Date
July 23, 2025, 3:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.018758] ================================================================== [ 30.019125] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 30.019944] Write of size 1 at addr fff00000c99bc573 by task kunit_try_catch/169 [ 30.020052] [ 30.020888] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.021063] Tainted: [N]=TEST [ 30.021096] Hardware name: linux,dummy-virt (DT) [ 30.021312] Call trace: [ 30.021482] show_stack+0x20/0x38 (C) [ 30.021617] dump_stack_lvl+0x8c/0xd0 [ 30.021668] print_report+0x118/0x5e8 [ 30.021712] kasan_report+0xdc/0x128 [ 30.021753] __asan_report_store1_noabort+0x20/0x30 [ 30.021801] kmalloc_oob_right+0x5a4/0x660 [ 30.021847] kunit_try_run_case+0x170/0x3f0 [ 30.021908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.021959] kthread+0x328/0x630 [ 30.022002] ret_from_fork+0x10/0x20 [ 30.022166] [ 30.022228] Allocated by task 169: [ 30.022344] kasan_save_stack+0x3c/0x68 [ 30.022418] kasan_save_track+0x20/0x40 [ 30.022464] kasan_save_alloc_info+0x40/0x58 [ 30.022501] __kasan_kmalloc+0xd4/0xd8 [ 30.022534] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.022576] kmalloc_oob_right+0xb0/0x660 [ 30.022613] kunit_try_run_case+0x170/0x3f0 [ 30.022649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.022690] kthread+0x328/0x630 [ 30.022722] ret_from_fork+0x10/0x20 [ 30.022775] [ 30.022832] The buggy address belongs to the object at fff00000c99bc500 [ 30.022832] which belongs to the cache kmalloc-128 of size 128 [ 30.022939] The buggy address is located 0 bytes to the right of [ 30.022939] allocated 115-byte region [fff00000c99bc500, fff00000c99bc573) [ 30.023006] [ 30.023085] The buggy address belongs to the physical page: [ 30.023430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.023669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.023958] page_type: f5(slab) [ 30.024248] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.024308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.024406] page dumped because: kasan: bad access detected [ 30.024446] [ 30.024472] Memory state around the buggy address: [ 30.024748] fff00000c99bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.024821] fff00000c99bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.024873] >fff00000c99bc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.024937] ^ [ 30.025024] fff00000c99bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.025066] fff00000c99bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.025128] ================================================================== [ 30.027468] ================================================================== [ 30.027509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 30.027561] Write of size 1 at addr fff00000c99bc578 by task kunit_try_catch/169 [ 30.027609] [ 30.027642] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.027727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.027753] Hardware name: linux,dummy-virt (DT) [ 30.027784] Call trace: [ 30.027807] show_stack+0x20/0x38 (C) [ 30.027854] dump_stack_lvl+0x8c/0xd0 [ 30.027915] print_report+0x118/0x5e8 [ 30.027959] kasan_report+0xdc/0x128 [ 30.028000] __asan_report_store1_noabort+0x20/0x30 [ 30.028048] kmalloc_oob_right+0x538/0x660 [ 30.028093] kunit_try_run_case+0x170/0x3f0 [ 30.028140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.028190] kthread+0x328/0x630 [ 30.028231] ret_from_fork+0x10/0x20 [ 30.028277] [ 30.029375] Allocated by task 169: [ 30.029420] kasan_save_stack+0x3c/0x68 [ 30.029469] kasan_save_track+0x20/0x40 [ 30.029507] kasan_save_alloc_info+0x40/0x58 [ 30.029544] __kasan_kmalloc+0xd4/0xd8 [ 30.029577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.029618] kmalloc_oob_right+0xb0/0x660 [ 30.029654] kunit_try_run_case+0x170/0x3f0 [ 30.029690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.029731] kthread+0x328/0x630 [ 30.029763] ret_from_fork+0x10/0x20 [ 30.029797] [ 30.029816] The buggy address belongs to the object at fff00000c99bc500 [ 30.029816] which belongs to the cache kmalloc-128 of size 128 [ 30.029872] The buggy address is located 5 bytes to the right of [ 30.029872] allocated 115-byte region [fff00000c99bc500, fff00000c99bc573) [ 30.029947] [ 30.029967] The buggy address belongs to the physical page: [ 30.030000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.030051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.030098] page_type: f5(slab) [ 30.030135] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.030182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.030220] page dumped because: kasan: bad access detected [ 30.030251] [ 30.030269] Memory state around the buggy address: [ 