Date
July 8, 2025, 4:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.531419] ================================================================== [ 17.531746] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.531978] Write of size 1 at addr fff00000c5b9de78 by task kunit_try_catch/138 [ 17.532028] [ 17.532057] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.532519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.533134] Hardware name: linux,dummy-virt (DT) [ 17.533170] Call trace: [ 17.533192] show_stack+0x20/0x38 (C) [ 17.533243] dump_stack_lvl+0x8c/0xd0 [ 17.533290] print_report+0x118/0x608 [ 17.533370] kasan_report+0xdc/0x128 [ 17.533426] __asan_report_store1_noabort+0x20/0x30 [ 17.533475] kmalloc_oob_right+0x538/0x660 [ 17.533522] kunit_try_run_case+0x170/0x3f0 [ 17.533569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.533622] kthread+0x328/0x630 [ 17.533667] ret_from_fork+0x10/0x20 [ 17.533714] [ 17.533732] Allocated by task 138: [ 17.533759] kasan_save_stack+0x3c/0x68 [ 17.533796] kasan_save_track+0x20/0x40 [ 17.533831] kasan_save_alloc_info+0x40/0x58 [ 17.533868] __kasan_kmalloc+0xd4/0xd8 [ 17.533901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.533938] kmalloc_oob_right+0xb0/0x660 [ 17.533975] kunit_try_run_case+0x170/0x3f0 [ 17.534012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.534054] kthread+0x328/0x630 [ 17.534089] ret_from_fork+0x10/0x20 [ 17.534122] [ 17.534140] The buggy address belongs to the object at fff00000c5b9de00 [ 17.534140] which belongs to the cache kmalloc-128 of size 128 [ 17.534195] The buggy address is located 5 bytes to the right of [ 17.534195] allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73) [ 17.534257] [ 17.534278] The buggy address belongs to the physical page: [ 17.534307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d [ 17.534368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.534413] page_type: f5(slab) [ 17.534450] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.534877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.534940] page dumped because: kasan: bad access detected [ 17.535017] [ 17.535036] Memory state around the buggy address: [ 17.535211] fff00000c5b9dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.535620] fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.535667] >fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.535713] ^ [ 17.535790] fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.535831] fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.535867] ================================================================== [ 17.523268] ================================================================== [ 17.523637] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.524493] Write of size 1 at addr fff00000c5b9de73 by task kunit_try_catch/138 [ 17.524601] [ 17.525360] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.6-rc1 #1 PREEMPT [ 17.525519] Tainted: [N]=TEST [ 17.525554] Hardware name: linux,dummy-virt (DT) [ 17.525770] Call trace: [ 17.525935] show_stack+0x20/0x38 (C) [ 17.526066] dump_stack_lvl+0x8c/0xd0 [ 17.526129] print_report+0x118/0x608 [ 17.526175] kasan_report+0xdc/0x128 [ 17.526219] __asan_report_store1_noabort+0x20/0x30 [ 17.526269] kmalloc_oob_right+0x5a4/0x660 [ 17.526317] kunit_try_run_case+0x170/0x3f0 [ 17.526383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.526436] kthread+0x328/0x630 [ 17.526483] ret_from_fork+0x10/0x20 [ 17.526643] [ 17.526682] Allocated by task 138: [ 17.526818] kasan_save_stack+0x3c/0x68 [ 17.526890] kasan_save_track+0x20/0x40 [ 17.526927] kasan_save_alloc_info+0x40/0x58 [ 17.526965] __kasan_kmalloc+0xd4/0xd8 [ 17.526999] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.527038] kmalloc_oob_right+0xb0/0x660 [ 17.527077] kunit_try_run_case+0x170/0x3f0 [ 17.527116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.527161] kthread+0x328/0x630 [ 17.527199] ret_from_fork+0x10/0x20 [ 17.527253] [ 17.527311] The buggy address belongs to the object at fff00000c5b9de00 [ 17.527311] which belongs to the cache kmalloc-128 of size 128 [ 17.527417] The buggy address is located 0 bytes to the right of [ 17.527417] allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73) [ 17.527485] [ 17.527570] The buggy address belongs to the physical page: [ 17.527764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d [ 17.528030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.528349] page_type: f5(slab) [ 17.528652] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.528714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.528821] page dumped because: kasan: bad access detected [ 17.528860] [ 17.528885] Memory state around the buggy address: [ 