Date
July 10, 2025, 6:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.447804] ================================================================== [ 16.447865] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.447997] Read of size 1 at addr fff00000c46ebc80 by task kunit_try_catch/136 [ 16.448043] [ 16.448082] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.448160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.448185] Hardware name: linux,dummy-virt (DT) [ 16.448214] Call trace: [ 16.448234] show_stack+0x20/0x38 (C) [ 16.448281] dump_stack_lvl+0x8c/0xd0 [ 16.448389] print_report+0x118/0x608 [ 16.448499] kasan_report+0xdc/0x128 [ 16.448658] __asan_report_load1_noabort+0x20/0x30 [ 16.448771] kmalloc_oob_right+0x5d0/0x660 [ 16.448817] kunit_try_run_case+0x170/0x3f0 [ 16.448864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.448926] kthread+0x328/0x630 [ 16.449088] ret_from_fork+0x10/0x20 [ 16.449193] [ 16.449210] Allocated by task 136: [ 16.449236] kasan_save_stack+0x3c/0x68 [ 16.449280] kasan_save_track+0x20/0x40 [ 16.449317] kasan_save_alloc_info+0x40/0x58 [ 16.449365] __kasan_kmalloc+0xd4/0xd8 [ 16.449400] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.449438] kmalloc_oob_right+0xb0/0x660 [ 16.449473] kunit_try_run_case+0x170/0x3f0 [ 16.449510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.449648] kthread+0x328/0x630 [ 16.449686] ret_from_fork+0x10/0x20 [ 16.449818] [ 16.449836] The buggy address belongs to the object at fff00000c46ebc00 [ 16.449836] which belongs to the cache kmalloc-128 of size 128 [ 16.449905] The buggy address is located 13 bytes to the right of [ 16.449905] allocated 115-byte region [fff00000c46ebc00, fff00000c46ebc73) [ 16.449978] [ 16.449997] The buggy address belongs to the physical page: [ 16.450024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046eb [ 16.450072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.450117] page_type: f5(slab) [ 16.450191] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.450239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.450287] page dumped because: kasan: bad access detected [ 16.450409] [ 16.450532] Memory state around the buggy address: [ 16.450607] fff00000c46ebb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.450649] fff00000c46ebc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.450928] >fff00000c46ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.450969] ^ [ 16.450996] fff00000c46ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.451046] fff00000c46ebd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.451084] ================================================================== [ 16.444623] ================================================================== [ 16.444661] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.444708] Write of size 1 at addr fff00000c46ebc78 by task kunit_try_catch/136 [ 16.444764] [ 16.444913] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.445252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.445278] Hardware name: linux,dummy-virt (DT) [ 16.445369] Call trace: [ 16.445477] show_stack+0x20/0x38 (C) [ 16.445709] dump_stack_lvl+0x8c/0xd0 [ 16.445912] print_report+0x118/0x608 [ 16.445959] kasan_report+0xdc/0x128 [ 16.446004] __asan_report_store1_noabort+0x20/0x30 [ 16.446057] kmalloc_oob_right+0x538/0x660 [ 16.446104] kunit_try_run_case+0x170/0x3f0 [ 16.446165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.446218] kthread+0x328/0x630 [ 16.446259] ret_from_fork+0x10/0x20 [ 16.446306] [ 16.446323] Allocated by task 136: [ 16.446361] kasan_save_stack+0x3c/0x68 [ 16.446402] kasan_save_track+0x20/0x40 [ 16.446439] kasan_save_alloc_info+0x40/0x58 [ 16.446478] __kasan_kmalloc+0xd4/0xd8 [ 16.446513] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.446551] kmalloc_oob_right+0xb0/0x660 [ 16.446587] kunit_try_run_case+0x170/0x3f0 [ 16.446623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.446666] kthread+0x328/0x630 [ 16.446698] ret_from_fork+0x10/0x20 [ 16.446732] [ 16.446750] The buggy address belongs to the object at fff00000c46ebc00 [ 16.446750] which belongs to the cache kmalloc-128 of size 128 [ 16.446805] The buggy address is located 5 bytes to the right of [ 16.446805] allocated 115-byte region [fff00000c46ebc00, fff00000c46ebc73) [ 16.446865] [ 16.446884] The buggy address belongs to the physical page: [ 16.446912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046eb [ 16.446984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.447030] page_type: f5(slab) [ 16.447066] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.447126] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.447165] page dumped because: kasan: bad access detected [ 16.447194] [ 16.447211] Memory state around the buggy address: [ 