Date
July 10, 2025, 9:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.246113] ================================================================== [ 29.246459] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.247327] Write of size 1 at addr fff00000c5a4dc73 by task kunit_try_catch/167 [ 29.247433] [ 29.248465] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.248644] Tainted: [N]=TEST [ 29.248693] Hardware name: linux,dummy-virt (DT) [ 29.248964] Call trace: [ 29.249182] show_stack+0x20/0x38 (C) [ 29.249547] dump_stack_lvl+0x8c/0xd0 [ 29.249643] print_report+0x118/0x5d0 [ 29.249718] kasan_report+0xdc/0x128 [ 29.249821] __asan_report_store1_noabort+0x20/0x30 [ 29.249883] kmalloc_oob_right+0x5a4/0x660 [ 29.249929] kunit_try_run_case+0x170/0x3f0 [ 29.250228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.250298] kthread+0x328/0x630 [ 29.250376] ret_from_fork+0x10/0x20 [ 29.251478] [ 29.251609] Allocated by task 167: [ 29.252024] kasan_save_stack+0x3c/0x68 [ 29.252097] kasan_save_track+0x20/0x40 [ 29.252289] kasan_save_alloc_info+0x40/0x58 [ 29.252333] __kasan_kmalloc+0xd4/0xd8 [ 29.252370] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.252459] kmalloc_oob_right+0xb0/0x660 [ 29.252518] kunit_try_run_case+0x170/0x3f0 [ 29.252579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.252643] kthread+0x328/0x630 [ 29.252675] ret_from_fork+0x10/0x20 [ 29.252978] [ 29.253233] The buggy address belongs to the object at fff00000c5a4dc00 [ 29.253233] which belongs to the cache kmalloc-128 of size 128 [ 29.253406] The buggy address is located 0 bytes to the right of [ 29.253406] allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73) [ 29.253512] [ 29.253778] The buggy address belongs to the physical page: [ 29.254692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d [ 29.254993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.255590] page_type: f5(slab) [ 29.256140] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.256220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.256356] page dumped because: kasan: bad access detected [ 29.256488] [ 29.256562] Memory state around the buggy address: [ 29.257288] fff00000c5a4db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.257373] fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.257446] >fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.257502] ^ [ 29.257637] fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.257688] fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.257767] ================================================================== [ 29.258269] ================================================================== [ 29.258349] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.258430] Write of size 1 at addr fff00000c5a4dc78 by task kunit_try_catch/167 [ 29.258500] [ 29.258570] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.258662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.258688] Hardware name: linux,dummy-virt (DT) [ 29.258930] Call trace: [ 29.258953] show_stack+0x20/0x38 (C) [ 29.259007] dump_stack_lvl+0x8c/0xd0 [ 29.259051] print_report+0x118/0x5d0 [ 29.259099] kasan_report+0xdc/0x128 [ 29.259153] __asan_report_store1_noabort+0x20/0x30 [ 29.259243] kmalloc_oob_right+0x538/0x660 [ 29.259330] kunit_try_run_case+0x170/0x3f0 [ 29.259435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.259544] kthread+0x328/0x630 [ 29.259676] ret_from_fork+0x10/0x20 [ 29.259736] [ 29.259754] Allocated by task 167: [ 29.259780] kasan_save_stack+0x3c/0x68 [ 29.259819] kasan_save_track+0x20/0x40 [ 29.259857] kasan_save_alloc_info+0x40/0x58 [ 29.259893] __kasan_kmalloc+0xd4/0xd8 [ 29.259929] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.259968] kmalloc_oob_right+0xb0/0x660 [ 29.260004] kunit_try_run_case+0x170/0x3f0 [ 29.260042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.260119] kthread+0x328/0x630 [ 29.260225] ret_from_fork+0x10/0x20 [ 29.260348] [ 29.260428] The buggy address belongs to the object at fff00000c5a4dc00 [ 29.260428] which belongs to the cache kmalloc-128 of size 128 [ 29.260557] The buggy address is located 5 bytes to the right of [ 29.260557] allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73) [ 29.260671] [ 29.260745] The buggy address belongs to the physical page: [ 29.260785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d [ 29.260868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.261181] page_type: f5(slab) [ 29.261238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.261354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.261433] page dumped because: kasan: bad access detected [ 29.261498] [ 29.261528] Memory state around the buggy address: [ 