Date
July 1, 2025, 3:08 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.633236] ================================================================== [ 16.633288] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.633333] Read of size 1 at addr fff00000c5733380 by task kunit_try_catch/137 [ 16.633436] [ 16.633467] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.633548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.633585] Hardware name: linux,dummy-virt (DT) [ 16.633614] Call trace: [ 16.633634] show_stack+0x20/0x38 (C) [ 16.633680] dump_stack_lvl+0x8c/0xd0 [ 16.634202] print_report+0x118/0x608 [ 16.634321] kasan_report+0xdc/0x128 [ 16.634369] __asan_report_load1_noabort+0x20/0x30 [ 16.634419] kmalloc_oob_right+0x5d0/0x660 [ 16.634465] kunit_try_run_case+0x170/0x3f0 [ 16.634512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.634576] kthread+0x328/0x630 [ 16.634616] ret_from_fork+0x10/0x20 [ 16.634700] [ 16.634842] Allocated by task 137: [ 16.634879] kasan_save_stack+0x3c/0x68 [ 16.635142] kasan_save_track+0x20/0x40 [ 16.635258] kasan_save_alloc_info+0x40/0x58 [ 16.635304] __kasan_kmalloc+0xd4/0xd8 [ 16.635339] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.635379] kmalloc_oob_right+0xb0/0x660 [ 16.635914] kunit_try_run_case+0x170/0x3f0 [ 16.636147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.636194] kthread+0x328/0x630 [ 16.636225] ret_from_fork+0x10/0x20 [ 16.636631] [ 16.636883] The buggy address belongs to the object at fff00000c5733300 [ 16.636883] which belongs to the cache kmalloc-128 of size 128 [ 16.637113] The buggy address is located 13 bytes to the right of [ 16.637113] allocated 115-byte region [fff00000c5733300, fff00000c5733373) [ 16.637409] [ 16.637488] The buggy address belongs to the physical page: [ 16.637584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733 [ 16.638078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.638742] page_type: f5(slab) [ 16.639114] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.639278] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.639383] page dumped because: kasan: bad access detected [ 16.639414] [ 16.639682] Memory state around the buggy address: [ 16.639785] fff00000c5733280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.639916] fff00000c5733300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.640460] >fff00000c5733380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.640872] ^ [ 16.640907] fff00000c5733400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.641164] fff00000c5733480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.641240] ================================================================== [ 16.630100] ================================================================== [ 16.630144] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.630219] Write of size 1 at addr fff00000c5733378 by task kunit_try_catch/137 [ 16.630269] [ 16.630297] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.630376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.630401] Hardware name: linux,dummy-virt (DT) [ 16.630430] Call trace: [ 16.630450] show_stack+0x20/0x38 (C) [ 16.630497] dump_stack_lvl+0x8c/0xd0 [ 16.630543] print_report+0x118/0x608 [ 16.630602] kasan_report+0xdc/0x128 [ 16.630646] __asan_report_store1_noabort+0x20/0x30 [ 16.630694] kmalloc_oob_right+0x538/0x660 [ 16.630747] kunit_try_run_case+0x170/0x3f0 [ 16.630794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.630845] kthread+0x328/0x630 [ 16.630885] ret_from_fork+0x10/0x20 [ 16.630933] [ 16.631129] Allocated by task 137: [ 16.631163] kasan_save_stack+0x3c/0x68 [ 16.631207] kasan_save_track+0x20/0x40 [ 16.631243] kasan_save_alloc_info+0x40/0x58 [ 16.631281] __kasan_kmalloc+0xd4/0xd8 [ 16.631316] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.631354] kmalloc_oob_right+0xb0/0x660 [ 16.631388] kunit_try_run_case+0x170/0x3f0 [ 16.631424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.631466] kthread+0x328/0x630 [ 16.631497] ret_from_fork+0x10/0x20 [ 16.631530] [ 16.631548] The buggy address belongs to the object at fff00000c5733300 [ 16.631548] which belongs to the cache kmalloc-128 of size 128 [ 16.631617] The buggy address is located 5 bytes to the right of [ 16.631617] allocated 115-byte region [fff00000c5733300, fff00000c5733373) [ 16.631680] [ 16.631699] The buggy address belongs to the physical page: [ 16.631762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733 [ 16.631851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.631986] page_type: f5(slab) [ 16.632053] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.632129] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.632169] page dumped because: kasan: bad access detected [ 16.632199] [ 16.632233] Memory state around the buggy address: [ 