16.447240] fff00000c46ebb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.447280] fff00000c46ebb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.447321] >fff00000c46ebc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.447365] ^ [ 16.447406] fff00000c46ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.447447] fff00000c46ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.447482] ================================================================== [ 16.437522] ================================================================== [ 16.437858] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.438786] Write of size 1 at addr fff00000c46ebc73 by task kunit_try_catch/136 [ 16.438893] [ 16.439659] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT [ 16.439803] Tainted: [N]=TEST [ 16.439834] Hardware name: linux,dummy-virt (DT) [ 16.440050] Call trace: [ 16.440226] show_stack+0x20/0x38 (C) [ 16.440376] dump_stack_lvl+0x8c/0xd0 [ 16.440442] print_report+0x118/0x608 [ 16.440491] kasan_report+0xdc/0x128 [ 16.440537] __asan_report_store1_noabort+0x20/0x30 [ 16.440589] kmalloc_oob_right+0x5a4/0x660 [ 16.440635] kunit_try_run_case+0x170/0x3f0 [ 16.440686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.440739] kthread+0x328/0x630 [ 16.440783] ret_from_fork+0x10/0x20 [ 16.440941] [ 16.440978] Allocated by task 136: [ 16.441088] kasan_save_stack+0x3c/0x68 [ 16.441151] kasan_save_track+0x20/0x40 [ 16.441188] kasan_save_alloc_info+0x40/0x58 [ 16.441228] __kasan_kmalloc+0xd4/0xd8 [ 16.441264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.441305] kmalloc_oob_right+0xb0/0x660 [ 16.441352] kunit_try_run_case+0x170/0x3f0 [ 16.441390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.441433] kthread+0x328/0x630 [ 16.441466] ret_from_fork+0x10/0x20 [ 16.441520] [ 16.441578] The buggy address belongs to the object at fff00000c46ebc00 [ 16.441578] which belongs to the cache kmalloc-128 of size 128 [ 16.441670] The buggy address is located 0 bytes to the right of [ 16.441670] allocated 115-byte region [fff00000c46ebc00, fff00000c46ebc73) [ 16.441737] [ 16.441821] The buggy address belongs to the physical page: [ 16.442035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046eb [ 16.442305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.442623] page_type: f5(slab) [ 16.442914] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.442978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.443080] page dumped because: kasan: bad access detected [ 16.443119] [ 16.443143] Memory state around the buggy address: [ 16.443376] fff00000c46ebb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.443448] fff00000c46ebb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.443499] >fff00000c46ebc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.443551] ^ [ 16.443631] fff00000c46ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.443674] fff00000c46ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.443734] ==================================================================
[ 11.832108] ================================================================== [ 11.832531] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.832972] Write of size 1 at addr ffff888102b0c378 by task kunit_try_catch/153 [ 11.833363] [ 11.833460] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.833501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.833512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.833534] Call Trace: [ 11.833546] <TASK> [ 11.833560] dump_stack_lvl+0x73/0xb0 [ 11.833589] print_report+0xd1/0x650 [ 11.833611] ? __virt_addr_valid+0x1db/0x2d0 [ 11.833633] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.833654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.833677] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.833699] kasan_report+0x141/0x180 [ 11.833720] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.833746] __asan_report_store1_noabort+0x1b/0x30 [ 11.833771] kmalloc_oob_right+0x6bd/0x7f0 [ 11.834043] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.834075] ? __schedule+0x10cc/0x2b60 [ 11.834099] ? __pfx_read_tsc+0x10/0x10 [ 11.834119] ? ktime_get_ts64+0x86/0x230 [ 11.834143] kunit_try_run_case+0x1a5/0x480 [ 11.834168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.834191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.834215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.834238] ? __kthread_parkme+0x82/0x180 [ 11.834258] ? preempt_count_sub+0x50/0x80 [ 11.834282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.834307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.834332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.834359] kthread+0x337/0x6f0 [ 11.834377] ? trace_preempt_on+0x20/0xc0 [ 11.834400] ? __pfx_kthread+0x10/0x10 [ 