Date
June 16, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.669627] ================================================================== [ 18.669747] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 18.669892] Read of size 1 at addr fff00000c6399a80 by task kunit_try_catch/145 [ 18.670024] [ 18.670103] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.670322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.670394] Hardware name: linux,dummy-virt (DT) [ 18.670473] Call trace: [ 18.670528] show_stack+0x20/0x38 (C) [ 18.670647] dump_stack_lvl+0x8c/0xd0 [ 18.670761] print_report+0x118/0x608 [ 18.670895] kasan_report+0xdc/0x128 [ 18.671010] __asan_report_load1_noabort+0x20/0x30 [ 18.671123] kmalloc_oob_right+0x5d0/0x660 [ 18.671231] kunit_try_run_case+0x170/0x3f0 [ 18.671343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.671484] kthread+0x328/0x630 [ 18.671581] ret_from_fork+0x10/0x20 [ 18.671685] [ 18.671723] Allocated by task 145: [ 18.671781] kasan_save_stack+0x3c/0x68 [ 18.671882] kasan_save_track+0x20/0x40 [ 18.671969] kasan_save_alloc_info+0x40/0x58 [ 18.672052] __kasan_kmalloc+0xd4/0xd8 [ 18.672135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.672230] kmalloc_oob_right+0xb0/0x660 [ 18.672317] kunit_try_run_case+0x170/0x3f0 [ 18.672404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.672505] kthread+0x328/0x630 [ 18.672583] ret_from_fork+0x10/0x20 [ 18.672668] [ 18.672713] The buggy address belongs to the object at fff00000c6399a00 [ 18.672713] which belongs to the cache kmalloc-128 of size 128 [ 18.672858] The buggy address is located 13 bytes to the right of [ 18.672858] allocated 115-byte region [fff00000c6399a00, fff00000c6399a73) [ 18.673066] [ 18.673128] The buggy address belongs to the physical page: [ 18.673219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 18.673343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.673474] page_type: f5(slab) [ 18.673593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.673764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.673928] page dumped because: kasan: bad access detected [ 18.674038] [ 18.674084] Memory state around the buggy address: [ 18.674163] fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674311] fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.674457] >fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674587] ^ [ 18.674681] fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674821] fff00000c6399b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.674959] ================================================================== [ 18.650026] ================================================================== [ 18.650758] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.652693] Write of size 1 at addr fff00000c6399a73 by task kunit_try_catch/145 [ 18.652990] [ 18.654493] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.654704] Tainted: [N]=TEST [ 18.654751] Hardware name: linux,dummy-virt (DT) [ 18.655069] Call trace: [ 18.655296] show_stack+0x20/0x38 (C) [ 18.655478] dump_stack_lvl+0x8c/0xd0 [ 18.655555] print_report+0x118/0x608 [ 18.655616] kasan_report+0xdc/0x128 [ 18.655671] __asan_report_store1_noabort+0x20/0x30 [ 18.655729] kmalloc_oob_right+0x5a4/0x660 [ 18.655783] kunit_try_run_case+0x170/0x3f0 [ 18.655855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.655922] kthread+0x328/0x630 [ 18.655975] ret_from_fork+0x10/0x20 [ 18.656169] [ 18.656221] Allocated by task 145: [ 18.656365] kasan_save_stack+0x3c/0x68 [ 18.656450] kasan_save_track+0x20/0x40 [ 18.656496] kasan_save_alloc_info+0x40/0x58 [ 18.656537] __kasan_kmalloc+0xd4/0xd8 [ 18.656578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.656623] kmalloc_oob_right+0xb0/0x660 [ 18.656663] kunit_try_run_case+0x170/0x3f0 [ 18.656703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.656752] kthread+0x328/0x630 [ 18.656794] ret_from_fork+0x10/0x20 [ 18.656917] [ 18.657060] The buggy address belongs to the object at fff00000c6399a00 [ 18.657060] which belongs to the cache kmalloc-128 of size 128 [ 18.657253] The buggy address is located 0 bytes to the right of [ 18.657253] allocated 115-byte region [fff00000c6399a00, fff00000c6399a73) [ 18.657336] [ 18.657438] The buggy address belongs to the physical page: [ 18.657720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 18.658124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.658492] page_type: f5(slab) [ 18.658900] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.658979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.659119] page dumped because: kasan: bad access detected [ 18.659172] [ 18.659207] Memory state around the buggy address: [ 