Date
July 17, 2025, 10:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.252367] ================================================================== [ 29.253022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.255305] Write of size 1 at addr fff00000c59f9773 by task kunit_try_catch/167 [ 29.255414] [ 29.256183] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.256330] Tainted: [N]=TEST [ 29.256362] Hardware name: linux,dummy-virt (DT) [ 29.256621] Call trace: [ 29.256804] show_stack+0x20/0x38 (C) [ 29.256937] dump_stack_lvl+0x8c/0xd0 [ 29.256992] print_report+0x118/0x5d0 [ 29.257036] kasan_report+0xdc/0x128 [ 29.257093] __asan_report_store1_noabort+0x20/0x30 [ 29.257142] kmalloc_oob_right+0x5a4/0x660 [ 29.257189] kunit_try_run_case+0x170/0x3f0 [ 29.257239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.257291] kthread+0x328/0x630 [ 29.257337] ret_from_fork+0x10/0x20 [ 29.257495] [ 29.257532] Allocated by task 167: [ 29.257647] kasan_save_stack+0x3c/0x68 [ 29.257710] kasan_save_track+0x20/0x40 [ 29.257746] kasan_save_alloc_info+0x40/0x58 [ 29.257783] __kasan_kmalloc+0xd4/0xd8 [ 29.257818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.257859] kmalloc_oob_right+0xb0/0x660 [ 29.257896] kunit_try_run_case+0x170/0x3f0 [ 29.257932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.257973] kthread+0x328/0x630 [ 29.258004] ret_from_fork+0x10/0x20 [ 29.258072] [ 29.258133] The buggy address belongs to the object at fff00000c59f9700 [ 29.258133] which belongs to the cache kmalloc-128 of size 128 [ 29.258226] The buggy address is located 0 bytes to the right of [ 29.258226] allocated 115-byte region [fff00000c59f9700, fff00000c59f9773) [ 29.258291] [ 29.258374] The buggy address belongs to the physical page: [ 29.258571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.258847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.259144] page_type: f5(slab) [ 29.259437] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.259497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.259599] page dumped because: kasan: bad access detected [ 29.259637] [ 29.259663] Memory state around the buggy address: [ 29.259884] fff00000c59f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.259948] fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.260000] >fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.260052] ^ [ 29.260147] fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.260187] fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.260247] ================================================================== [ 29.261022] ================================================================== [ 29.261076] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.261125] Write of size 1 at addr fff00000c59f9778 by task kunit_try_catch/167 [ 29.261183] [ 29.261212] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.261292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.261322] Hardware name: linux,dummy-virt (DT) [ 29.261351] Call trace: [ 29.261372] show_stack+0x20/0x38 (C) [ 29.261434] dump_stack_lvl+0x8c/0xd0 [ 29.261482] print_report+0x118/0x5d0 [ 29.261525] kasan_report+0xdc/0x128 [ 29.261579] __asan_report_store1_noabort+0x20/0x30 [ 29.261637] kmalloc_oob_right+0x538/0x660 [ 29.261683] kunit_try_run_case+0x170/0x3f0 [ 29.261728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.261778] kthread+0x328/0x630 [ 29.261819] ret_from_fork+0x10/0x20 [ 29.261865] [ 29.261882] Allocated by task 167: [ 29.261908] kasan_save_stack+0x3c/0x68 [ 29.261954] kasan_save_track+0x20/0x40 [ 29.261989] kasan_save_alloc_info+0x40/0x58 [ 29.262025] __kasan_kmalloc+0xd4/0xd8 [ 29.262071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.262110] kmalloc_oob_right+0xb0/0x660 [ 29.262145] kunit_try_run_case+0x170/0x3f0 [ 29.262180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.262220] kthread+0x328/0x630 [ 29.262251] ret_from_fork+0x10/0x20 [ 29.262285] [ 29.262303] The buggy address belongs to the object at fff00000c59f9700 [ 29.262303] which belongs to the cache kmalloc-128 of size 128 [ 29.262356] The buggy address is located 5 bytes to the right of [ 29.262356] allocated 115-byte region [fff00000c59f9700, fff00000c59f9773) [ 29.262417] [ 29.262435] The buggy address belongs to the physical page: [ 29.262462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.262510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.262554] page_type: f5(slab) [ 29.262591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.262638] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.262676] page dumped because: kasan: bad access detected [ 29.262704] [ 29.262721] Memory state around the buggy address: [ 