Date
July 24, 2025, 4:41 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.094826] ================================================================== [ 32.095144] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 32.096066] Write of size 1 at addr fff00000c3f77d73 by task kunit_try_catch/167 [ 32.096384] [ 32.098270] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.098475] Tainted: [N]=TEST [ 32.098522] Hardware name: linux,dummy-virt (DT) [ 32.098835] Call trace: [ 32.099460] show_stack+0x20/0x38 (C) [ 32.099720] dump_stack_lvl+0x8c/0xd0 [ 32.099937] print_report+0x118/0x5e8 [ 32.099985] kasan_report+0xdc/0x128 [ 32.100029] __asan_report_store1_noabort+0x20/0x30 [ 32.100080] kmalloc_oob_right+0x5a4/0x660 [ 32.100126] kunit_try_run_case+0x170/0x3f0 [ 32.100368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.100534] kthread+0x328/0x630 [ 32.100648] ret_from_fork+0x10/0x20 [ 32.101662] [ 32.101712] Allocated by task 167: [ 32.102164] kasan_save_stack+0x3c/0x68 [ 32.102570] kasan_save_track+0x20/0x40 [ 32.102669] kasan_save_alloc_info+0x40/0x58 [ 32.102790] __kasan_kmalloc+0xd4/0xd8 [ 32.102845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.103198] kmalloc_oob_right+0xb0/0x660 [ 32.103443] kunit_try_run_case+0x170/0x3f0 [ 32.103670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.103814] kthread+0x328/0x630 [ 32.103904] ret_from_fork+0x10/0x20 [ 32.104017] [ 32.104113] The buggy address belongs to the object at fff00000c3f77d00 [ 32.104113] which belongs to the cache kmalloc-128 of size 128 [ 32.104246] The buggy address is located 0 bytes to the right of [ 32.104246] allocated 115-byte region [fff00000c3f77d00, fff00000c3f77d73) [ 32.104333] [ 32.104447] The buggy address belongs to the physical page: [ 32.105742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77 [ 32.106173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.107320] page_type: f5(slab) [ 32.108529] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.108704] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.109296] page dumped because: kasan: bad access detected [ 32.109463] [ 32.109493] Memory state around the buggy address: [ 32.109784] fff00000c3f77c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.109865] fff00000c3f77c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.109945] >fff00000c3f77d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.110024] ^ [ 32.110127] fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.110187] fff00000c3f77e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.110267] ================================================================== [ 32.112431] ================================================================== [ 32.112474] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 32.112532] Write of size 1 at addr fff00000c3f77d78 by task kunit_try_catch/167 [ 32.112581] [ 32.112618] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.112795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.112886] Hardware name: linux,dummy-virt (DT) [ 32.112958] Call trace: [ 32.113028] show_stack+0x20/0x38 (C) [ 32.113112] dump_stack_lvl+0x8c/0xd0 [ 32.113189] print_report+0x118/0x5e8 [ 32.113235] kasan_report+0xdc/0x128 [ 32.113278] __asan_report_store1_noabort+0x20/0x30 [ 32.113326] kmalloc_oob_right+0x538/0x660 [ 32.113593] kunit_try_run_case+0x170/0x3f0 [ 32.113719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.113821] kthread+0x328/0x630 [ 32.113898] ret_from_fork+0x10/0x20 [ 32.113946] [ 32.114215] Allocated by task 167: [ 32.114292] kasan_save_stack+0x3c/0x68 [ 32.114547] kasan_save_track+0x20/0x40 [ 32.114607] kasan_save_alloc_info+0x40/0x58 [ 32.114725] __kasan_kmalloc+0xd4/0xd8 [ 32.114820] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.114908] kmalloc_oob_right+0xb0/0x660 [ 32.114974] kunit_try_run_case+0x170/0x3f0 [ 32.115013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.115222] kthread+0x328/0x630 [ 32.115328] ret_from_fork+0x10/0x20 [ 32.115415] [ 32.115498] The buggy address belongs to the object at fff00000c3f77d00 [ 32.115498] which belongs to the cache kmalloc-128 of size 128 [ 32.115618] The buggy address is located 5 bytes to the right of [ 32.115618] allocated 115-byte region [fff00000c3f77d00, fff00000c3f77d73) [ 32.115683] [ 32.115703] The buggy address belongs to the physical page: [ 32.115767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77 [ 32.115823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.116087] page_type: f5(slab) [ 32.116225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.116324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.116464] page dumped because: kasan: bad access detected [ 32.116515] [ 32.116533] Memory state around the buggy address: [ 