Date
July 8, 2025, 7:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.945181] ================================================================== [ 18.945233] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 18.945281] Read of size 1 at addr fff00000c1d5fa80 by task kunit_try_catch/136 [ 18.945728] [ 18.945819] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.945930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.946170] Hardware name: linux,dummy-virt (DT) [ 18.946215] Call trace: [ 18.946383] show_stack+0x20/0x38 (C) [ 18.946444] dump_stack_lvl+0x8c/0xd0 [ 18.946624] print_report+0x118/0x608 [ 18.946830] kasan_report+0xdc/0x128 [ 18.946957] __asan_report_load1_noabort+0x20/0x30 [ 18.947044] kmalloc_oob_right+0x5d0/0x660 [ 18.947089] kunit_try_run_case+0x170/0x3f0 [ 18.947292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.947461] kthread+0x328/0x630 [ 18.947522] ret_from_fork+0x10/0x20 [ 18.947656] [ 18.947704] Allocated by task 136: [ 18.947744] kasan_save_stack+0x3c/0x68 [ 18.947792] kasan_save_track+0x20/0x40 [ 18.947829] kasan_save_alloc_info+0x40/0x58 [ 18.947867] __kasan_kmalloc+0xd4/0xd8 [ 18.947901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.947937] kmalloc_oob_right+0xb0/0x660 [ 18.947971] kunit_try_run_case+0x170/0x3f0 [ 18.948006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.948047] kthread+0x328/0x630 [ 18.948078] ret_from_fork+0x10/0x20 [ 18.948116] [ 18.948134] The buggy address belongs to the object at fff00000c1d5fa00 [ 18.948134] which belongs to the cache kmalloc-128 of size 128 [ 18.948188] The buggy address is located 13 bytes to the right of [ 18.948188] allocated 115-byte region [fff00000c1d5fa00, fff00000c1d5fa73) [ 18.948250] [ 18.948268] The buggy address belongs to the physical page: [ 18.948296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5f [ 18.948345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.948390] page_type: f5(slab) [ 18.948426] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.948474] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.948513] page dumped because: kasan: bad access detected [ 18.948542] [ 18.948559] Memory state around the buggy address: [ 18.948588] fff00000c1d5f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.948629] fff00000c1d5fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.948669] >fff00000c1d5fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.948706] ^ [ 18.948742] fff00000c1d5fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.949058] fff00000c1d5fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.949294] ================================================================== [ 18.937348] ================================================================== [ 18.937388] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 18.937434] Write of size 1 at addr fff00000c1d5fa78 by task kunit_try_catch/136 [ 18.937481] [ 18.937510] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.937586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.937744] Hardware name: linux,dummy-virt (DT) [ 18.937805] Call trace: [ 18.937827] show_stack+0x20/0x38 (C) [ 18.937884] dump_stack_lvl+0x8c/0xd0 [ 18.937929] print_report+0x118/0x608 [ 18.937982] kasan_report+0xdc/0x128 [ 18.938034] __asan_report_store1_noabort+0x20/0x30 [ 18.938084] kmalloc_oob_right+0x538/0x660 [ 18.938127] kunit_try_run_case+0x170/0x3f0 [ 18.938179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.938235] kthread+0x328/0x630 [ 18.938275] ret_from_fork+0x10/0x20 [ 18.938319] [ 18.938336] Allocated by task 136: [ 18.938363] kasan_save_stack+0x3c/0x68 [ 18.938401] kasan_save_track+0x20/0x40 [ 18.938445] kasan_save_alloc_info+0x40/0x58 [ 18.938489] __kasan_kmalloc+0xd4/0xd8 [ 18.938523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.938559] kmalloc_oob_right+0xb0/0x660 [ 18.938593] kunit_try_run_case+0x170/0x3f0 [ 18.938630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.938672] kthread+0x328/0x630 [ 18.938703] ret_from_fork+0x10/0x20 [ 18.939698] [ 18.939729] The buggy address belongs to the object at fff00000c1d5fa00 [ 18.939729] which belongs to the cache kmalloc-128 of size 128 [ 18.939785] The buggy address is located 5 bytes to the right of [ 18.939785] allocated 115-byte region [fff00000c1d5fa00, fff00000c1d5fa73) [ 18.940276] [ 18.940305] The buggy address belongs to the physical page: [ 18.940356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5f [ 18.940824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.941109] page_type: f5(slab) [ 18.941475] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.942243] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.942420] page dumped because: kasan: bad access detected [ 18.942530] [ 18.942600] Memory state around the buggy address: [ 