Date
June 25, 2025, 8:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 26.261594] ================================================================== [ 26.261631] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 26.261671] Read of size 1 at addr fff00000c3fada80 by task kunit_try_catch/148 [ 26.261717] [ 26.261744] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.261822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.261847] Hardware name: linux,dummy-virt (DT) [ 26.261876] Call trace: [ 26.261896] show_stack+0x20/0x38 (C) [ 26.261940] dump_stack_lvl+0x8c/0xd0 [ 26.261984] print_report+0x118/0x608 [ 26.262029] kasan_report+0xdc/0x128 [ 26.262073] __asan_report_load1_noabort+0x20/0x30 [ 26.262127] kmalloc_oob_right+0x5d0/0x660 [ 26.262172] kunit_try_run_case+0x170/0x3f0 [ 26.262217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.262268] kthread+0x328/0x630 [ 26.262309] ret_from_fork+0x10/0x20 [ 26.262353] [ 26.262370] Allocated by task 148: [ 26.262498] kasan_save_stack+0x3c/0x68 [ 26.262585] kasan_save_track+0x20/0x40 [ 26.262711] kasan_save_alloc_info+0x40/0x58 [ 26.262768] __kasan_kmalloc+0xd4/0xd8 [ 26.262804] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.262863] kmalloc_oob_right+0xb0/0x660 [ 26.262899] kunit_try_run_case+0x170/0x3f0 [ 26.262938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.262980] kthread+0x328/0x630 [ 26.263011] ret_from_fork+0x10/0x20 [ 26.263045] [ 26.263119] The buggy address belongs to the object at fff00000c3fada00 [ 26.263119] which belongs to the cache kmalloc-128 of size 128 [ 26.263229] The buggy address is located 13 bytes to the right of [ 26.263229] allocated 115-byte region [fff00000c3fada00, fff00000c3fada73) [ 26.263310] [ 26.263340] The buggy address belongs to the physical page: [ 26.263386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.263470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.263538] page_type: f5(slab) [ 26.263575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.263731] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.263911] page dumped because: kasan: bad access detected [ 26.263967] [ 26.263994] Memory state around the buggy address: [ 26.264024] fff00000c3fad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.264080] fff00000c3fada00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.264344] >fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.264451] ^ [ 26.264483] fff00000c3fadb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.264820] fff00000c3fadb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.264975] ================================================================== [ 26.258157] ================================================================== [ 26.258298] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 26.258374] Write of size 1 at addr fff00000c3fada78 by task kunit_try_catch/148 [ 26.258464] [ 26.258539] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.258837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.258864] Hardware name: linux,dummy-virt (DT) [ 26.258961] Call trace: [ 26.258995] show_stack+0x20/0x38 (C) [ 26.259042] dump_stack_lvl+0x8c/0xd0 [ 26.259262] print_report+0x118/0x608 [ 26.259482] kasan_report+0xdc/0x128 [ 26.259542] __asan_report_store1_noabort+0x20/0x30 [ 26.259592] kmalloc_oob_right+0x538/0x660 [ 26.259639] kunit_try_run_case+0x170/0x3f0 [ 26.259727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.259780] kthread+0x328/0x630 [ 26.260248] ret_from_fork+0x10/0x20 [ 26.260315] [ 26.260334] Allocated by task 148: [ 26.260361] kasan_save_stack+0x3c/0x68 [ 26.260412] kasan_save_track+0x20/0x40 [ 26.260448] kasan_save_alloc_info+0x40/0x58 [ 26.260483] __kasan_kmalloc+0xd4/0xd8 [ 26.260519] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.260558] kmalloc_oob_right+0xb0/0x660 [ 26.260594] kunit_try_run_case+0x170/0x3f0 [ 26.260631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.260674] kthread+0x328/0x630 [ 26.260706] ret_from_fork+0x10/0x20 [ 26.260744] [ 26.260763] The buggy address belongs to the object at fff00000c3fada00 [ 26.260763] which belongs to the cache kmalloc-128 of size 128 [ 26.260818] The buggy address is located 5 bytes to the right of [ 26.260818] allocated 115-byte region [fff00000c3fada00, fff00000c3fada73) [ 26.260879] [ 26.260899] The buggy address belongs to the physical page: [ 26.260928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.260977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.261023] page_type: f5(slab) [ 26.261059] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.261106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.261145] page dumped because: kasan: bad access detected [ 26.261174] [ 26.261190] Memory state around the buggy