Date
June 19, 2025, 12:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.673672] ================================================================== [ 29.674739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.677241] Write of size 1 at addr fff00000c6466573 by task kunit_try_catch/147 [ 29.677570] [ 29.679788] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.680227] Tainted: [N]=TEST [ 29.680308] Hardware name: linux,dummy-virt (DT) [ 29.680924] Call trace: [ 29.681358] show_stack+0x20/0x38 (C) [ 29.681816] dump_stack_lvl+0x8c/0xd0 [ 29.681987] print_report+0x118/0x608 [ 29.682100] kasan_report+0xdc/0x128 [ 29.682240] __asan_report_store1_noabort+0x20/0x30 [ 29.682366] kmalloc_oob_right+0x5a4/0x660 [ 29.682475] kunit_try_run_case+0x170/0x3f0 [ 29.682589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.682721] kthread+0x328/0x630 [ 29.682840] ret_from_fork+0x10/0x20 [ 29.683406] [ 29.683517] Allocated by task 147: [ 29.683739] kasan_save_stack+0x3c/0x68 [ 29.683906] kasan_save_track+0x20/0x40 [ 29.684032] kasan_save_alloc_info+0x40/0x58 [ 29.684126] __kasan_kmalloc+0xd4/0xd8 [ 29.684355] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.684468] kmalloc_oob_right+0xb0/0x660 [ 29.684588] kunit_try_run_case+0x170/0x3f0 [ 29.684688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.684852] kthread+0x328/0x630 [ 29.684967] ret_from_fork+0x10/0x20 [ 29.685152] [ 29.685378] The buggy address belongs to the object at fff00000c6466500 [ 29.685378] which belongs to the cache kmalloc-128 of size 128 [ 29.685669] The buggy address is located 0 bytes to the right of [ 29.685669] allocated 115-byte region [fff00000c6466500, fff00000c6466573) [ 29.685856] [ 29.686055] The buggy address belongs to the physical page: [ 29.686447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 29.688272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.689466] page_type: f5(slab) [ 29.692063] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.692953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.693338] page dumped because: kasan: bad access detected [ 29.693774] [ 29.694757] Memory state around the buggy address: [ 29.696254] fff00000c6466400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.696475] fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.696665] >fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.696798] ^ [ 29.697010] fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.697117] fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.697272] ================================================================== [ 29.712160] ================================================================== [ 29.712288] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.712407] Read of size 1 at addr fff00000c6466580 by task kunit_try_catch/147 [ 29.712529] [ 29.712614] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.712827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.712906] Hardware name: linux,dummy-virt (DT) [ 29.712986] Call trace: [ 29.713778] show_stack+0x20/0x38 (C) [ 29.713927] dump_stack_lvl+0x8c/0xd0 [ 29.714072] print_report+0x118/0x608 [ 29.714214] kasan_report+0xdc/0x128 [ 29.714356] __asan_report_load1_noabort+0x20/0x30 [ 29.714487] kmalloc_oob_right+0x5d0/0x660 [ 29.714618] kunit_try_run_case+0x170/0x3f0 [ 29.714749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.714980] kthread+0x328/0x630 [ 29.715224] ret_from_fork+0x10/0x20 [ 29.715531] [ 29.715689] Allocated by task 147: [ 29.716074] kasan_save_stack+0x3c/0x68 [ 29.716428] kasan_save_track+0x20/0x40 [ 29.716577] kasan_save_alloc_info+0x40/0x58 [ 29.716796] __kasan_kmalloc+0xd4/0xd8 [ 29.716950] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.717477] kmalloc_oob_right+0xb0/0x660 [ 29.717570] kunit_try_run_case+0x170/0x3f0 [ 29.717650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.717743] kthread+0x328/0x630 [ 29.717822] ret_from_fork+0x10/0x20 [ 29.717943] [ 29.718009] The buggy address belongs to the object at fff00000c6466500 [ 29.718009] which belongs to the cache kmalloc-128 of size 128 [ 29.718165] The buggy address is located 13 bytes to the right of [ 29.718165] allocated 115-byte region [fff00000c6466500, fff00000c6466573) [ 29.718309] [ 29.718351] The buggy address belongs to the physical page: [ 29.718445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 29.718617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.718796] page_type: f5(slab) [ 29.718953] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.719137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.719273] page dumped because: kasan: bad access detected [ 29.719360] [ 29.719425] Memory state around the buggy address: [ 