30.030300] fff00000c99bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.030342] fff00000c99bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030390] >fff00000c99bc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.030426] ^ [ 30.030467] fff00000c99bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030507] fff00000c99bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030543] ================================================================== [ 30.031135] ================================================================== [ 30.031184] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 30.031231] Read of size 1 at addr fff00000c99bc580 by task kunit_try_catch/169 [ 30.031279] [ 30.031308] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.031458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.031576] Hardware name: linux,dummy-virt (DT) [ 30.031612] Call trace: [ 30.031734] show_stack+0x20/0x38 (C) [ 30.031803] dump_stack_lvl+0x8c/0xd0 [ 30.031851] print_report+0x118/0x5e8 [ 30.032132] kasan_report+0xdc/0x128 [ 30.032289] __asan_report_load1_noabort+0x20/0x30 [ 30.032354] kmalloc_oob_right+0x5d0/0x660 [ 30.032401] kunit_try_run_case+0x170/0x3f0 [ 30.032448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.032509] kthread+0x328/0x630 [ 30.032551] ret_from_fork+0x10/0x20 [ 30.032597] [ 30.032615] Allocated by task 169: [ 30.032778] kasan_save_stack+0x3c/0x68 [ 30.032822] kasan_save_track+0x20/0x40 [ 30.032960] kasan_save_alloc_info+0x40/0x58 [ 30.033090] __kasan_kmalloc+0xd4/0xd8 [ 30.033160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.033292] kmalloc_oob_right+0xb0/0x660 [ 30.033393] kunit_try_run_case+0x170/0x3f0 [ 30.033440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.033481] kthread+0x328/0x630 [ 30.033824] ret_from_fork+0x10/0x20 [ 30.033924] [ 30.033985] The buggy address belongs to the object at fff00000c99bc500 [ 30.033985] which belongs to the cache kmalloc-128 of size 128 [ 30.034097] The buggy address is located 13 bytes to the right of [ 30.034097] allocated 115-byte region [fff00000c99bc500, fff00000c99bc573) [ 30.034163] [ 30.034183] The buggy address belongs to the physical page: [ 30.034218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.034281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.034329] page_type: f5(slab) [ 30.034377] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.034426] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.034464] page dumped because: kasan: bad access detected [ 30.034493] [ 30.034520] Memory state around the buggy address: [ 30.034550] fff00000c99bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034591] fff00000c99bc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.034631] >fff00000c99bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034676] ^ [ 30.034712] fff00000c99bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034767] fff00000c99bc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034819] ==================================================================
[ 24.398543] ================================================================== [ 24.399290] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 24.399524] Read of size 1 at addr ffff888104964480 by task kunit_try_catch/185 [ 24.399902] [ 24.400056] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.400121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.400134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.400180] Call Trace: [ 24.400200] <TASK> [ 24.400234] dump_stack_lvl+0x73/0xb0 [ 24.400279] print_report+0xd1/0x640 [ 24.400304] ? __virt_addr_valid+0x1db/0x2d0 [ 24.400329] ? kmalloc_oob_right+0x68a/0x7f0 [ 24.400350] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.400421] ? kmalloc_oob_right+0x68a/0x7f0 [ 24.400447] kasan_report+0x141/0x180 [ 24.400469] ? kmalloc_oob_right+0x68a/0x7f0 [ 24.400496] __asan_report_load1_noabort+0x18/0x20 [ 24.400520] kmalloc_oob_right+0x68a/0x7f0 [ 24.400542] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.400564] ? __schedule+0x10da/0x2b60 [ 24.400589] ? __pfx_read_tsc+0x10/0x10 [ 24.400611] ? ktime_get_ts64+0x86/0x230 [ 24.400636] kunit_try_run_case+0x1a5/0x480 [ 24.400661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.400683] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.400707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.400754] ? __kthread_parkme+0x82/0x180 [ 24.400775] ? preempt_count_sub+0x50/0x80 [ 24.400800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.400824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.400847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.400870] kthread+0x337/0x6f0 [ 24.400889] ? trace_preempt_on+0x20/0xc0 [ 24.400930] ? __pfx_kthread+0x10/0x10 [ 24.400959] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.400996] ? calculate_sigpending+0x7b/0xa0 [ 24.401020] ? __pfx_kthread+0x10/0x10 [ 24.401054] ret_from_fork+0x116/0x1d0 [ 24.401086] ? __pfx_kthread+0x10/0x10 [ 24.401107] ret_from_fork_asm+0x1a/0x30 [ 24.401177] </TASK> [ 24.401189] [ 24.408772] Allocated by task 185: [ 24.408957] kasan_save_stack+0x45/0x70 [ 24.409174] kasan_save_track+0x18/0x40 [ 24.409335] kasan_save_alloc_info+0x3b/0x50 [ 24.409531] __kasan_kmalloc+0xb7/0xc0 [ 24.409721] __kmalloc_cache_noprof+0x189/0x420 [ 24.409951] kmalloc_oob_right+0xa9/0x7f0 [ 24.410177] kunit_try_run_case+0x1a5/0x480 [ 24.410378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.410615] kthread+0x337/0x6f0 [ 24.410772] ret_from_fork+0x116/0x1d0 [ 24.410947] ret_from_fork_asm+0x1a/0x30 [ 24.411171] [ 24.411595] The buggy address belongs to the object at ffff888104964400 [ 24.411595] which belongs to the cache kmalloc-128 of size 128 [ 24.412221] The buggy address is located 13 bytes to the right of [ 24.412221] allocated 115-byte region [ffff888104964400, ffff888104964473) [ 24.412794] [ 24.412890] The buggy address belongs to the physical page: [ 24.413421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964 [ 24.413803] flags: 0x200000000000000(node=0|zone=2) [ 24.414038] page_type: f5(slab) [ 24.414234] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.414633] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.414978] page dumped because: kasan: bad access detected [ 24.415226] [ 24.415311] Memory state around the buggy address: [ 24.415521] ffff888104964380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.415817] ffff888104964400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.416119] >ffff888104964480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.416532] ^ [ 24.416695] ffff888104964500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.417293] ffff888104964580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.417622] ================================================================== [ 24.352474] ================================================================== [ 24.353324] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 24.354047] Write of size 1 at addr ffff888104964473 by task kunit_try_catch/185 [ 24.354690] [ 24.355792] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.356160] Tainted: [N]=TEST [ 24.356194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.356438] Call Trace: [ 24.356510] <TASK> [ 24.356655] dump_stack_lvl+0x73/0xb0 [ 24.356750] print_report+0xd1/0x640 [ 24.356781] ? __virt_addr_valid+0x1db/0x2d0 [ 24.356807] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.356829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.356854] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.356876] kasan_report+0x141/0x180 [ 24.356897] ? kmalloc_oob_right+0x6f0/0x7f0 [ 24.356923] __asan_report_store1_noabort+0x1b/0x30 [ 24.356949] kmalloc_oob_right+0x6f0/0x7f0 [ 24.356971] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.356993] ? __schedule+0x10da/0x2b60 [ 24.357019] ? __pfx_read_tsc+0x10/0x10 [ 24.357041] ? ktime_get_ts64+0x86/0x230 [ 24.357068] kunit_try_run_case+0x1a5/0x480 [ 24.357095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.357117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.357142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.357180] ? __kthread_parkme+0x82/0x180 [ 24.357202] ? preempt_count_sub+0x50/0x80 [ 24.357227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.357250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.357274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.357297] kthread+0x337/0x6f0 [ 24.357317] ? trace_preempt_on+0x20/0xc0 [ 24.357342] ? __pfx_kthread+0x10/0x10 [ 24.357362] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.357397] ? calculate_sigpending+0x7b/0xa0 [ 24.357423] ? __pfx_kthread+0x10/0x10 [ 24.357445] ret_from_fork+0x116/0x1d0 [ 24.357464] ? __pfx_kthread+0x10/0x10 [ 24.357485] ret_from_fork_asm+0x1a/0x30 [ 24.357545] </TASK> [ 24.357611] [ 24.365087] Allocated by task 185: [ 24.365406] kasan_save_stack+0x45/0x70 [ 24.365654] kasan_save_track+0x18/0x40 [ 24.365900] kasan_save_alloc_info+0x3b/0x50 [ 24.366136] __kasan_kmalloc+0xb7/0xc0 [ 24.366330] __kmalloc_cache_noprof+0x189/0x420 [ 24.366622] kmalloc_oob_right+0xa9/0x7f0 [ 24.366814] kunit_try_run_case+0x1a5/0x480 [ 24.367068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.367294] kthread+0x337/0x6f0 [ 24.367506] ret_from_fork+0x116/0x1d0 [ 24.367664] ret_from_fork_asm+0x1a/0x30 [ 24.368178] [ 24.368330] The buggy address belongs to the object at ffff888104964400 [ 24.368330] which belongs to the cache kmalloc-128 of size 128 [ 24.368978] The buggy address is located 0 bytes to the right of [ 24.368978] allocated 115-byte region [ffff888104964400, ffff888104964473) [ 