Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.761397] ================================================================== [ 21.761523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 21.761673] Read of size 1 at addr fff00000c3ebab80 by task kunit_try_catch/140 [ 21.761881] [ 21.761987] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 21.762198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.762859] Hardware name: linux,dummy-virt (DT) [ 21.763308] Call trace: [ 21.763442] show_stack+0x20/0x38 (C) [ 21.763667] dump_stack_lvl+0x8c/0xd0 [ 21.763837] print_report+0x118/0x608 [ 21.764053] kasan_report+0xdc/0x128 [ 21.764176] __asan_report_load1_noabort+0x20/0x30 [ 21.764364] kmalloc_oob_right+0x5d0/0x660 [ 21.764504] kunit_try_run_case+0x170/0x3f0 [ 21.764638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.764773] kthread+0x328/0x630 [ 21.764952] ret_from_fork+0x10/0x20 [ 21.765127] [ 21.765200] Allocated by task 140: [ 21.765274] kasan_save_stack+0x3c/0x68 [ 21.765373] kasan_save_track+0x20/0x40 [ 21.765486] kasan_save_alloc_info+0x40/0x58 [ 21.765588] __kasan_kmalloc+0xd4/0xd8 [ 21.765679] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.765794] kmalloc_oob_right+0xb0/0x660 [ 21.765928] kunit_try_run_case+0x170/0x3f0 [ 21.766029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.766194] kthread+0x328/0x630 [ 21.766335] ret_from_fork+0x10/0x20 [ 21.766442] [ 21.766487] The buggy address belongs to the object at fff00000c3ebab00 [ 21.766487] which belongs to the cache kmalloc-128 of size 128 [ 21.766658] The buggy address is located 13 bytes to the right of [ 21.766658] allocated 115-byte region [fff00000c3ebab00, fff00000c3ebab73) [ 21.766818] [ 21.766875] The buggy address belongs to the physical page: [ 21.766955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eba [ 21.767101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.767268] page_type: f5(slab) [ 21.767369] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.767949] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.768108] page dumped because: kasan: bad access detected [ 21.768197] [ 21.768259] Memory state around the buggy address: [ 21.768463] fff00000c3ebaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.768755] fff00000c3ebab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.769054] >fff00000c3ebab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.769151] ^ [ 21.769296] fff00000c3ebac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.769716] fff00000c3ebac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.769922] ================================================================== [ 21.755491] ================================================================== [ 21.755584] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 21.755708] Write of size 1 at addr fff00000c3ebab78 by task kunit_try_catch/140 [ 21.755845] [ 21.755930] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 21.756142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.756235] Hardware name: linux,dummy-virt (DT) [ 21.756344] Call trace: [ 21.756442] show_stack+0x20/0x38 (C) [ 21.756570] dump_stack_lvl+0x8c/0xd0 [ 21.756702] print_report+0x118/0x608 [ 21.756859] kasan_report+0xdc/0x128 [ 21.757013] __asan_report_store1_noabort+0x20/0x30 [ 21.757184] kmalloc_oob_right+0x538/0x660 [ 21.757349] kunit_try_run_case+0x170/0x3f0 [ 21.757479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.757586] kthread+0x328/0x630 [ 21.757671] ret_from_fork+0x10/0x20 [ 21.757772] [ 21.757808] Allocated by task 140: [ 21.757863] kasan_save_stack+0x3c/0x68 [ 21.758038] kasan_save_track+0x20/0x40 [ 21.758137] kasan_save_alloc_info+0x40/0x58 [ 21.758218] __kasan_kmalloc+0xd4/0xd8 [ 21.758306] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.758481] kmalloc_oob_right+0xb0/0x660 [ 21.758579] kunit_try_run_case+0x170/0x3f0 [ 21.758662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.758767] kthread+0x328/0x630 [ 21.758867] ret_from_fork+0x10/0x20 [ 21.759002] [ 21.759065] The buggy address belongs to the object at fff00000c3ebab00 [ 21.759065] which belongs to the cache kmalloc-128 of size 128 [ 21.759190] The buggy address is located 5 bytes to the right of [ 21.759190] allocated 115-byte region [fff00000c3ebab00, fff00000c3ebab73) [ 21.759308] [ 21.759345] The buggy address belongs to the physical page: [ 21.759450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eba [ 21.759566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.759727] page_type: f5(slab) [ 21.759832] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.759946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.760073] page dumped because: kasan: bad access detected [ 21.760146] [ 21.760181] Memory state around the buggy address: [ 