Date
June 17, 2025, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.563350] ================================================================== [ 16.563420] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.563493] Write of size 1 at addr fff00000c748a378 by task kunit_try_catch/145 [ 16.563625] [ 16.563675] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 16.563771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.563813] Hardware name: linux,dummy-virt (DT) [ 16.563923] Call trace: [ 16.563958] show_stack+0x20/0x38 (C) [ 16.564015] dump_stack_lvl+0x8c/0xd0 [ 16.564084] print_report+0x118/0x608 [ 16.564132] kasan_report+0xdc/0x128 [ 16.564507] __asan_report_store1_noabort+0x20/0x30 [ 16.564601] kmalloc_oob_right+0x538/0x660 [ 16.564674] kunit_try_run_case+0x170/0x3f0 [ 16.564786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.564840] kthread+0x328/0x630 [ 16.564889] ret_from_fork+0x10/0x20 [ 16.564967] [ 16.564986] Allocated by task 145: [ 16.565013] kasan_save_stack+0x3c/0x68 [ 16.565505] kasan_save_track+0x20/0x40 [ 16.565595] kasan_save_alloc_info+0x40/0x58 [ 16.565643] __kasan_kmalloc+0xd4/0xd8 [ 16.565699] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.565757] kmalloc_oob_right+0xb0/0x660 [ 16.565794] kunit_try_run_case+0x170/0x3f0 [ 16.565831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.565873] kthread+0x328/0x630 [ 16.565923] ret_from_fork+0x10/0x20 [ 16.565970] [ 16.566045] The buggy address belongs to the object at fff00000c748a300 [ 16.566045] which belongs to the cache kmalloc-128 of size 128 [ 16.566288] The buggy address is located 5 bytes to the right of [ 16.566288] allocated 115-byte region [fff00000c748a300, fff00000c748a373) [ 16.566830] [ 16.566864] The buggy address belongs to the physical page: [ 16.566895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a [ 16.566962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.567194] page_type: f5(slab) [ 16.567241] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.567884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.567961] page dumped because: kasan: bad access detected [ 16.568048] [ 16.568102] Memory state around the buggy address: [ 16.568161] fff00000c748a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.568271] fff00000c748a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.568343] >fff00000c748a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.568434] ^ [ 16.568545] fff00000c748a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.568592] fff00000c748a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.568639] ================================================================== [ 16.556216] ================================================================== [ 16.556561] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.557433] Write of size 1 at addr fff00000c748a373 by task kunit_try_catch/145 [ 16.557546] [ 16.558457] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 16.558614] Tainted: [N]=TEST [ 16.558650] Hardware name: linux,dummy-virt (DT) [ 16.558881] Call trace: [ 16.559075] show_stack+0x20/0x38 (C) [ 16.559220] dump_stack_lvl+0x8c/0xd0 [ 16.559286] print_report+0x118/0x608 [ 16.559337] kasan_report+0xdc/0x128 [ 16.559384] __asan_report_store1_noabort+0x20/0x30 [ 16.559432] kmalloc_oob_right+0x5a4/0x660 [ 16.559478] kunit_try_run_case+0x170/0x3f0 [ 16.559530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.559583] kthread+0x328/0x630 [ 16.559627] ret_from_fork+0x10/0x20 [ 16.559785] [ 16.559828] Allocated by task 145: [ 16.559954] kasan_save_stack+0x3c/0x68 [ 16.560025] kasan_save_track+0x20/0x40 [ 16.560064] kasan_save_alloc_info+0x40/0x58 [ 16.560100] __kasan_kmalloc+0xd4/0xd8 [ 16.560138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.560179] kmalloc_oob_right+0xb0/0x660 [ 16.560215] kunit_try_run_case+0x170/0x3f0 [ 16.560253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.560296] kthread+0x328/0x630 [ 16.560328] ret_from_fork+0x10/0x20 [ 16.560381] [ 16.560442] The buggy address belongs to the object at fff00000c748a300 [ 16.560442] which belongs to the cache kmalloc-128 of size 128 [ 16.560538] The buggy address is located 0 bytes to the right of [ 16.560538] allocated 115-byte region [fff00000c748a300, fff00000c748a373) [ 16.560606] [ 16.560690] The buggy address belongs to the physical page: [ 16.560862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a [ 16.561156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.561454] page_type: f5(slab) [ 16.561767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.561831] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.561953] page dumped because: kasan: bad access detected [ 16.561995] [ 16.562020] Memory state around the buggy address: [ 