Date
July 9, 2025, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.654742] ================================================================== [ 16.656559] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.656815] Read of size 1 at addr fff00000c7767080 by task kunit_try_catch/136 [ 16.657271] [ 16.657306] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.657388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.657909] Hardware name: linux,dummy-virt (DT) [ 16.657956] Call trace: [ 16.658120] show_stack+0x20/0x38 (C) [ 16.659067] dump_stack_lvl+0x8c/0xd0 [ 16.659580] print_report+0x118/0x608 [ 16.659634] kasan_report+0xdc/0x128 [ 16.659681] __asan_report_load1_noabort+0x20/0x30 [ 16.659733] kmalloc_oob_right+0x5d0/0x660 [ 16.659779] kunit_try_run_case+0x170/0x3f0 [ 16.659827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.659880] kthread+0x328/0x630 [ 16.659922] ret_from_fork+0x10/0x20 [ 16.659971] [ 16.659988] Allocated by task 136: [ 16.660015] kasan_save_stack+0x3c/0x68 [ 16.660061] kasan_save_track+0x20/0x40 [ 16.660127] kasan_save_alloc_info+0x40/0x58 [ 16.660182] __kasan_kmalloc+0xd4/0xd8 [ 16.660370] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.660428] kmalloc_oob_right+0xb0/0x660 [ 16.660650] kunit_try_run_case+0x170/0x3f0 [ 16.660905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.661054] kthread+0x328/0x630 [ 16.661142] ret_from_fork+0x10/0x20 [ 16.661178] [ 16.661197] The buggy address belongs to the object at fff00000c7767000 [ 16.661197] which belongs to the cache kmalloc-128 of size 128 [ 16.661503] The buggy address is located 13 bytes to the right of [ 16.661503] allocated 115-byte region [fff00000c7767000, fff00000c7767073) [ 16.661574] [ 16.661625] The buggy address belongs to the physical page: [ 16.661654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767 [ 16.661708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.661874] page_type: f5(slab) [ 16.661989] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.662046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.662121] page dumped because: kasan: bad access detected [ 16.662152] [ 16.662169] Memory state around the buggy address: [ 16.662329] fff00000c7766f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.662463] fff00000c7767000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.662547] >fff00000c7767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.662693] ^ [ 16.662774] fff00000c7767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.662877] fff00000c7767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.662958] ================================================================== [ 16.639995] ================================================================== [ 16.640374] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.641241] Write of size 1 at addr fff00000c7767073 by task kunit_try_catch/136 [ 16.641355] [ 16.642222] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT [ 16.642376] Tainted: [N]=TEST [ 16.642409] Hardware name: linux,dummy-virt (DT) [ 16.642629] Call trace: [ 16.642794] show_stack+0x20/0x38 (C) [ 16.642928] dump_stack_lvl+0x8c/0xd0 [ 16.642990] print_report+0x118/0x608 [ 16.643041] kasan_report+0xdc/0x128 [ 16.643103] __asan_report_store1_noabort+0x20/0x30 [ 16.643157] kmalloc_oob_right+0x5a4/0x660 [ 16.643204] kunit_try_run_case+0x170/0x3f0 [ 16.643257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.643310] kthread+0x328/0x630 [ 16.643354] ret_from_fork+0x10/0x20 [ 16.643511] [ 16.643549] Allocated by task 136: [ 16.643662] kasan_save_stack+0x3c/0x68 [ 16.643726] kasan_save_track+0x20/0x40 [ 16.643764] kasan_save_alloc_info+0x40/0x58 [ 16.643803] __kasan_kmalloc+0xd4/0xd8 [ 16.643840] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.643880] kmalloc_oob_right+0xb0/0x660 [ 16.643916] kunit_try_run_case+0x170/0x3f0 [ 16.643953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.643995] kthread+0x328/0x630 [ 16.644035] ret_from_fork+0x10/0x20 [ 16.644102] [ 16.644161] The buggy address belongs to the object at fff00000c7767000 [ 16.644161] which belongs to the cache kmalloc-128 of size 128 [ 16.644254] The buggy address is located 0 bytes to the right of [ 16.644254] allocated 115-byte region [fff00000c7767000, fff00000c7767073) [ 16.644320] [ 16.644399] The buggy address belongs to the physical page: [ 16.644570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767 [ 16.644834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.645126] page_type: f5(slab) [ 16.645426] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.645491] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.645594] page dumped because: kasan: bad access detected [ 16.645636] [ 16.645660] Memory state around the buggy address: [ 