Date
July 3, 2025, 3:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.160690] ================================================================== [ 15.160769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 15.161454] Read of size 1 at addr fff00000c3ec5e80 by task kunit_try_catch/139 [ 15.161504] [ 15.161537] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.161616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.161643] Hardware name: linux,dummy-virt (DT) [ 15.162278] Call trace: [ 15.162331] show_stack+0x20/0x38 (C) [ 15.162382] dump_stack_lvl+0x8c/0xd0 [ 15.162543] print_report+0x118/0x608 [ 15.163340] kasan_report+0xdc/0x128 [ 15.163567] __asan_report_load1_noabort+0x20/0x30 [ 15.163651] kmalloc_oob_right+0x5d0/0x660 [ 15.163698] kunit_try_run_case+0x170/0x3f0 [ 15.163749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.165994] kthread+0x328/0x630 [ 15.166058] ret_from_fork+0x10/0x20 [ 15.166111] [ 15.166130] Allocated by task 139: [ 15.166167] kasan_save_stack+0x3c/0x68 [ 15.166205] kasan_save_track+0x20/0x40 [ 15.166239] kasan_save_alloc_info+0x40/0x58 [ 15.166278] __kasan_kmalloc+0xd4/0xd8 [ 15.166311] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.166347] kmalloc_oob_right+0xb0/0x660 [ 15.166383] kunit_try_run_case+0x170/0x3f0 [ 15.166424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.166466] kthread+0x328/0x630 [ 15.166628] ret_from_fork+0x10/0x20 [ 15.166663] [ 15.166684] The buggy address belongs to the object at fff00000c3ec5e00 [ 15.166684] which belongs to the cache kmalloc-128 of size 128 [ 15.167062] The buggy address is located 13 bytes to the right of [ 15.167062] allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73) [ 15.167185] [ 15.167216] The buggy address belongs to the physical page: [ 15.167255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5 [ 15.167308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.167354] page_type: f5(slab) [ 15.167402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.167460] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.167498] page dumped because: kasan: bad access detected [ 15.167536] [ 15.167553] Memory state around the buggy address: [ 15.167589] fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167631] fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.167672] >fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167708] ^ [ 15.167734] fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167784] fff00000c3ec5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167820] ================================================================== [ 15.148518] ================================================================== [ 15.148554] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 15.148601] Write of size 1 at addr fff00000c3ec5e78 by task kunit_try_catch/139 [ 15.148647] [ 15.148677] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.149047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.149085] Hardware name: linux,dummy-virt (DT) [ 15.149357] Call trace: [ 15.149384] show_stack+0x20/0x38 (C) [ 15.149435] dump_stack_lvl+0x8c/0xd0 [ 15.149962] print_report+0x118/0x608 [ 15.150006] kasan_report+0xdc/0x128 [ 15.150087] __asan_report_store1_noabort+0x20/0x30 [ 15.150418] kmalloc_oob_right+0x538/0x660 [ 15.150480] kunit_try_run_case+0x170/0x3f0 [ 15.150530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.150582] kthread+0x328/0x630 [ 15.150626] ret_from_fork+0x10/0x20 [ 15.150735] [ 15.150842] Allocated by task 139: [ 15.150878] kasan_save_stack+0x3c/0x68 [ 15.150916] kasan_save_track+0x20/0x40 [ 15.150970] kasan_save_alloc_info+0x40/0x58 [ 15.151036] __kasan_kmalloc+0xd4/0xd8 [ 15.151162] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.151286] kmalloc_oob_right+0xb0/0x660 [ 15.151404] kunit_try_run_case+0x170/0x3f0 [ 15.151542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.151585] kthread+0x328/0x630 [ 15.151878] ret_from_fork+0x10/0x20 [ 15.151921] [ 15.151939] The buggy address belongs to the object at fff00000c3ec5e00 [ 15.151939] which belongs to the cache kmalloc-128 of size 128 [ 15.152005] The buggy address is located 5 bytes to the right of [ 15.152005] allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73) [ 15.152076] [ 15.152106] The buggy address belongs to the physical page: [ 15.152144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5 [ 15.152203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.152249] page_type: f5(slab) [ 15.152341] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.152392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.152447] page dumped because: kasan: bad access detected [ 15.152539] [ 15.152670] Memory state around the buggy address: [ 