Date
July 3, 2025, 6:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.431535] ================================================================== [ 16.431863] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.432758] Write of size 1 at addr fff00000c652da73 by task kunit_try_catch/136 [ 16.432864] [ 16.433662] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 16.433804] Tainted: [N]=TEST [ 16.433837] Hardware name: linux,dummy-virt (DT) [ 16.434077] Call trace: [ 16.434248] show_stack+0x20/0x38 (C) [ 16.434379] dump_stack_lvl+0x8c/0xd0 [ 16.434441] print_report+0x118/0x608 [ 16.434489] kasan_report+0xdc/0x128 [ 16.434535] __asan_report_store1_noabort+0x20/0x30 [ 16.434583] kmalloc_oob_right+0x5a4/0x660 [ 16.434628] kunit_try_run_case+0x170/0x3f0 [ 16.434678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.434729] kthread+0x328/0x630 [ 16.434772] ret_from_fork+0x10/0x20 [ 16.434923] [ 16.434962] Allocated by task 136: [ 16.435109] kasan_save_stack+0x3c/0x68 [ 16.435177] kasan_save_track+0x20/0x40 [ 16.435214] kasan_save_alloc_info+0x40/0x58 [ 16.435253] __kasan_kmalloc+0xd4/0xd8 [ 16.435288] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.435327] kmalloc_oob_right+0xb0/0x660 [ 16.435362] kunit_try_run_case+0x170/0x3f0 [ 16.435398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.435440] kthread+0x328/0x630 [ 16.435471] ret_from_fork+0x10/0x20 [ 16.435523] [ 16.435586] The buggy address belongs to the object at fff00000c652da00 [ 16.435586] which belongs to the cache kmalloc-128 of size 128 [ 16.435677] The buggy address is located 0 bytes to the right of [ 16.435677] allocated 115-byte region [fff00000c652da00, fff00000c652da73) [ 16.435741] [ 16.435820] The buggy address belongs to the physical page: [ 16.436015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652d [ 16.436298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.436597] page_type: f5(slab) [ 16.436945] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.437020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.437166] page dumped because: kasan: bad access detected [ 16.437208] [ 16.437234] Memory state around the buggy address: [ 16.437449] fff00000c652d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.437513] fff00000c652d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.437566] >fff00000c652da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.437619] ^ [ 16.437699] fff00000c652da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.437740] fff00000c652db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.437800] ================================================================== [ 16.443024] ================================================================== [ 16.443133] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.443212] Read of size 1 at addr fff00000c652da80 by task kunit_try_catch/136 [ 16.443297] [ 16.443344] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.443460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.443487] Hardware name: linux,dummy-virt (DT) [ 16.443517] Call trace: [ 16.443568] show_stack+0x20/0x38 (C) [ 16.443640] dump_stack_lvl+0x8c/0xd0 [ 16.443687] print_report+0x118/0x608 [ 16.443731] kasan_report+0xdc/0x128 [ 16.443946] __asan_report_load1_noabort+0x20/0x30 [ 16.444007] kmalloc_oob_right+0x5d0/0x660 [ 16.444064] kunit_try_run_case+0x170/0x3f0 [ 16.444174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.444226] kthread+0x328/0x630 [ 16.444275] ret_from_fork+0x10/0x20 [ 16.444321] [ 16.444339] Allocated by task 136: [ 16.444570] kasan_save_stack+0x3c/0x68 [ 16.444666] kasan_save_track+0x20/0x40 [ 16.444808] kasan_save_alloc_info+0x40/0x58 [ 16.444878] __kasan_kmalloc+0xd4/0xd8 [ 16.444987] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.445054] kmalloc_oob_right+0xb0/0x660 [ 16.445089] kunit_try_run_case+0x170/0x3f0 [ 16.445247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.445294] kthread+0x328/0x630 [ 16.445325] ret_from_fork+0x10/0x20 [ 16.445359] [ 16.445378] The buggy address belongs to the object at fff00000c652da00 [ 16.445378] which belongs to the cache kmalloc-128 of size 128 [ 16.445434] The buggy address is located 13 bytes to the right of [ 16.445434] allocated 115-byte region [fff00000c652da00, fff00000c652da73) [ 16.445496] [ 16.445516] The buggy address belongs to the physical page: [ 16.445545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652d [ 16.445595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.445642] page_type: f5(slab) [ 16.445678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.445726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.445764] page dumped because: kasan: bad access detected [ 16.445793] [ 16.445810] Memory state around the buggy address: [ 