Date
July 1, 2025, 12:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.028169] ================================================================== [ 17.028210] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.028262] Write of size 1 at addr fff00000c4687f78 by task kunit_try_catch/136 [ 17.028795] [ 17.028846] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.028980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.029115] Hardware name: linux,dummy-virt (DT) [ 17.029573] Call trace: [ 17.029631] show_stack+0x20/0x38 (C) [ 17.029734] dump_stack_lvl+0x8c/0xd0 [ 17.029791] print_report+0x118/0x608 [ 17.029839] kasan_report+0xdc/0x128 [ 17.030122] __asan_report_store1_noabort+0x20/0x30 [ 17.030248] kmalloc_oob_right+0x538/0x660 [ 17.030301] kunit_try_run_case+0x170/0x3f0 [ 17.030415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.030544] kthread+0x328/0x630 [ 17.030595] ret_from_fork+0x10/0x20 [ 17.030671] [ 17.030779] Allocated by task 136: [ 17.030924] kasan_save_stack+0x3c/0x68 [ 17.030979] kasan_save_track+0x20/0x40 [ 17.031077] kasan_save_alloc_info+0x40/0x58 [ 17.031145] __kasan_kmalloc+0xd4/0xd8 [ 17.031182] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.031510] kmalloc_oob_right+0xb0/0x660 [ 17.031603] kunit_try_run_case+0x170/0x3f0 [ 17.031761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.031853] kthread+0x328/0x630 [ 17.031892] ret_from_fork+0x10/0x20 [ 17.032189] [ 17.032293] The buggy address belongs to the object at fff00000c4687f00 [ 17.032293] which belongs to the cache kmalloc-128 of size 128 [ 17.032437] The buggy address is located 5 bytes to the right of [ 17.032437] allocated 115-byte region [fff00000c4687f00, fff00000c4687f73) [ 17.032618] [ 17.032641] The buggy address belongs to the physical page: [ 17.032672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104687 [ 17.033086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.033150] page_type: f5(slab) [ 17.033198] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.033486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.033642] page dumped because: kasan: bad access detected [ 17.033784] [ 17.033803] Memory state around the buggy address: [ 17.034029] fff00000c4687e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.034121] fff00000c4687e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.034168] >fff00000c4687f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.034217] ^ [ 17.034266] fff00000c4687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.034311] fff00000c4688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.034360] ================================================================== [ 17.019331] ================================================================== [ 17.019770] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.020636] Write of size 1 at addr fff00000c4687f73 by task kunit_try_catch/136 [ 17.020748] [ 17.021558] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 17.021704] Tainted: [N]=TEST [ 17.021737] Hardware name: linux,dummy-virt (DT) [ 17.021961] Call trace: [ 17.022134] show_stack+0x20/0x38 (C) [ 17.022270] dump_stack_lvl+0x8c/0xd0 [ 17.022332] print_report+0x118/0x608 [ 17.022382] kasan_report+0xdc/0x128 [ 17.022433] __asan_report_store1_noabort+0x20/0x30 [ 17.022492] kmalloc_oob_right+0x5a4/0x660 [ 17.022538] kunit_try_run_case+0x170/0x3f0 [ 17.022589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.022642] kthread+0x328/0x630 [ 17.022685] ret_from_fork+0x10/0x20 [ 17.022850] [ 17.022889] Allocated by task 136: [ 17.023005] kasan_save_stack+0x3c/0x68 [ 17.023071] kasan_save_track+0x20/0x40 [ 17.023112] kasan_save_alloc_info+0x40/0x58 [ 17.023152] __kasan_kmalloc+0xd4/0xd8 [ 17.023188] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.023232] kmalloc_oob_right+0xb0/0x660 [ 17.023267] kunit_try_run_case+0x170/0x3f0 [ 17.023304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.023347] kthread+0x328/0x630 [ 17.023378] ret_from_fork+0x10/0x20 [ 17.023432] [ 17.023504] The buggy address belongs to the object at fff00000c4687f00 [ 17.023504] which belongs to the cache kmalloc-128 of size 128 [ 17.023600] The buggy address is located 0 bytes to the right of [ 17.023600] allocated 115-byte region [fff00000c4687f00, fff00000c4687f73) [ 17.023667] [ 17.023750] The buggy address belongs to the physical page: [ 17.023961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104687 [ 17.024244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.024554] page_type: f5(slab) [ 17.024856] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.024918] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.025024] page dumped because: kasan: bad access detected [ 17.025064] [ 17.025089] Memory state around the buggy address: [ 