11.834420] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.834441] ? calculate_sigpending+0x7b/0xa0 [ 11.834464] ? __pfx_kthread+0x10/0x10 [ 11.834485] ret_from_fork+0x116/0x1d0 [ 11.834503] ? __pfx_kthread+0x10/0x10 [ 11.834523] ret_from_fork_asm+0x1a/0x30 [ 11.834552] </TASK> [ 11.834562] [ 11.843488] Allocated by task 153: [ 11.843620] kasan_save_stack+0x45/0x70 [ 11.844202] kasan_save_track+0x18/0x40 [ 11.844600] kasan_save_alloc_info+0x3b/0x50 [ 11.844802] __kasan_kmalloc+0xb7/0xc0 [ 11.845187] __kmalloc_cache_noprof+0x189/0x420 [ 11.845359] kmalloc_oob_right+0xa9/0x7f0 [ 11.845668] kunit_try_run_case+0x1a5/0x480 [ 11.845955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.846245] kthread+0x337/0x6f0 [ 11.846413] ret_from_fork+0x116/0x1d0 [ 11.846576] ret_from_fork_asm+0x1a/0x30 [ 11.846734] [ 11.847179] The buggy address belongs to the object at ffff888102b0c300 [ 11.847179] which belongs to the cache kmalloc-128 of size 128 [ 11.847643] The buggy address is located 5 bytes to the right of [ 11.847643] allocated 115-byte region [ffff888102b0c300, ffff888102b0c373) [ 11.848491] [ 11.848603] The buggy address belongs to the physical page: [ 11.848836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0c [ 11.849457] flags: 0x200000000000000(node=0|zone=2) [ 11.849890] page_type: f5(slab) [ 11.850092] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.850388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.850709] page dumped because: kasan: bad access detected [ 11.851155] [ 11.851261] Memory state around the buggy address: [ 11.851513] ffff888102b0c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.852268] ffff888102b0c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.852574] >ffff888102b0c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.853114] ^ [ 11.853698] ffff888102b0c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.854327] ffff888102b0c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.854740] ================================================================== [ 11.798747] ================================================================== [ 11.799700] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.800422] Write of size 1 at addr ffff888102b0c373 by task kunit_try_catch/153 [ 11.800867] [ 11.802312] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.802660] Tainted: [N]=TEST [ 11.802692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.802904] Call Trace: [ 11.802968] <TASK> [ 11.803120] dump_stack_lvl+0x73/0xb0 [ 11.803206] print_report+0xd1/0x650 [ 11.803234] ? __virt_addr_valid+0x1db/0x2d0 [ 11.803259] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.803279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.803302] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.803323] kasan_report+0x141/0x180 [ 11.803344] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.803370] __asan_report_store1_noabort+0x1b/0x30 [ 11.803395] kmalloc_oob_right+0x6f0/0x7f0 [ 11.803416] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.803438] ? __schedule+0x10cc/0x2b60 [ 11.803461] ? __pfx_read_tsc+0x10/0x10 [ 11.803483] ? ktime_get_ts64+0x86/0x230 [ 11.803508] kunit_try_run_case+0x1a5/0x480 [ 11.803535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.803558] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.803582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.803605] ? __kthread_parkme+0x82/0x180 [ 11.803627] ? preempt_count_sub+0x50/0x80 [ 11.803651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.803676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.803701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.803727] kthread+0x337/0x6f0 [ 11.803745] ? trace_preempt_on+0x20/0xc0 [ 11.803769] ? __pfx_kthread+0x10/0x10 [ 11.803789] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.803827] ? calculate_sigpending+0x7b/0xa0 [ 11.803852] ? __pfx_kthread+0x10/0x10 [ 11.803873] ret_from_fork+0x116/0x1d0 [ 11.803890] ? __pfx_kthread+0x10/0x10 [ 11.803911] ret_from_fork_asm+0x1a/0x30 [ 11.803980] </TASK> [ 11.804053] [ 11.814577] Allocated by task 153: [ 11.815336] kasan_save_stack+0x45/0x70 [ 11.815556] kasan_save_track+0x18/0x40 [ 11.815993] kasan_save_alloc_info+0x3b/0x50 [ 11.816336] __kasan_kmalloc+0xb7/0xc0 [ 11.816670] __kmalloc_cache_noprof+0x189/0x420 [ 11.817105] kmalloc_oob_right+0xa9/0x7f0 [ 11.817311] kunit_try_run_case+0x1a5/0x480 [ 11.817514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.817735] kthread+0x337/0x6f0 [ 11.817901] ret_from_fork+0x116/0x1d0 [ 11.818607] ret_from_fork_asm+0x1a/0x30 [ 11.819275] [ 11.819439] The buggy address belongs to the object at ffff888102b0c300 [ 11.819439] which belongs to the cache kmalloc-128 of size 128 [ 11.820411] The buggy address is located 0 bytes to the right of [ 11.820411] allocated 