address: [ 26.261219] fff00000c3fad900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.261260] fff00000c3fad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.261300] >fff00000c3fada00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.261335] ^ [ 26.261372] fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.261422] fff00000c3fadb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.261457] ================================================================== [ 26.251341] ================================================================== [ 26.251702] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 26.252609] Write of size 1 at addr fff00000c3fada73 by task kunit_try_catch/148 [ 26.252716] [ 26.253475] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.253621] Tainted: [N]=TEST [ 26.253655] Hardware name: linux,dummy-virt (DT) [ 26.253870] Call trace: [ 26.254043] show_stack+0x20/0x38 (C) [ 26.254184] dump_stack_lvl+0x8c/0xd0 [ 26.254238] print_report+0x118/0x608 [ 26.254286] kasan_report+0xdc/0x128 [ 26.254331] __asan_report_store1_noabort+0x20/0x30 [ 26.254378] kmalloc_oob_right+0x5a4/0x660 [ 26.254436] kunit_try_run_case+0x170/0x3f0 [ 26.254487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.254539] kthread+0x328/0x630 [ 26.254582] ret_from_fork+0x10/0x20 [ 26.254741] [ 26.254779] Allocated by task 148: [ 26.254892] kasan_save_stack+0x3c/0x68 [ 26.254948] kasan_save_track+0x20/0x40 [ 26.254986] kasan_save_alloc_info+0x40/0x58 [ 26.255022] __kasan_kmalloc+0xd4/0xd8 [ 26.255058] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.255098] kmalloc_oob_right+0xb0/0x660 [ 26.255134] kunit_try_run_case+0x170/0x3f0 [ 26.255170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.255213] kthread+0x328/0x630 [ 26.255243] ret_from_fork+0x10/0x20 [ 26.255295] [ 26.255352] The buggy address belongs to the object at fff00000c3fada00 [ 26.255352] which belongs to the cache kmalloc-128 of size 128 [ 26.255453] The buggy address is located 0 bytes to the right of [ 26.255453] allocated 115-byte region [fff00000c3fada00, fff00000c3fada73) [ 26.255518] [ 26.255597] The buggy address belongs to the physical page: [ 26.255793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.256116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.256421] page_type: f5(slab) [ 26.256708] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.256770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.256873] page dumped because: kasan: bad access detected [ 26.256912] [ 26.256938] Memory state around the buggy address: [ 26.257149] fff00000c3fad900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.257211] fff00000c3fad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257263] >fff00000c3fada00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.257315] ^ [ 26.257407] fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257448] fff00000c3fadb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257509] ==================================================================
[ 21.212313] ================================================================== [ 21.212993] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 21.213285] Write of size 1 at addr ffff88810257e678 by task kunit_try_catch/165 [ 21.213585] [ 21.213665] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 21.213711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.213722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.213743] Call Trace: [ 21.213755] <TASK> [ 21.213770] dump_stack_lvl+0x73/0xb0 [ 21.213794] print_report+0xd1/0x650 [ 21.213814] ? __virt_addr_valid+0x1db/0x2d0 [ 21.213835] ? kmalloc_oob_right+0x6bd/0x7f0 [ 21.213855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.213878] ? kmalloc_oob_right+0x6bd/0x7f0 [ 21.213898] kasan_report+0x141/0x180 [ 21.213918] ? kmalloc_oob_right+0x6bd/0x7f0 [ 21.213954] __asan_report_store1_noabort+0x1b/0x30 [ 21.213976] kmalloc_oob_right+0x6bd/0x7f0 [ 21.213997] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 21.214017] ? __schedule+0x10cc/0x2b60 [ 21.214040] ? __pfx_read_tsc+0x10/0x10 [ 21.214061] ? ktime_get_ts64+0x86/0x230 [ 21.214085] kunit_try_run_case+0x1a5/0x480 [ 21.214109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.214131] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.214150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.214173] ? __kthread_parkme+0x82/0x180 [ 21.214192] ? preempt_count_sub+0x50/0x80 [ 21.214213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.214236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.214258] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.214280] kthread+0x337/0x6f0 [ 21.214298] ? trace_preempt_on+0x20/0xc0 [ 21.214320] ? __pfx_kthread+0x10/0x10 [ 