18.659490] fff00000c6399900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.659576] fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.659643] >fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.659707] ^ [ 18.659802] fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.659865] fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.659942] ================================================================== [ 18.663631] ================================================================== [ 18.663717] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 18.663826] Write of size 1 at addr fff00000c6399a78 by task kunit_try_catch/145 [ 18.663944] [ 18.664027] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 18.664246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.664314] Hardware name: linux,dummy-virt (DT) [ 18.664389] Call trace: [ 18.664442] show_stack+0x20/0x38 (C) [ 18.664561] dump_stack_lvl+0x8c/0xd0 [ 18.664671] print_report+0x118/0x608 [ 18.664777] kasan_report+0xdc/0x128 [ 18.664916] __asan_report_store1_noabort+0x20/0x30 [ 18.665021] kmalloc_oob_right+0x538/0x660 [ 18.665113] kunit_try_run_case+0x170/0x3f0 [ 18.665220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.665335] kthread+0x328/0x630 [ 18.665434] ret_from_fork+0x10/0x20 [ 18.665545] [ 18.665588] Allocated by task 145: [ 18.665656] kasan_save_stack+0x3c/0x68 [ 18.665755] kasan_save_track+0x20/0x40 [ 18.665895] kasan_save_alloc_info+0x40/0x58 [ 18.666022] __kasan_kmalloc+0xd4/0xd8 [ 18.666152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.666254] kmalloc_oob_right+0xb0/0x660 [ 18.666344] kunit_try_run_case+0x170/0x3f0 [ 18.666436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.666541] kthread+0x328/0x630 [ 18.666621] ret_from_fork+0x10/0x20 [ 18.666699] [ 18.666743] The buggy address belongs to the object at fff00000c6399a00 [ 18.666743] which belongs to the cache kmalloc-128 of size 128 [ 18.666881] The buggy address is located 5 bytes to the right of [ 18.666881] allocated 115-byte region [fff00000c6399a00, fff00000c6399a73) [ 18.667027] [ 18.667075] The buggy address belongs to the physical page: [ 18.667146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106399 [ 18.667269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.667385] page_type: f5(slab) [ 18.667485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.667628] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.667740] page dumped because: kasan: bad access detected [ 18.667816] [ 18.667868] Memory state around the buggy address: [ 18.667935] fff00000c6399900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.668043] fff00000c6399980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.668142] >fff00000c6399a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.668240] ^ [ 18.668350] fff00000c6399a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.668454] fff00000c6399b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.668542] ==================================================================
[ 10.718759] ================================================================== [ 10.719063] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.719325] Read of size 1 at addr ffff888102a15a80 by task kunit_try_catch/161 [ 10.719642] [ 10.719996] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 10.720049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.720060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.720083] Call Trace: [ 10.720096] <TASK> [ 10.720112] dump_stack_lvl+0x73/0xb0 [ 10.720141] print_report+0xd1/0x650 [ 10.720163] ? __virt_addr_valid+0x1db/0x2d0 [ 10.720185] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.720204] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.720225] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.720246] kasan_report+0x141/0x180 [ 10.720266] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.720291] __asan_report_load1_noabort+0x18/0x20 [ 10.720314] kmalloc_oob_right+0x68a/0x7f0 [ 10.720336] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.720357] ? __schedule+0x10cc/0x2b60 [ 10.720379] ? __pfx_read_tsc+0x10/0x10 [ 10.720596] ? ktime_get_ts64+0x86/0x230 [ 10.720634] kunit_try_run_case+0x1a5/0x480 [ 10.720659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.720680] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.720702] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.720724] ? __kthread_parkme+0x82/0x180 [ 10.720744] ? preempt_count_sub+0x50/0x80 [ 10.720767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.720790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.720812] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.720834] kthread+0x337/0x6f0 [ 10.720852] ? trace_preempt_on+0x20/0xc0 [ 10.720876] ? __pfx_kthread+0x10/0x10 [ 10.720895] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.720914] ? calculate_sigpending+0x7b/0xa0 [ 10.720953] ? __pfx_kthread+0x10/0x10 [ 10.720973] ret_from_fork+0x116/0x1d0 [ 10.720991] ? __pfx_kthread+0x10/0x10 [ 10.721010] ret_from_fork_asm+0x1a/0x30 [ 10.721040] </TASK> [ 10.721051] [ 10.727681] Allocated by task 161: [ 10.727840] kasan_save_stack+0x45/0x70 [ 10.728050] kasan_save_track+0x18/0x40 [ 10.728210] kasan_save_alloc_info+0x3b/0x50 [ 10.728577] __kasan_kmalloc+0xb7/0xc0 [ 10.728725] __kmalloc_cache_noprof+0x189/0x420 [ 10.728957] kmalloc_oob_right+0xa9/0x7f0 [ 10.729149] kunit_try_run_case+0x1a5/0x480 [ 10.729316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.729690] kthread+0x337/0x6f0 [ 10.729851] ret_from_fork+0x116/0x1d0 [ 10.730038] ret_from_fork_asm+0x1a/0x30 [ 10.730171] [ 10.730235] The buggy address belongs to the object at ffff888102a15a00 [ 10.730235] which belongs to the cache kmalloc-128 of size 128 [ 10.731013] The buggy address is located 13 bytes to the right of [ 10.731013] allocated 115-byte region [ffff888102a15a00, ffff888102a15a73) [ 10.731445] [ 10.731533] The buggy address belongs to the physical page: [ 10.731883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a15 [ 10.732167] flags: 0x200000000000000(node=0|zone=2) [ 10.732391] page_type: f5(slab) [ 10.732566] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.732845] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.733145] page dumped because: kasan: bad access detected [ 10.733349] [ 10.733482] Memory state around the buggy address: [ 10.733686] ffff888102a15980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.733968] ffff888102a15a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.734240] >ffff888102a15a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.734719] ^ [ 10.734861] ffff888102a15b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.735145] ffff888102a15b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.735423] ================================================================== [ 10.670255] ================================================================== [ 10.670886] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.671763] Write of size 1 at addr ffff888102a15a73 by task kunit_try_catch/161 [ 10.672151] [ 10.673106] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 10.673462] Tainted: [N]=TEST [ 10.673494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.673708] Call Trace: [ 10.673775] <TASK> [ 10.673919] dump_stack_lvl+0x73/0xb0 [ 10.674042] print_report+0xd1/0x650 [ 10.674071] ? __virt_addr_valid+0x1db/0x2d0 [ 10.674097] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.674117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.674138] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.674159] kasan_report+0x141/0x180 [ 10.674180] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.674205] __asan_report_store1_noabort+0x1b/0x30 [ 10.674228] kmalloc_oob_right+0x6f0/0x7f0 [ 10.674249] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.674271] ? __schedule+0x10cc/0x2b60 [ 10.674292] ? __pfx_read_tsc+0x10/0x10 [ 10.674314] ? ktime_get_ts64+0x86/0x230 [ 10.674339] kunit_try_run_case+0x1a5/0x480 [ 10.674365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.674386] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.674407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.674429] ? __kthread_parkme+0x82/0x180 [ 10.674450] ? preempt_count_sub+0x50/0x80 [ 10.674474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.674496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.674518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.674540] kthread+0x337/0x6f0 [ 10.674559] ? trace_preempt_on+0x20/0xc0 [ 10.674583] ? __pfx_kthread+0x10/0x10 [ 10.674602] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.674622] ? calculate_sigpending+0x7b/0xa0 [ 10.674646] ? __pfx_kthread+0x10/0x10 [ 10.674666] ret_from_fork+0x116/0x1d0 [ 10.674683] ? __pfx_kthread+0x10/0x10 [ 10.674703] ret_from_fork_asm+0x1a/0x30 [ 10.674756] </TASK> [ 10.674823] [ 10.682024] Allocated by task 161: [ 10.682815] kasan_save_stack+0x45/0x70 [ 10.683082] kasan_save_track+0x18/0x40 [ 10.683276] kasan_save_alloc_info+0x3b/0x50 [ 10.683814] __kasan_kmalloc+0xb7/0xc0 [ 10.684085] __kmalloc_cache_noprof+0x189/0x420 [ 10.684319] kmalloc_oob_right+0xa9/0x7f0 [ 10.684753] kunit_try_run_case+0x1a5/0x480 [ 10.685155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.685542] kthread+0x337/0x6f0 [ 10.685753] ret_from_fork+0x116/0x1d0 [ 10.685919] ret_from_fork_asm+0x1a/0x30 [ 10.686116] [ 10.686264] The buggy address belongs to the object at ffff888102a15a00 [ 10.686264] which belongs to the cache kmalloc-128 of size 128 [ 10.686926] The buggy address is located 0 bytes to the right of [ 10.686926] allocated 115-byte region [ffff888102a15a00, ffff888102a15a73) [ 