15.152935] fff00000c3ec5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.153322] fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.153568] >fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.153904] ^ [ 15.154739] fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.154789] fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.154826] ================================================================== [ 15.141037] ================================================================== [ 15.141379] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 15.142248] Write of size 1 at addr fff00000c3ec5e73 by task kunit_try_catch/139 [ 15.142381] [ 15.143138] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G N 6.15.5-rc1 #1 PREEMPT [ 15.143283] Tainted: [N]=TEST [ 15.143315] Hardware name: linux,dummy-virt (DT) [ 15.143533] Call trace: [ 15.143702] show_stack+0x20/0x38 (C) [ 15.143833] dump_stack_lvl+0x8c/0xd0 [ 15.143894] print_report+0x118/0x608 [ 15.143939] kasan_report+0xdc/0x128 [ 15.143995] __asan_report_store1_noabort+0x20/0x30 [ 15.144044] kmalloc_oob_right+0x5a4/0x660 [ 15.144090] kunit_try_run_case+0x170/0x3f0 [ 15.144147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.144199] kthread+0x328/0x630 [ 15.144245] ret_from_fork+0x10/0x20 [ 15.144401] [ 15.144439] Allocated by task 139: [ 15.144549] kasan_save_stack+0x3c/0x68 [ 15.144611] kasan_save_track+0x20/0x40 [ 15.144646] kasan_save_alloc_info+0x40/0x58 [ 15.144683] __kasan_kmalloc+0xd4/0xd8 [ 15.144717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.144755] kmalloc_oob_right+0xb0/0x660 [ 15.144792] kunit_try_run_case+0x170/0x3f0 [ 15.144830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.144872] kthread+0x328/0x630 [ 15.144906] ret_from_fork+0x10/0x20 [ 15.144970] [ 15.145028] The buggy address belongs to the object at fff00000c3ec5e00 [ 15.145028] which belongs to the cache kmalloc-128 of size 128 [ 15.145118] The buggy address is located 0 bytes to the right of [ 15.145118] allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73) [ 15.145184] [ 15.145265] The buggy address belongs to the physical page: [ 15.145434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5 [ 15.145694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.145991] page_type: f5(slab) [ 15.146492] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.146558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.146667] page dumped because: kasan: bad access detected [ 15.146706] [ 15.146732] Memory state around the buggy address: [ 15.146974] fff00000c3ec5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.147043] fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147097] >fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.147151] ^ [ 15.147233] fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147274] fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147336] ==================================================================
[ 10.462208] ================================================================== [ 10.463028] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.463798] Write of size 1 at addr ffff888102dc0573 by task kunit_try_catch/155 [ 10.464211] [ 10.465148] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.465448] Tainted: [N]=TEST [ 10.465481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.465713] Call Trace: [ 10.465779] <TASK> [ 10.465924] dump_stack_lvl+0x73/0xb0 [ 10.466009] print_report+0xd1/0x650 [ 10.466037] ? __virt_addr_valid+0x1db/0x2d0 [ 10.466062] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.466083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.466106] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.466127] kasan_report+0x141/0x180 [ 10.466150] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.466176] __asan_report_store1_noabort+0x1b/0x30 [ 10.466197] kmalloc_oob_right+0x6f0/0x7f0 [ 10.466219] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.466253] ? sysvec_call_function_single+0x50/0x90 [ 10.466293] ? trace_hardirqs_on+0x37/0xe0 [ 10.466318] ? __pfx_read_tsc+0x10/0x10 [ 10.466338] ? ktime_get_ts64+0x86/0x230 [ 10.466365] kunit_try_run_case+0x1a5/0x480 [ 10.466390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.466414] ? queued_spin_lock_slowpath+0x116/0xb40 [ 10.466439] ? __kthread_parkme+0x82/0x180 [ 10.466462] ? preempt_count_sub+0x50/0x80 [ 10.466488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.466511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.466533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.466556] kthread+0x337/0x6f0 [ 10.466572] ? trace_preempt_on+0x20/0xc0 [ 10.466594] ? __pfx_kthread+0x10/0x10 [ 10.466611] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.466633] ? calculate_sigpending+0x7b/0xa0 [ 10.466655] ? __pfx_kthread+0x10/0x10 [ 10.466673] ret_from_fork+0x41/0x80 [ 10.466693] ? __pfx_kthread+0x10/0x10 [ 10.466711] ret_from_fork_asm+0x1a/0x30 [ 10.466764] </TASK> [ 10.466827] [ 10.479173] Allocated by task 155: [ 10.479452] kasan_save_stack+0x45/0x70 [ 10.479654] kasan_save_track+0x18/0x40 [ 10.480135] kasan_save_alloc_info+0x3b/0x50 [ 10.480464] __kasan_kmalloc+0xb7/0xc0 [ 10.480659] __kmalloc_cache_noprof+0x189/0x420 [ 10.481083] kmalloc_oob_right+0xa9/0x7f0 [ 10.481282] kunit_try_run_case+0x1a5/0x480 [ 10.481680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.481995] kthread+0x337/0x6f0 [ 10.482264] ret_from_fork+0x41/0x80 [ 10.482427] ret_from_fork_asm+0x1a/0x30 [ 10.482641] [ 10.483127] The buggy address belongs to the object at ffff888102dc0500 [ 10.483127] which belongs to the cache kmalloc-128 of size 128 [ 10.484027] The buggy address is located 0 bytes to the right of [ 10.484027] allocated 115-byte region [ffff888102dc0500, ffff888102dc0573) [ 10.484864] [ 10.485358] The buggy address belongs to the physical page: [ 10.485954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dc0 [ 10.486785] flags: 0x200000000000000(node=0|zone=2) [ 10.487488] page_type: f5(slab) [ 10.488146] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.488617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.489101] page dumped because: kasan: bad access detected [ 10.489368] [ 10.489476] Memory state around the buggy address: [ 10.490313] ffff888102dc0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.490623] ffff888102dc0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.491039] >ffff888102dc0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.491345] ^ [ 10.491748] ffff888102dc0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.492047] ffff888102dc0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.492746] ================================================================== [ 10.520380] ================================================================== [ 10.520970] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.521349] Read of size 1 at addr ffff888102dc0580 by task kunit_try_catch/155 [ 10.522092] [ 10.522204] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.522259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.522271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.522290] Call Trace: [ 10.522301] <TASK> [ 10.522316] dump_stack_lvl+0x73/0xb0 [ 10.522420] print_report+0xd1/0x650 [ 10.522443] ? __virt_addr_valid+0x1db/0x2d0 [ 10.522463] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.522485] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.522507] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.522529] kasan_report+0x141/0x180 [ 10.522551] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.522578] __asan_report_load1_noabort+0x18/0x20 [ 10.522598] kmalloc_oob_right+0x68a/0x7f0 [ 10.522621] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.522642] ? sysvec_call_function_single+0x50/0x90 [ 10.522667] ? trace_hardirqs_on+0x37/0xe0 [ 10.522688] ? __pfx_read_tsc+0x10/0x10 [ 10.522707] ? ktime_get_ts64+0x86/0x230 [ 10.522731] kunit_try_run_case+0x1a5/0x480 [ 10.522755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.522779] ? queued_spin_lock_slowpath+0x116/0xb40 [ 10.522803] ? __kthread_parkme+0x82/0x180 [ 10.522823] ? preempt_count_sub+0x50/0x80 [ 10.522848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.522871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.522894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.522917] kthread+0x337/0x6f0 [ 10.522933] ? trace_preempt_on+0x20/0xc0 [ 10.522955] ? __pfx_kthread+0x10/0x10 [ 10.522973] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.522994] ? calculate_sigpending+0x7b/0xa0 [ 10.523014] ? __pfx_kthread+0x10/0x10 [ 10.523032] ret_from_fork+0x41/0x80 [ 10.523052] ? __pfx_kthread+0x10/0x10 [ 10.523069] ret_from_fork_asm+0x1a/0x30 [ 10.523099] </TASK> [ 10.523109] [ 10.532367] Allocated by task 155: [ 10.532540] kasan_save_stack+0x45/0x70 [ 10.532997] kasan_save_track+0x18/0x40 [ 10.533426] kasan_save_alloc_info+0x3b/0x50 [ 10.533737] __kasan_kmalloc+0xb7/0xc0 [ 10.534116] __kmalloc_cache_noprof+0x189/0x420 [ 10.534345] kmalloc_oob_right+0xa9/0x7f0 [ 10.534537] kunit_try_run_case+0x1a5/0x480 [ 10.534926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.535330] kthread+0x337/0x6f0 [ 10.535620] ret_from_fork+0x41/0x80 [ 10.535978] ret_from_fork_asm+0x1a/0x30 [ 10.536172] [ 10.536270] The buggy address belongs to the object at ffff888102dc0500 [ 10.536270] which belongs to the cache kmalloc-128 of size 128 [ 10.537038] The buggy address is located 13 bytes to the right of [ 10.537038] allocated 115-byte region [ffff888102dc0500, ffff888102dc0573) [ 10.537968] [ 10.538064] The buggy address belongs to the physical page: [ 10.538488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dc0 [ 10.539199] flags: 0x200000000000000(node=0|zone=2) [ 10.539556] page_type: f5(slab) [ 10.539874] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.540204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.540520] page dumped because: kasan: bad access detected [ 10.540969] [ 10.541179] Memory state around the buggy address: [ 10.541642] ffff888102dc0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.542109] ffff888102dc0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.542594] >ffff888102dc0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.543030] ^ [ 10.543193] ffff888102dc0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.543496] ffff888102dc0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.543893] ================================================================== [ 10.494499] ================================================================== [ 10.494981] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.495487] Write of size 1 at addr ffff888102dc0578 by task kunit_try_catch/155 [ 10.495835] [ 10.495949] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 10.495992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.496003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.496281] Call Trace: [ 10.496297] <TASK> [ 10.496312] dump_stack_lvl+0x73/0xb0 [ 10.496338] print_report+0xd1/0x650 [ 10.496361] ? __virt_addr_valid+0x1db/0x2d0 [ 10.496393] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.496414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.496436] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.496458] kasan_report+0x141/0x180 [ 10.496481] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.496507] __asan_report_store1_noabort+0x1b/0x30 [ 10.496528] kmalloc_oob_right+0x6bd/0x7f0 [ 10.496550] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.496572] ? sysvec_call_function_single+0x50/0x90 [ 10.496596] ? trace_hardirqs_on+0x37/0xe0 [ 10.496618] ? __pfx_read_tsc+0x10/0x10 [ 10.496637] ? ktime_get_ts64+0x86/0x230 [ 10.496814] kunit_try_run_case+0x1a5/0x480 [ 10.496844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.496868] ? queued_spin_lock_slowpath+0x116/0xb40 [ 10.496892] ? __kthread_parkme+0x82/0x180 [ 10.496913] ? preempt_count_sub+0x50/0x80 [ 10.496937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.496961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.496984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.497006] kthread+0x337/0x6f0 [ 10.497022] ? trace_preempt_on+0x20/0xc0 [ 10.497044] ? __pfx_kthread+0x10/0x10 [ 10.497062] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.497083] ? calculate_sigpending+0x7b/0xa0 [ 10.497104] ? __pfx_kthread+0x10/0x10 [ 10.497122] ret_from_fork+0x41/0x80 [ 10.497142] ? __pfx_kthread+0x10/0x10 [ 10.497160] ret_from_fork_asm+0x1a/0x30 [ 10.497189] </TASK> [ 10.497199] [ 10.507886] Allocated by task 155: [ 10.508032] kasan_save_stack+0x45/0x70 [ 10.508234] kasan_save_track+0x18/0x40 [ 10.508681] kasan_save_alloc_info+0x3b/0x50 [ 10.508834] __kasan_kmalloc+0xb7/0xc0 [ 10.509155] __kmalloc_cache_noprof+0x189/0x420 [ 10.509546] kmalloc_oob_right+0xa9/0x7f0 [ 10.509771] kunit_try_run_case+0x1a5/0x480 [ 10.510117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.510686] kthread+0x337/0x6f0 [ 10.510832] ret_from_fork+0x41/0x80 [ 10.511010] ret_from_fork_asm+0x1a/0x30 [ 10.511497] [ 10.511603] The buggy address belongs to the object at ffff888102dc0500 [ 10.511603] which belongs to the cache kmalloc-128 of size 128 [ 10.512432] The buggy address is located 5 bytes to the right of [ 10.512432] allocated 115-byte region [ffff888102dc0500, ffff888102dc0573) [ 10.513133] [ 10.513219] The buggy address belongs to the physical page: [ 10.513542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dc0 [ 10.514096] flags: 0x200000000000000(node=0|zone=2) [ 10.514554] page_type: f5(slab) [ 10.514690] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.515232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.515689] page dumped because: kasan: bad access detected [ 10.516019] [ 10.516091] Memory state around the buggy address: [ 10.516406] ffff888102dc0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.517067] ffff888102dc0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.517573] >ffff888102dc0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.518050] ^ [ 10.518425] ffff888102dc0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.518766] ffff888102dc0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.519159] ==================================================================