17.529097] fff00000c5b9dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.529163] fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529217] >fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.529270] ^ [ 17.529361] fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529402] fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529465] ================================================================== [ 17.536660] ================================================================== [ 17.536706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.536753] Read of size 1 at addr fff00000c5b9de80 by task kunit_try_catch/138 [ 17.536800] [ 17.536828] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.536904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.536929] Hardware name: linux,dummy-virt (DT) [ 17.536962] Call trace: [ 17.536982] show_stack+0x20/0x38 (C) [ 17.537028] dump_stack_lvl+0x8c/0xd0 [ 17.537074] print_report+0x118/0x608 [ 17.537118] kasan_report+0xdc/0x128 [ 17.537161] __asan_report_load1_noabort+0x20/0x30 [ 17.537209] kmalloc_oob_right+0x5d0/0x660 [ 17.537256] kunit_try_run_case+0x170/0x3f0 [ 17.537303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.537402] kthread+0x328/0x630 [ 17.537448] ret_from_fork+0x10/0x20 [ 17.537494] [ 17.537512] Allocated by task 138: [ 17.537538] kasan_save_stack+0x3c/0x68 [ 17.537575] kasan_save_track+0x20/0x40 [ 17.537610] kasan_save_alloc_info+0x40/0x58 [ 17.537648] __kasan_kmalloc+0xd4/0xd8 [ 17.537681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.537717] kmalloc_oob_right+0xb0/0x660 [ 17.537754] kunit_try_run_case+0x170/0x3f0 [ 17.537792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.537936] kthread+0x328/0x630 [ 17.537991] ret_from_fork+0x10/0x20 [ 17.538370] [ 17.538424] The buggy address belongs to the object at fff00000c5b9de00 [ 17.538424] which belongs to the cache kmalloc-128 of size 128 [ 17.539289] The buggy address is located 13 bytes to the right of [ 17.539289] allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73) [ 17.542027] [ 17.542508] The buggy address belongs to the physical page: [ 17.542575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d [ 17.542628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.542676] page_type: f5(slab) [ 17.542772] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.543027] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.543288] page dumped because: kasan: bad access detected [ 17.543322] [ 17.543351] Memory state around the buggy address: [ 17.543382] fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.543424] fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.543465] >fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.543502] ^ [ 17.543529] fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.544553] fff00000c5b9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.544596] ==================================================================
[ 10.465300] ================================================================== [ 10.466056] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.466617] Write of size 1 at addr ffff8881035eba78 by task kunit_try_catch/156 [ 10.467084] [ 10.467199] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 10.467243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.467255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.467276] Call Trace: [ 10.467289] <TASK> [ 10.467302] dump_stack_lvl+0x73/0xb0 [ 10.467327] print_report+0xd1/0x650 [ 10.467350] ? __virt_addr_valid+0x1db/0x2d0 [ 10.467372] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.467394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.467417] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.467439] kasan_report+0x141/0x180 [ 10.467462] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.467489] __asan_report_store1_noabort+0x1b/0x30 [ 10.467728] kmalloc_oob_right+0x6bd/0x7f0 [ 10.467761] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.467799] ? __schedule+0x10cc/0x2b60 [ 10.467824] ? __pfx_read_tsc+0x10/0x10 [ 10.467843] ? ktime_get_ts64+0x86/0x230 [ 10.467911] kunit_try_run_case+0x1a5/0x480 [ 10.467935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.467954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.467978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.468002] ? __kthread_parkme+0x82/0x180 [ 10.468023] ? preempt_count_sub+0x50/0x80 [ 10.468048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.468068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.468091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.468115] kthread+0x337/0x6f0 [ 10.468132] ? trace_preempt_on+0x20/0xc0 [ 10.468155] ? __pfx_kthread+0x10/0x10 [ 10.468173] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.468195] ? calculate_sigpending+0x7b/0xa0 [ 10.468216] ? __pfx_kthread+0x10/0x10 [ 10.468235] ret_from_fork+0x41/0x80 [ 10.468255] ? __pfx_kthread+0x10/0x10 [ 10.468273] ret_from_fork_asm+0x1a/0x30 [ 10.468303] </TASK> [ 10.468314] [ 10.478505] Allocated by task 156: [ 10.478684] kasan_save_stack+0x45/0x70 [ 10.478894] kasan_save_track+0x18/0x40 [ 10.479036] kasan_save_alloc_info+0x3b/0x50 [ 10.479184] __kasan_kmalloc+0xb7/0xc0 [ 10.479351] __kmalloc_cache_noprof+0x189/0x420 [ 10.479635] kmalloc_oob_right+0xa9/0x7f0 [ 10.479843] kunit_try_run_case+0x1a5/0x480 [ 10.480049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.480228] kthread+0x337/0x6f0 [ 10.480349] ret_from_fork+0x41/0x80 [ 10.480534] ret_from_fork_asm+0x1a/0x30 [ 10.480760] [ 10.480937] The buggy address belongs to the object at ffff8881035eba00 [ 10.480937] which belongs to the cache kmalloc-128 of size 128 [ 10.482208] The buggy address is located 5 bytes to the right of [ 10.482208] allocated 115-byte region [ffff8881035eba00, ffff8881035eba73) [ 10.483000] [ 10.483108] The buggy address belongs to the physical page: [ 10.483469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb [ 10.483935] flags: 0x200000000000000(node=0|zone=2) [ 10.484274] page_type: f5(slab) [ 10.484440] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.484935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.485336] page dumped because: kasan: bad access detected [ 10.485663] [ 10.485756] Memory state around the buggy address: [ 10.486152] ffff8881035eb900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.486554] ffff8881035eb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.486888] >ffff8881035eba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.487314] ^ [ 10.487706] ffff8881035eba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.488051] ffff8881035ebb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.488353] ================================================================== [ 10.489159] ================================================================== [ 10.489900] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.490329] Read of size 1 at addr ffff8881035eba80 by task kunit_try_catch/156 [ 10.490598] [ 10.490917] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 10.491034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.491061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.491083] Call Trace: [ 10.491097] <TASK> [ 10.491202] dump_stack_lvl+0x73/0xb0 [ 10.491232] print_report+0xd1/0x650 [ 10.491255] ? __virt_addr_valid+0x1db/0x2d0 [ 10.491278] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.491300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.491323] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.491346] kasan_report+0x141/0x180 [ 10.491368] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.491396] __asan_report_load1_noabort+0x18/0x20 [ 10.491419] kmalloc_oob_right+0x68a/0x7f0 [ 10.491444] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.491467] ? __schedule+0x10cc/0x2b60 [ 10.491491] ? __pfx_read_tsc+0x10/0x10 [ 10.491545] ? ktime_get_ts64+0x86/0x230 [ 10.491581] kunit_try_run_case+0x1a5/0x480 [ 10.491604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.491623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.491647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.491671] ? __kthread_parkme+0x82/0x180 [ 10.491693] ? preempt_count_sub+0x50/0x80 [ 10.491718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.491738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.491761] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.491785] kthread+0x337/0x6f0 [ 10.491803] ? trace_preempt_on+0x20/0xc0 [ 10.491825] ? __pfx_kthread+0x10/0x10 [ 10.491843] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.491866] ? calculate_sigpending+0x7b/0xa0 [ 10.491897] ? __pfx_kthread+0x10/0x10 [ 10.491916] ret_from_fork+0x41/0x80 [ 10.491936] ? __pfx_kthread+0x10/0x10 [ 10.491954] ret_from_fork_asm+0x1a/0x30 [ 10.491985] </TASK> [ 10.491997] [ 10.501223] Allocated by task 156: [ 10.501487] kasan_save_stack+0x45/0x70 [ 10.501815] kasan_save_track+0x18/0x40 [ 10.502025] kasan_save_alloc_info+0x3b/0x50 [ 10.502210] __kasan_kmalloc+0xb7/0xc0 [ 10.502382] __kmalloc_cache_noprof+0x189/0x420 [ 10.502825] kmalloc_oob_right+0xa9/0x7f0 [ 10.503046] kunit_try_run_case+0x1a5/0x480 [ 10.503319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.503626] kthread+0x337/0x6f0 [ 10.503787] ret_from_fork+0x41/0x80 [ 10.504098] ret_from_fork_asm+0x1a/0x30 [ 10.504363] [ 10.504458] The buggy address belongs to the object at ffff8881035eba00 [ 10.504458] which belongs to the cache kmalloc-128 of size 128 [ 10.505154] The buggy address is located 13 bytes to the right of [ 10.505154] allocated 115-byte region [ffff8881035eba00, ffff8881035eba73) [ 10.505815] [ 10.505906] The buggy address belongs to the physical page: [ 10.506140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb [ 10.506479] flags: 0x200000000000000(node=0|zone=2) [ 10.506906] page_type: f5(slab) [ 10.507078] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.507548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.507975] page dumped because: kasan: bad access detected [ 10.508228] [ 10.508300] Memory state around the buggy address: [ 10.508701] ffff8881035eb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.509015] ffff8881035eba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.509366] >ffff8881035eba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.509795] ^ [ 10.509968] ffff8881035ebb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.510250] ffff8881035ebb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.510532] ================================================================== [ 10.441254] ================================================================== [ 10.441957] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.442708] Write of size 1 at addr ffff8881035eba73 by task kunit_try_catch/156 [ 10.443089] [ 10.444050] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 10.444330] Tainted: [N]=TEST [ 10.444362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.444597] Call Trace: [ 10.444665] <TASK> [ 10.444808] dump_stack_lvl+0x73/0xb0 [ 10.444903] print_report+0xd1/0x650 [ 10.444934] ? __virt_addr_valid+0x1db/0x2d0 [ 10.444959] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.444982] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.445004] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.445027] kasan_report+0x141/0x180 [ 10.445050] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.445078] __asan_report_store1_noabort+0x1b/0x30 [ 10.445100] kmalloc_oob_right+0x6f0/0x7f0 [ 10.445123] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.445148] ? __schedule+0x10cc/0x2b60 [ 10.445173] ? __pfx_read_tsc+0x10/0x10 [ 10.445196] ? ktime_get_ts64+0x86/0x230 [ 10.445224] kunit_try_run_case+0x1a5/0x480 [ 10.445248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.445267] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.445292] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.445316] ? __kthread_parkme+0x82/0x180 [ 10.445340] ? preempt_count_sub+0x50/0x80 [ 10.445367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.445387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.445411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.445435] kthread+0x337/0x6f0 [ 10.445452] ? trace_preempt_on+0x20/0xc0 [ 10.445477] ? __pfx_kthread+0x10/0x10 [ 10.445495] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.445518] ? calculate_sigpending+0x7b/0xa0 [ 10.445541] ? __pfx_kthread+0x10/0x10 [ 10.445559] ret_from_fork+0x41/0x80 [ 10.445580] ? __pfx_kthread+0x10/0x10 [ 10.445598] ret_from_fork_asm+0x1a/0x30 [ 10.445652] </TASK> [ 10.445717] [ 10.453764] Allocated by task 156: [ 10.454092] kasan_save_stack+0x45/0x70 [ 10.454280] kasan_save_track+0x18/0x40 [ 10.454515] kasan_save_alloc_info+0x3b/0x50 [ 10.454691] __kasan_kmalloc+0xb7/0xc0 [ 10.454848] __kmalloc_cache_noprof+0x189/0x420 [ 10.455111] kmalloc_oob_right+0xa9/0x7f0 [ 10.455307] kunit_try_run_case+0x1a5/0x480 [ 10.455466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.455733] kthread+0x337/0x6f0 [ 10.455921] ret_from_fork+0x41/0x80 [ 10.456087] ret_from_fork_asm+0x1a/0x30 [ 10.456340] [ 10.456543] The buggy address belongs to the object at ffff8881035eba00 [ 10.456543] which belongs to the cache kmalloc-128 of size 128 [ 10.457159] The buggy address is located 0 bytes to the right of [ 10.457159] allocated 115-byte region [ffff8881035eba00, ffff8881035eba73) [ 10.457766] [ 10.457979] The buggy address belongs to the physical page: [ 10.458440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb [ 10.459023] flags: 0x200000000000000(node=0|zone=2) [ 10.459695] page_type: f5(slab) [ 10.460227] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.460585] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.460981] page dumped because: kasan: bad access detected [ 10.461246] [ 10.461352] Memory state around the buggy address: [ 10.461832] ffff8881035eb900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.462197] ffff8881035eb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.462543] >ffff8881035eba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.462887] ^ [ 10.463231] ffff8881035eba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.463518] ffff8881035ebb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.463990] ==================================================================