21.760255] fff00000c3ebaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.760354] fff00000c3ebaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.760456] >fff00000c3ebab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.760539] ^ [ 21.760630] fff00000c3ebab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.760771] fff00000c3ebac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.760871] ================================================================== [ 21.745517] ================================================================== [ 21.745994] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 21.747565] Write of size 1 at addr fff00000c3ebab73 by task kunit_try_catch/140 [ 21.747726] [ 21.748767] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G N 6.15.2-rc1 #1 PREEMPT [ 21.748956] Tainted: [N]=TEST [ 21.748999] Hardware name: linux,dummy-virt (DT) [ 21.749291] Call trace: [ 21.749495] show_stack+0x20/0x38 (C) [ 21.749678] dump_stack_lvl+0x8c/0xd0 [ 21.749758] print_report+0x118/0x608 [ 21.749814] kasan_report+0xdc/0x128 [ 21.749864] __asan_report_store1_noabort+0x20/0x30 [ 21.749922] kmalloc_oob_right+0x5a4/0x660 [ 21.749976] kunit_try_run_case+0x170/0x3f0 [ 21.750035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.750096] kthread+0x328/0x630 [ 21.750149] ret_from_fork+0x10/0x20 [ 21.750358] [ 21.750473] Allocated by task 140: [ 21.750702] kasan_save_stack+0x3c/0x68 [ 21.750837] kasan_save_track+0x20/0x40 [ 21.750922] kasan_save_alloc_info+0x40/0x58 [ 21.750996] __kasan_kmalloc+0xd4/0xd8 [ 21.751038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.751089] kmalloc_oob_right+0xb0/0x660 [ 21.751133] kunit_try_run_case+0x170/0x3f0 [ 21.751178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.751228] kthread+0x328/0x630 [ 21.751269] ret_from_fork+0x10/0x20 [ 21.751336] [ 21.751436] The buggy address belongs to the object at fff00000c3ebab00 [ 21.751436] which belongs to the cache kmalloc-128 of size 128 [ 21.751555] The buggy address is located 0 bytes to the right of [ 21.751555] allocated 115-byte region [fff00000c3ebab00, fff00000c3ebab73) [ 21.751633] [ 21.751738] The buggy address belongs to the physical page: [ 21.752026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eba [ 21.752382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.752783] page_type: f5(slab) [ 21.753161] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.753235] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.753372] page dumped because: kasan: bad access detected [ 21.753436] [ 21.753471] Memory state around the buggy address: [ 21.753757] fff00000c3ebaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.753843] fff00000c3ebaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.753910] >fff00000c3ebab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.753984] ^ [ 21.754087] fff00000c3ebab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.754137] fff00000c3ebac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.754211] ==================================================================
[ 12.681535] ================================================================== [ 12.682366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 12.684019] Write of size 1 at addr ffff888102d90973 by task kunit_try_catch/156 [ 12.684293] [ 12.686083] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 12.686484] Tainted: [N]=TEST [ 12.686526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.687510] Call Trace: [ 12.687679] <TASK> [ 12.687911] dump_stack_lvl+0x73/0xb0 [ 12.688033] print_report+0xd1/0x650 [ 12.688070] ? __virt_addr_valid+0x1db/0x2d0 [ 12.688098] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.688122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.688145] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.688167] kasan_report+0x141/0x180 [ 12.688190] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.688217] __asan_report_store1_noabort+0x1b/0x30 [ 12.688238] kmalloc_oob_right+0x6f0/0x7f0 [ 12.688262] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.688285] ? __schedule+0x10cc/0x2b30 [ 12.688308] ? __pfx_read_tsc+0x10/0x10 [ 12.688330] ? ktime_get_ts64+0x86/0x230 [ 12.688358] kunit_try_run_case+0x1a5/0x480 [ 12.688384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.688407] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.688431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.688454] ? __kthread_parkme+0x82/0x180 [ 12.688477] ? preempt_count_sub+0x50/0x80 [ 12.688504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.688527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.688549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.688595] kthread+0x337/0x6f0 [ 12.688624] ? trace_preempt_on+0x20/0xc0 [ 12.688668] ? __pfx_kthread+0x10/0x10 [ 