16.632282] fff00000c5733200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.632325] fff00000c5733280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.632838] >fff00000c5733300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.632973] ^ [ 16.633022] fff00000c5733380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.633064] fff00000c5733400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.633101] ================================================================== [ 16.622561] ================================================================== [ 16.623046] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.623891] Write of size 1 at addr fff00000c5733373 by task kunit_try_catch/137 [ 16.623998] [ 16.624814] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 16.624957] Tainted: [N]=TEST [ 16.624989] Hardware name: linux,dummy-virt (DT) [ 16.625209] Call trace: [ 16.625396] show_stack+0x20/0x38 (C) [ 16.625549] dump_stack_lvl+0x8c/0xd0 [ 16.625624] print_report+0x118/0x608 [ 16.625674] kasan_report+0xdc/0x128 [ 16.625719] __asan_report_store1_noabort+0x20/0x30 [ 16.625767] kmalloc_oob_right+0x5a4/0x660 [ 16.625812] kunit_try_run_case+0x170/0x3f0 [ 16.625863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.625915] kthread+0x328/0x630 [ 16.625958] ret_from_fork+0x10/0x20 [ 16.626117] [ 16.626155] Allocated by task 137: [ 16.626269] kasan_save_stack+0x3c/0x68 [ 16.626332] kasan_save_track+0x20/0x40 [ 16.626370] kasan_save_alloc_info+0x40/0x58 [ 16.626409] __kasan_kmalloc+0xd4/0xd8 [ 16.626444] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.626484] kmalloc_oob_right+0xb0/0x660 [ 16.626519] kunit_try_run_case+0x170/0x3f0 [ 16.626556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.626609] kthread+0x328/0x630 [ 16.626641] ret_from_fork+0x10/0x20 [ 16.626694] [ 16.626753] The buggy address belongs to the object at fff00000c5733300 [ 16.626753] which belongs to the cache kmalloc-128 of size 128 [ 16.626847] The buggy address is located 0 bytes to the right of [ 16.626847] allocated 115-byte region [fff00000c5733300, fff00000c5733373) [ 16.626915] [ 16.626994] The buggy address belongs to the physical page: [ 16.627192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733 [ 16.627460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.627761] page_type: f5(slab) [ 16.628057] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.628118] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.628228] page dumped because: kasan: bad access detected [ 16.628267] [ 16.628292] Memory state around the buggy address: [ 16.628511] fff00000c5733200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.628590] fff00000c5733280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.628645] >fff00000c5733300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.628700] ^ [ 16.628784] fff00000c5733380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.628828] fff00000c5733400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.628890] ==================================================================
[ 10.864872] ================================================================== [ 10.865396] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.865944] Read of size 1 at addr ffff88810339bd80 by task kunit_try_catch/153 [ 10.866428] [ 10.866538] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.866583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.866594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.866616] Call Trace: [ 10.866629] <TASK> [ 10.866647] dump_stack_lvl+0x73/0xb0 [ 10.866676] print_report+0xd1/0x650 [ 10.866698] ? __virt_addr_valid+0x1db/0x2d0 [ 10.866721] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.866741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.866762] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.866782] kasan_report+0x141/0x180 [ 10.866803] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.866827] __asan_report_load1_noabort+0x18/0x20 [ 10.866850] kmalloc_oob_right+0x68a/0x7f0 [ 10.866871] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.866892] ? __schedule+0x10cc/0x2b60 [ 10.866913] ? __pfx_read_tsc+0x10/0x10 [ 10.866933] ? ktime_get_ts64+0x86/0x230 [ 10.866956] kunit_try_run_case+0x1a5/0x480 [ 10.866979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.867000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.867033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.867054] ? __kthread_parkme+0x82/0x180 [ 10.867074] ? preempt_count_sub+0x50/0x80 [ 10.867097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.867120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.867141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.867164] kthread+0x337/0x6f0 [ 10.867183] ? trace_preempt_on+0x20/0xc0 [ 10.867208] ? __pfx_kthread+0x10/0x10 [ 