16.645912] fff00000c7766f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.645979] fff00000c7766f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.646034] >fff00000c7767000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.646100] ^ [ 16.646182] fff00000c7767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646226] fff00000c7767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646289] ================================================================== [ 16.647428] ================================================================== [ 16.647837] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.647917] Write of size 1 at addr fff00000c7767078 by task kunit_try_catch/136 [ 16.648000] [ 16.648038] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.648335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.648371] Hardware name: linux,dummy-virt (DT) [ 16.648591] Call trace: [ 16.648632] show_stack+0x20/0x38 (C) [ 16.648687] dump_stack_lvl+0x8c/0xd0 [ 16.648790] print_report+0x118/0x608 [ 16.648858] kasan_report+0xdc/0x128 [ 16.648997] __asan_report_store1_noabort+0x20/0x30 [ 16.649058] kmalloc_oob_right+0x538/0x660 [ 16.649128] kunit_try_run_case+0x170/0x3f0 [ 16.649180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.649523] kthread+0x328/0x630 [ 16.649593] ret_from_fork+0x10/0x20 [ 16.649950] [ 16.650073] Allocated by task 136: [ 16.650119] kasan_save_stack+0x3c/0x68 [ 16.650162] kasan_save_track+0x20/0x40 [ 16.650206] kasan_save_alloc_info+0x40/0x58 [ 16.650245] __kasan_kmalloc+0xd4/0xd8 [ 16.650281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.650319] kmalloc_oob_right+0xb0/0x660 [ 16.650354] kunit_try_run_case+0x170/0x3f0 [ 16.650391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.650433] kthread+0x328/0x630 [ 16.650465] ret_from_fork+0x10/0x20 [ 16.650499] [ 16.650517] The buggy address belongs to the object at fff00000c7767000 [ 16.650517] which belongs to the cache kmalloc-128 of size 128 [ 16.650574] The buggy address is located 5 bytes to the right of [ 16.650574] allocated 115-byte region [fff00000c7767000, fff00000c7767073) [ 16.650637] [ 16.650655] The buggy address belongs to the physical page: [ 16.650683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107767 [ 16.650734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.650781] page_type: f5(slab) [ 16.650818] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.650868] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.650908] page dumped because: kasan: bad access detected [ 16.650938] [ 16.650955] Memory state around the buggy address: [ 16.650984] fff00000c7766f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.651026] fff00000c7766f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.651068] >fff00000c7767000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.651113] ^ [ 16.651152] fff00000c7767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.651194] fff00000c7767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.651398] ==================================================================
[ 12.026587] ================================================================== [ 12.027581] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.028320] Write of size 1 at addr ffff888102c29a78 by task kunit_try_catch/153 [ 12.028616] [ 12.028711] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.028757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.028769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.028792] Call Trace: [ 12.028961] <TASK> [ 12.028985] dump_stack_lvl+0x73/0xb0 [ 12.029018] print_report+0xd1/0x650 [ 12.029041] ? __virt_addr_valid+0x1db/0x2d0 [ 12.029064] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.029085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.029108] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.029129] kasan_report+0x141/0x180 [ 12.029150] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.029176] __asan_report_store1_noabort+0x1b/0x30 [ 12.029201] kmalloc_oob_right+0x6bd/0x7f0 [ 12.029223] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.029245] ? __schedule+0x10cc/0x2b60 [ 12.029267] ? __pfx_read_tsc+0x10/0x10 [ 12.029289] ? ktime_get_ts64+0x86/0x230 [ 12.029314] kunit_try_run_case+0x1a5/0x480 [ 12.029339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.029361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.029385] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.029408] ? __kthread_parkme+0x82/0x180 [ 12.029429] ? preempt_count_sub+0x50/0x80 [ 12.029454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.029477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.029501] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.029526] kthread+0x337/0x6f0 [ 12.029545] ? trace_preempt_on+0x20/0xc0 [ 12.029569] ? __pfx_kthread+0x10/0x10 [ 