18.942986] fff00000c1d5f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.943113] fff00000c1d5f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.943297] >fff00000c1d5fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.943336] ^ [ 18.943767] fff00000c1d5fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.943883] fff00000c1d5fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.943965] ================================================================== [ 18.928124] ================================================================== [ 18.928463] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.929286] Write of size 1 at addr fff00000c1d5fa73 by task kunit_try_catch/136 [ 18.929392] [ 18.930169] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT [ 18.930312] Tainted: [N]=TEST [ 18.930345] Hardware name: linux,dummy-virt (DT) [ 18.930561] Call trace: [ 18.930737] show_stack+0x20/0x38 (C) [ 18.930871] dump_stack_lvl+0x8c/0xd0 [ 18.930930] print_report+0x118/0x608 [ 18.930977] kasan_report+0xdc/0x128 [ 18.931021] __asan_report_store1_noabort+0x20/0x30 [ 18.931071] kmalloc_oob_right+0x5a4/0x660 [ 18.931115] kunit_try_run_case+0x170/0x3f0 [ 18.931165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.931216] kthread+0x328/0x630 [ 18.931259] ret_from_fork+0x10/0x20 [ 18.931409] [ 18.931863] Allocated by task 136: [ 18.932012] kasan_save_stack+0x3c/0x68 [ 18.932081] kasan_save_track+0x20/0x40 [ 18.932124] kasan_save_alloc_info+0x40/0x58 [ 18.932163] __kasan_kmalloc+0xd4/0xd8 [ 18.932197] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.932237] kmalloc_oob_right+0xb0/0x660 [ 18.932272] kunit_try_run_case+0x170/0x3f0 [ 18.932308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.932349] kthread+0x328/0x630 [ 18.932380] ret_from_fork+0x10/0x20 [ 18.932435] [ 18.932494] The buggy address belongs to the object at fff00000c1d5fa00 [ 18.932494] which belongs to the cache kmalloc-128 of size 128 [ 18.932586] The buggy address is located 0 bytes to the right of [ 18.932586] allocated 115-byte region [fff00000c1d5fa00, fff00000c1d5fa73) [ 18.932651] [ 18.932746] The buggy address belongs to the physical page: [ 18.932924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5f [ 18.933187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.933473] page_type: f5(slab) [ 18.933783] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.933848] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.933951] page dumped because: kasan: bad access detected [ 18.933990] [ 18.934015] Memory state around the buggy address: [ 18.934231] fff00000c1d5f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.934295] fff00000c1d5f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.934349] >fff00000c1d5fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.934401] ^ [ 18.934479] fff00000c1d5fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.934520] fff00000c1d5fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.934580] ==================================================================
[ 12.072827] ================================================================== [ 12.073153] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.073561] Write of size 1 at addr ffff888102602478 by task kunit_try_catch/153 [ 12.073902] [ 12.074023] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.074270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.074287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.074308] Call Trace: [ 12.074346] <TASK> [ 12.074364] dump_stack_lvl+0x73/0xb0 [ 12.074393] print_report+0xd1/0x650 [ 12.074414] ? __virt_addr_valid+0x1db/0x2d0 [ 12.074435] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.074454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.074479] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.074499] kasan_report+0x141/0x180 [ 12.074519] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.074544] __asan_report_store1_noabort+0x1b/0x30 [ 12.074567] kmalloc_oob_right+0x6bd/0x7f0 [ 12.074588] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.074629] ? __schedule+0x10cc/0x2b60 [ 12.074651] ? __pfx_read_tsc+0x10/0x10 [ 12.074670] ? ktime_get_ts64+0x86/0x230 [ 12.074695] kunit_try_run_case+0x1a5/0x480 [ 12.074717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.074738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.074760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.074799] ? __kthread_parkme+0x82/0x180 [ 12.074818] ? preempt_count_sub+0x50/0x80 [ 12.074840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.074863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.074884] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.074905] kthread+0x337/0x6f0 [ 12.074923] ? trace_preempt_on+0x20/0xc0 [ 12.074945] ? __pfx_kthread+0x10/0x10 [ 