32.116588] fff00000c3f77c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.116900] fff00000c3f77c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.117012] >fff00000c3f77d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.117136] ^ [ 32.117228] fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.117274] fff00000c3f77e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.117459] ================================================================== [ 32.118536] ================================================================== [ 32.118586] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 32.118636] Read of size 1 at addr fff00000c3f77d80 by task kunit_try_catch/167 [ 32.118683] [ 32.118715] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.118932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.119008] Hardware name: linux,dummy-virt (DT) [ 32.119040] Call trace: [ 32.119063] show_stack+0x20/0x38 (C) [ 32.119152] dump_stack_lvl+0x8c/0xd0 [ 32.119288] print_report+0x118/0x5e8 [ 32.119376] kasan_report+0xdc/0x128 [ 32.119517] __asan_report_load1_noabort+0x20/0x30 [ 32.119581] kmalloc_oob_right+0x5d0/0x660 [ 32.119628] kunit_try_run_case+0x170/0x3f0 [ 32.119673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.119744] kthread+0x328/0x630 [ 32.119797] ret_from_fork+0x10/0x20 [ 32.119844] [ 32.119862] Allocated by task 167: [ 32.119890] kasan_save_stack+0x3c/0x68 [ 32.119926] kasan_save_track+0x20/0x40 [ 32.119960] kasan_save_alloc_info+0x40/0x58 [ 32.119996] __kasan_kmalloc+0xd4/0xd8 [ 32.120028] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.120068] kmalloc_oob_right+0xb0/0x660 [ 32.120104] kunit_try_run_case+0x170/0x3f0 [ 32.120139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.120180] kthread+0x328/0x630 [ 32.120211] ret_from_fork+0x10/0x20 [ 32.120245] [ 32.120264] The buggy address belongs to the object at fff00000c3f77d00 [ 32.120264] which belongs to the cache kmalloc-128 of size 128 [ 32.120319] The buggy address is located 13 bytes to the right of [ 32.120319] allocated 115-byte region [fff00000c3f77d00, fff00000c3f77d73) [ 32.120385] [ 32.120405] The buggy address belongs to the physical page: [ 32.120437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77 [ 32.120487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.120534] page_type: f5(slab) [ 32.120570] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.120884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.120954] page dumped because: kasan: bad access detected [ 32.121027] [ 32.121095] Memory state around the buggy address: [ 32.121206] fff00000c3f77c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.121270] fff00000c3f77d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.121311] >fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.121348] ^ [ 32.121374] fff00000c3f77e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.121538] fff00000c3f77e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.121604] ==================================================================
[ 26.065056] ================================================================== [ 26.066447] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 26.067535] Write of size 1 at addr ffff888105454673 by task kunit_try_catch/184 [ 26.067990] [ 26.068933] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 26.069367] Tainted: [N]=TEST [ 26.069400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.069649] Call Trace: [ 26.069723] <TASK> [ 26.070102] dump_stack_lvl+0x73/0xb0 [ 26.070202] print_report+0xd1/0x640 [ 26.070233] ? __virt_addr_valid+0x1db/0x2d0 [ 26.070259] ? kmalloc_oob_right+0x6f0/0x7f0 [ 26.070279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.070305] ? kmalloc_oob_right+0x6f0/0x7f0 [ 26.070327] kasan_report+0x141/0x180 [ 26.070349] ? kmalloc_oob_right+0x6f0/0x7f0 [ 26.070374] __asan_report_store1_noabort+0x1b/0x30 [ 26.070398] kmalloc_oob_right+0x6f0/0x7f0 [ 26.070419] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 26.070441] ? __schedule+0x10da/0x2b60 [ 26.070468] ? __pfx_read_tsc+0x10/0x10 [ 26.070491] ? ktime_get_ts64+0x86/0x230 [ 26.070517] kunit_try_run_case+0x1a5/0x480 [ 26.070543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.070564] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.070605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.070630] ? __kthread_parkme+0x82/0x180 [ 26.070650] ? preempt_count_sub+0x50/0x80 [ 26.070675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.070698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.070721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.070744] kthread+0x337/0x6f0 [ 26.070764] ? trace_preempt_on+0x20/0xc0 [ 26.070841] ? __pfx_kthread+0x10/0x10 [ 26.070863] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.070886] ? calculate_sigpending+0x7b/0xa0 [ 26.070911] ? __pfx_kthread+0x10/0x10 [ 26.070945] ret_from_fork+0x116/0x1d0 [ 26.070965] ? __pfx_kthread+0x10/0x10 [ 26.070984] ret_from_fork_asm+0x1a/0x30 [ 26.071047] </TASK> [ 26.071115] [ 26.078977] Allocated by task 184: [ 26.079262] kasan_save_stack+0x45/0x70 [ 26.079486] kasan_save_track+0x18/0x40 [ 26.079775] kasan_save_alloc_info+0x3b/0x50 [ 26.080078] __kasan_kmalloc+0xb7/0xc0 [ 26.080249] __kmalloc_cache_noprof+0x189/0x420 [ 26.080413] kmalloc_oob_right+0xa9/0x7f0 [ 26.080545] kunit_try_run_case+0x1a5/0x480 [ 26.080737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.081184] kthread+0x337/0x6f0 [ 26.081352] ret_from_fork+0x116/0x1d0 [ 26.081514] ret_from_fork_asm+0x1a/0x30 [ 26.081742] [ 26.081889] The buggy address belongs to the object at ffff888105454600 [ 26.081889] which belongs to the cache kmalloc-128 of size 128 [ 26.082316] The buggy address is located 0 bytes to the right of [ 26.082316] allocated 115-byte region [ffff888105454600, ffff888105454673) [ 26.082902] [ 26.083108] The buggy address belongs to the physical page: [ 26.083765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105454 [ 26.084352] flags: 0x200000000000000(node=0|zone=2) [ 26.085079] page_type: f5(slab) [ 26.085665] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.086005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.086373] page dumped because: kasan: bad access detected [ 26.086642] [ 26.086732] Memory state around the buggy address: [ 26.087208] ffff888105454500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.087542] ffff888105454580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.087923] >ffff888105454600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.088221] ^ [ 26.088509] ffff888105454680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.088730] ffff888105454700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.089063] ================================================================== [ 26.111944] ================================================================== [ 26.112281] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 26.112597] Read of size 1 at addr ffff888105454680 by task kunit_try_catch/184 [ 26.112919] [ 26.113197] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 26.113246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.113258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.113279] Call Trace: [ 26.113296] <TASK> [ 26.113312] dump_stack_lvl+0x73/0xb0 [ 26.113339] print_report+0xd1/0x640 [ 26.113362] ? __virt_addr_valid+0x1db/0x2d0 [ 26.113386] ? kmalloc_oob_right+0x68a/0x7f0 [ 26.113406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.113430] ? kmalloc_oob_right+0x68a/0x7f0 [ 26.113451] kasan_report+0x141/0x180 [ 26.113472] ? kmalloc_oob_right+0x68a/0x7f0 [ 26.113497] __asan_report_load1_noabort+0x18/0x20 [ 26.113521] kmalloc_oob_right+0x68a/0x7f0 [ 26.113563] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 26.113598] ? __schedule+0x10da/0x2b60 [ 26.113622] ? __pfx_read_tsc+0x10/0x10 [ 26.113643] ? ktime_get_ts64+0x86/0x230 [ 26.113666] kunit_try_run_case+0x1a5/0x480 [ 26.113691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.113713] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.113737] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.113761] ? __kthread_parkme+0x82/0x180 [ 26.114053] ? preempt_count_sub+0x50/0x80 [ 26.114086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.114111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.114134] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.114157] kthread+0x337/0x6f0 [ 26.114176] ? trace_preempt_on+0x20/0xc0 [ 26.114199] ? __pfx_kthread+0x10/0x10 [ 26.114219] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.114242] ? calculate_sigpending+0x7b/0xa0 [ 26.114266] ? __pfx_kthread+0x10/0x10 [ 26.114286] ret_from_fork+0x116/0x1d0 [ 26.114305] ? __pfx_kthread+0x10/0x10 [ 26.114324] ret_from_fork_asm+0x1a/0x30 [ 26.114356] </TASK> [ 26.114366] [ 26.123797] Allocated by task 184: [ 26.124205] kasan_save_stack+0x45/0x70 [ 26.124390] kasan_save_track+0x18/0x40 [ 26.124563] kasan_save_alloc_info+0x3b/0x50 [ 26.124763] __kasan_kmalloc+0xb7/0xc0 [ 26.125303] __kmalloc_cache_noprof+0x189/0x420 [ 26.125479] kmalloc_oob_right+0xa9/0x7f0 [ 26.125749] kunit_try_run_case+0x1a5/0x480 [ 26.126126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.126499] kthread+0x337/0x6f0 [ 26.126677] ret_from_fork+0x116/0x1d0 [ 26.126833] ret_from_fork_asm+0x1a/0x30 [ 26.127161] [ 26.127381] The buggy address belongs to the object at ffff888105454600 [ 26.127381] which belongs to the cache kmalloc-128 of size 128 [ 26.127894] The buggy address is located 13 bytes to the right of [ 26.127894] allocated 115-byte region [ffff888105454600, ffff888105454673) [ 26.128826] [ 26.129023] The buggy address belongs to the physical page: [ 26.129256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105454 [ 26.129612] flags: 0x200000000000000(node=0|zone=2) [ 26.129827] page_type: f5(slab) [ 26.130380] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.130708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.131197] page dumped because: kasan: bad access detected [ 26.131565] [ 26.131682] Memory state around the buggy address: [ 26.132156] ffff888105454580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.132549] ffff888105454600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.133154] >ffff888105454680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.133465] ^ [ 26.133801] ffff888105454700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.134176] ffff888105454780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.134836] ================================================================== [ 26.090420] ================================================================== [ 26.090739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 26.091081] Write of size 1 at addr ffff888105454678 by task kunit_try_catch/184 [ 26.091443] [ 26.091527] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 26.091586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.091598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.091619] Call Trace: [ 26.091631] <TASK> [ 26.091648] dump_stack_lvl+0x73/0xb0 [ 26.091674] print_report+0xd1/0x640 [ 26.091697] ? __virt_addr_valid+0x1db/0x2d0 [ 26.091720] ? kmalloc_oob_right+0x6bd/0x7f0 [ 26.091741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.091767] ? kmalloc_oob_right+0x6bd/0x7f0 [ 26.091787] kasan_report+0x141/0x180 [ 26.091809] ? kmalloc_oob_right+0x6bd/0x7f0 [ 26.091834] __asan_report_store1_noabort+0x1b/0x30 [ 26.091857] kmalloc_oob_right+0x6bd/0x7f0 [ 26.091879] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 26.091901] ? __schedule+0x10da/0x2b60 [ 26.091937] ? __pfx_read_tsc+0x10/0x10 [ 26.091959] ? ktime_get_ts64+0x86/0x230 [ 26.091983] kunit_try_run_case+0x1a5/0x480 [ 26.092008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.092030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.092054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.092078] ? __kthread_parkme+0x82/0x180 [ 26.092098] ? preempt_count_sub+0x50/0x80 [ 26.092120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.092143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.092166] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.092189] kthread+0x337/0x6f0 [ 26.092208] ? trace_preempt_on+0x20/0xc0 [ 26.092247] ? __pfx_kthread+0x10/0x10 [ 26.092273] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.092298] ? calculate_sigpending+0x7b/0xa0 [ 26.092327] ? __pfx_kthread+0x10/0x10 [ 26.092348] ret_from_fork+0x116/0x1d0 [ 26.092366] ? __pfx_kthread+0x10/0x10 [ 26.092386] ret_from_fork_asm+0x1a/0x30 [ 26.092417] </TASK> [ 26.092428] [ 26.099262] Allocated by task 184: [ 26.099421] kasan_save_stack+0x45/0x70 [ 26.099557] kasan_save_track+0x18/0x40 [ 26.099694] kasan_save_alloc_info+0x3b/0x50 [ 26.099835] __kasan_kmalloc+0xb7/0xc0 [ 26.100059] __kmalloc_cache_noprof+0x189/0x420 [ 26.100276] kmalloc_oob_right+0xa9/0x7f0 [ 26.100472] kunit_try_run_case+0x1a5/0x480 [ 26.100881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.101280] kthread+0x337/0x6f0 [ 26.101435] ret_from_fork+0x116/0x1d0 [ 26.101611] ret_from_fork_asm+0x1a/0x30 [ 26.101757] [ 26.101820] The buggy address belongs to the object at ffff888105454600 [ 26.101820] which belongs to the cache kmalloc-128 of size 128 [ 26.102559] The buggy address is located 5 bytes to the right of [ 26.102559] allocated 115-byte region [ffff888105454600, ffff888105454673) [ 26.103516] [ 26.103601] The buggy address belongs to the physical page: [ 26.103771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105454 [ 26.104003] flags: 0x200000000000000(node=0|zone=2) [ 26.104229] page_type: f5(slab) [ 26.104388] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.105425] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.105783] page dumped because: kasan: bad access detected [ 26.106192] [ 26.106265] Memory state around the buggy address: [ 26.106483] ffff888105454500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.106778] ffff888105454580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.107455] >ffff888105454600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.107681] ^ [ 26.107887] ffff888105454680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.108094] ffff888105454700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.109518] ==================================================================