12.688700] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.688738] ? calculate_sigpending+0x7b/0xa0 [ 12.688773] ? __pfx_kthread+0x10/0x10 [ 12.688793] ret_from_fork+0x41/0x80 [ 12.688816] ? __pfx_kthread+0x10/0x10 [ 12.688835] ret_from_fork_asm+0x1a/0x30 [ 12.688901] </TASK> [ 12.688987] [ 12.703985] Allocated by task 156: [ 12.705332] kasan_save_stack+0x45/0x70 [ 12.705710] kasan_save_track+0x18/0x40 [ 12.705894] kasan_save_alloc_info+0x3b/0x50 [ 12.706080] __kasan_kmalloc+0xb7/0xc0 [ 12.706249] __kmalloc_cache_noprof+0x189/0x420 [ 12.706436] kmalloc_oob_right+0xa9/0x7f0 [ 12.707295] kunit_try_run_case+0x1a5/0x480 [ 12.708985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.709583] kthread+0x337/0x6f0 [ 12.710690] ret_from_fork+0x41/0x80 [ 12.710904] ret_from_fork_asm+0x1a/0x30 [ 12.711465] [ 12.711693] The buggy address belongs to the object at ffff888102d90900 [ 12.711693] which belongs to the cache kmalloc-128 of size 128 [ 12.712223] The buggy address is located 0 bytes to the right of [ 12.712223] allocated 115-byte region [ffff888102d90900, ffff888102d90973) [ 12.714262] [ 12.714971] The buggy address belongs to the physical page: [ 12.716899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d90 [ 12.717823] flags: 0x200000000000000(node=0|zone=2) [ 12.719497] page_type: f5(slab) [ 12.721066] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.721409] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.722363] page dumped because: kasan: bad access detected [ 12.722861] [ 12.723011] Memory state around the buggy address: [ 12.724122] ffff888102d90800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.724512] ffff888102d90880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.725286] >ffff888102d90900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.726014] ^ [ 12.726536] ffff888102d90980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.727021] ffff888102d90a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.727415] ================================================================== [ 12.755877] ================================================================== [ 12.756692] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.757337] Read of size 1 at addr ffff888102d90980 by task kunit_try_catch/156 [ 12.758009] [ 12.758213] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 12.758354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.758383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.758426] Call Trace: [ 12.758469] <TASK> [ 12.758505] dump_stack_lvl+0x73/0xb0 [ 12.758582] print_report+0xd1/0x650 [ 12.758633] ? __virt_addr_valid+0x1db/0x2d0 [ 12.758680] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.758725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.758773] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.758819] kasan_report+0x141/0x180 [ 12.758866] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.758923] __asan_report_load1_noabort+0x18/0x20 [ 12.758968] kmalloc_oob_right+0x68a/0x7f0 [ 12.759008] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.759044] ? __schedule+0x10cc/0x2b30 [ 12.759083] ? __pfx_read_tsc+0x10/0x10 [ 12.759120] ? ktime_get_ts64+0x86/0x230 [ 12.759223] kunit_try_run_case+0x1a5/0x480 [ 12.759292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.759336] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.759403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.759447] ? __kthread_parkme+0x82/0x180 [ 12.759505] ? preempt_count_sub+0x50/0x80 [ 12.759550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.759602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.759646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.759687] kthread+0x337/0x6f0 [ 12.759722] ? trace_preempt_on+0x20/0xc0 [ 12.759767] ? __pfx_kthread+0x10/0x10 [ 12.759797] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.759830] ? calculate_sigpending+0x7b/0xa0 [ 12.759863] ? __pfx_kthread+0x10/0x10 [ 12.759899] ret_from_fork+0x41/0x80 [ 12.759940] ? __pfx_kthread+0x10/0x10 [ 12.759979] ret_from_fork_asm+0x1a/0x30 [ 12.760042] </TASK> [ 12.760066] [ 12.770754] Allocated by task 156: [ 12.771031] kasan_save_stack+0x45/0x70 [ 12.771439] kasan_save_track+0x18/0x40 [ 12.771928] kasan_save_alloc_info+0x3b/0x50 [ 12.772196] __kasan_kmalloc+0xb7/0xc0 [ 12.772508] __kmalloc_cache_noprof+0x189/0x420 [ 12.772893] kmalloc_oob_right+0xa9/0x7f0 [ 12.773254] kunit_try_run_case+0x1a5/0x480 [ 12.773445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.773779] kthread+0x337/0x6f0 [ 12.774025] ret_from_fork+0x41/0x80 [ 12.774325] ret_from_fork_asm+0x1a/0x30 [ 12.774535] [ 12.774779] The buggy address belongs to the object at ffff888102d90900 [ 12.774779] which belongs to the cache kmalloc-128 of size 128 [ 12.775377] The buggy address is located 13 bytes to the right of [ 12.775377] allocated 115-byte