115-byte region [ffff888102b0c300, ffff888102b0c373) [ 11.821369] [ 11.821852] The buggy address belongs to the physical page: [ 11.822746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0c [ 11.823563] flags: 0x200000000000000(node=0|zone=2) [ 11.824278] page_type: f5(slab) [ 11.825159] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.825480] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.826364] page dumped because: kasan: bad access detected [ 11.826642] [ 11.826747] Memory state around the buggy address: [ 11.827598] ffff888102b0c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.828027] ffff888102b0c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.828512] >ffff888102b0c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.829074] ^ [ 11.829549] ffff888102b0c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.829998] ffff888102b0c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.830507] ================================================================== [ 11.855499] ================================================================== [ 11.855809] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.856873] Read of size 1 at addr ffff888102b0c380 by task kunit_try_catch/153 [ 11.857263] [ 11.857366] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.857613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.857627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.857649] Call Trace: [ 11.857660] <TASK> [ 11.857674] dump_stack_lvl+0x73/0xb0 [ 11.857702] print_report+0xd1/0x650 [ 11.857723] ? __virt_addr_valid+0x1db/0x2d0 [ 11.857745] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.857765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.857788] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.857961] kasan_report+0x141/0x180 [ 11.857996] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.858023] __asan_report_load1_noabort+0x18/0x20 [ 11.858063] kmalloc_oob_right+0x68a/0x7f0 [ 11.858085] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.858107] ? __schedule+0x10cc/0x2b60 [ 11.858129] ? __pfx_read_tsc+0x10/0x10 [ 11.858148] ? ktime_get_ts64+0x86/0x230 [ 11.858172] kunit_try_run_case+0x1a5/0x480 [ 11.858196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.858219] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.858242] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.858265] ? __kthread_parkme+0x82/0x180 [ 11.858285] ? preempt_count_sub+0x50/0x80 [ 11.858308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.858332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.858357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.858383] kthread+0x337/0x6f0 [ 11.858401] ? trace_preempt_on+0x20/0xc0 [ 11.858423] ? __pfx_kthread+0x10/0x10 [ 11.858443] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.858464] ? calculate_sigpending+0x7b/0xa0 [ 11.858487] ? __pfx_kthread+0x10/0x10 [ 11.858508] ret_from_fork+0x116/0x1d0 [ 11.858526] ? __pfx_kthread+0x10/0x10 [ 11.858545] ret_from_fork_asm+0x1a/0x30 [ 11.858575] </TASK> [ 11.858585] [ 11.869205] Allocated by task 153: [ 11.869654] kasan_save_stack+0x45/0x70 [ 11.869911] kasan_save_track+0x18/0x40 [ 11.870329] kasan_save_alloc_info+0x3b/0x50 [ 11.870620] __kasan_kmalloc+0xb7/0xc0 [ 11.870974] __kmalloc_cache_noprof+0x189/0x420 [ 11.871415] kmalloc_oob_right+0xa9/0x7f0 [ 11.871905] kunit_try_run_case+0x1a5/0x480 [ 11.872091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.872514] kthread+0x337/0x6f0 [ 11.872792] ret_from_fork+0x116/0x1d0 [ 11.873167] ret_from_fork_asm+0x1a/0x30 [ 11.873370] [ 11.873455] The buggy address belongs to the object at ffff888102b0c300 [ 11.873455] which belongs to the cache kmalloc-128 of size 128 [ 11.873986] The buggy address is located 13 bytes to the right of [ 11.873986] allocated 115-byte region [ffff888102b0c300, ffff888102b0c373) [ 11.874519] [ 11.874610] The buggy address belongs to the physical page: [ 11.874857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0c [ 11.875651] flags: 0x200000000000000(node=0|zone=2) [ 11.876100] page_type: f5(slab) [ 11.876278] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.876950] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.877386] page dumped because: kasan: bad access detected [ 11.877631] [ 11.877714] Memory state around the buggy address: [ 11.878184] ffff888102b0c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.878568] ffff888102b0c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.878946] >ffff888102b0c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.879338] ^ [ 11.879738] ffff888102b0c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.880111] ffff888102b0c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.880574] ==================================================================