16.562311] fff00000c748a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.562382] fff00000c748a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.562438] >fff00000c748a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.562492] ^ [ 16.562576] fff00000c748a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.562619] fff00000c748a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.562681] ================================================================== [ 16.569156] ================================================================== [ 16.569317] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.569375] Read of size 1 at addr fff00000c748a380 by task kunit_try_catch/145 [ 16.569424] [ 16.569453] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 16.569537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.569563] Hardware name: linux,dummy-virt (DT) [ 16.569600] Call trace: [ 16.569623] show_stack+0x20/0x38 (C) [ 16.569672] dump_stack_lvl+0x8c/0xd0 [ 16.569719] print_report+0x118/0x608 [ 16.569777] kasan_report+0xdc/0x128 [ 16.569824] __asan_report_load1_noabort+0x20/0x30 [ 16.569880] kmalloc_oob_right+0x5d0/0x660 [ 16.569938] kunit_try_run_case+0x170/0x3f0 [ 16.569985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.570149] kthread+0x328/0x630 [ 16.570210] ret_from_fork+0x10/0x20 [ 16.570534] [ 16.570557] Allocated by task 145: [ 16.570586] kasan_save_stack+0x3c/0x68 [ 16.570696] kasan_save_track+0x20/0x40 [ 16.570774] kasan_save_alloc_info+0x40/0x58 [ 16.570821] __kasan_kmalloc+0xd4/0xd8 [ 16.570896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.570979] kmalloc_oob_right+0xb0/0x660 [ 16.571058] kunit_try_run_case+0x170/0x3f0 [ 16.571122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.571184] kthread+0x328/0x630 [ 16.571216] ret_from_fork+0x10/0x20 [ 16.571278] [ 16.571296] The buggy address belongs to the object at fff00000c748a300 [ 16.571296] which belongs to the cache kmalloc-128 of size 128 [ 16.571354] The buggy address is located 13 bytes to the right of [ 16.571354] allocated 115-byte region [fff00000c748a300, fff00000c748a373) [ 16.571573] [ 16.571625] The buggy address belongs to the physical page: [ 16.571673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a [ 16.571781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.571848] page_type: f5(slab) [ 16.571886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.571947] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.571987] page dumped because: kasan: bad access detected [ 16.572218] [ 16.572279] Memory state around the buggy address: [ 16.572340] fff00000c748a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.572430] fff00000c748a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.572503] >fff00000c748a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.572542] ^ [ 16.572767] fff00000c748a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.572833] fff00000c748a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.572968] ==================================================================
[ 16.579532] ================================================================== [ 16.580615] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 16.581668] Write of size 1 at addr ffff888100ab8273 by task kunit_try_catch/163 [ 16.583106] [ 16.584737] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 16.585201] Tainted: [N]=TEST [ 16.585283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.585550] Call Trace: [ 16.585634] <TASK> [ 16.585811] dump_stack_lvl+0x73/0xb0 [ 16.585968] print_report+0xd1/0x650 [ 16.586012] ? __virt_addr_valid+0x1db/0x2d0 [ 16.586050] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.586080] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.586111] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.586143] kasan_report+0x141/0x180 [ 16.586173] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.586209] __asan_report_store1_noabort+0x1b/0x30 [ 16.586270] kmalloc_oob_right+0x6f0/0x7f0 [ 16.586305] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.586336] ? __schedule+0x10cc/0x2b60 [ 16.586364] ? __pfx_read_tsc+0x10/0x10 [ 16.586394] ? ktime_get_ts64+0x86/0x230 [ 16.586428] kunit_try_run_case+0x1a5/0x480 [ 16.586465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.586496] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.586525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.586561] ? __kthread_parkme+0x82/0x180 [ 16.586590] ? preempt_count_sub+0x50/0x80 [ 16.586622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.586655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.586686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.586718] kthread+0x337/0x6f0 [ 16.586745] ? trace_preempt_on+0x20/0xc0 [ 16.586778] ? __pfx_kthread+0x10/0x10 [ 