12.029589] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.029625] ? calculate_sigpending+0x7b/0xa0 [ 12.029649] ? __pfx_kthread+0x10/0x10 [ 12.029670] ret_from_fork+0x116/0x1d0 [ 12.029688] ? __pfx_kthread+0x10/0x10 [ 12.029708] ret_from_fork_asm+0x1a/0x30 [ 12.029739] </TASK> [ 12.029750] [ 12.040878] Allocated by task 153: [ 12.041221] kasan_save_stack+0x45/0x70 [ 12.041443] kasan_save_track+0x18/0x40 [ 12.041590] kasan_save_alloc_info+0x3b/0x50 [ 12.041754] __kasan_kmalloc+0xb7/0xc0 [ 12.041940] __kmalloc_cache_noprof+0x189/0x420 [ 12.042165] kmalloc_oob_right+0xa9/0x7f0 [ 12.042526] kunit_try_run_case+0x1a5/0x480 [ 12.042741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.043040] kthread+0x337/0x6f0 [ 12.043258] ret_from_fork+0x116/0x1d0 [ 12.043448] ret_from_fork_asm+0x1a/0x30 [ 12.043653] [ 12.043736] The buggy address belongs to the object at ffff888102c29a00 [ 12.043736] which belongs to the cache kmalloc-128 of size 128 [ 12.044301] The buggy address is located 5 bytes to the right of [ 12.044301] allocated 115-byte region [ffff888102c29a00, ffff888102c29a73) [ 12.044878] [ 12.045181] The buggy address belongs to the physical page: [ 12.045404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29 [ 12.045691] flags: 0x200000000000000(node=0|zone=2) [ 12.045858] page_type: f5(slab) [ 12.046009] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.046346] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.046766] page dumped because: kasan: bad access detected [ 12.047088] [ 12.047183] Memory state around the buggy address: [ 12.047380] ffff888102c29900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.047616] ffff888102c29980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.048140] >ffff888102c29a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.048412] ^ [ 12.048665] ffff888102c29a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.048880] ffff888102c29b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.049194] ================================================================== [ 12.049745] ================================================================== [ 12.050250] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.050525] Read of size 1 at addr ffff888102c29a80 by task kunit_try_catch/153 [ 12.050969] [ 12.051090] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.051134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.051145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.051167] Call Trace: [ 12.051184] <TASK> [ 12.051201] dump_stack_lvl+0x73/0xb0 [ 12.051230] print_report+0xd1/0x650 [ 12.051252] ? __virt_addr_valid+0x1db/0x2d0 [ 12.051275] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.051296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.051318] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.051340] kasan_report+0x141/0x180 [ 12.051362] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.051387] __asan_report_load1_noabort+0x18/0x20 [ 12.051412] kmalloc_oob_right+0x68a/0x7f0 [ 12.051434] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.051456] ? __schedule+0x10cc/0x2b60 [ 12.051478] ? __pfx_read_tsc+0x10/0x10 [ 12.051499] ? ktime_get_ts64+0x86/0x230 [ 12.051523] kunit_try_run_case+0x1a5/0x480 [ 12.051546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.051569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.051606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.051630] ? __kthread_parkme+0x82/0x180 [ 12.051651] ? preempt_count_sub+0x50/0x80 [ 12.051675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.051699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.051723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.051748] kthread+0x337/0x6f0 [ 12.051766] ? trace_preempt_on+0x20/0xc0 [ 12.051802] ? __pfx_kthread+0x10/0x10 [ 12.051822] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.051843] ? calculate_sigpending+0x7b/0xa0 [ 12.051868] ? __pfx_kthread+0x10/0x10 [ 12.051889] ret_from_fork+0x116/0x1d0 [ 12.051907] ? __pfx_kthread+0x10/0x10 [ 12.051928] ret_from_fork_asm+0x1a/0x30 [ 12.051959] </TASK> [ 12.051969] [ 12.059319] Allocated by task 153: [ 12.059453] kasan_save_stack+0x45/0x70 [ 12.059611] kasan_save_track+0x18/0x40 [ 12.059747] kasan_save_alloc_info+0x3b/0x50 [ 12.059974] __kasan_kmalloc+0xb7/0xc0 [ 12.060159] __kmalloc_cache_noprof+0x189/0x420 [ 12.060490] kmalloc_oob_right+0xa9/0x7f0 [ 12.061064] kunit_try_run_case+0x1a5/0x480 [ 12.061273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.061536] kthread+0x337/0x6f0 [ 12.061694] ret_from_fork+0x116/0x1d0 [ 12.061971] ret_from_fork_asm+0x1a/0x30 [ 12.062115] [ 12.062186] The buggy address belongs to the object at ffff888102c29a00 [ 12.062186] which belongs to the cache kmalloc-128 of size 128 [ 12.062668] The buggy address is located 13 bytes to the right of [ 