29.261621] fff00000c5a4db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.261675] fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.261717] >fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.261993] ^ [ 29.262057] fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262145] fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262249] ================================================================== [ 29.262711] ================================================================== [ 29.262774] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.262876] Read of size 1 at addr fff00000c5a4dc80 by task kunit_try_catch/167 [ 29.262924] [ 29.262952] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.263034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.263069] Hardware name: linux,dummy-virt (DT) [ 29.263100] Call trace: [ 29.263152] show_stack+0x20/0x38 (C) [ 29.263201] dump_stack_lvl+0x8c/0xd0 [ 29.263244] print_report+0x118/0x5d0 [ 29.263642] kasan_report+0xdc/0x128 [ 29.263687] __asan_report_load1_noabort+0x20/0x30 [ 29.263735] kmalloc_oob_right+0x5d0/0x660 [ 29.263781] kunit_try_run_case+0x170/0x3f0 [ 29.263830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.263883] kthread+0x328/0x630 [ 29.263925] ret_from_fork+0x10/0x20 [ 29.263970] [ 29.264044] Allocated by task 167: [ 29.264108] kasan_save_stack+0x3c/0x68 [ 29.264244] kasan_save_track+0x20/0x40 [ 29.264344] kasan_save_alloc_info+0x40/0x58 [ 29.264438] __kasan_kmalloc+0xd4/0xd8 [ 29.264500] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.264539] kmalloc_oob_right+0xb0/0x660 [ 29.264849] kunit_try_run_case+0x170/0x3f0 [ 29.264919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.264987] kthread+0x328/0x630 [ 29.265066] ret_from_fork+0x10/0x20 [ 29.265841] [ 29.265863] The buggy address belongs to the object at fff00000c5a4dc00 [ 29.265863] which belongs to the cache kmalloc-128 of size 128 [ 29.265930] The buggy address is located 13 bytes to the right of [ 29.265930] allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73) [ 29.265995] [ 29.266014] The buggy address belongs to the physical page: [ 29.266043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d [ 29.266094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.266150] page_type: f5(slab) [ 29.266185] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.266236] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.266276] page dumped because: kasan: bad access detected [ 29.266306] [ 29.266323] Memory state around the buggy address: [ 29.266353] fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266395] fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.266437] >fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266474] ^ [ 29.266500] fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266542] fff00000c5a4dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266580] ==================================================================
[ 24.333554] ================================================================== [ 24.334117] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 24.334368] Write of size 1 at addr ffff888105182878 by task kunit_try_catch/184 [ 24.334650] [ 24.334770] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 24.334817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.334829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.334851] Call Trace: [ 24.334866] <TASK> [ 24.334884] dump_stack_lvl+0x73/0xb0 [ 24.334911] print_report+0xd1/0x610 [ 24.334933] ? __virt_addr_valid+0x1db/0x2d0 [ 24.335030] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.335053] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.335080] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.335101] kasan_report+0x141/0x180 [ 24.335123] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.335149] __asan_report_store1_noabort+0x1b/0x30 [ 24.335173] kmalloc_oob_right+0x6bd/0x7f0 [ 24.335195] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.335217] ? __schedule+0x10cc/0x2b60 [ 24.335238] ? irqentry_exit+0x2a/0x60 [ 24.335260] ? __pfx_read_tsc+0x10/0x10 [ 24.335281] ? ktime_get_ts64+0x86/0x230 [ 24.335306] kunit_try_run_case+0x1a5/0x480 [ 24.335328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.335349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.335371] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.335394] ? __kthread_parkme+0x82/0x180 [ 24.335414] ? preempt_count_sub+0x50/0x80 [ 24.335437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.335459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.335483] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.335518] kthread+0x337/0x6f0 [ 24.335537] ? trace_preempt_on+0x20/0xc0 [ 24.335561] ? __pfx_kthread+0x10/0x10 [ 24.335582] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.335603] ? calculate_sigpending+0x7b/0xa0 [ 24.335627] ? __pfx_kthread+0x10/0x10 [ 24.335648] ret_from_fork+0x116/0x1d0 [ 24.335667] ? __pfx_kthread+0x10/0x10 [ 24.335688] ret_from_fork_asm+0x1a/0x30 [ 24.335728] </TASK> [ 24.335739] [ 24.346187] Allocated by task 184: [ 24.346324] kasan_save_stack+0x45/0x70 [ 24.346473] kasan_save_track+0x18/0x40 [ 24.347540] kasan_save_alloc_info+0x3b/0x50 [ 24.348046] __kasan_kmalloc+0xb7/0xc0 [ 24.348534] __kmalloc_cache_noprof+0x189/0x420 [ 24.348970] kmalloc_oob_right+0xa9/0x7f0 [ 24.349403] kunit_try_run_case+0x1a5/0x480 [ 24.349570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.349769] kthread+0x337/0x6f0 [ 24.350093] ret_from_fork+0x116/0x1d0 [ 24.350512] ret_from_fork_asm+0x1a/0x30 [ 24.350955] [ 24.351117] The buggy address belongs to the object at ffff888105182800 [ 24.351117] which belongs to the cache kmalloc-128 of size 128 [ 24.352214] The buggy address is located 5 bytes to the right of [ 24.352214] allocated 115-byte region [ffff888105182800, ffff888105182873) [ 24.352892] [ 24.353063] The buggy address belongs to the physical page: [ 24.353636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105182 [ 24.354364] flags: 0x200000000000000(node=0|zone=2) [ 24.354637] page_type: f5(slab) [ 24.355032] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.355415] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.356194] page dumped because: kasan: bad access detected [ 24.356582] [ 24.356648] Memory state around the buggy address: [ 24.356810] ffff888105182700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.357062] ffff888105182780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.357424] >ffff888105182800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.357862] ^ [ 24.358512] ffff888105182880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.359095] ffff888105182900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.359310] ================================================================== [ 24.359851] ================================================================== [ 24.360208] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 24.360453] Read of size 1 at addr ffff888105182880 by task kunit_try_catch/184 [ 24.361132] [ 24.361239] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 24.361287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.361299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.361320] Call Trace: [ 24.361338] <TASK> [ 24.361354] dump_stack_lvl+0x73/0xb0 [ 24.361383] print_report+0xd1/0x610 [ 24.361439] ? __virt_addr_valid+0x1db/0x2d0 [ 24.361463] ? kmalloc_oob_right+0x68a/0x7f0 [ 24.361483] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.361549] ? kmalloc_oob_right+0x68a/0x7f0 [ 24.361592] kasan_report+0x141/0x180 [ 24.361613] ? kmalloc_oob_right+0x68a/0x7f0 [ 24.361649] __asan_report_load1_noabort+0x18/0x20 [ 24.361672] kmalloc_oob_right+0x68a/0x7f0 [ 24.361693] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.361725] ? __schedule+0x10cc/0x2b60 [ 24.361747] ? irqentry_exit+0x2a/0x60 [ 24.361768] ? __pfx_read_tsc+0x10/0x10 [ 24.361842] ? ktime_get_ts64+0x86/0x230 [ 24.361899] kunit_try_run_case+0x1a5/0x480 [ 24.361921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.361941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.361974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.361997] ? __kthread_parkme+0x82/0x180 [ 24.362017] ? preempt_count_sub+0x50/0x80 [ 24.362066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.362087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.362111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.362146] kthread+0x337/0x6f0 [ 24.362167] ? trace_preempt_on+0x20/0xc0 [ 24.362189] ? __pfx_kthread+0x10/0x10 [ 24.362209] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.362230] ? calculate_sigpending+0x7b/0xa0 [ 24.362253] ? __pfx_kthread+0x10/0x10 [ 24.362274] ret_from_fork+0x116/0x1d0 [ 24.362292] ? __pfx_kthread+0x10/0x10 [ 24.362312] ret_from_fork_asm+0x1a/0x30 [ 24.362343] </TASK> [ 24.362354] [ 24.371339] Allocated by task 184: [ 24.371678] kasan_save_stack+0x45/0x70 [ 24.371988] kasan_save_track+0x18/0x40 [ 24.372218] kasan_save_alloc_info+0x3b/0x50 [ 24.372410] __kasan_kmalloc+0xb7/0xc0 [ 24.372623] __kmalloc_cache_noprof+0x189/0x420 [ 24.372922] kmalloc_oob_right+0xa9/0x7f0 [ 24.373161] kunit_try_run_case+0x1a5/0x480 [ 24.373383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.373737] kthread+0x337/0x6f0 [ 24.373991] ret_from_fork+0x116/0x1d0 [ 24.374214] ret_from_fork_asm+0x1a/0x30 [ 24.374433] [ 24.374559] The buggy address belongs to the object at ffff888105182800 [ 24.374559] which belongs to the cache kmalloc-128 of size 128 [ 24.375318] The buggy address is located 13 bytes to the right of [ 24.375318] allocated 115-byte region [ffff888105182800, ffff888105182873) [ 