Date
July 16, 2025, 3:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.357220] ================================================================== [ 16.357260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.357307] Write of size 1 at addr fff00000c6554778 by task kunit_try_catch/136 [ 16.357367] [ 16.357398] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.357478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.357503] Hardware name: linux,dummy-virt (DT) [ 16.357532] Call trace: [ 16.357553] show_stack+0x20/0x38 (C) [ 16.357600] dump_stack_lvl+0x8c/0xd0 [ 16.357646] print_report+0x118/0x5d0 [ 16.357691] kasan_report+0xdc/0x128 [ 16.357766] __asan_report_store1_noabort+0x20/0x30 [ 16.357826] kmalloc_oob_right+0x538/0x660 [ 16.357880] kunit_try_run_case+0x170/0x3f0 [ 16.357927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.357979] kthread+0x328/0x630 [ 16.358019] ret_from_fork+0x10/0x20 [ 16.358065] [ 16.358092] Allocated by task 136: [ 16.358119] kasan_save_stack+0x3c/0x68 [ 16.358158] kasan_save_track+0x20/0x40 [ 16.358195] kasan_save_alloc_info+0x40/0x58 [ 16.358234] __kasan_kmalloc+0xd4/0xd8 [ 16.358274] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.358317] kmalloc_oob_right+0xb0/0x660 [ 16.358352] kunit_try_run_case+0x170/0x3f0 [ 16.358396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.358439] kthread+0x328/0x630 [ 16.358470] ret_from_fork+0x10/0x20 [ 16.358504] [ 16.358522] The buggy address belongs to the object at fff00000c6554700 [ 16.358522] which belongs to the cache kmalloc-128 of size 128 [ 16.358587] The buggy address is located 5 bytes to the right of [ 16.358587] allocated 115-byte region [fff00000c6554700, fff00000c6554773) [ 16.358652] [ 16.358670] The buggy address belongs to the physical page: [ 16.358699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554 [ 16.359014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.359083] page_type: f5(slab) [ 16.359359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.359417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.359471] page dumped because: kasan: bad access detected [ 16.359501] [ 16.359519] Memory state around the buggy address: [ 16.360193] fff00000c6554600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.360238] fff00000c6554680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360280] >fff00000c6554700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.360318] ^ [ 16.360357] fff00000c6554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360398] fff00000c6554800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360435] ================================================================== [ 16.360779] ================================================================== [ 16.360830] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.360876] Read of size 1 at addr fff00000c6554780 by task kunit_try_catch/136 [ 16.360931] [ 16.360959] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.361037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.361063] Hardware name: linux,dummy-virt (DT) [ 16.361091] Call trace: [ 16.361111] show_stack+0x20/0x38 (C) [ 16.361157] dump_stack_lvl+0x8c/0xd0 [ 16.361276] print_report+0x118/0x5d0 [ 16.361352] kasan_report+0xdc/0x128 [ 16.361432] __asan_report_load1_noabort+0x20/0x30 [ 16.361498] kmalloc_oob_right+0x5d0/0x660 [ 16.361563] kunit_try_run_case+0x170/0x3f0 [ 16.361635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.361689] kthread+0x328/0x630 [ 16.361768] ret_from_fork+0x10/0x20 [ 16.361834] [ 16.361860] Allocated by task 136: [ 16.361887] kasan_save_stack+0x3c/0x68 [ 16.361927] kasan_save_track+0x20/0x40 [ 16.361963] kasan_save_alloc_info+0x40/0x58 [ 16.362002] __kasan_kmalloc+0xd4/0xd8 [ 16.362177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.362231] kmalloc_oob_right+0xb0/0x660 [ 16.362267] kunit_try_run_case+0x170/0x3f0 [ 16.362369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.362416] kthread+0x328/0x630 [ 16.362448] ret_from_fork+0x10/0x20 [ 16.362482] [ 16.362927] The buggy address belongs to the object at fff00000c6554700 [ 16.362927] which belongs to the cache kmalloc-128 of size 128 [ 16.363035] The buggy address is located 13 bytes to the right of [ 16.363035] allocated 115-byte region [fff00000c6554700, fff00000c6554773) [ 16.363122] [ 16.363181] The buggy address belongs to the physical page: [ 16.363219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554 [ 16.363314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.363360] page_type: f5(slab) [ 16.363396] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.363445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.363484] page dumped because: kasan: bad access detected [ 16.363646] [ 16.363663] Memory state around the buggy address: [ 16.363694] fff00000c6554680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.363818] fff00000c6554700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.363891] >fff00000c6554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.363968] ^ [ 16.364057] fff00000c6554800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.364129] fff00000c6554880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.364210] ================================================================== [ 16.349802] ================================================================== [ 16.350544] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.351480] Write of size 1 at addr fff00000c6554773 by task kunit_try_catch/136 [ 16.351588] [ 16.352342] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 16.352488] Tainted: [N]=TEST [ 16.352520] Hardware name: linux,dummy-virt (DT) [ 16.352770] Call trace: [ 16.352944] show_stack+0x20/0x38 (C) [ 16.353079] dump_stack_lvl+0x8c/0xd0 [ 16.353142] print_report+0x118/0x5d0 [ 16.353191] kasan_report+0xdc/0x128 [ 16.353237] __asan_report_store1_noabort+0x20/0x30 [ 16.353289] kmalloc_oob_right+0x5a4/0x660 [ 16.353335] kunit_try_run_case+0x170/0x3f0 [ 16.353387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.353439] kthread+0x328/0x630 [ 16.353483] ret_from_fork+0x10/0x20 [ 16.353637] [ 16.353674] Allocated by task 136: [ 16.353816] kasan_save_stack+0x3c/0x68 [ 16.353885] kasan_save_track+0x20/0x40 [ 16.353922] kasan_save_alloc_info+0x40/0x58 [ 16.353961] __kasan_kmalloc+0xd4/0xd8 [ 