10.867229] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.867249] ? calculate_sigpending+0x7b/0xa0 [ 10.867272] ? __pfx_kthread+0x10/0x10 [ 10.867292] ret_from_fork+0x116/0x1d0 [ 10.867309] ? __pfx_kthread+0x10/0x10 [ 10.867328] ret_from_fork_asm+0x1a/0x30 [ 10.867358] </TASK> [ 10.867370] [ 10.873610] Allocated by task 153: [ 10.873795] kasan_save_stack+0x45/0x70 [ 10.873992] kasan_save_track+0x18/0x40 [ 10.874184] kasan_save_alloc_info+0x3b/0x50 [ 10.874381] __kasan_kmalloc+0xb7/0xc0 [ 10.874513] __kmalloc_cache_noprof+0x189/0x420 [ 10.874729] kmalloc_oob_right+0xa9/0x7f0 [ 10.874928] kunit_try_run_case+0x1a5/0x480 [ 10.875145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.875397] kthread+0x337/0x6f0 [ 10.875553] ret_from_fork+0x116/0x1d0 [ 10.875721] ret_from_fork_asm+0x1a/0x30 [ 10.875889] [ 10.875983] The buggy address belongs to the object at ffff88810339bd00 [ 10.875983] which belongs to the cache kmalloc-128 of size 128 [ 10.876363] The buggy address is located 13 bytes to the right of [ 10.876363] allocated 115-byte region [ffff88810339bd00, ffff88810339bd73) [ 10.876969] [ 10.877062] The buggy address belongs to the physical page: [ 10.877265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10339b [ 10.877592] flags: 0x200000000000000(node=0|zone=2) [ 10.877766] page_type: f5(slab) [ 10.877881] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.878111] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.878324] page dumped because: kasan: bad access detected [ 10.878564] [ 10.878665] Memory state around the buggy address: [ 10.878882] ffff88810339bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.879197] ffff88810339bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.879505] >ffff88810339bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.879908] ^ [ 10.880031] ffff88810339be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.880242] ffff88810339be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.880548] ================================================================== [ 10.812395] ================================================================== [ 10.813015] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.814050] Write of size 1 at addr ffff88810339bd73 by task kunit_try_catch/153 [ 10.814447] [ 10.815498] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.815912] Tainted: [N]=TEST [ 10.815947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.816174] Call Trace: [ 10.816241] <TASK> [ 10.816394] dump_stack_lvl+0x73/0xb0 [ 10.816479] print_report+0xd1/0x650 [ 10.816507] ? __virt_addr_valid+0x1db/0x2d0 [ 10.816532] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.816552] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.816573] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.816594] kasan_report+0x141/0x180 [ 10.816615] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.816727] __asan_report_store1_noabort+0x1b/0x30 [ 10.816752] kmalloc_oob_right+0x6f0/0x7f0 [ 10.816774] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.816796] ? __schedule+0x10cc/0x2b60 [ 10.816818] ? __pfx_read_tsc+0x10/0x10 [ 10.816839] ? ktime_get_ts64+0x86/0x230 [ 10.816864] kunit_try_run_case+0x1a5/0x480 [ 10.816889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.816910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.816933] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.816954] ? __kthread_parkme+0x82/0x180 [ 10.816975] ? preempt_count_sub+0x50/0x80 [ 10.816999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.817032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.817054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.817075] kthread+0x337/0x6f0 [ 10.817093] ? trace_preempt_on+0x20/0xc0 [ 10.817116] ? __pfx_kthread+0x10/0x10 [ 10.817136] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.817155] ? calculate_sigpending+0x7b/0xa0 [ 10.817178] ? __pfx_kthread+0x10/0x10 [ 10.817198] ret_from_fork+0x116/0x1d0 [ 10.817215] ? __pfx_kthread+0x10/0x10 [ 10.817234] ret_from_fork_asm+0x1a/0x30 [ 10.817295] </TASK> [ 10.817360] [ 10.825178] Allocated by task 153: [ 10.825530] kasan_save_stack+0x45/0x70 [ 10.826174] kasan_save_track+0x18/0x40 [ 10.826347] kasan_save_alloc_info+0x3b/0x50 [ 10.826497] __kasan_kmalloc+0xb7/0xc0 [ 10.826707] __kmalloc_cache_noprof+0x189/0x420 [ 10.826942] kmalloc_oob_right+0xa9/0x7f0 [ 10.827174] kunit_try_run_case+0x1a5/0x480 [ 10.827390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.827829] kthread+0x337/0x6f0 [ 10.828262] ret_from_fork+0x116/0x1d0 [ 10.828926] ret_from_fork_asm+0x1a/0x30 [ 10.829278] [ 10.829570] The buggy address belongs to the object at ffff88810339bd00 [ 10.829570] which belongs to the cache kmalloc-128 of size 128 [ 10.830530] The buggy address is located 0 bytes to the right of [ 10.830530] allocated 