29.262749] fff00000c59f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.262794] fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262834] >fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.262870] ^ [ 29.262907] fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262946] fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.262982] ================================================================== [ 29.263114] ================================================================== [ 29.263165] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.263234] Read of size 1 at addr fff00000c59f9780 by task kunit_try_catch/167 [ 29.263342] [ 29.263369] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.263449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.263475] Hardware name: linux,dummy-virt (DT) [ 29.263503] Call trace: [ 29.263539] show_stack+0x20/0x38 (C) [ 29.263615] dump_stack_lvl+0x8c/0xd0 [ 29.263684] print_report+0x118/0x5d0 [ 29.263728] kasan_report+0xdc/0x128 [ 29.263807] __asan_report_load1_noabort+0x20/0x30 [ 29.263878] kmalloc_oob_right+0x5d0/0x660 [ 29.263944] kunit_try_run_case+0x170/0x3f0 [ 29.263999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.264089] kthread+0x328/0x630 [ 29.264132] ret_from_fork+0x10/0x20 [ 29.264436] [ 29.264467] Allocated by task 167: [ 29.264503] kasan_save_stack+0x3c/0x68 [ 29.264540] kasan_save_track+0x20/0x40 [ 29.264580] kasan_save_alloc_info+0x40/0x58 [ 29.264617] __kasan_kmalloc+0xd4/0xd8 [ 29.264650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.264688] kmalloc_oob_right+0xb0/0x660 [ 29.264725] kunit_try_run_case+0x170/0x3f0 [ 29.264760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.264859] kthread+0x328/0x630 [ 29.264931] ret_from_fork+0x10/0x20 [ 29.264982] [ 29.265000] The buggy address belongs to the object at fff00000c59f9700 [ 29.265000] which belongs to the cache kmalloc-128 of size 128 [ 29.265110] The buggy address is located 13 bytes to the right of [ 29.265110] allocated 115-byte region [fff00000c59f9700, fff00000c59f9773) [ 29.265212] [ 29.265258] The buggy address belongs to the physical page: [ 29.265286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.265596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.265707] page_type: f5(slab) [ 29.265756] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.265826] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.265901] page dumped because: kasan: bad access detected [ 29.265968] [ 29.266018] Memory state around the buggy address: [ 29.266124] fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266198] fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.266239] >fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266542] ^ [ 29.266596] fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.266653] fff00000c59f9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266717] ==================================================================
[ 25.014947] ================================================================== [ 25.015633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 25.016254] Read of size 1 at addr ffff88810553d380 by task kunit_try_catch/185 [ 25.016888] [ 25.017056] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 25.017116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.017128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.017148] Call Trace: [ 25.017163] <TASK> [ 25.017176] dump_stack_lvl+0x73/0xb0 [ 25.017205] print_report+0xd1/0x610 [ 25.017238] ? __virt_addr_valid+0x1db/0x2d0 [ 25.017261] ? kmalloc_oob_right+0x68a/0x7f0 [ 25.017290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.017315] ? kmalloc_oob_right+0x68a/0x7f0 [ 25.017336] kasan_report+0x141/0x180 [ 25.017357] ? kmalloc_oob_right+0x68a/0x7f0 [ 25.017382] __asan_report_load1_noabort+0x18/0x20 [ 25.017405] kmalloc_oob_right+0x68a/0x7f0 [ 25.017426] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 25.017447] ? __schedule+0x10c6/0x2b60 [ 25.017469] ? __pfx_read_tsc+0x10/0x10 [ 25.017489] ? ktime_get_ts64+0x86/0x230 [ 25.017513] kunit_try_run_case+0x1a5/0x480 [ 25.017535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.017556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.017578] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.017600] ? __kthread_parkme+0x82/0x180 [ 25.017622] ? preempt_count_sub+0x50/0x80 [ 25.017644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.017666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.017696] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.017720] kthread+0x337/0x6f0 [ 25.017745] ? trace_preempt_on+0x20/0xc0 [ 25.017774] ? __pfx_kthread+0x10/0x10 [ 25.017793] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.017814] ? calculate_sigpending+0x7b/0xa0 [ 25.017836] ? __pfx_kthread+0x10/0x10 [ 25.017856] ret_from_fork+0x116/0x1d0 [ 25.017874] ? __pfx_kthread+0x10/0x10 [ 25.017893] ret_from_fork_asm+0x1a/0x30 [ 25.017927] </TASK> [ 25.017937] [ 25.028269] Allocated by task 185: [ 25.028474] kasan_save_stack+0x45/0x70 [ 25.028611] kasan_save_track+0x18/0x40 [ 25.029045] kasan_save_alloc_info+0x3b/0x50 [ 25.029535] __kasan_kmalloc+0xb7/0xc0 [ 25.029935] __kmalloc_cache_noprof+0x189/0x420 [ 25.030457] kmalloc_oob_right+0xa9/0x7f0 [ 25.030664] kunit_try_run_case+0x1a5/0x480 [ 25.030798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.030958] kthread+0x337/0x6f0 [ 25.031065] ret_from_fork+0x116/0x1d0 [ 25.031197] ret_from_fork_asm+0x1a/0x30 [ 25.031463] [ 25.031590] The buggy address belongs to the object at ffff88810553d300 [ 25.031590] which belongs to the cache kmalloc-128 of size 128 [ 25.032034] The buggy address is located 13 bytes to the right of [ 25.032034] allocated 115-byte region [ffff88810553d300, ffff88810553d373) [ 25.032692] [ 25.032798] The buggy address belongs to the physical page: [ 25.033140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 25.033563] flags: 0x200000000000000(node=0|zone=2) [ 25.033753] page_type: f5(slab) [ 25.033862] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.034238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.034708] page dumped because: kasan: bad access detected [ 25.035014] [ 25.035132] Memory state around the buggy address: [ 25.035332] ffff88810553d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.035569] ffff88810553d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.035998] >ffff88810553d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.036305] ^ [ 25.036585] ffff88810553d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.037196] ffff88810553d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.037461] ================================================================== [ 24.957213] ================================================================== [ 24.958195] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 24.959199] Write of size 1 at addr ffff88810553d373 by task kunit_try_catch/185 [ 24.959941] [ 24.961345] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 24.961690] Tainted: [N]=TEST [ 24.961721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.961948] Call Trace: [ 24.962015] <TASK> [ 24.962173] dump_stack_lvl+0x73/0xb0 [ 24.962288] print_report+0xd1/0x610 [ 24.962349] ? __virt_addr_valid+0x1db/0x2d0 [ 24.962376] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.962431] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.962457] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.962488] kasan_report+0x141/0x180 [ 24.962509] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.962535] __asan_report_store1_noabort+0x1b/0x30 [ 24.962558] kmalloc_oob_right+0x6f0/0x7f0 [ 24.962580] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.962601] ? __schedule+0x10c6/0x2b60 [ 24.962625] ? __pfx_read_tsc+0x10/0x10 [ 24.962646] ? ktime_get_ts64+0x86/0x230 [ 24.962672] kunit_try_run_case+0x1a5/0x480 [ 24.962698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.962719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.962741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.962763] ? __kthread_parkme+0x82/0x180 [ 24.962788] ? preempt_count_sub+0x50/0x80 [ 24.962811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.962833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.962855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.962878] kthread+0x337/0x6f0 [ 24.962896] ? trace_preempt_on+0x20/0xc0 [ 24.962920] ? __pfx_kthread+0x10/0x10 [ 24.962940] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.962960] ? calculate_sigpending+0x7b/0xa0 [ 24.962984] ? __pfx_kthread+0x10/0x10 [ 24.963004] ret_from_fork+0x116/0x1d0 [ 24.963022] ? __pfx_kthread+0x10/0x10 [ 24.963042] ret_from_fork_asm+0x1a/0x30 [ 24.963110] </TASK> [ 24.963175] [ 24.972604] Allocated by task 185: [ 24.973067] kasan_save_stack+0x45/0x70 [ 24.973403] kasan_save_track+0x18/0x40 [ 24.973756] kasan_save_alloc_info+0x3b/0x50 [ 24.974103] __kasan_kmalloc+0xb7/0xc0 [ 24.974277] __kmalloc_cache_noprof+0x189/0x420 [ 24.974671] kmalloc_oob_right+0xa9/0x7f0 [ 24.974872] kunit_try_run_case+0x1a5/0x480 [ 24.975054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.975674] kthread+0x337/0x6f0 [ 24.975840] ret_from_fork+0x116/0x1d0 [ 24.976200] ret_from_fork_asm+0x1a/0x30 [ 24.976683] [ 24.976859] The buggy address belongs to the object at ffff88810553d300 [ 24.976859] which belongs to the cache kmalloc-128 of size 128 [ 24.977751] The buggy address is located 0 bytes to the right of [ 24.977751] allocated 115-byte region [ffff88810553d300, ffff88810553d373) [ 