29.719533] fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.719689] fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.719804] >fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.719918] ^ [ 29.719980] fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720082] fff00000c6466680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720744] ================================================================== [ 29.700568] ================================================================== [ 29.700884] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.701060] Write of size 1 at addr fff00000c6466578 by task kunit_try_catch/147 [ 29.701210] [ 29.701326] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.701889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.701957] Hardware name: linux,dummy-virt (DT) [ 29.702032] Call trace: [ 29.702088] show_stack+0x20/0x38 (C) [ 29.702205] dump_stack_lvl+0x8c/0xd0 [ 29.702314] print_report+0x118/0x608 [ 29.702424] kasan_report+0xdc/0x128 [ 29.702540] __asan_report_store1_noabort+0x20/0x30 [ 29.702664] kmalloc_oob_right+0x538/0x660 [ 29.702851] kunit_try_run_case+0x170/0x3f0 [ 29.703037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.703175] kthread+0x328/0x630 [ 29.703290] ret_from_fork+0x10/0x20 [ 29.703415] [ 29.703460] Allocated by task 147: [ 29.703530] kasan_save_stack+0x3c/0x68 [ 29.703631] kasan_save_track+0x20/0x40 [ 29.703728] kasan_save_alloc_info+0x40/0x58 [ 29.703827] __kasan_kmalloc+0xd4/0xd8 [ 29.705553] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.705761] kmalloc_oob_right+0xb0/0x660 [ 29.706013] kunit_try_run_case+0x170/0x3f0 [ 29.706452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.706725] kthread+0x328/0x630 [ 29.706923] ret_from_fork+0x10/0x20 [ 29.707152] [ 29.707211] The buggy address belongs to the object at fff00000c6466500 [ 29.707211] which belongs to the cache kmalloc-128 of size 128 [ 29.707783] The buggy address is located 5 bytes to the right of [ 29.707783] allocated 115-byte region [fff00000c6466500, fff00000c6466573) [ 29.708373] [ 29.708460] The buggy address belongs to the physical page: [ 29.708689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 29.708883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.709003] page_type: f5(slab) [ 29.709107] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.709244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.709721] page dumped because: kasan: bad access detected [ 29.709798] [ 29.709840] Memory state around the buggy address: [ 29.709920] fff00000c6466400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.710020] fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710142] >fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.710238] ^ [ 29.710330] fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710420] fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710503] ==================================================================
[ 25.768736] ================================================================== [ 25.769910] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 25.770907] Write of size 1 at addr ffff888102b36e73 by task kunit_try_catch/165 [ 25.771658] [ 25.773558] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 25.774061] Tainted: [N]=TEST [ 25.774129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.774440] Call Trace: [ 25.774530] <TASK> [ 25.774712] dump_stack_lvl+0x73/0xb0 [ 25.774836] print_report+0xd1/0x650 [ 25.774871] ? __virt_addr_valid+0x1db/0x2d0 [ 25.774901] ? kmalloc_oob_right+0x6f0/0x7f0 [ 25.774958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.775002] ? kmalloc_oob_right+0x6f0/0x7f0 [ 25.775039] kasan_report+0x141/0x180 [ 25.775079] ? kmalloc_oob_right+0x6f0/0x7f0 [ 25.775130] __asan_report_store1_noabort+0x1b/0x30 [ 25.775158] kmalloc_oob_right+0x6f0/0x7f0 [ 25.775181] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 25.775205] ? __schedule+0x10cc/0x2b60 [ 25.775229] ? __pfx_read_tsc+0x10/0x10 [ 25.775254] ? ktime_get_ts64+0x86/0x230 [ 25.775282] kunit_try_run_case+0x1a5/0x480 [ 25.775310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.775333] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.775357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.775381] ? __kthread_parkme+0x82/0x180 [ 25.775404] ? preempt_count_sub+0x50/0x80 [ 25.775430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.775454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.775478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.775501] kthread+0x337/0x6f0 [ 25.775522] ? trace_preempt_on+0x20/0xc0 [ 25.775547] ? __pfx_kthread+0x10/0x10 [ 25.775569] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.775591] ? calculate_sigpending+0x7b/0xa0 [ 