12.074964] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.074983] ? calculate_sigpending+0x7b/0xa0 [ 12.075007] ? __pfx_kthread+0x10/0x10 [ 12.075027] ret_from_fork+0x116/0x1d0 [ 12.075055] ? __pfx_kthread+0x10/0x10 [ 12.075075] ret_from_fork_asm+0x1a/0x30 [ 12.075106] </TASK> [ 12.075119] [ 12.083483] Allocated by task 153: [ 12.083682] kasan_save_stack+0x45/0x70 [ 12.083887] kasan_save_track+0x18/0x40 [ 12.084101] kasan_save_alloc_info+0x3b/0x50 [ 12.084439] __kasan_kmalloc+0xb7/0xc0 [ 12.084748] __kmalloc_cache_noprof+0x189/0x420 [ 12.084967] kmalloc_oob_right+0xa9/0x7f0 [ 12.085217] kunit_try_run_case+0x1a5/0x480 [ 12.085430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.085685] kthread+0x337/0x6f0 [ 12.086026] ret_from_fork+0x116/0x1d0 [ 12.086174] ret_from_fork_asm+0x1a/0x30 [ 12.086370] [ 12.086462] The buggy address belongs to the object at ffff888102602400 [ 12.086462] which belongs to the cache kmalloc-128 of size 128 [ 12.087417] The buggy address is located 5 bytes to the right of [ 12.087417] allocated 115-byte region [ffff888102602400, ffff888102602473) [ 12.088006] [ 12.088113] The buggy address belongs to the physical page: [ 12.088400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 12.088645] flags: 0x200000000000000(node=0|zone=2) [ 12.088973] page_type: f5(slab) [ 12.089289] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.089753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.090065] page dumped because: kasan: bad access detected [ 12.090237] [ 12.090307] Memory state around the buggy address: [ 12.090602] ffff888102602300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.090989] ffff888102602380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.091719] >ffff888102602400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.091942] ^ [ 12.092563] ffff888102602480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.093161] ffff888102602500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.093599] ================================================================== [ 12.038174] ================================================================== [ 12.039339] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 12.040859] Write of size 1 at addr ffff888102602473 by task kunit_try_catch/153 [ 12.042146] [ 12.043545] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.043899] Tainted: [N]=TEST [ 12.043930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.044175] Call Trace: [ 12.044243] <TASK> [ 12.044387] dump_stack_lvl+0x73/0xb0 [ 12.044475] print_report+0xd1/0x650 [ 12.044534] ? __virt_addr_valid+0x1db/0x2d0 [ 12.044561] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.044581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.044606] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.044626] kasan_report+0x141/0x180 [ 12.044647] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.044673] __asan_report_store1_noabort+0x1b/0x30 [ 12.044695] kmalloc_oob_right+0x6f0/0x7f0 [ 12.044716] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.044738] ? __schedule+0x10cc/0x2b60 [ 12.044760] ? __pfx_read_tsc+0x10/0x10 [ 12.044781] ? ktime_get_ts64+0x86/0x230 [ 12.044806] kunit_try_run_case+0x1a5/0x480 [ 12.044832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.044852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.044876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.044897] ? __kthread_parkme+0x82/0x180 [ 12.044918] ? preempt_count_sub+0x50/0x80 [ 12.044942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.044964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.044985] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.045007] kthread+0x337/0x6f0 [ 12.045026] ? trace_preempt_on+0x20/0xc0 [ 12.045077] ? __pfx_kthread+0x10/0x10 [ 12.045097] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.045117] ? calculate_sigpending+0x7b/0xa0 [ 12.045141] ? __pfx_kthread+0x10/0x10 [ 12.045161] ret_from_fork+0x116/0x1d0 [ 12.045179] ? __pfx_kthread+0x10/0x10 [ 12.045198] ret_from_fork_asm+0x1a/0x30 [ 12.045257] </TASK> [ 12.045322] [ 12.057872] Allocated by task 153: [ 12.058487] kasan_save_stack+0x45/0x70 [ 12.058829] kasan_save_track+0x18/0x40 [ 12.059191] kasan_save_alloc_info+0x3b/0x50 [ 12.059454] __kasan_kmalloc+0xb7/0xc0 [ 12.059664] __kmalloc_cache_noprof+0x189/0x420 [ 12.059950] kmalloc_oob_right+0xa9/0x7f0 [ 12.060260] kunit_try_run_case+0x1a5/0x480 [ 12.060446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.060810] kthread+0x337/0x6f0 [ 12.060977] ret_from_fork+0x116/0x1d0 [ 12.061338] ret_from_fork_asm+0x1a/0x30 [ 12.061651] [ 12.061840] The buggy address belongs to the object at ffff888102602400 [ 12.061840] which belongs to the cache kmalloc-128 of size 128 [ 12.062773] The buggy address is located 0 bytes to the right of [ 12.062773] allocated 115-byte