_report_store1_noabort+0x20/0x30 [ 20.865265] kmalloc_oob_right+0x5a4/0x660 [ 20.865316] kunit_try_run_case+0x170/0x3f0 [ 20.865372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.865447] kthread+0x328/0x630 [ 20.865498] ret_from_fork+0x10/0x20 [ 20.865685] [ 20.865732] Allocated by task 136: [ 20.865870] kasan_save_stack+0x3c/0x68 [ 20.865950] kasan_save_track+0x20/0x40 [ 20.865995] kasan_save_alloc_info+0x40/0x58 [ 20.866036] __kasan_kmalloc+0xd4/0xd8 [ 20.866077] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.866120] kmalloc_oob_right+0xb0/0x660 [ 20.866159] kunit_try_run_case+0x170/0x3f0 [ 20.866200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866246] kthread+0x328/0x630 [ 20.866280] ret_from_fork+0x10/0x20 [ 20.866341] [ 20.866522] The buggy address belongs to the object at fff00000c5d6e900 [ 20.866522] which belongs to the cache kmalloc-128 of size 128 [ 20.866733] The buggy address is located 0 bytes to the right of [ 20.866733] allocated 115-byte region [fff00000c5d6e900, fff00000c5d6e973) [ 20.866823] [ 20.866932] The buggy address belongs to the physical page: [ 20.867167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 20.867539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.867902] page_type: f5(slab) [ 20.868321] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.868408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.868547] page dumped because: kasan: bad access detected [ 20.868598] [ 20.868630] Memory state around the buggy address: [ 20.868905] fff00000c5d6e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.868988] fff00000c5d6e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869053] >fff00000c5d6e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.869116] ^ [ 20.869214] fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869262] fff00000c5d6ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869334] ================================================================== [ 20.885504] ================================================================== [ 20.885618] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 20.886822] Read of size 1 at addr fff00000c5d6e980 by task kunit_try_catch/136 [ 20.887004] [ 20.887308] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 20.888675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.888868] Hardware name: linux,dummy-virt (DT) [ 20.889032] Call trace: [ 20.889086] show_stack+0x20/0x38 (C) [ 20.889833] dump_stack_lvl+0x8c/0xd0 [ 20.889965] print_report+0x118/0x608 [ 20.890084] kasan_report+0xdc/0x128 [ 20.890234] __asan_report_load1_noabort+0x20/0x30 [ 20.891270] kmalloc_oob_right+0x5d0/0x660 [ 20.891766] kunit_try_run_case+0x170/0x3f0 [ 20.892124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.893027] kthread+0x328/0x630 [ 20.893180] ret_from_fork+0x10/0x20 [ 20.894258] [ 20.894310] Allocated by task 136: [ 20.894788] kasan_save_stack+0x3c/0x68 [ 20.895082] kasan_save_track+0x20/0x40 [ 20.895178] kasan_save_alloc_info+0x40/0x58 [ 20.895605] __kasan_kmalloc+0xd4/0xd8 [ 20.895947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.896504] kmalloc_oob_right+0xb0/0x660 [ 20.896690] kunit_try_run_case+0x170/0x3f0 [ 20.896816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.897119] kthread+0x328/0x630 [ 20.897206] ret_from_fork+0x10/0x20 [ 20.897295] [ 20.897349] The buggy address belongs to the object at fff00000c5d6e900 [ 20.897349] which belongs to the cache kmalloc-128 of size 128 [ 20.897505] The buggy address is located 13 bytes to the right of [ 20.897505] allocated 115-byte region [fff00000c5d6e900, fff00000c5d6e973) [ 20.897668] [ 20.897713] The buggy address belongs to the physical page: [ 20.898146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 20.898451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.899000] page_type: f5(slab) [ 20.899425] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.899630] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.899926] page dumped because: kasan: bad access detected [ 20.900080] [ 20.900306] Memory state around the buggy address: [ 20.900513] fff00000c5d6e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.901073] fff00000c5d6e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.901181] >fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.901777] ^ [ 20.902463] fff00000c5d6ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.902730] fff00000c5d6ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.903098] ================================================================== [ 20.875836] ================================================================== [ 