25.775617] ? __pfx_kthread+0x10/0x10 [ 25.775639] ret_from_fork+0x116/0x1d0 [ 25.775660] ? __pfx_kthread+0x10/0x10 [ 25.775681] ret_from_fork_asm+0x1a/0x30 [ 25.775746] </TASK> [ 25.775829] [ 25.787467] Allocated by task 165: [ 25.788335] kasan_save_stack+0x45/0x70 [ 25.788682] kasan_save_track+0x18/0x40 [ 25.788882] kasan_save_alloc_info+0x3b/0x50 [ 25.789270] __kasan_kmalloc+0xb7/0xc0 [ 25.789595] __kmalloc_cache_noprof+0x189/0x420 [ 25.789990] kmalloc_oob_right+0xa9/0x7f0 [ 25.790353] kunit_try_run_case+0x1a5/0x480 [ 25.790727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.791033] kthread+0x337/0x6f0 [ 25.791647] ret_from_fork+0x116/0x1d0 [ 25.792218] ret_from_fork_asm+0x1a/0x30 [ 25.792713] [ 25.793156] The buggy address belongs to the object at ffff888102b36e00 [ 25.793156] which belongs to the cache kmalloc-128 of size 128 [ 25.794236] The buggy address is located 0 bytes to the right of [ 25.794236] allocated 115-byte region [ffff888102b36e00, ffff888102b36e73) [ 25.795013] [ 25.795635] The buggy address belongs to the physical page: [ 25.797316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b36 [ 25.798306] flags: 0x200000000000000(node=0|zone=2) [ 25.798927] page_type: f5(slab) [ 25.799876] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.800795] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.801528] page dumped because: kasan: bad access detected [ 25.801829] [ 25.802172] Memory state around the buggy address: [ 25.802953] ffff888102b36d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.803565] ffff888102b36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.804151] >ffff888102b36e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.804658] ^ [ 25.805565] ffff888102b36e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.806040] ffff888102b36f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.806632] ================================================================== [ 25.809881] ================================================================== [ 25.810418] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 25.811027] Write of size 1 at addr ffff888102b36e78 by task kunit_try_catch/165 [ 25.811600] [ 25.811763] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 25.811868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.811891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.811931] Call Trace: [ 25.811970] <TASK> [ 25.812006] dump_stack_lvl+0x73/0xb0 [ 25.812063] print_report+0xd1/0x650 [ 25.812118] ? __virt_addr_valid+0x1db/0x2d0 [ 25.812156] ? kmalloc_oob_right+0x6bd/0x7f0 [ 25.812186] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.812223] ? kmalloc_oob_right+0x6bd/0x7f0 [ 25.812257] kasan_report+0x141/0x180 [ 25.812289] ? kmalloc_oob_right+0x6bd/0x7f0 [ 25.812327] __asan_report_store1_noabort+0x1b/0x30 [ 25.812361] kmalloc_oob_right+0x6bd/0x7f0 [ 25.812392] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 25.812426] ? __schedule+0x10cc/0x2b60 [ 25.812458] ? __pfx_read_tsc+0x10/0x10 [ 25.812491] ? ktime_get_ts64+0x86/0x230 [ 25.812529] kunit_try_run_case+0x1a5/0x480 [ 25.812567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.812599] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.812634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.812671] ? __kthread_parkme+0x82/0x180 [ 25.813276] ? preempt_count_sub+0x50/0x80 [ 25.813316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.813343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.813370] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.813394] kthread+0x337/0x6f0 [ 25.813414] ? trace_preempt_on+0x20/0xc0 [ 25.813439] ? __pfx_kthread+0x10/0x10 [ 25.813460] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.813484] ? calculate_sigpending+0x7b/0xa0 [ 25.813509] ? __pfx_kthread+0x10/0x10 [ 25.813531] ret_from_fork+0x116/0x1d0 [ 25.813552] ? __pfx_kthread+0x10/0x10 [ 25.813573] ret_from_fork_asm+0x1a/0x30 [ 25.813606] </TASK> [ 25.813621] [ 25.825003] Allocated by task 165: [ 25.825252] kasan_save_stack+0x45/0x70 [ 25.825575] kasan_save_track+0x18/0x40 [ 25.825830] kasan_save_alloc_info+0x3b/0x50 [ 25.826242] __kasan_kmalloc+0xb7/0xc0 [ 25.826458] __kmalloc_cache_noprof+0x189/0x420 [ 25.826871] kmalloc_oob_right+0xa9/0x7f0 [ 25.827241] kunit_try_run_case+0x1a5/0x480 [ 25.827449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.827669] kthread+0x337/0x6f0 [ 25.827831] ret_from_fork+0x116/0x1d0 [ 25.827997] ret_from_fork_asm+0x1a/0x30 [ 25.828303] [ 25.828501] The buggy address belongs to the object at ffff888102b36e00 [ 25.828501] which belongs to the cache kmalloc-128 of size 128 [ 25.829595] The buggy address is located 5 bytes to the right of [ 25.829595] allocated 115-byte region [ffff888102b36e00, ffff888102b36e73) [ 