24.369596] [ 24.369829] The buggy address belongs to the physical page: [ 24.370650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964 [ 24.371396] flags: 0x200000000000000(node=0|zone=2) [ 24.372130] page_type: f5(slab) [ 24.372769] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.373356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.373669] page dumped because: kasan: bad access detected [ 24.373850] [ 24.374043] Memory state around the buggy address: [ 24.374693] ffff888104964300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.375118] ffff888104964380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.375564] >ffff888104964400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.375940] ^ [ 24.376334] ffff888104964480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.376742] ffff888104964500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.377088] ================================================================== [ 24.379049] ================================================================== [ 24.379464] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 24.379794] Write of size 1 at addr ffff888104964478 by task kunit_try_catch/185 [ 24.380166] [ 24.380295] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 24.380345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.380357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.380398] Call Trace: [ 24.380412] <TASK> [ 24.380431] dump_stack_lvl+0x73/0xb0 [ 24.380462] print_report+0xd1/0x640 [ 24.380485] ? __virt_addr_valid+0x1db/0x2d0 [ 24.380510] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.380531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.380556] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.380577] kasan_report+0x141/0x180 [ 24.380599] ? kmalloc_oob_right+0x6bd/0x7f0 [ 24.380624] __asan_report_store1_noabort+0x1b/0x30 [ 24.380649] kmalloc_oob_right+0x6bd/0x7f0 [ 24.380671] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 24.380693] ? __schedule+0x10da/0x2b60 [ 24.380717] ? __pfx_read_tsc+0x10/0x10 [ 24.380739] ? ktime_get_ts64+0x86/0x230 [ 24.380763] kunit_try_run_case+0x1a5/0x480 [ 24.380788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.380810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.380835] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.380861] ? __kthread_parkme+0x82/0x180 [ 24.380884] ? preempt_count_sub+0x50/0x80 [ 24.380908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.380931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.380971] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.380995] kthread+0x337/0x6f0 [ 24.381015] ? trace_preempt_on+0x20/0xc0 [ 24.381039] ? __pfx_kthread+0x10/0x10 [ 24.381059] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.381082] ? calculate_sigpending+0x7b/0xa0 [ 24.381106] ? __pfx_kthread+0x10/0x10 [ 24.381127] ret_from_fork+0x116/0x1d0 [ 24.381158] ? __pfx_kthread+0x10/0x10 [ 24.381178] ret_from_fork_asm+0x1a/0x30 [ 24.381222] </TASK> [ 24.381253] [ 24.388948] Allocated by task 185: [ 24.389155] kasan_save_stack+0x45/0x70 [ 24.389368] kasan_save_track+0x18/0x40 [ 24.389565] kasan_save_alloc_info+0x3b/0x50 [ 24.390019] __kasan_kmalloc+0xb7/0xc0 [ 24.390226] __kmalloc_cache_noprof+0x189/0x420 [ 24.390698] kmalloc_oob_right+0xa9/0x7f0 [ 24.390913] kunit_try_run_case+0x1a5/0x480 [ 24.391125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.391433] kthread+0x337/0x6f0 [ 24.391597] ret_from_fork+0x116/0x1d0 [ 24.391731] ret_from_fork_asm+0x1a/0x30 [ 24.391904] [ 24.392026] The buggy address belongs to the object at ffff888104964400 [ 24.392026] which belongs to the cache kmalloc-128 of size 128 [ 24.392656] The buggy address is located 5 bytes to the right of [ 24.392656] allocated 115-byte region [ffff888104964400, ffff888104964473) [ 24.393222] [ 24.393301] The buggy address belongs to the physical page: [ 24.393642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964 [ 24.393999] flags: 0x200000000000000(node=0|zone=2) [ 24.394211] page_type: f5(slab) [ 24.394428] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.394749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.395130] page dumped because: kasan: bad access detected [ 24.395318] [ 24.395636] Memory state around the buggy address: [ 24.395875] ffff888104964300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.396271] ffff888104964380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.396546] >ffff888104964400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.396980] ^ [ 24.397294] ffff888104964480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.397603] ffff888104964500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.397939] ==================================================================