20.875944] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 20.876069] Write of size 1 at addr fff00000c5d6e978 by task kunit_try_catch/136 [ 20.876181] [ 20.876263] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 20.876463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.876524] Hardware name: linux,dummy-virt (DT) [ 20.876594] Call trace: [ 20.876649] show_stack+0x20/0x38 (C) [ 20.876773] dump_stack_lvl+0x8c/0xd0 [ 20.876891] print_report+0x118/0x608 [ 20.877007] kasan_report+0xdc/0x128 [ 20.877121] __asan_report_store1_noabort+0x20/0x30 [ 20.877240] kmalloc_oob_right+0x538/0x660 [ 20.877356] kunit_try_run_case+0x170/0x3f0 [ 20.877683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.877840] kthread+0x328/0x630 [ 20.878426] ret_from_fork+0x10/0x20 [ 20.878552] [ 20.878598] Allocated by task 136: [ 20.878705] kasan_save_stack+0x3c/0x68 [ 20.878832] kasan_save_track+0x20/0x40 [ 20.878923] kasan_save_alloc_info+0x40/0x58 [ 20.878997] __kasan_kmalloc+0xd4/0xd8 [ 20.879067] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.879150] kmalloc_oob_right+0xb0/0x660 [ 20.879225] kunit_try_run_case+0x170/0x3f0 [ 20.879312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.879424] kthread+0x328/0x630 [ 20.879494] ret_from_fork+0x10/0x20 [ 20.879573] [ 20.879711] The buggy address belongs to the object at fff00000c5d6e900 [ 20.879711] which belongs to the cache kmalloc-128 of size 128 [ 20.879877] The buggy address is located 5 bytes to the right of [ 20.879877] allocated 115-byte region [fff00000c5d6e900, fff00000c5d6e973) [ 20.880038] [ 20.880088] The buggy address belongs to the physical page: [ 20.880167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d6e [ 20.881272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.881784] page_type: f5(slab) [ 20.882300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.882735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.882896] page dumped because: kasan: bad access detected [ 20.883148] [ 20.883221] Memory state around the buggy address: [ 20.883311] fff00000c5d6e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.883669] fff00000c5d6e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.883790] >fff00000c5d6e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.883898] ^ [ 20.883999] fff00000c5d6e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.884144] fff00000c5d6ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.884239] ==================================================================
[ 10.233448] ================================================================== [ 10.233769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.234095] Read of size 1 at addr ffff888102f85f80 by task kunit_try_catch/153 [ 10.234598] [ 10.234725] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 10.234838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.234850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.234872] Call Trace: [ 10.234887] <TASK> [ 10.234926] dump_stack_lvl+0x73/0xb0 [ 10.234952] print_report+0xd1/0x650 [ 10.234974] ? __virt_addr_valid+0x1db/0x2d0 [ 10.234995] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.235033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.235055] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.235076] kasan_report+0x141/0x180 [ 10.235099] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.235125] __asan_report_load1_noabort+0x18/0x20 [ 10.235146] kmalloc_oob_right+0x68a/0x7f0 [ 10.235168] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.235191] ? __schedule+0x10cc/0x2b60 [ 10.235213] ? __pfx_read_tsc+0x10/0x10 [ 10.235235] ? ktime_get_ts64+0x86/0x230 [ 10.235259] kunit_try_run_case+0x1a5/0x480 [ 10.235296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.235316] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.235339] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.235363] ? __kthread_parkme+0x82/0x180 [ 10.235384] ? preempt_count_sub+0x50/0x80 [ 10.235406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.235427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.235466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.235490] kthread+0x337/0x6f0 [ 10.235509] ? trace_preempt_on+0x20/0xc0 [ 10.235532] ? __pfx_kthread+0x10/0x10 [ 10.235552] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.235574] ? calculate_sigpending+0x7b/0xa0 [ 10.235597] ? __pfx_kthread+0x10/0x10 [ 10.235630] ret_from_fork+0x116/0x1d0 [ 10.235648] ? __pfx_kthread+0x10/0x10 [ 10.235668] ret_from_fork_asm+0x1a/0x30 [ 10.235698] </TASK> [ 10.235707] [ 10.243635] Allocated by task 153: [ 10.244034] kasan_save_stack+0x45/0x70 [ 10.244251] kasan_save_track+0x18/0x40 [ 10.244474] kasan_save_alloc_info+0x3b/0x50 [ 10.244666] __kasan_kmalloc+0xb7/0xc0 [ 10.244890] __kmalloc_cache_noprof+0x189/0x420 [ 10.245048] kmalloc_oob_right+0xa9/0x7f0 [ 10.245189] kunit_try_run_case+0x1a5/0x480 [ 10.245363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.245630] kthread+0x337/0x6f0 [ 10.245810] ret_from_fork+0x116/0x1d0 [ 10.246000] ret_from_fork_asm+0x1a/0x30 [ 10.246203] [ 10.246301] The buggy address belongs to the object at ffff888102f85f00 [ 10.246301] which belongs to the cache kmalloc-128 of size 128 [ 10.246936] The buggy address is located 13 bytes to the right of [ 10.246936] allocated 115-byte region [ffff888102f85f00, ffff888102f85f73) [ 10.247329] [ 10.247403] The buggy address belongs to the physical page: [ 10.247582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f85 [ 10.248051] flags: 0x200000000000000(node=0|zone=2) [ 10.248345] page_type: f5(slab) [ 10.248536] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.249031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.249379] page dumped because: kasan: bad access detected [ 10.249649] [ 10.249976] Memory state around the buggy address: [ 10.250201] ffff888102f85e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.250520] ffff888102f85f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.250846] >ffff888102f85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.251099] ^ [ 10.251265] ffff888102f86000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.251605] ffff888102f86080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 10.252024] ================================================================== [ 10.209465] ================================================================== [ 10.209873] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.210260] Write of size 1 at addr ffff888102f85f78 by task kunit_try_catch/153 [ 10.210552] [ 10.210723] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 10.210767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.210780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.210800] Call Trace: [ 10.210813] <TASK> [ 10.210850] dump_stack_lvl+0x73/0xb0 [ 10.210876] print_report+0xd1/0x650 [ 10.210898] ? __virt_addr_valid+0x1db/0x2d0 [ 10.210938] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.210959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.210996] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.211019] kasan_report+0x141/0x180 [ 10.211056] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.211083] __asan_report_store1_noabort+0x1b/0x30 [ 10.211103] kmalloc_oob_right+0x6bd/0x7f0 [ 10.211125] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.211149] ? __schedule+0x10cc/0x2b60 [ 10.211172] ? __pfx_read_tsc+0x10/0x10 [ 10.211193] ? ktime_get_ts64+0x86/0x230 [ 10.211216] kunit_try_run_case+0x1a5/0x480 [ 10.211236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.211256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.211279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.211303] ? __kthread_parkme+0x82/0x180 [ 10.211322] ? preempt_count_sub+0x50/0x80 [ 10.211346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.211366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.211390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.211414] kthread+0x337/0x6f0 [ 10.211432] ? trace_preempt_on+0x20/0xc0 [ 10.211473] ? __pfx_kthread+0x10/0x10 [ 10.211493] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.211515] ? calculate_sigpending+0x7b/0xa0 [ 10.211552] ? __pfx_kthread+0x10/0x10 [ 10.211573] ret_from_fork+0x116/0x1d0 [ 10.211591] ? __pfx_kthread+0x10/0x10 [ 10.211621] ret_from_fork_asm+0x1a/0x30 [ 10.211651] </TASK> [ 10.211661] [ 10.222368] Allocated by task 153: [ 10.222555] kasan_save_stack+0x45/0x70 [ 10.222843] kasan_save_track+0x18/0x40 [ 10.223152] kasan_save_alloc_info+0x3b/0x50 [ 10.223499] __kasan_kmalloc+0xb7/0xc0 [ 10.223964] __kmalloc_cache_noprof+0x189/0x420 [ 10.224204] kmalloc_oob_right+0xa9/0x7f0 [ 10.224521] kunit_try_run_case+0x1a5/0x480 [ 10.224924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.225161] kthread+0x337/0x6f0 [ 10.225337] ret_from_fork+0x116/0x1d0 [ 10.225510] ret_from_fork_asm+0x1a/0x30 [ 10.225723] [ 10.226322] The buggy address belongs to the object at ffff888102f85f00 [ 10.226322] which belongs to the cache kmalloc-128 of size 128 [ 10.226875] The buggy address is located 5 bytes to the right of [ 10.226875] allocated 115-byte region [ffff888102f85f00, ffff888102f85f73) [ 10.227571] [ 10.227679] The buggy address belongs to the physical page: [ 