10.687464] [ 10.687894] The buggy address belongs to the physical page: [ 10.688813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a15 [ 10.689368] flags: 0x200000000000000(node=0|zone=2) [ 10.690051] page_type: f5(slab) [ 10.690612] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.690925] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.691352] page dumped because: kasan: bad access detected [ 10.691651] [ 10.691825] Memory state around the buggy address: [ 10.692344] ffff888102a15900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.692738] ffff888102a15980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.693188] >ffff888102a15a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.693548] ^ [ 10.693965] ffff888102a15a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.694235] ffff888102a15b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.694645] ================================================================== [ 10.695946] ================================================================== [ 10.696367] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.696719] Write of size 1 at addr ffff888102a15a78 by task kunit_try_catch/161 [ 10.697235] [ 10.697343] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 10.697393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.697404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.697426] Call Trace: [ 10.697445] <TASK> [ 10.697465] dump_stack_lvl+0x73/0xb0 [ 10.697493] print_report+0xd1/0x650 [ 10.697517] ? __virt_addr_valid+0x1db/0x2d0 [ 10.697540] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.697559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.697580] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.697600] kasan_report+0x141/0x180 [ 10.697621] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.697646] __asan_report_store1_noabort+0x1b/0x30 [ 10.697669] kmalloc_oob_right+0x6bd/0x7f0 [ 10.697696] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.697718] ? __schedule+0x10cc/0x2b60 [ 10.697739] ? __pfx_read_tsc+0x10/0x10 [ 10.697759] ? ktime_get_ts64+0x86/0x230 [ 10.697811] kunit_try_run_case+0x1a5/0x480 [ 10.697834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.697855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.697890] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.697911] ? __kthread_parkme+0x82/0x180 [ 10.697960] ? preempt_count_sub+0x50/0x80 [ 10.697984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.698006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.698038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.698060] kthread+0x337/0x6f0 [ 10.698079] ? trace_preempt_on+0x20/0xc0 [ 10.698103] ? __pfx_kthread+0x10/0x10 [ 10.698122] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.698142] ? calculate_sigpending+0x7b/0xa0 [ 10.698165] ? __pfx_kthread+0x10/0x10 [ 10.698203] ret_from_fork+0x116/0x1d0 [ 10.698222] ? __pfx_kthread+0x10/0x10 [ 10.698241] ret_from_fork_asm+0x1a/0x30 [ 10.698292] </TASK> [ 10.698303] [ 10.705763] Allocated by task 161: [ 10.705887] kasan_save_stack+0x45/0x70 [ 10.706841] kasan_save_track+0x18/0x40 [ 10.707069] kasan_save_alloc_info+0x3b/0x50 [ 10.707284] __kasan_kmalloc+0xb7/0xc0 [ 10.707530] __kmalloc_cache_noprof+0x189/0x420 [ 10.707770] kmalloc_oob_right+0xa9/0x7f0 [ 10.708716] kunit_try_run_case+0x1a5/0x480 [ 10.708905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.709167] kthread+0x337/0x6f0 [ 10.709376] ret_from_fork+0x116/0x1d0 [ 10.709548] ret_from_fork_asm+0x1a/0x30 [ 10.709786] [ 10.709904] The buggy address belongs to the object at ffff888102a15a00 [ 10.709904] which belongs to the cache kmalloc-128 of size 128 [ 10.710925] The buggy address is located 5 bytes to the right of [ 10.710925] allocated 115-byte region [ffff888102a15a00, ffff888102a15a73) [ 10.711867] [ 10.711964] The buggy address belongs to the physical page: [ 10.712461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a15 [ 10.713141] flags: 0x200000000000000(node=0|zone=2) [ 10.713364] page_type: f5(slab) [ 10.713831] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.714368] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.714909] page dumped because: kasan: bad access detected [ 10.715281] [ 10.715380] Memory state around the buggy address: [ 10.715886] ffff888102a15900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.716222] ffff888102a15980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.716580] >ffff888102a15a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.717032] ^ [ 10.717337] ffff888102a15a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.717636] ffff888102a15b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.718056] ==================================================================