17.025313] fff00000c4687e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.025379] fff00000c4687e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.025435] >fff00000c4687f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.025503] ^ [ 17.025588] fff00000c4687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.025633] fff00000c4688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.025695] ================================================================== [ 17.036157] ================================================================== [ 17.036209] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.036258] Read of size 1 at addr fff00000c4687f80 by task kunit_try_catch/136 [ 17.036557] [ 17.036693] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.036781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.036808] Hardware name: linux,dummy-virt (DT) [ 17.036846] Call trace: [ 17.036977] show_stack+0x20/0x38 (C) [ 17.037033] dump_stack_lvl+0x8c/0xd0 [ 17.037201] print_report+0x118/0x608 [ 17.037268] kasan_report+0xdc/0x128 [ 17.037314] __asan_report_load1_noabort+0x20/0x30 [ 17.037366] kmalloc_oob_right+0x5d0/0x660 [ 17.037411] kunit_try_run_case+0x170/0x3f0 [ 17.037470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.037522] kthread+0x328/0x630 [ 17.037569] ret_from_fork+0x10/0x20 [ 17.037625] [ 17.037643] Allocated by task 136: [ 17.037671] kasan_save_stack+0x3c/0x68 [ 17.037712] kasan_save_track+0x20/0x40 [ 17.037757] kasan_save_alloc_info+0x40/0x58 [ 17.037805] __kasan_kmalloc+0xd4/0xd8 [ 17.037847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.037886] kmalloc_oob_right+0xb0/0x660 [ 17.037921] kunit_try_run_case+0x170/0x3f0 [ 17.037957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.037999] kthread+0x328/0x630 [ 17.038029] ret_from_fork+0x10/0x20 [ 17.038063] [ 17.038080] The buggy address belongs to the object at fff00000c4687f00 [ 17.038080] which belongs to the cache kmalloc-128 of size 128 [ 17.038142] The buggy address is located 13 bytes to the right of [ 17.038142] allocated 115-byte region [fff00000c4687f00, fff00000c4687f73) [ 17.038207] [ 17.038235] The buggy address belongs to the physical page: [ 17.038273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104687 [ 17.038326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.038374] page_type: f5(slab) [ 17.038411] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.038952] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.039021] page dumped because: kasan: bad access detected [ 17.039164] [ 17.039262] Memory state around the buggy address: [ 17.039295] fff00000c4687e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.039431] fff00000c4687f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.039491] >fff00000c4687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.039533] ^ [ 17.039609] fff00000c4688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.039760] fff00000c4688080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 17.040043] ==================================================================
[ 10.714858] ================================================================== [ 10.715493] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.716447] Write of size 1 at addr ffff888102cbbd73 by task kunit_try_catch/153 [ 10.716800] [ 10.717855] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.718230] Tainted: [N]=TEST [ 10.718266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.718481] Call Trace: [ 10.718546] <TASK> [ 10.718702] dump_stack_lvl+0x73/0xb0 [ 10.718790] print_report+0xd1/0x650 [ 10.718818] ? __virt_addr_valid+0x1db/0x2d0 [ 10.718843] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.718863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.718884] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.718905] kasan_report+0x141/0x180 [ 10.718926] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.718951] __asan_report_store1_noabort+0x1b/0x30 [ 10.718970] kmalloc_oob_right+0x6f0/0x7f0 [ 10.718992] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.719013] ? __schedule+0x10cc/0x2b60 [ 10.719063] ? __pfx_read_tsc+0x10/0x10 [ 10.719085] ? ktime_get_ts64+0x86/0x230 [ 10.719110] kunit_try_run_case+0x1a5/0x480 [ 10.719136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.719157] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.719180] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.719201] ? __kthread_parkme+0x82/0x180 [ 10.719222] ? preempt_count_sub+0x50/0x80 [ 10.719246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.719268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.719289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.719311] kthread+0x337/0x6f0 [ 10.719329] ? trace_preempt_on+0x20/0xc0 [ 10.719352] ? __pfx_kthread+0x10/0x10 [ 