region [ffff888102d90900, ffff888102d90973) [ 12.775792] [ 12.775907] The buggy address belongs to the physical page: [ 12.776211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d90 [ 12.776821] flags: 0x200000000000000(node=0|zone=2) [ 12.777187] page_type: f5(slab) [ 12.777471] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.778198] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.778522] page dumped because: kasan: bad access detected [ 12.779310] [ 12.779615] Memory state around the buggy address: [ 12.780024] ffff888102d90880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.780245] ffff888102d90900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.780455] >ffff888102d90980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.781032] ^ [ 12.781294] ffff888102d90a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.781521] ffff888102d90a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.782170] ================================================================== [ 12.730931] ================================================================== [ 12.731325] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.731756] Write of size 1 at addr ffff888102d90978 by task kunit_try_catch/156 [ 12.732079] [ 12.732346] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 12.732876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.732900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.732934] Call Trace: [ 12.732954] <TASK> [ 12.732987] dump_stack_lvl+0x73/0xb0 [ 12.733044] print_report+0xd1/0x650 [ 12.733080] ? __virt_addr_valid+0x1db/0x2d0 [ 12.733114] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.733148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.733175] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.733196] kasan_report+0x141/0x180 [ 12.733218] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.733243] __asan_report_store1_noabort+0x1b/0x30 [ 12.733263] kmalloc_oob_right+0x6bd/0x7f0 [ 12.733285] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.733306] ? __schedule+0x10cc/0x2b30 [ 12.733328] ? __pfx_read_tsc+0x10/0x10 [ 12.733348] ? ktime_get_ts64+0x86/0x230 [ 12.733373] kunit_try_run_case+0x1a5/0x480 [ 12.733397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.733418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.733439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.733460] ? __kthread_parkme+0x82/0x180 [ 12.733481] ? preempt_count_sub+0x50/0x80 [ 12.733506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.733527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.733548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.733597] kthread+0x337/0x6f0 [ 12.733616] ? trace_preempt_on+0x20/0xc0 [ 12.733640] ? __pfx_kthread+0x10/0x10 [ 12.733665] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.734211] ? calculate_sigpending+0x7b/0xa0 [ 12.734241] ? __pfx_kthread+0x10/0x10 [ 12.734262] ret_from_fork+0x41/0x80 [ 12.734284] ? __pfx_kthread+0x10/0x10 [ 12.734301] ret_from_fork_asm+0x1a/0x30 [ 12.734331] </TASK> [ 12.734345] [ 12.744664] Allocated by task 156: [ 12.744848] kasan_save_stack+0x45/0x70 [ 12.745025] kasan_save_track+0x18/0x40 [ 12.745179] kasan_save_alloc_info+0x3b/0x50 [ 12.745338] __kasan_kmalloc+0xb7/0xc0 [ 12.745479] __kmalloc_cache_noprof+0x189/0x420 [ 12.745651] kmalloc_oob_right+0xa9/0x7f0 [ 12.745817] kunit_try_run_case+0x1a5/0x480 [ 12.746011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.746338] kthread+0x337/0x6f0 [ 12.746709] ret_from_fork+0x41/0x80 [ 12.747043] ret_from_fork_asm+0x1a/0x30 [ 12.747447] [ 12.747659] The buggy address belongs to the object at ffff888102d90900 [ 12.747659] which belongs to the cache kmalloc-128 of size 128 [ 12.748375] The buggy address is located 5 bytes to the right of [ 12.748375] allocated 115-byte region [ffff888102d90900, ffff888102d90973) [ 12.748798] [ 12.748916] The buggy address belongs to the physical page: [ 12.749369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d90 [ 12.749952] flags: 0x200000000000000(node=0|zone=2) [ 12.750347] page_type: f5(slab) [ 12.750699] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.751422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.751882] page dumped because: kasan: bad access detected [ 12.752107] [ 12.752220] Memory state around the buggy address: [ 12.752416] ffff888102d90800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.752763] ffff888102d90880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.753373] >ffff888102d90900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.753925] ^ [ 12.754228] ffff888102d90980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.754493] ffff888102d90a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.754750] ==================================================================