21.214339] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.214360] ? calculate_sigpending+0x7b/0xa0 [ 21.214382] ? __pfx_kthread+0x10/0x10 [ 21.214402] ret_from_fork+0x116/0x1d0 [ 21.214419] ? __pfx_kthread+0x10/0x10 [ 21.214438] ret_from_fork_asm+0x1a/0x30 [ 21.214466] </TASK> [ 21.214476] [ 21.220773] Allocated by task 165: [ 21.220891] kasan_save_stack+0x45/0x70 [ 21.221077] kasan_save_track+0x18/0x40 [ 21.221345] kasan_save_alloc_info+0x3b/0x50 [ 21.221591] __kasan_kmalloc+0xb7/0xc0 [ 21.221770] __kmalloc_cache_noprof+0x189/0x420 [ 21.221932] kmalloc_oob_right+0xa9/0x7f0 [ 21.222106] kunit_try_run_case+0x1a5/0x480 [ 21.222293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.222494] kthread+0x337/0x6f0 [ 21.222600] ret_from_fork+0x116/0x1d0 [ 21.222717] ret_from_fork_asm+0x1a/0x30 [ 21.222850] [ 21.222947] The buggy address belongs to the object at ffff88810257e600 [ 21.222947] which belongs to the cache kmalloc-128 of size 128 [ 21.223541] The buggy address is located 5 bytes to the right of [ 21.223541] allocated 115-byte region [ffff88810257e600, ffff88810257e673) [ 21.224001] [ 21.224077] The buggy address belongs to the physical page: [ 21.224294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257e [ 21.224617] flags: 0x200000000000000(node=0|zone=2) [ 21.224767] page_type: f5(slab) [ 21.224875] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.225329] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.225656] page dumped because: kasan: bad access detected [ 21.225818] [ 21.225878] Memory state around the buggy address: [ 21.226028] ffff88810257e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.226227] ffff88810257e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.226425] >ffff88810257e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.226922] ^ [ 21.227224] ffff88810257e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.227522] ffff88810257e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.227816] ================================================================== [ 21.181386] ================================================================== [ 21.182271] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 21.183031] Write of size 1 at addr ffff88810257e673 by task kunit_try_catch/165 [ 21.183481] [ 21.184558] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 21.184968] Tainted: [N]=TEST [ 21.185003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.185234] Call Trace: [ 21.185303] <TASK> [ 21.185445] dump_stack_lvl+0x73/0xb0 [ 21.185536] print_report+0xd1/0x650 [ 21.185564] ? __virt_addr_valid+0x1db/0x2d0 [ 21.185590] ? kmalloc_oob_right+0x6f0/0x7f0 [ 21.185610] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.185634] ? kmalloc_oob_right+0x6f0/0x7f0 [ 21.185654] kasan_report+0x141/0x180 [ 21.185674] ? kmalloc_oob_right+0x6f0/0x7f0 [ 21.185698] __asan_report_store1_noabort+0x1b/0x30 [ 21.185721] kmalloc_oob_right+0x6f0/0x7f0 [ 21.185741] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 21.185762] ? __schedule+0x10cc/0x2b60 [ 21.185786] ? __pfx_read_tsc+0x10/0x10 [ 21.185809] ? ktime_get_ts64+0x86/0x230 [ 21.185849] kunit_try_run_case+0x1a5/0x480 [ 21.185876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.185898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.185917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.185951] ? __kthread_parkme+0x82/0x180 [ 21.185971] ? preempt_count_sub+0x50/0x80 [ 21.185994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.186017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.186039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.186061] kthread+0x337/0x6f0 [ 21.186079] ? trace_preempt_on+0x20/0xc0 [ 21.186102] ? __pfx_kthread+0x10/0x10 [ 21.186121] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.186142] ? calculate_sigpending+0x7b/0xa0 [ 21.186165] ? __pfx_kthread+0x10/0x10 [ 21.186185] ret_from_fork+0x116/0x1d0 [ 21.186203] ? __pfx_kthread+0x10/0x10 [ 21.186222] ret_from_fork_asm+0x1a/0x30 [ 21.186273] </TASK> [ 21.186337] [ 21.197509] Allocated by task 165: [ 21.197774] kasan_save_stack+0x45/0x70 [ 21.198263] kasan_save_track+0x18/0x40 [ 21.198628] kasan_save_alloc_info+0x3b/0x50 [ 21.199077] __kasan_kmalloc+0xb7/0xc0 [ 21.199368] __kmalloc_cache_noprof+0x189/0x420 [ 21.199716] kmalloc_oob_right+0xa9/0x7f0 [ 21.199987] kunit_try_run_case+0x1a5/0x480 [ 21.200415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.200722] kthread+0x337/0x6f0 [ 21.200854] ret_from_fork+0x116/0x1d0 [ 21.201240] ret_from_fork_asm+0x1a/0x30 [ 21.201573] [ 21.201689] The buggy address belongs to the object at ffff88810257e600 [ 21.201689] which belongs to the cache kmalloc-128 of size 128 [ 21.203102] The buggy address is located 0 bytes to the right of [ 21.203102] allocated 