24.978560] [ 24.978861] The buggy address belongs to the physical page: [ 24.979673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 24.980291] flags: 0x200000000000000(node=0|zone=2) [ 24.980949] page_type: f5(slab) [ 24.981533] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.981841] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.983136] page dumped because: kasan: bad access detected [ 24.983348] [ 24.983422] Memory state around the buggy address: [ 24.983816] ffff88810553d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.984050] ffff88810553d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.984404] >ffff88810553d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.984638] ^ [ 24.985432] ffff88810553d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.985761] ffff88810553d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.986125] ================================================================== [ 24.988766] ================================================================== [ 24.989150] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 24.989378] Write of size 1 at addr ffff88810553d378 by task kunit_try_catch/185 [ 24.989597] [ 24.989673] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 24.989719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.989730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.989750] Call Trace: [ 24.989762] <TASK> [ 24.989776] dump_stack_lvl+0x73/0xb0 [ 24.989802] print_report+0xd1/0x610 [ 24.989822] ? __virt_addr_valid+0x1db/0x2d0 [ 24.989843] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.989862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.989886] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.989905] kasan_report+0x141/0x180 [ 24.989930] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.989955] __asan_report_store1_noabort+0x1b/0x30 [ 24.989977] kmalloc_oob_right+0x6bd/0x7f0 [ 24.989997] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.990018] ? __schedule+0x10c6/0x2b60 [ 24.990039] ? __pfx_read_tsc+0x10/0x10 [ 24.990059] ? ktime_get_ts64+0x86/0x230 [ 24.990101] kunit_try_run_case+0x1a5/0x480 [ 24.990124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.990144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.990165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.990187] ? __kthread_parkme+0x82/0x180 [ 24.990210] ? preempt_count_sub+0x50/0x80 [ 24.990253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.990276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.990299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.990321] kthread+0x337/0x6f0 [ 24.990339] ? trace_preempt_on+0x20/0xc0 [ 24.990361] ? __pfx_kthread+0x10/0x10 [ 24.990381] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.990401] ? calculate_sigpending+0x7b/0xa0 [ 24.990424] ? __pfx_kthread+0x10/0x10 [ 24.990444] ret_from_fork+0x116/0x1d0 [ 24.990461] ? __pfx_kthread+0x10/0x10 [ 24.990481] ret_from_fork_asm+0x1a/0x30 [ 24.990651] </TASK> [ 24.990664] [ 25.000527] Allocated by task 185: [ 25.001130] kasan_save_stack+0x45/0x70 [ 25.001734] kasan_save_track+0x18/0x40 [ 25.002425] kasan_save_alloc_info+0x3b/0x50 [ 25.003146] __kasan_kmalloc+0xb7/0xc0 [ 25.003728] __kmalloc_cache_noprof+0x189/0x420 [ 25.004283] kmalloc_oob_right+0xa9/0x7f0 [ 25.004649] kunit_try_run_case+0x1a5/0x480 [ 25.004800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.004967] kthread+0x337/0x6f0 [ 25.005089] ret_from_fork+0x116/0x1d0 [ 25.005215] ret_from_fork_asm+0x1a/0x30 [ 25.005347] [ 25.005468] The buggy address belongs to the object at ffff88810553d300 [ 25.005468] which belongs to the cache kmalloc-128 of size 128 [ 25.006663] The buggy address is located 5 bytes to the right of [ 25.006663] allocated 115-byte region [ffff88810553d300, ffff88810553d373) [ 25.008072] [ 25.008239] The buggy address belongs to the physical page: [ 25.008779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 25.009163] flags: 0x200000000000000(node=0|zone=2) [ 25.009641] page_type: f5(slab) [ 25.009944] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.010247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.010552] page dumped because: kasan: bad access detected [ 25.010769] [ 25.010845] Memory state around the buggy address: [ 25.011024] ffff88810553d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.011244] ffff88810553d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.011922] >ffff88810553d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.012646] ^ [ 25.013321] ffff88810553d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.013538] ffff88810553d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.014022] ==================================================================