region [ffff888102602400, ffff888102602473) [ 12.063779] [ 12.064238] The buggy address belongs to the physical page: [ 12.064745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 12.065451] flags: 0x200000000000000(node=0|zone=2) [ 12.066095] page_type: f5(slab) [ 12.066868] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.067346] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.067820] page dumped because: kasan: bad access detected [ 12.068084] [ 12.068213] Memory state around the buggy address: [ 12.068756] ffff888102602300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.069220] ffff888102602380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.069545] >ffff888102602400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.069951] ^ [ 12.070417] ffff888102602480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.070927] ffff888102602500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.071338] ================================================================== [ 12.094158] ================================================================== [ 12.094502] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.095545] Read of size 1 at addr ffff888102602480 by task kunit_try_catch/153 [ 12.095890] [ 12.096008] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.096067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.096079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.096100] Call Trace: [ 12.096115] <TASK> [ 12.096130] dump_stack_lvl+0x73/0xb0 [ 12.096156] print_report+0xd1/0x650 [ 12.096177] ? __virt_addr_valid+0x1db/0x2d0 [ 12.096197] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.096217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.096241] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.096262] kasan_report+0x141/0x180 [ 12.096283] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.096308] __asan_report_load1_noabort+0x18/0x20 [ 12.096330] kmalloc_oob_right+0x68a/0x7f0 [ 12.096350] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.096371] ? __schedule+0x10cc/0x2b60 [ 12.096392] ? __pfx_read_tsc+0x10/0x10 [ 12.096411] ? ktime_get_ts64+0x86/0x230 [ 12.096435] kunit_try_run_case+0x1a5/0x480 [ 12.096458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.096479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.096499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.096521] ? __kthread_parkme+0x82/0x180 [ 12.096539] ? preempt_count_sub+0x50/0x80 [ 12.096561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.096582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.096604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.096625] kthread+0x337/0x6f0 [ 12.096643] ? trace_preempt_on+0x20/0xc0 [ 12.096664] ? __pfx_kthread+0x10/0x10 [ 12.096683] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.096702] ? calculate_sigpending+0x7b/0xa0 [ 12.096725] ? __pfx_kthread+0x10/0x10 [ 12.096745] ret_from_fork+0x116/0x1d0 [ 12.096761] ? __pfx_kthread+0x10/0x10 [ 12.096780] ret_from_fork_asm+0x1a/0x30 [ 12.096810] </TASK> [ 12.096820] [ 12.108415] Allocated by task 153: [ 12.108766] kasan_save_stack+0x45/0x70 [ 12.109226] kasan_save_track+0x18/0x40 [ 12.109425] kasan_save_alloc_info+0x3b/0x50 [ 12.109662] __kasan_kmalloc+0xb7/0xc0 [ 12.109836] __kmalloc_cache_noprof+0x189/0x420 [ 12.110061] kmalloc_oob_right+0xa9/0x7f0 [ 12.110645] kunit_try_run_case+0x1a5/0x480 [ 12.110819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.111301] kthread+0x337/0x6f0 [ 12.111627] ret_from_fork+0x116/0x1d0 [ 12.111907] ret_from_fork_asm+0x1a/0x30 [ 12.112087] [ 12.112358] The buggy address belongs to the object at ffff888102602400 [ 12.112358] which belongs to the cache kmalloc-128 of size 128 [ 12.113024] The buggy address is located 13 bytes to the right of [ 12.113024] allocated 115-byte region [ffff888102602400, ffff888102602473) [ 12.113952] [ 12.114055] The buggy address belongs to the physical page: [ 12.114494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 12.114791] flags: 0x200000000000000(node=0|zone=2) [ 12.115031] page_type: f5(slab) [ 12.115201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.115922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.116418] page dumped because: kasan: bad access detected [ 12.116613] [ 12.116899] Memory state around the buggy address: [ 12.117279] ffff888102602380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.117884] ffff888102602400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.118426] >ffff888102602480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.118903] ^ [ 12.119185] ffff888102602500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.119646] ffff888102602580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.120034] ==================================================================