115-byte region [ffff88810257e600, ffff88810257e673) [ 21.203752] [ 21.203970] The buggy address belongs to the physical page: [ 21.204692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257e [ 21.205604] flags: 0x200000000000000(node=0|zone=2) [ 21.206277] page_type: f5(slab) [ 21.206705] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.206995] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.207753] page dumped because: kasan: bad access detected [ 21.208195] [ 21.208303] Memory state around the buggy address: [ 21.208790] ffff88810257e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.209193] ffff88810257e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.209526] >ffff88810257e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.209790] ^ [ 21.210287] ffff88810257e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.210598] ffff88810257e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.210918] ================================================================== [ 21.228361] ================================================================== [ 21.228575] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 21.228772] Read of size 1 at addr ffff88810257e680 by task kunit_try_catch/165 [ 21.229418] [ 21.229527] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 21.229573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.229586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.229606] Call Trace: [ 21.229619] <TASK> [ 21.229634] dump_stack_lvl+0x73/0xb0 [ 21.229658] print_report+0xd1/0x650 [ 21.229678] ? __virt_addr_valid+0x1db/0x2d0 [ 21.229700] ? kmalloc_oob_right+0x68a/0x7f0 [ 21.229719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.229743] ? kmalloc_oob_right+0x68a/0x7f0 [ 21.229763] kasan_report+0x141/0x180 [ 21.229782] ? kmalloc_oob_right+0x68a/0x7f0 [ 21.229806] __asan_report_load1_noabort+0x18/0x20 [ 21.229827] kmalloc_oob_right+0x68a/0x7f0 [ 21.229847] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 21.229868] ? __schedule+0x10cc/0x2b60 [ 21.229891] ? __pfx_read_tsc+0x10/0x10 [ 21.229911] ? ktime_get_ts64+0x86/0x230 [ 21.229934] kunit_try_run_case+0x1a5/0x480 [ 21.229974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.229995] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.230015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.230038] ? __kthread_parkme+0x82/0x180 [ 21.230056] ? preempt_count_sub+0x50/0x80 [ 21.230078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.230100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.230135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.230157] kthread+0x337/0x6f0 [ 21.230175] ? trace_preempt_on+0x20/0xc0 [ 21.230196] ? __pfx_kthread+0x10/0x10 [ 21.230215] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.230237] ? calculate_sigpending+0x7b/0xa0 [ 21.230258] ? __pfx_kthread+0x10/0x10 [ 21.230278] ret_from_fork+0x116/0x1d0 [ 21.230295] ? __pfx_kthread+0x10/0x10 [ 21.230314] ret_from_fork_asm+0x1a/0x30 [ 21.230342] </TASK> [ 21.230351] [ 21.236550] Allocated by task 165: [ 21.236715] kasan_save_stack+0x45/0x70 [ 21.236896] kasan_save_track+0x18/0x40 [ 21.237079] kasan_save_alloc_info+0x3b/0x50 [ 21.237490] __kasan_kmalloc+0xb7/0xc0 [ 21.237633] __kmalloc_cache_noprof+0x189/0x420 [ 21.237772] kmalloc_oob_right+0xa9/0x7f0 [ 21.237896] kunit_try_run_case+0x1a5/0x480 [ 21.238096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.238357] kthread+0x337/0x6f0 [ 21.238510] ret_from_fork+0x116/0x1d0 [ 21.238723] ret_from_fork_asm+0x1a/0x30 [ 21.238895] [ 21.238989] The buggy address belongs to the object at ffff88810257e600 [ 21.238989] which belongs to the cache kmalloc-128 of size 128 [ 21.239472] The buggy address is located 13 bytes to the right of [ 21.239472] allocated 115-byte region [ffff88810257e600, ffff88810257e673) [ 21.239909] [ 21.239981] The buggy address belongs to the physical page: [ 21.240159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257e [ 21.240610] flags: 0x200000000000000(node=0|zone=2) [ 21.240888] page_type: f5(slab) [ 21.241086] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.241424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.241632] page dumped because: kasan: bad access detected [ 21.241788] [ 21.241848] Memory state around the buggy address: [ 21.242022] ffff88810257e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.242335] ffff88810257e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.242646] >ffff88810257e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.242964] ^ [ 21.243158] ffff88810257e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.243447] ffff88810257e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.243647] ==================================================================