16.445839] fff00000c652d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.445959] fff00000c652da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.446085] >fff00000c652da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.446196] ^ [ 16.446243] fff00000c652db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.446492] fff00000c652db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.446695] ================================================================== [ 16.438358] ================================================================== [ 16.438436] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.438501] Write of size 1 at addr fff00000c652da78 by task kunit_try_catch/136 [ 16.438549] [ 16.438613] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 16.438692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.438792] Hardware name: linux,dummy-virt (DT) [ 16.438829] Call trace: [ 16.438856] show_stack+0x20/0x38 (C) [ 16.439007] dump_stack_lvl+0x8c/0xd0 [ 16.439122] print_report+0x118/0x608 [ 16.439228] kasan_report+0xdc/0x128 [ 16.439273] __asan_report_store1_noabort+0x20/0x30 [ 16.439320] kmalloc_oob_right+0x538/0x660 [ 16.439381] kunit_try_run_case+0x170/0x3f0 [ 16.439427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.439477] kthread+0x328/0x630 [ 16.439517] ret_from_fork+0x10/0x20 [ 16.439728] [ 16.439754] Allocated by task 136: [ 16.439871] kasan_save_stack+0x3c/0x68 [ 16.439913] kasan_save_track+0x20/0x40 [ 16.439980] kasan_save_alloc_info+0x40/0x58 [ 16.440046] __kasan_kmalloc+0xd4/0xd8 [ 16.440083] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.440513] kmalloc_oob_right+0xb0/0x660 [ 16.440600] kunit_try_run_case+0x170/0x3f0 [ 16.440671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.440723] kthread+0x328/0x630 [ 16.440755] ret_from_fork+0x10/0x20 [ 16.440812] [ 16.440911] The buggy address belongs to the object at fff00000c652da00 [ 16.440911] which belongs to the cache kmalloc-128 of size 128 [ 16.441216] The buggy address is located 5 bytes to the right of [ 16.441216] allocated 115-byte region [fff00000c652da00, fff00000c652da73) [ 16.441331] [ 16.441350] The buggy address belongs to the physical page: [ 16.441507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652d [ 16.441762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.441822] page_type: f5(slab) [ 16.441868] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.441926] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.441964] page dumped because: kasan: bad access detected [ 16.442003] [ 16.442021] Memory state around the buggy address: [ 16.442060] fff00000c652d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.442102] fff00000c652d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.442142] >fff00000c652da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.442187] ^ [ 16.442231] fff00000c652da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.442272] fff00000c652db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.442309] ==================================================================
[ 10.739055] ================================================================== [ 10.740284] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.741921] Write of size 1 at addr ffff8881029db173 by task kunit_try_catch/154 [ 10.742275] [ 10.743251] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.743595] Tainted: [N]=TEST [ 10.743627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.743848] Call Trace: [ 10.743913] <TASK> [ 10.744073] dump_stack_lvl+0x73/0xb0 [ 10.744201] print_report+0xd1/0x650 [ 10.744230] ? __virt_addr_valid+0x1db/0x2d0 [ 10.744255] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.744276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.744297] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.744339] kasan_report+0x141/0x180 [ 10.744361] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.744418] __asan_report_store1_noabort+0x1b/0x30 [ 10.744439] kmalloc_oob_right+0x6f0/0x7f0 [ 10.744473] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.744495] ? __schedule+0x10cc/0x2b60 [ 10.744517] ? __pfx_read_tsc+0x10/0x10 [ 10.744539] ? ktime_get_ts64+0x86/0x230 [ 10.744565] kunit_try_run_case+0x1a5/0x480 [ 10.744591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.744612] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.744635] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.744656] ? __kthread_parkme+0x82/0x180 [ 10.744678] ? preempt_count_sub+0x50/0x80 [ 10.744701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.744724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.744745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.744767] kthread+0x337/0x6f0 [ 10.744786] ? trace_preempt_on+0x20/0xc0 [ 10.744809] ? __pfx_kthread+0x10/0x10 [ 10.744829] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.744849] ? calculate_sigpending+0x7b/0xa0 [ 10.744873] ? __pfx_kthread+0x10/0x10 [ 10.744893] ret_from_fork+0x116/0x1d0 [ 10.744911] ? __pfx_kthread+0x10/0x10 [ 10.744930] ret_from_fork_asm+0x1a/0x30 [ 10.744990] </TASK> [ 10.745062] [ 10.755804] Allocated by task 154: [ 10.756169] kasan_save_stack+0x45/0x70 [ 10.756526] kasan_save_track+0x18/0x40 [ 10.756693] kasan_save_alloc_info+0x3b/0x50 [ 10.756894] __kasan_kmalloc+0xb7/0xc0 [ 10.757087] __kmalloc_cache_noprof+0x189/0x420 [ 10.757292] kmalloc_oob_right+0xa9/0x7f0 [ 10.757460] kunit_try_run_case+0x1a5/0x480 [ 10.757636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.757883] kthread+0x337/0x6f0 [ 10.758026] ret_from_fork+0x116/0x1d0 [ 10.758206] ret_from_fork_asm+0x1a/0x30 [ 10.758530] [ 10.758669] The buggy address belongs to the object at ffff8881029db100 [ 10.758669] which belongs to the cache kmalloc-128 of size 128 [ 10.759236] The buggy address is located 0 bytes to the right of [ 10.759236] allocated 115-byte region [ffff8881029db100, ffff8881029db173) [ 10.759784] [ 10.759984] The buggy address belongs to the physical page: [ 10.760462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db [ 10.760954] flags: 0x200000000000000(node=0|zone=2) [ 10.761598] page_type: f5(slab) [ 10.762067] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.762433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.762834] page dumped because: kasan: bad access detected [ 10.763078] [ 10.763195] Memory state around the buggy address: [ 10.763628] ffff8881029db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.763988] ffff8881029db080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.764323] >ffff8881029db100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.764638] ^ [ 10.764960] ffff8881029db180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.765233] ffff8881029db200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.765603] ================================================================== [ 10.766872] ================================================================== [ 10.767523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.767801] Write of size 1 at addr ffff8881029db178 by task kunit_try_catch/154 [ 10.768101] [ 10.768227] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.768268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.768280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.768299] Call Trace: [ 10.768311] <TASK> [ 10.768325] dump_stack_lvl+0x73/0xb0 [ 10.768349] print_report+0xd1/0x650 [ 10.768370] ? __virt_addr_valid+0x1db/0x2d0 [ 10.768391] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.768411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.768432] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.768452] kasan_report+0x141/0x180 [ 10.768473] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.768498] __asan_report_store1_noabort+0x1b/0x30 [ 10.768517] kmalloc_oob_right+0x6bd/0x7f0 [ 10.768538] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.768569] ? __schedule+0x10cc/0x2b60 [ 10.768590] ? __pfx_read_tsc+0x10/0x10 [ 10.768610] ? ktime_get_ts64+0x86/0x230 [ 10.768632] kunit_try_run_case+0x1a5/0x480 [ 10.768654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.768675] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.768695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.768717] ? __kthread_parkme+0x82/0x180 [ 10.768737] ? preempt_count_sub+0x50/0x80 [ 10.768759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.768781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.768802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.768824] kthread+0x337/0x6f0 [ 10.768842] ? trace_preempt_on+0x20/0xc0 [ 10.768864] ? __pfx_kthread+0x10/0x10 [ 10.768883] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.768903] ? calculate_sigpending+0x7b/0xa0 [ 10.768925] ? __pfx_kthread+0x10/0x10 [ 10.768945] ret_from_fork+0x116/0x1d0 [ 10.768962] ? __pfx_kthread+0x10/0x10 [ 10.768981] ret_from_fork_asm+0x1a/0x30 [ 10.769010] </TASK> [ 10.769021] [ 10.775887] Allocated by task 154: [ 10.776016] kasan_save_stack+0x45/0x70 [ 10.776167] kasan_save_track+0x18/0x40 [ 10.776301] kasan_save_alloc_info+0x3b/0x50 [ 10.776457] __kasan_kmalloc+0xb7/0xc0 [ 10.776681] __kmalloc_cache_noprof+0x189/0x420 [ 10.777012] kmalloc_oob_right+0xa9/0x7f0 [ 10.777313] kunit_try_run_case+0x1a5/0x480 [ 10.777476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.777645] kthread+0x337/0x6f0 [ 10.777767] ret_from_fork+0x116/0x1d0 [ 10.777953] ret_from_fork_asm+0x1a/0x30 [ 10.778157] [ 10.778254] The buggy address belongs to the object at ffff8881029db100 [ 10.778254] which belongs to the cache kmalloc-128 of size 128 [ 10.779994] The buggy address is located 5 bytes to the right of [ 10.779994] allocated 115-byte region [ffff8881029db100, ffff8881029db173) [ 10.780741] [ 10.780848] The buggy address belongs to the physical page: [ 10.781202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db [ 10.781719] flags: 0x200000000000000(node=0|zone=2) [ 10.781923] page_type: f5(slab) [ 10.782081] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.782654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.783201] page dumped because: kasan: bad access detected [ 10.783469] [ 10.783542] Memory state around the buggy address: [ 10.783699] ffff8881029db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.783915] ffff8881029db080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.784140] >ffff8881029db100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.784350] ^ [ 10.784560] ffff8881029db180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.784771] ffff8881029db200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.784981] ================================================================== [ 10.786889] ================================================================== [ 10.787158] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.787462] Read of size 1 at addr ffff8881029db180 by task kunit_try_catch/154 [ 10.787817] [ 10.788423] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.788470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.788482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.788503] Call Trace: [ 10.788517] <TASK> [ 10.788530] dump_stack_lvl+0x73/0xb0 [ 10.788557] print_report+0xd1/0x650 [ 10.788579] ? __virt_addr_valid+0x1db/0x2d0 [ 10.788600] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.788620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.788641] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.788661] kasan_report+0x141/0x180 [ 10.788681] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.788706] __asan_report_load1_noabort+0x18/0x20 [ 10.788729] kmalloc_oob_right+0x68a/0x7f0 [ 10.788750] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.788771] ? __schedule+0x10cc/0x2b60 [ 10.788791] ? __pfx_read_tsc+0x10/0x10 [ 10.788811] ? ktime_get_ts64+0x86/0x230 [ 10.788834] kunit_try_run_case+0x1a5/0x480 [ 10.788856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.788876] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.788897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.788918] ? __kthread_parkme+0x82/0x180 [ 10.788937] ? preempt_count_sub+0x50/0x80 [ 10.788959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.788983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.789005] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.789027] kthread+0x337/0x6f0 [ 10.789046] ? trace_preempt_on+0x20/0xc0 [ 10.789068] ? __pfx_kthread+0x10/0x10 [ 10.789087] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.789122] ? calculate_sigpending+0x7b/0xa0 [ 10.789145] ? __pfx_kthread+0x10/0x10 [ 10.789175] ret_from_fork+0x116/0x1d0 [ 10.789193] ? __pfx_kthread+0x10/0x10 [ 10.789213] ret_from_fork_asm+0x1a/0x30 [ 10.789242] </TASK> [ 10.789252] [ 10.798216] Allocated by task 154: [ 10.798889] kasan_save_stack+0x45/0x70 [ 10.799089] kasan_save_track+0x18/0x40 [ 10.799300] kasan_save_alloc_info+0x3b/0x50 [ 10.800896] __kasan_kmalloc+0xb7/0xc0 [ 10.801095] __kmalloc_cache_noprof+0x189/0x420 [ 10.801328] kmalloc_oob_right+0xa9/0x7f0 [ 10.801840] kunit_try_run_case+0x1a5/0x480 [ 10.802022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.802474] kthread+0x337/0x6f0 [ 10.802775] ret_from_fork+0x116/0x1d0 [ 10.802964] ret_from_fork_asm+0x1a/0x30 [ 10.803376] [ 10.803735] The buggy address belongs to the object at ffff8881029db100 [ 10.803735] which belongs to the cache kmalloc-128 of size 128 [ 10.804374] The buggy address is located 13 bytes to the right of [ 10.804374] allocated 115-byte region [ffff8881029db100, ffff8881029db173) [ 10.804926] [ 10.805015] The buggy address belongs to the physical page: [ 10.805262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db [ 10.805836] flags: 0x200000000000000(node=0|zone=2) [ 10.806032] page_type: f5(slab) [ 10.806522] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.806852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.807295] page dumped because: kasan: bad access detected [ 10.807578] [ 10.807663] Memory state around the buggy address: [ 10.807863] ffff8881029db080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.808173] ffff8881029db100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.808857] >ffff8881029db180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.809159] ^ [ 10.809327] ffff8881029db200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.809825] ffff8881029db280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.810263] ==================================================================