10.719371] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.719391] ? calculate_sigpending+0x7b/0xa0 [ 10.719415] ? __pfx_kthread+0x10/0x10 [ 10.719435] ret_from_fork+0x116/0x1d0 [ 10.719452] ? __pfx_kthread+0x10/0x10 [ 10.719471] ret_from_fork_asm+0x1a/0x30 [ 10.719525] </TASK> [ 10.719590] [ 10.729853] Allocated by task 153: [ 10.730181] kasan_save_stack+0x45/0x70 [ 10.730395] kasan_save_track+0x18/0x40 [ 10.730583] kasan_save_alloc_info+0x3b/0x50 [ 10.730770] __kasan_kmalloc+0xb7/0xc0 [ 10.730904] __kmalloc_cache_noprof+0x189/0x420 [ 10.731077] kmalloc_oob_right+0xa9/0x7f0 [ 10.731216] kunit_try_run_case+0x1a5/0x480 [ 10.731433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.731680] kthread+0x337/0x6f0 [ 10.731890] ret_from_fork+0x116/0x1d0 [ 10.732035] ret_from_fork_asm+0x1a/0x30 [ 10.732208] [ 10.732326] The buggy address belongs to the object at ffff888102cbbd00 [ 10.732326] which belongs to the cache kmalloc-128 of size 128 [ 10.733426] The buggy address is located 0 bytes to the right of [ 10.733426] allocated 115-byte region [ffff888102cbbd00, ffff888102cbbd73) [ 10.733961] [ 10.734113] The buggy address belongs to the physical page: [ 10.734482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cbb [ 10.735088] flags: 0x200000000000000(node=0|zone=2) [ 10.735702] page_type: f5(slab) [ 10.736174] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.736710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.737105] page dumped because: kasan: bad access detected [ 10.737371] [ 10.737451] Memory state around the buggy address: [ 10.737864] ffff888102cbbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.738347] ffff888102cbbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.738765] >ffff888102cbbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.739070] ^ [ 10.739402] ffff888102cbbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.739735] ffff888102cbbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.740071] ================================================================== [ 10.741614] ================================================================== [ 10.741878] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.742395] Write of size 1 at addr ffff888102cbbd78 by task kunit_try_catch/153 [ 10.742672] [ 10.742759] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.742800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.742812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.742831] Call Trace: [ 10.742843] <TASK> [ 10.742857] dump_stack_lvl+0x73/0xb0 [ 10.742882] print_report+0xd1/0x650 [ 10.742903] ? __virt_addr_valid+0x1db/0x2d0 [ 10.742923] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.742943] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.742963] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.742984] kasan_report+0x141/0x180 [ 10.743004] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.743047] __asan_report_store1_noabort+0x1b/0x30 [ 10.743067] kmalloc_oob_right+0x6bd/0x7f0 [ 10.743088] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.743109] ? __schedule+0x10cc/0x2b60 [ 10.743130] ? __pfx_read_tsc+0x10/0x10 [ 10.743159] ? ktime_get_ts64+0x86/0x230 [ 10.743182] kunit_try_run_case+0x1a5/0x480 [ 10.743204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.743224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.743246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.743267] ? __kthread_parkme+0x82/0x180 [ 10.743286] ? preempt_count_sub+0x50/0x80 [ 10.743307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.743329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.743350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.743372] kthread+0x337/0x6f0 [ 10.743390] ? trace_preempt_on+0x20/0xc0 [ 10.743412] ? __pfx_kthread+0x10/0x10 [ 10.743431] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.743450] ? calculate_sigpending+0x7b/0xa0 [ 10.743472] ? __pfx_kthread+0x10/0x10 [ 10.743493] ret_from_fork+0x116/0x1d0 [ 10.743509] ? __pfx_kthread+0x10/0x10 [ 10.743529] ret_from_fork_asm+0x1a/0x30 [ 10.743557] </TASK> [ 10.743568] [ 10.751882] Allocated by task 153: [ 10.752013] kasan_save_stack+0x45/0x70 [ 10.752295] kasan_save_track+0x18/0x40 [ 10.752675] kasan_save_alloc_info+0x3b/0x50 [ 10.752863] __kasan_kmalloc+0xb7/0xc0 [ 10.753057] __kmalloc_cache_noprof+0x189/0x420 [ 10.753292] kmalloc_oob_right+0xa9/0x7f0 [ 10.753432] kunit_try_run_case+0x1a5/0x480 [ 10.753793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.754109] kthread+0x337/0x6f0 [ 10.754297] ret_from_fork+0x116/0x1d0 [ 10.754543] ret_from_fork_asm+0x1a/0x30 [ 10.754712] [ 10.754782] The buggy address belongs to the object at ffff888102cbbd00 [ 10.754782] which belongs to the cache kmalloc-128 of size 128 [ 10.755273] The buggy address is located 5 bytes to the right of [ 10.755273] allocated 