10.227994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f85 [ 10.228395] flags: 0x200000000000000(node=0|zone=2) [ 10.228677] page_type: f5(slab) [ 10.228849] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.229243] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.229581] page dumped because: kasan: bad access detected [ 10.229825] [ 10.229922] Memory state around the buggy address: [ 10.230220] ffff888102f85e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.230565] ffff888102f85e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.230902] >ffff888102f85f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.231169] ^ [ 10.231854] ffff888102f85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.232175] ffff888102f86000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.232476] ================================================================== [ 10.178938] ================================================================== [ 10.179922] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.181137] Write of size 1 at addr ffff888102f85f73 by task kunit_try_catch/153 [ 10.182038] [ 10.183155] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 10.183503] Tainted: [N]=TEST [ 10.183533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.183759] Call Trace: [ 10.183826] <TASK> [ 10.183968] dump_stack_lvl+0x73/0xb0 [ 10.184052] print_report+0xd1/0x650 [ 10.184082] ? __virt_addr_valid+0x1db/0x2d0 [ 10.184107] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.184128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.184151] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.184173] kasan_report+0x141/0x180 [ 10.184197] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.184224] __asan_report_store1_noabort+0x1b/0x30 [ 10.184245] kmalloc_oob_right+0x6f0/0x7f0 [ 10.184267] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.184290] ? __schedule+0x10cc/0x2b60 [ 10.184315] ? __pfx_read_tsc+0x10/0x10 [ 10.184337] ? ktime_get_ts64+0x86/0x230 [ 10.184362] kunit_try_run_case+0x1a5/0x480 [ 10.184386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.184405] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.184431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.184455] ? __kthread_parkme+0x82/0x180 [ 10.184477] ? preempt_count_sub+0x50/0x80 [ 10.184501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.184522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.184546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.184570] kthread+0x337/0x6f0 [ 10.184589] ? trace_preempt_on+0x20/0xc0 [ 10.184627] ? __pfx_kthread+0x10/0x10 [ 10.184647] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.184669] ? calculate_sigpending+0x7b/0xa0 [ 10.184694] ? __pfx_kthread+0x10/0x10 [ 10.184716] ret_from_fork+0x116/0x1d0 [ 10.184734] ? __pfx_kthread+0x10/0x10 [ 10.184769] ret_from_fork_asm+0x1a/0x30 [ 10.184825] </TASK> [ 10.184891] [ 10.194556] Allocated by task 153: [ 10.195136] kasan_save_stack+0x45/0x70 [ 10.195349] kasan_save_track+0x18/0x40 [ 10.195537] kasan_save_alloc_info+0x3b/0x50 [ 10.195742] __kasan_kmalloc+0xb7/0xc0 [ 10.196060] __kmalloc_cache_noprof+0x189/0x420 [ 10.196258] kmalloc_oob_right+0xa9/0x7f0 [ 10.196469] kunit_try_run_case+0x1a5/0x480 [ 10.196665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.196927] kthread+0x337/0x6f0 [ 10.197125] ret_from_fork+0x116/0x1d0 [ 10.197798] ret_from_fork_asm+0x1a/0x30 [ 10.197983] [ 10.198108] The buggy address belongs to the object at ffff888102f85f00 [ 10.198108] which belongs to the cache kmalloc-128 of size 128 [ 10.199121] The buggy address is located 0 bytes to the right of [ 10.199121] allocated 115-byte region [ffff888102f85f00, ffff888102f85f73) [ 10.199672] [ 10.200068] The buggy address belongs to the physical page: [ 10.200677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f85 [ 10.201506] flags: 0x200000000000000(node=0|zone=2) [ 10.202448] page_type: f5(slab) [ 10.203274] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.203627] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.204325] page dumped because: kasan: bad access detected [ 10.204737] [ 10.205037] Memory state around the buggy address: [ 10.205838] ffff888102f85e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.206285] ffff888102f85e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.206635] >ffff888102f85f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.206958] ^ [ 10.207311] ffff888102f85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.207597] ffff888102f86000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.208263] ==================================================================