115-byte region [ffff88810339bd00, ffff88810339bd73) [ 10.831476] [ 10.831650] The buggy address belongs to the physical page: [ 10.832334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10339b [ 10.833067] flags: 0x200000000000000(node=0|zone=2) [ 10.833970] page_type: f5(slab) [ 10.834641] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.835369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.835780] page dumped because: kasan: bad access detected [ 10.836403] [ 10.836529] Memory state around the buggy address: [ 10.837435] ffff88810339bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.837745] ffff88810339bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.838295] >ffff88810339bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.838888] ^ [ 10.839329] ffff88810339bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.839639] ffff88810339be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.840156] ================================================================== [ 10.843119] ================================================================== [ 10.843614] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.844054] Write of size 1 at addr ffff88810339bd78 by task kunit_try_catch/153 [ 10.844416] [ 10.844516] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.844757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.844773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.844795] Call Trace: [ 10.844837] <TASK> [ 10.844918] dump_stack_lvl+0x73/0xb0 [ 10.844950] print_report+0xd1/0x650 [ 10.844972] ? __virt_addr_valid+0x1db/0x2d0 [ 10.845015] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.845048] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.845084] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.845104] kasan_report+0x141/0x180 [ 10.845126] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.845256] __asan_report_store1_noabort+0x1b/0x30 [ 10.845278] kmalloc_oob_right+0x6bd/0x7f0 [ 10.845300] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.845321] ? __schedule+0x10cc/0x2b60 [ 10.845342] ? __pfx_read_tsc+0x10/0x10 [ 10.845362] ? ktime_get_ts64+0x86/0x230 [ 10.845385] kunit_try_run_case+0x1a5/0x480 [ 10.845409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.845429] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.845450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.845472] ? __kthread_parkme+0x82/0x180 [ 10.845491] ? preempt_count_sub+0x50/0x80 [ 10.845513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.845535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.845556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.845578] kthread+0x337/0x6f0 [ 10.845595] ? trace_preempt_on+0x20/0xc0 [ 10.845618] ? __pfx_kthread+0x10/0x10 [ 10.845714] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.845739] ? calculate_sigpending+0x7b/0xa0 [ 10.845765] ? __pfx_kthread+0x10/0x10 [ 10.845787] ret_from_fork+0x116/0x1d0 [ 10.845805] ? __pfx_kthread+0x10/0x10 [ 10.845824] ret_from_fork_asm+0x1a/0x30 [ 10.845855] </TASK> [ 10.845866] [ 10.854134] Allocated by task 153: [ 10.854341] kasan_save_stack+0x45/0x70 [ 10.854563] kasan_save_track+0x18/0x40 [ 10.854837] kasan_save_alloc_info+0x3b/0x50 [ 10.855003] __kasan_kmalloc+0xb7/0xc0 [ 10.855142] __kmalloc_cache_noprof+0x189/0x420 [ 10.855415] kmalloc_oob_right+0xa9/0x7f0 [ 10.855740] kunit_try_run_case+0x1a5/0x480 [ 10.855963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.856331] kthread+0x337/0x6f0 [ 10.856514] ret_from_fork+0x116/0x1d0 [ 10.856730] ret_from_fork_asm+0x1a/0x30 [ 10.856865] [ 10.857040] The buggy address belongs to the object at ffff88810339bd00 [ 10.857040] which belongs to the cache kmalloc-128 of size 128 [ 10.857698] The buggy address is located 5 bytes to the right of [ 10.857698] allocated 115-byte region [ffff88810339bd00, ffff88810339bd73) [ 10.858201] [ 10.858273] The buggy address belongs to the physical page: [ 10.858525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10339b [ 10.859006] flags: 0x200000000000000(node=0|zone=2) [ 10.859283] page_type: f5(slab) [ 10.859429] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.859715] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.860305] page dumped because: kasan: bad access detected [ 10.860651] [ 10.860748] Memory state around the buggy address: [ 10.861291] ffff88810339bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.861637] ffff88810339bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.861994] >ffff88810339bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.862367] ^ [ 10.862575] ffff88810339bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.863119] ffff88810339be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.863553] ==================================================================