12.062668] allocated 115-byte region [ffff888102c29a00, ffff888102c29a73) [ 12.063216] [ 12.063293] The buggy address belongs to the physical page: [ 12.063523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29 [ 12.064091] flags: 0x200000000000000(node=0|zone=2) [ 12.064333] page_type: f5(slab) [ 12.064502] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.065098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.065351] page dumped because: kasan: bad access detected [ 12.065524] [ 12.065607] Memory state around the buggy address: [ 12.065954] ffff888102c29980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.066281] ffff888102c29a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.066561] >ffff888102c29a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.066784] ^ [ 12.066907] ffff888102c29b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.067247] ffff888102c29b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.067884] ================================================================== [ 11.995267] ================================================================== [ 11.996276] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.997284] Write of size 1 at addr ffff888102c29a73 by task kunit_try_catch/153 [ 11.997609] [ 11.998520] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.998957] Tainted: [N]=TEST [ 11.998994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.999221] Call Trace: [ 11.999287] <TASK> [ 11.999430] dump_stack_lvl+0x73/0xb0 [ 11.999519] print_report+0xd1/0x650 [ 11.999559] ? __virt_addr_valid+0x1db/0x2d0 [ 11.999585] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.999626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.999649] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.999670] kasan_report+0x141/0x180 [ 11.999704] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.999730] __asan_report_store1_noabort+0x1b/0x30 [ 11.999755] kmalloc_oob_right+0x6f0/0x7f0 [ 11.999830] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.999853] ? __schedule+0x10cc/0x2b60 [ 11.999876] ? __pfx_read_tsc+0x10/0x10 [ 11.999898] ? ktime_get_ts64+0x86/0x230 [ 11.999925] kunit_try_run_case+0x1a5/0x480 [ 11.999952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.999974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.999999] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.000022] ? __kthread_parkme+0x82/0x180 [ 12.000044] ? preempt_count_sub+0x50/0x80 [ 12.000069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.000093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.000117] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.000142] kthread+0x337/0x6f0 [ 12.000160] ? trace_preempt_on+0x20/0xc0 [ 12.000185] ? __pfx_kthread+0x10/0x10 [ 12.000204] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.000226] ? calculate_sigpending+0x7b/0xa0 [ 12.000250] ? __pfx_kthread+0x10/0x10 [ 12.000271] ret_from_fork+0x116/0x1d0 [ 12.000289] ? __pfx_kthread+0x10/0x10 [ 12.000309] ret_from_fork_asm+0x1a/0x30 [ 12.000372] </TASK> [ 12.000440] [ 12.009227] Allocated by task 153: [ 12.009572] kasan_save_stack+0x45/0x70 [ 12.009884] kasan_save_track+0x18/0x40 [ 12.010107] kasan_save_alloc_info+0x3b/0x50 [ 12.010324] __kasan_kmalloc+0xb7/0xc0 [ 12.010532] __kmalloc_cache_noprof+0x189/0x420 [ 12.010755] kmalloc_oob_right+0xa9/0x7f0 [ 12.011007] kunit_try_run_case+0x1a5/0x480 [ 12.011248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.011437] kthread+0x337/0x6f0 [ 12.011560] ret_from_fork+0x116/0x1d0 [ 12.011836] ret_from_fork_asm+0x1a/0x30 [ 12.012098] [ 12.012250] The buggy address belongs to the object at ffff888102c29a00 [ 12.012250] which belongs to the cache kmalloc-128 of size 128 [ 12.012902] The buggy address is located 0 bytes to the right of [ 12.012902] allocated 115-byte region [ffff888102c29a00, ffff888102c29a73) [ 12.013542] [ 12.015004] The buggy address belongs to the physical page: [ 12.016643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c29 [ 12.017507] flags: 0x200000000000000(node=0|zone=2) [ 12.018283] page_type: f5(slab) [ 12.018932] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.019263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.019824] page dumped because: kasan: bad access detected [ 12.020188] [ 12.020422] Memory state around the buggy address: [ 12.021110] ffff888102c29900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.021423] ffff888102c29980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.021953] >ffff888102c29a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.022443] ^ [ 12.022787] ffff888102c29a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.023320] ffff888102c29b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.023781] ==================================================================