24.376031] [ 24.376135] The buggy address belongs to the physical page: [ 24.376385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105182 [ 24.376719] flags: 0x200000000000000(node=0|zone=2) [ 24.377067] page_type: f5(slab) [ 24.377278] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.377656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.378100] page dumped because: kasan: bad access detected [ 24.378378] [ 24.378463] Memory state around the buggy address: [ 24.378669] ffff888105182780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.379216] ffff888105182800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.379575] >ffff888105182880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.380005] ^ [ 24.380160] ffff888105182900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.380406] ffff888105182980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.380852] ================================================================== [ 24.301132] ================================================================== [ 24.302072] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 24.302726] Write of size 1 at addr ffff888105182873 by task kunit_try_catch/184 [ 24.303224] [ 24.304213] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 24.304552] Tainted: [N]=TEST [ 24.304585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.304826] Call Trace: [ 24.304899] <TASK> [ 24.305044] dump_stack_lvl+0x73/0xb0 [ 24.305133] print_report+0xd1/0x610 [ 24.305163] ? __virt_addr_valid+0x1db/0x2d0 [ 24.305190] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.305211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.305236] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.305257] kasan_report+0x141/0x180 [ 24.305279] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.305304] __asan_report_store1_noabort+0x1b/0x30 [ 24.305328] kmalloc_oob_right+0x6f0/0x7f0 [ 24.305350] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.305372] ? __schedule+0x10cc/0x2b60 [ 24.305396] ? irqentry_exit+0x2a/0x60 [ 24.305420] ? __pfx_read_tsc+0x10/0x10 [ 24.305443] ? ktime_get_ts64+0x86/0x230 [ 24.305470] kunit_try_run_case+0x1a5/0x480 [ 24.305502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.305522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.305545] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.305568] ? __kthread_parkme+0x82/0x180 [ 24.305590] ? preempt_count_sub+0x50/0x80 [ 24.305613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.305635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.305659] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.305684] kthread+0x337/0x6f0 [ 24.305715] ? trace_preempt_on+0x20/0xc0 [ 24.305739] ? __pfx_kthread+0x10/0x10 [ 24.305761] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.305878] ? calculate_sigpending+0x7b/0xa0 [ 24.305907] ? __pfx_kthread+0x10/0x10 [ 24.305929] ret_from_fork+0x116/0x1d0 [ 24.305949] ? __pfx_kthread+0x10/0x10 [ 24.305969] ret_from_fork_asm+0x1a/0x30 [ 24.306035] </TASK> [ 24.306107] [ 24.316282] Allocated by task 184: [ 24.316974] kasan_save_stack+0x45/0x70 [ 24.317193] kasan_save_track+0x18/0x40 [ 24.317333] kasan_save_alloc_info+0x3b/0x50 [ 24.317657] __kasan_kmalloc+0xb7/0xc0 [ 24.317966] __kmalloc_cache_noprof+0x189/0x420 [ 24.318241] kmalloc_oob_right+0xa9/0x7f0 [ 24.318515] kunit_try_run_case+0x1a5/0x480 [ 24.318883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.319635] kthread+0x337/0x6f0 [ 24.319776] ret_from_fork+0x116/0x1d0 [ 24.320133] ret_from_fork_asm+0x1a/0x30 [ 24.320723] [ 24.320993] The buggy address belongs to the object at ffff888105182800 [ 24.320993] which belongs to the cache kmalloc-128 of size 128 [ 24.322005] The buggy address is located 0 bytes to the right of [ 24.322005] allocated 115-byte region [ffff888105182800, ffff888105182873) [ 24.323459] [ 24.323665] The buggy address belongs to the physical page: [ 24.324400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105182 [ 24.325568] flags: 0x200000000000000(node=0|zone=2) [ 24.326378] page_type: f5(slab) [ 24.327007] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.327730] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.328605] page dumped because: kasan: bad access detected [ 24.328976] [ 24.329145] Memory state around the buggy address: [ 24.329990] ffff888105182700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.330370] ffff888105182780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.330637] >ffff888105182800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.330918] ^ [ 24.331542] ffff888105182880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.331771] ffff888105182900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.332086] ==================================================================