25.831342] [ 25.831829] The buggy address belongs to the physical page: [ 25.832652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b36 [ 25.833229] flags: 0x200000000000000(node=0|zone=2) [ 25.833701] page_type: f5(slab) [ 25.833892] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.834165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.834522] page dumped because: kasan: bad access detected [ 25.834796] [ 25.834898] Memory state around the buggy address: [ 25.835072] ffff888102b36d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.836398] ffff888102b36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.836705] >ffff888102b36e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.837263] ^ [ 25.837583] ffff888102b36e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.838058] ffff888102b36f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.838657] ================================================================== [ 25.839831] ================================================================== [ 25.840779] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 25.841246] Read of size 1 at addr ffff888102b36e80 by task kunit_try_catch/165 [ 25.841855] [ 25.842430] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 25.842558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.842575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.842602] Call Trace: [ 25.842641] <TASK> [ 25.842675] dump_stack_lvl+0x73/0xb0 [ 25.842719] print_report+0xd1/0x650 [ 25.842745] ? __virt_addr_valid+0x1db/0x2d0 [ 25.842770] ? kmalloc_oob_right+0x68a/0x7f0 [ 25.842792] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.842819] ? kmalloc_oob_right+0x68a/0x7f0 [ 25.842841] kasan_report+0x141/0x180 [ 25.842864] ? kmalloc_oob_right+0x68a/0x7f0 [ 25.842890] __asan_report_load1_noabort+0x18/0x20 [ 25.842926] kmalloc_oob_right+0x68a/0x7f0 [ 25.842955] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 25.842978] ? __schedule+0x10cc/0x2b60 [ 25.843002] ? __pfx_read_tsc+0x10/0x10 [ 25.843024] ? ktime_get_ts64+0x86/0x230 [ 25.843050] kunit_try_run_case+0x1a5/0x480 [ 25.843076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.843099] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.843268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.843294] ? __kthread_parkme+0x82/0x180 [ 25.843317] ? preempt_count_sub+0x50/0x80 [ 25.843343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.843367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.843391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.843415] kthread+0x337/0x6f0 [ 25.843436] ? trace_preempt_on+0x20/0xc0 [ 25.843460] ? __pfx_kthread+0x10/0x10 [ 25.843482] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.843504] ? calculate_sigpending+0x7b/0xa0 [ 25.843529] ? __pfx_kthread+0x10/0x10 [ 25.843551] ret_from_fork+0x116/0x1d0 [ 25.843572] ? __pfx_kthread+0x10/0x10 [ 25.843594] ret_from_fork_asm+0x1a/0x30 [ 25.843626] </TASK> [ 25.843640] [ 25.853436] Allocated by task 165: [ 25.853787] kasan_save_stack+0x45/0x70 [ 25.854195] kasan_save_track+0x18/0x40 [ 25.854547] kasan_save_alloc_info+0x3b/0x50 [ 25.854754] __kasan_kmalloc+0xb7/0xc0 [ 25.855111] __kmalloc_cache_noprof+0x189/0x420 [ 25.855455] kmalloc_oob_right+0xa9/0x7f0 [ 25.855656] kunit_try_run_case+0x1a5/0x480 [ 25.856046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.856467] kthread+0x337/0x6f0 [ 25.856764] ret_from_fork+0x116/0x1d0 [ 25.857004] ret_from_fork_asm+0x1a/0x30 [ 25.857374] [ 25.857490] The buggy address belongs to the object at ffff888102b36e00 [ 25.857490] which belongs to the cache kmalloc-128 of size 128 [ 25.858169] The buggy address is located 13 bytes to the right of [ 25.858169] allocated 115-byte region [ffff888102b36e00, ffff888102b36e73) [ 25.858635] [ 25.858744] The buggy address belongs to the physical page: [ 25.858966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b36 [ 25.859635] flags: 0x200000000000000(node=0|zone=2) [ 25.860126] page_type: f5(slab) [ 25.860447] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.861107] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.861707] page dumped because: kasan: bad access detected [ 25.862123] [ 25.862235] Memory state around the buggy address: [ 25.862566] ffff888102b36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.863039] ffff888102b36e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.863325] >ffff888102b36e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.863594] ^ [ 25.863756] ffff888102b36f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.864063] ffff888102b36f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.864642] ==================================================================