Date
July 18, 2025, 1:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.238794] ================================================================== [ 31.238829] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 31.238870] Read of size 1 at addr fff00000c3efd580 by task kunit_try_catch/167 [ 31.238937] [ 31.238963] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.239058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.239095] Hardware name: linux,dummy-virt (DT) [ 31.239142] Call trace: [ 31.239181] show_stack+0x20/0x38 (C) [ 31.239226] dump_stack_lvl+0x8c/0xd0 [ 31.239285] print_report+0x118/0x5e8 [ 31.239344] kasan_report+0xdc/0x128 [ 31.239402] __asan_report_load1_noabort+0x20/0x30 [ 31.239458] kmalloc_oob_right+0x5d0/0x660 [ 31.239503] kunit_try_run_case+0x170/0x3f0 [ 31.239547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.239911] kthread+0x328/0x630 [ 31.239955] ret_from_fork+0x10/0x20 [ 31.239999] [ 31.240034] Allocated by task 167: [ 31.240190] kasan_save_stack+0x3c/0x68 [ 31.240244] kasan_save_track+0x20/0x40 [ 31.240309] kasan_save_alloc_info+0x40/0x58 [ 31.240378] __kasan_kmalloc+0xd4/0xd8 [ 31.240475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.240544] kmalloc_oob_right+0xb0/0x660 [ 31.240633] kunit_try_run_case+0x170/0x3f0 [ 31.240688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.240728] kthread+0x328/0x630 [ 31.240776] ret_from_fork+0x10/0x20 [ 31.240810] [ 31.240827] The buggy address belongs to the object at fff00000c3efd500 [ 31.240827] which belongs to the cache kmalloc-128 of size 128 [ 31.240881] The buggy address is located 13 bytes to the right of [ 31.240881] allocated 115-byte region [fff00000c3efd500, fff00000c3efd573) [ 31.240944] [ 31.240962] The buggy address belongs to the physical page: [ 31.240989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.241037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.241091] page_type: f5(slab) [ 31.241126] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.241214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.241306] page dumped because: kasan: bad access detected [ 31.241335] [ 31.241387] Memory state around the buggy address: [ 31.241465] fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.241548] fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.241613] >fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.241649] ^ [ 31.241675] fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.241713] fff00000c3efd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.241749] ================================================================== [ 31.236686] ================================================================== [ 31.236724] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 31.236771] Write of size 1 at addr fff00000c3efd578 by task kunit_try_catch/167 [ 31.236846] [ 31.236876] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.236955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.236980] Hardware name: linux,dummy-virt (DT) [ 31.237009] Call trace: [ 31.237036] show_stack+0x20/0x38 (C) [ 31.237103] dump_stack_lvl+0x8c/0xd0 [ 31.237150] print_report+0x118/0x5e8 [ 31.237192] kasan_report+0xdc/0x128 [ 31.237235] __asan_report_store1_noabort+0x20/0x30 [ 31.237282] kmalloc_oob_right+0x538/0x660 [ 31.237336] kunit_try_run_case+0x170/0x3f0 [ 31.237389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.237448] kthread+0x328/0x630 [ 31.237490] ret_from_fork+0x10/0x20 [ 31.237539] [ 31.237557] Allocated by task 167: [ 31.237583] kasan_save_stack+0x3c/0x68 [ 31.237619] kasan_save_track+0x20/0x40 [ 31.237652] kasan_save_alloc_info+0x40/0x58 [ 31.237696] __kasan_kmalloc+0xd4/0xd8 [ 31.237729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.237772] kmalloc_oob_right+0xb0/0x660 [ 31.237809] kunit_try_run_case+0x170/0x3f0 [ 31.237843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.237891] kthread+0x328/0x630 [ 31.237931] ret_from_fork+0x10/0x20 [ 31.237965] [ 31.237982] The buggy address belongs to the object at fff00000c3efd500 [ 31.237982] which belongs to the cache kmalloc-128 of size 128 [ 31.238041] The buggy address is located 5 bytes to the right of [ 31.238041] allocated 115-byte region [fff00000c3efd500, fff00000c3efd573) [ 31.238111] [ 31.238129] The buggy address belongs to the physical page: [ 31.238157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.238206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.238252] page_type: f5(slab) [ 31.238287] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.238334] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.238372] page dumped because: kasan: bad access detected [ 31.238400] [ 31.238417] Memory state around the buggy address: [ 