115-byte region [ffff888102cbbd00, ffff888102cbbd73) [ 10.755726] [ 10.755868] The buggy address belongs to the physical page: [ 10.756126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cbb [ 10.756449] flags: 0x200000000000000(node=0|zone=2) [ 10.756609] page_type: f5(slab) [ 10.756728] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.757490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.757858] page dumped because: kasan: bad access detected [ 10.758168] [ 10.759095] Memory state around the buggy address: [ 10.759323] ffff888102cbbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.759640] ffff888102cbbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.759930] >ffff888102cbbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.761444] ^ [ 10.762017] ffff888102cbbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.762994] ffff888102cbbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.763526] ================================================================== [ 10.764820] ================================================================== [ 10.766325] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.767486] Read of size 1 at addr ffff888102cbbd80 by task kunit_try_catch/153 [ 10.767746] [ 10.767831] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.767871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.767882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.767903] Call Trace: [ 10.767916] <TASK> [ 10.767930] dump_stack_lvl+0x73/0xb0 [ 10.767957] print_report+0xd1/0x650 [ 10.767979] ? __virt_addr_valid+0x1db/0x2d0 [ 10.768000] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.768020] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.768260] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.768282] kasan_report+0x141/0x180 [ 10.768304] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.768329] __asan_report_load1_noabort+0x18/0x20 [ 10.768352] kmalloc_oob_right+0x68a/0x7f0 [ 10.768604] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.768634] ? __schedule+0x10cc/0x2b60 [ 10.768655] ? __pfx_read_tsc+0x10/0x10 [ 10.768675] ? ktime_get_ts64+0x86/0x230 [ 10.768697] kunit_try_run_case+0x1a5/0x480 [ 10.768719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.768740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.768761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.768782] ? __kthread_parkme+0x82/0x180 [ 10.768800] ? preempt_count_sub+0x50/0x80 [ 10.768822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.768844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.768866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.768888] kthread+0x337/0x6f0 [ 10.768906] ? trace_preempt_on+0x20/0xc0 [ 10.768927] ? __pfx_kthread+0x10/0x10 [ 10.768946] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.768966] ? calculate_sigpending+0x7b/0xa0 [ 10.768989] ? __pfx_kthread+0x10/0x10 [ 10.769009] ret_from_fork+0x116/0x1d0 [ 10.769038] ? __pfx_kthread+0x10/0x10 [ 10.769059] ret_from_fork_asm+0x1a/0x30 [ 10.769088] </TASK> [ 10.769099] [ 10.784524] Allocated by task 153: [ 10.784967] kasan_save_stack+0x45/0x70 [ 10.785464] kasan_save_track+0x18/0x40 [ 10.785714] kasan_save_alloc_info+0x3b/0x50 [ 10.786227] __kasan_kmalloc+0xb7/0xc0 [ 10.786629] __kmalloc_cache_noprof+0x189/0x420 [ 10.786790] kmalloc_oob_right+0xa9/0x7f0 [ 10.786926] kunit_try_run_case+0x1a5/0x480 [ 10.787154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.788199] kthread+0x337/0x6f0 [ 10.788579] ret_from_fork+0x116/0x1d0 [ 10.788942] ret_from_fork_asm+0x1a/0x30 [ 10.789366] [ 10.789583] The buggy address belongs to the object at ffff888102cbbd00 [ 10.789583] which belongs to the cache kmalloc-128 of size 128 [ 10.790687] The buggy address is located 13 bytes to the right of [ 10.790687] allocated 115-byte region [ffff888102cbbd00, ffff888102cbbd73) [ 10.791751] [ 10.791946] The buggy address belongs to the physical page: [ 10.792341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cbb [ 10.792709] flags: 0x200000000000000(node=0|zone=2) [ 10.792905] page_type: f5(slab) [ 10.793365] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.794087] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.794393] page dumped because: kasan: bad access detected [ 10.794814] [ 10.794998] Memory state around the buggy address: [ 10.795530] ffff888102cbbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.796020] ffff888102cbbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.796445] >ffff888102cbbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.796651] ^ [ 10.796761] ffff888102cbbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.796965] ffff888102cbbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.797212] ==================================================================