16.586806] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.586860] ? calculate_sigpending+0x7b/0xa0 [ 16.586899] ? __pfx_kthread+0x10/0x10 [ 16.586928] ret_from_fork+0x116/0x1d0 [ 16.586955] ? __pfx_kthread+0x10/0x10 [ 16.586984] ret_from_fork_asm+0x1a/0x30 [ 16.587063] </TASK> [ 16.587146] [ 16.601808] Allocated by task 163: [ 16.602448] kasan_save_stack+0x45/0x70 [ 16.602926] kasan_save_track+0x18/0x40 [ 16.603324] kasan_save_alloc_info+0x3b/0x50 [ 16.604522] __kasan_kmalloc+0xb7/0xc0 [ 16.605334] __kmalloc_cache_noprof+0x189/0x420 [ 16.605969] kmalloc_oob_right+0xa9/0x7f0 [ 16.606332] kunit_try_run_case+0x1a5/0x480 [ 16.607036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.607514] kthread+0x337/0x6f0 [ 16.607913] ret_from_fork+0x116/0x1d0 [ 16.608201] ret_from_fork_asm+0x1a/0x30 [ 16.608564] [ 16.608983] The buggy address belongs to the object at ffff888100ab8200 [ 16.608983] which belongs to the cache kmalloc-128 of size 128 [ 16.610280] The buggy address is located 0 bytes to the right of [ 16.610280] allocated 115-byte region [ffff888100ab8200, ffff888100ab8273) [ 16.611639] [ 16.612283] The buggy address belongs to the physical page: [ 16.613171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8 [ 16.614448] flags: 0x200000000000000(node=0|zone=2) [ 16.615567] page_type: f5(slab) [ 16.616599] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.617133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.618040] page dumped because: kasan: bad access detected [ 16.618630] [ 16.618987] Memory state around the buggy address: [ 16.620160] ffff888100ab8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.620762] ffff888100ab8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.621411] >ffff888100ab8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.621893] ^ [ 16.622532] ffff888100ab8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.623115] ffff888100ab8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.623714] ================================================================== [ 16.626670] ================================================================== [ 16.627451] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 16.628340] Write of size 1 at addr ffff888100ab8278 by task kunit_try_catch/163 [ 16.628746] [ 16.629194] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 16.629341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.629376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.629431] Call Trace: [ 16.629476] <TASK> [ 16.629520] dump_stack_lvl+0x73/0xb0 [ 16.629601] print_report+0xd1/0x650 [ 16.629671] ? __virt_addr_valid+0x1db/0x2d0 [ 16.629747] ? kmalloc_oob_right+0x6bd/0x7f0 [ 16.629817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.629901] ? kmalloc_oob_right+0x6bd/0x7f0 [ 16.629971] kasan_report+0x141/0x180 [ 16.630169] ? kmalloc_oob_right+0x6bd/0x7f0 [ 16.630256] __asan_report_store1_noabort+0x1b/0x30 [ 16.630333] kmalloc_oob_right+0x6bd/0x7f0 [ 16.630404] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.630475] ? __schedule+0x10cc/0x2b60 [ 16.630543] ? __pfx_read_tsc+0x10/0x10 [ 16.630600] ? ktime_get_ts64+0x86/0x230 [ 16.630666] kunit_try_run_case+0x1a5/0x480 [ 16.630732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.630791] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.630879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.630961] ? __kthread_parkme+0x82/0x180 [ 16.631007] ? preempt_count_sub+0x50/0x80 [ 16.631042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.631075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.631108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.631141] kthread+0x337/0x6f0 [ 16.631167] ? trace_preempt_on+0x20/0xc0 [ 16.631199] ? __pfx_kthread+0x10/0x10 [ 16.631244] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.631290] ? calculate_sigpending+0x7b/0xa0 [ 16.631324] ? __pfx_kthread+0x10/0x10 [ 16.631353] ret_from_fork+0x116/0x1d0 [ 16.631378] ? __pfx_kthread+0x10/0x10 [ 16.631406] ret_from_fork_asm+0x1a/0x30 [ 16.631447] </TASK> [ 16.631461] [ 16.646498] Allocated by task 163: [ 16.646828] kasan_save_stack+0x45/0x70 [ 16.647422] kasan_save_track+0x18/0x40 [ 16.647925] kasan_save_alloc_info+0x3b/0x50 [ 16.648358] __kasan_kmalloc+0xb7/0xc0 [ 16.648715] __kmalloc_cache_noprof+0x189/0x420 [ 16.649348] kmalloc_oob_right+0xa9/0x7f0 [ 16.649819] kunit_try_run_case+0x1a5/0x480 [ 16.650539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.650937] kthread+0x337/0x6f0 [ 16.651682] ret_from_fork+0x116/0x1d0 [ 16.652186] ret_from_fork_asm+0x1a/0x30 [ 16.652812] [ 16.652988] The buggy address belongs to the object at ffff888100ab8200 [ 16.652988] which belongs to the cache kmalloc-128 of size 128 [ 16.654002] The buggy address is located 5 bytes to the right of [ 16.654002] allocated 115-byte region [ffff888100ab8200, ffff888100ab8273) [ 16.655460] [ 16.655734] The buggy address belongs to the physical page: [ 16.656266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8 [ 16.657122] flags: 0x200000000000000(node=0|zone=2) [ 16.657624] page_type: f5(slab) [ 16.657985] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.658673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.659382] page dumped because: kasan: bad access detected [ 16.660141] [ 16.660391] Memory state around the buggy address: [ 16.660808] ffff888100ab8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.661536] ffff888100ab8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.662364] >ffff888100ab8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.662963] ^ [ 16.663564] ffff888100ab8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.664417] ffff888100ab8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.664898] ================================================================== [ 16.666197] ================================================================== [ 16.667607] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 16.668140] Read of size 1 at addr ffff888100ab8280 by task kunit_try_catch/163 [ 16.668791] [ 16.669023] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 16.669146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.669183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.669290] Call Trace: [ 16.669695] <TASK> [ 16.669768] dump_stack_lvl+0x73/0xb0 [ 16.669896] print_report+0xd1/0x650 [ 16.669965] ? __virt_addr_valid+0x1db/0x2d0 [ 16.670025] ? kmalloc_oob_right+0x68a/0x7f0 [ 16.670057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.670089] ? kmalloc_oob_right+0x68a/0x7f0 [ 16.670119] kasan_report+0x141/0x180 [ 16.670150] ? kmalloc_oob_right+0x68a/0x7f0 [ 16.670186] __asan_report_load1_noabort+0x18/0x20 [ 16.670230] kmalloc_oob_right+0x68a/0x7f0 [ 16.670285] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.670317] ? __schedule+0x10cc/0x2b60 [ 16.670345] ? __pfx_read_tsc+0x10/0x10 [ 16.670374] ? ktime_get_ts64+0x86/0x230 [ 16.670408] kunit_try_run_case+0x1a5/0x480 [ 16.670440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.670471] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.670498] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.670533] ? __kthread_parkme+0x82/0x180 [ 16.670559] ? preempt_count_sub+0x50/0x80 [ 16.670591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.670623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.670655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.670688] kthread+0x337/0x6f0 [ 16.670715] ? trace_preempt_on+0x20/0xc0 [ 16.670745] ? __pfx_kthread+0x10/0x10 [ 16.670773] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.670806] ? calculate_sigpending+0x7b/0xa0 [ 16.670864] ? __pfx_kthread+0x10/0x10 [ 16.670897] ret_from_fork+0x116/0x1d0 [ 16.670922] ? __pfx_kthread+0x10/0x10 [ 16.670950] ret_from_fork_asm+0x1a/0x30 [ 16.670991] </TASK> [ 16.671005] [ 16.684760] Allocated by task 163: [ 16.685120] kasan_save_stack+0x45/0x70 [ 16.685560] kasan_save_track+0x18/0x40 [ 16.685999] kasan_save_alloc_info+0x3b/0x50 [ 16.686465] __kasan_kmalloc+0xb7/0xc0 [ 16.686877] __kmalloc_cache_noprof+0x189/0x420 [ 16.687377] kmalloc_oob_right+0xa9/0x7f0 [ 16.687804] kunit_try_run_case+0x1a5/0x480 [ 16.688293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.688658] kthread+0x337/0x6f0 [ 16.688913] ret_from_fork+0x116/0x1d0 [ 16.693641] ret_from_fork_asm+0x1a/0x30 [ 16.694515] [ 16.695273] The buggy address belongs to the object at ffff888100ab8200 [ 16.695273] which belongs to the cache kmalloc-128 of size 128 [ 16.697154] The buggy address is located 13 bytes to the right of [ 16.697154] allocated 115-byte region [ffff888100ab8200, ffff888100ab8273) [ 16.699986] [ 16.700125] The buggy address belongs to the physical page: [ 16.700425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8 [ 16.700814] flags: 0x200000000000000(node=0|zone=2) [ 16.701977] page_type: f5(slab) [ 16.702224] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.702774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.703585] page dumped because: kasan: bad access detected [ 16.704073] [ 16.704279] Memory state around the buggy address: [ 16.704747] ffff888100ab8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.705372] ffff888100ab8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.706089] >ffff888100ab8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.706685] ^ [ 16.707131] ffff888100ab8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.708038] ffff888100ab8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.708765] ==================================================================