31.238446] fff00000c3efd400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.238486] fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.238526] >fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.238562] ^ [ 31.238600] fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.238638] fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.238673] ================================================================== [ 31.225227] ================================================================== [ 31.225541] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 31.226363] Write of size 1 at addr fff00000c3efd573 by task kunit_try_catch/167 [ 31.226516] [ 31.227298] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.227666] Tainted: [N]=TEST [ 31.227700] Hardware name: linux,dummy-virt (DT) [ 31.228966] Call trace: [ 31.229336] show_stack+0x20/0x38 (C) [ 31.229510] dump_stack_lvl+0x8c/0xd0 [ 31.229566] print_report+0x118/0x5e8 [ 31.229611] kasan_report+0xdc/0x128 [ 31.229653] __asan_report_store1_noabort+0x20/0x30 [ 31.229701] kmalloc_oob_right+0x5a4/0x660 [ 31.229747] kunit_try_run_case+0x170/0x3f0 [ 31.229795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.229844] kthread+0x328/0x630 [ 31.229951] ret_from_fork+0x10/0x20 [ 31.230393] [ 31.230483] Allocated by task 167: [ 31.230784] kasan_save_stack+0x3c/0x68 [ 31.230940] kasan_save_track+0x20/0x40 [ 31.230975] kasan_save_alloc_info+0x40/0x58 [ 31.231011] __kasan_kmalloc+0xd4/0xd8 [ 31.231043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.231094] kmalloc_oob_right+0xb0/0x660 [ 31.231129] kunit_try_run_case+0x170/0x3f0 [ 31.231164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.231204] kthread+0x328/0x630 [ 31.231236] ret_from_fork+0x10/0x20 [ 31.231432] [ 31.231553] The buggy address belongs to the object at fff00000c3efd500 [ 31.231553] which belongs to the cache kmalloc-128 of size 128 [ 31.231644] The buggy address is located 0 bytes to the right of [ 31.231644] allocated 115-byte region [fff00000c3efd500, fff00000c3efd573) [ 31.231739] [ 31.232128] The buggy address belongs to the physical page: [ 31.232627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.233026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.233367] page_type: f5(slab) [ 31.233844] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.233976] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.234156] page dumped because: kasan: bad access detected [ 31.234201] [ 31.234226] Memory state around the buggy address: [ 31.234476] fff00000c3efd400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.234649] fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.234738] >fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.234860] ^ [ 31.235063] fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.235140] fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.235215] ==================================================================
[ 24.047626] ================================================================== [ 24.048467] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 24.049131] Write of size 1 at addr ffff8881012bce78 by task kunit_try_catch/184 [ 24.049788] [ 24.049979] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 24.050027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.050038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.050060] Call Trace: [ 24.050073] <TASK> [ 24.050088] dump_stack_lvl+0x73/0xb0 [ 24.050282] print_report+0xd1/0x640 [ 24.050312] ? __virt_addr_valid+0x1db/0x2d0 [ 24.050335] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.050355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.050380] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.050401] kasan_report+0x141/0x180 [ 24.050422] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.050446] __asan_report_store1_noabort+0x1b/0x30 [ 24.050470] kmalloc_oob_right+0x6bd/0x7f0 [ 24.050491] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.050512] ? __schedule+0x10da/0x2b60 [ 24.050535] ? __pfx_read_tsc+0x10/0x10 [ 24.050556] ? ktime_get_ts64+0x86/0x230 [ 24.050581] kunit_try_run_case+0x1a5/0x480 [ 24.050611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.050632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.050665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.050697] ? __kthread_parkme+0x82/0x180 [ 24.050717] ? preempt_count_sub+0x50/0x80 [ 24.050739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.050762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.050785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.050864] kthread+0x337/0x6f0 [ 24.050884] ? trace_preempt_on+0x20/0xc0 [ 24.050907] ? __pfx_kthread+0x10/0x10 [ 24.050926] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.050956] ? calculate_sigpending+0x7b/0xa0 [ 24.050980] ? __pfx_kthread+0x10/0x10 [ 24.051000] ret_from_fork+0x116/0x1d0 [ 24.051019] ? __pfx_kthread+0x10/0x10 [ 24.051038] ret_from_fork_asm+0x1a/0x30 [ 24.051068] </TASK> [ 24.051079] [ 24.059722] Allocated by task 184: [ 24.059880] kasan_save_stack+0x45/0x70 [ 24.060064] kasan_save_track+0x18/0x40 [ 24.060263] kasan_save_alloc_info+0x3b/0x50 [ 24.060442] __kasan_kmalloc+0xb7/0xc0 [ 24.060567] __kmalloc_cache_noprof+0x189/0x420 [ 24.060716] kmalloc_oob_right+0xa9/0x7f0 [ 24.060848] kunit_try_run_case+0x1a5/0x480 [ 24.060987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.061152] kthread+0x337/0x6f0 [ 24.062286] ret_from_fork+0x116/0x1d0 [ 24.062429] ret_from_fork_asm+0x1a/0x30 [ 24.062764] [ 24.062899] The buggy address belongs to the object at ffff8881012bce00 [ 24.062899] which belongs to the cache kmalloc-128 of size 128 [ 24.063617] The buggy address is located 5 bytes to the right of [ 24.063617] allocated 115-byte region [ffff8881012bce00, ffff8881012bce73) [ 24.064421] [ 24.064505] The buggy address belongs to the physical page: [ 24.064804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012bc [ 24.065535] flags: 0x200000000000000(node=0|zone=2) [ 24.065768] page_type: f5(slab) [ 24.066094] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.066427] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.066763] page dumped because: kasan: bad access detected [ 24.067045] [ 24.067537] Memory state around the buggy address: [ 24.067733] ffff8881012bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.068198] ffff8881012bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.069208] >ffff8881012bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.069483] ^ [ 24.070025] ffff8881012bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.070535] ffff8881012bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.071023] ================================================================== [ 24.071500] ================================================================== [ 24.071727] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 24.071964] Read of size 1 at addr ffff8881012bce80 by task kunit_try_catch/184 [ 24.072671] [ 24.073581] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 24.073634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.073647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.073668] Call Trace: [ 24.073684] <TASK> [ 24.073699] dump_stack_lvl+0x73/0xb0 [ 24.073733] print_report+0xd1/0x640 [ 24.073757] ? __virt_addr_valid+0x1db/0x2d0 [ 24.073780] ? kmalloc_oob_right+0x68a/0x7f0 [ 24.073860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.073885] ? kmalloc_oob_right+0x68a/0x7f0 [ 24.073906] kasan_report+0x141/0x180 [ 24.073927] ? kmalloc_oob_right+0x68a/0x7f0 [ 24.073951] __asan_report_load1_noabort+0x18/0x20 [ 24.073975] kmalloc_oob_right+0x68a/0x7f0 [ 24.073996] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.074016] ? __schedule+0x10da/0x2b60 [ 24.074039] ? __pfx_read_tsc+0x10/0x10 [ 24.074060] ? ktime_get_ts64+0x86/0x230 [ 24.074084] kunit_try_run_case+0x1a5/0x480 [ 24.074107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.074128] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.074160] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.074208] ? __kthread_parkme+0x82/0x180 [ 24.074227] ? preempt_count_sub+0x50/0x80 [ 24.074250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.074272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.074293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.074317] kthread+0x337/0x6f0 [ 24.074335] ? trace_preempt_on+0x20/0xc0 [ 24.074358] ? __pfx_kthread+0x10/0x10 [ 24.074377] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.074406] ? calculate_sigpending+0x7b/0xa0 [ 24.074429] ? __pfx_kthread+0x10/0x10 [ 24.074449] ret_from_fork+0x116/0x1d0 [ 24.074467] ? __pfx_kthread+0x10/0x10 [ 24.074486] ret_from_fork_asm+0x1a/0x30 [ 24.074516] </TASK> [ 24.074526] [ 24.084454] Allocated by task 184: [ 24.084588] kasan_save_stack+0x45/0x70 [ 24.084732] kasan_save_track+0x18/0x40 [ 24.085115] kasan_save_alloc_info+0x3b/0x50 [ 24.085331] __kasan_kmalloc+0xb7/0xc0 [ 24.085494] __kmalloc_cache_noprof+0x189/0x420 [ 24.085676] kmalloc_oob_right+0xa9/0x7f0 [ 24.086711] kunit_try_run_case+0x1a5/0x480 [ 24.086875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.087435] kthread+0x337/0x6f0 [ 24.088193] ret_from_fork+0x116/0x1d0 [ 24.088622] ret_from_fork_asm+0x1a/0x30 [ 24.089081] [ 24.089164] The buggy address belongs to the object at ffff8881012bce00 [ 24.089164] which belongs to the cache kmalloc-128 of size 128 [ 24.089809] The buggy address is located 13 bytes to the right of [ 24.089809] allocated 115-byte region [ffff8881012bce00, ffff8881012bce73) [ 24.090719] [ 24.090823] The buggy address belongs to the physical page: [ 24.091399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012bc [ 24.091931] flags: 0x200000000000000(node=0|zone=2) [ 24.092375] page_type: f5(slab) [ 24.092556] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.093286] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.093518] page dumped because: kasan: bad access detected [ 24.093684] [ 24.093749] Memory state around the buggy address: [ 24.094246] ffff8881012bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.094554] ffff8881012bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.095287] >ffff8881012bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.095584] ^ [ 24.095751] ffff8881012bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.096348] ffff8881012bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.096777] ================================================================== [ 24.018523] ================================================================== [ 24.019188] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 24.019886] Write of size 1 at addr ffff8881012bce73 by task kunit_try_catch/184 [ 24.020303] [ 24.021494] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 24.021893] Tainted: [N]=TEST [ 24.021928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.022183] Call Trace: [ 24.022252] <TASK> [ 24.022393] dump_stack_lvl+0x73/0xb0 [ 24.022486] print_report+0xd1/0x640 [ 24.022516] ? __virt_addr_valid+0x1db/0x2d0 [ 24.022542] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.022562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.022587] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.022613] kasan_report+0x141/0x180 [ 24.022635] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.022659] __asan_report_store1_noabort+0x1b/0x30 [ 24.022683] kmalloc_oob_right+0x6f0/0x7f0 [ 24.022704] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.022725] ? __schedule+0x10da/0x2b60 [ 24.022749] ? __pfx_read_tsc+0x10/0x10 [ 24.022772] ? ktime_get_ts64+0x86/0x230 [ 24.022837] kunit_try_run_case+0x1a5/0x480 [ 24.022864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.022885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.022919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.022951] ? __kthread_parkme+0x82/0x180 [ 24.022972] ? preempt_count_sub+0x50/0x80 [ 24.022995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.023018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.023040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.023063] kthread+0x337/0x6f0 [ 24.023082] ? trace_preempt_on+0x20/0xc0 [ 24.023105] ? __pfx_kthread+0x10/0x10 [ 24.023125] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.023154] ? calculate_sigpending+0x7b/0xa0 [ 24.023187] ? __pfx_kthread+0x10/0x10 [ 24.023207] ret_from_fork+0x116/0x1d0 [ 24.023226] ? __pfx_kthread+0x10/0x10 [ 24.023245] ret_from_fork_asm+0x1a/0x30 [ 24.023301] </TASK> [ 24.023366] [ 24.030194] Allocated by task 184: [ 24.030845] kasan_save_stack+0x45/0x70 [ 24.031018] kasan_save_track+0x18/0x40 [ 24.031151] kasan_save_alloc_info+0x3b/0x50 [ 24.031534] __kasan_kmalloc+0xb7/0xc0 [ 24.031718] __kmalloc_cache_noprof+0x189/0x420 [ 24.031942] kmalloc_oob_right+0xa9/0x7f0 [ 24.032131] kunit_try_run_case+0x1a5/0x480 [ 24.032339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.032583] kthread+0x337/0x6f0 [ 24.032743] ret_from_fork+0x116/0x1d0 [ 24.032981] ret_from_fork_asm+0x1a/0x30 [ 24.033442] [ 24.033596] The buggy address belongs to the object at ffff8881012bce00 [ 24.033596] which belongs to the cache kmalloc-128 of size 128 [ 24.034314] The buggy address is located 0 bytes to the right of [ 24.034314] allocated 115-byte region [ffff8881012bce00, ffff8881012bce73) [ 24.035082] [ 24.035272] The buggy address belongs to the physical page: [ 24.036261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012bc [ 24.037009] flags: 0x200000000000000(node=0|zone=2) [ 24.037695] page_type: f5(slab) [ 24.038434] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.038764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.039683] page dumped because: kasan: bad access detected [ 24.040340] [ 24.040594] Memory state around the buggy address: [ 24.041439] ffff8881012bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.042184] ffff8881012bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.042950] >ffff8881012bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.043329] ^ [ 24.043579] ffff8881012bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.044919] ffff8881012bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.045188] ==================================================================