16.353997] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.354037] kmalloc_oob_right+0xb0/0x660 [ 16.354072] kunit_try_run_case+0x170/0x3f0 [ 16.354110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.354153] kthread+0x328/0x630 [ 16.354185] ret_from_fork+0x10/0x20 [ 16.354238] [ 16.354296] The buggy address belongs to the object at fff00000c6554700 [ 16.354296] which belongs to the cache kmalloc-128 of size 128 [ 16.354388] The buggy address is located 0 bytes to the right of [ 16.354388] allocated 115-byte region [fff00000c6554700, fff00000c6554773) [ 16.354456] [ 16.354533] The buggy address belongs to the physical page: [ 16.354738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554 [ 16.355010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.355297] page_type: f5(slab) [ 16.355583] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.355647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.355768] page dumped because: kasan: bad access detected [ 16.355809] [ 16.355834] Memory state around the buggy address: [ 16.356056] fff00000c6554600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.356120] fff00000c6554680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.356174] >fff00000c6554700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.356227] ^ [ 16.356308] fff00000c6554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.356350] fff00000c6554800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.356410] ==================================================================
[ 11.819697] ================================================================== [ 11.820926] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.821546] Write of size 1 at addr ffff88810305bc73 by task kunit_try_catch/153 [ 11.821944] [ 11.823213] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.823584] Tainted: [N]=TEST [ 11.823617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.823844] Call Trace: [ 11.823911] <TASK> [ 11.824073] dump_stack_lvl+0x73/0xb0 [ 11.824161] print_report+0xd1/0x610 [ 11.824191] ? __virt_addr_valid+0x1db/0x2d0 [ 11.824217] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.824238] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.824261] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.824283] kasan_report+0x141/0x180 [ 11.824305] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.824331] __asan_report_store1_noabort+0x1b/0x30 [ 11.824357] kmalloc_oob_right+0x6f0/0x7f0 [ 11.824379] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.824402] ? __schedule+0x10cc/0x2b60 [ 11.824424] ? __pfx_read_tsc+0x10/0x10 [ 11.824816] ? ktime_get_ts64+0x86/0x230 [ 11.824847] kunit_try_run_case+0x1a5/0x480 [ 11.824875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.824898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.824923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.824947] ? __kthread_parkme+0x82/0x180 [ 11.824969] ? preempt_count_sub+0x50/0x80 [ 11.825042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.825066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.825091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.825117] kthread+0x337/0x6f0 [ 11.825136] ? trace_preempt_on+0x20/0xc0 [ 11.825160] ? __pfx_kthread+0x10/0x10 [ 11.825181] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.825202] ? calculate_sigpending+0x7b/0xa0 [ 11.825228] ? __pfx_kthread+0x10/0x10 [ 11.825249] ret_from_fork+0x116/0x1d0 [ 11.825268] ? __pfx_kthread+0x10/0x10 [ 11.825288] ret_from_fork_asm+0x1a/0x30 [ 11.825355] </TASK> [ 11.825427] [ 11.837241] Allocated by task 153: [ 11.837509] kasan_save_stack+0x45/0x70 [ 11.837677] kasan_save_track+0x18/0x40 [ 11.837962] kasan_save_alloc_info+0x3b/0x50 [ 11.838336] __kasan_kmalloc+0xb7/0xc0 [ 11.838476] __kmalloc_cache_noprof+0x189/0x420 [ 11.838927] kmalloc_oob_right+0xa9/0x7f0 [ 11.839312] kunit_try_run_case+0x1a5/0x480 [ 11.839522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.840179] kthread+0x337/0x6f0 [ 11.840543] ret_from_fork+0x116/0x1d0 [ 11.840847] ret_from_fork_asm+0x1a/0x30 [ 11.841116] [ 11.841349] The buggy address belongs to the object at ffff88810305bc00 [ 11.841349] which belongs to the cache kmalloc-128 of size 128 [ 11.842460] The buggy address is located 0 bytes to the right of [ 11.842460] allocated 115-byte region [ffff88810305bc00, ffff88810305bc73) [ 11.843418] [ 11.843704] The buggy address belongs to the physical page: [ 11.844428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b [ 11.845178] flags: 0x200000000000000(node=0|zone=2) [ 11.846203] page_type: f5(slab) [ 11.846926] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.847695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.848402] page dumped because: kasan: bad access detected [ 11.848591] [ 11.848668] Memory state around the buggy address: [ 11.849232] ffff88810305bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.849954] ffff88810305bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.850819] >ffff88810305bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.851674] ^ [ 11.852282] ffff88810305bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.852520] ffff88810305bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.853256] ================================================================== [ 11.855804] ================================================================== [ 11.856127] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.856596] Write of size 1 at addr ffff88810305bc78 by task kunit_try_catch/153 [ 11.857214] [ 11.857481] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.857532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.857543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.857563] Call Trace: [ 11.857575] <TASK> [ 11.857589] dump_stack_lvl+0x73/0xb0 [ 11.857619] print_report+0xd1/0x610 [ 11.857641] ? __virt_addr_valid+0x1db/0x2d0 [ 11.857664] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.857685] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.857708] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.857730] kasan_report+0x141/0x180 [ 11.857765] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.857791] __asan_report_store1_noabort+0x1b/0x30 [ 11.857816] kmalloc_oob_right+0x6bd/0x7f0 [ 11.857838] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.857861] ? __schedule+0x10cc/0x2b60 [ 11.857883] ? __pfx_read_tsc+0x10/0x10 [ 11.857903] ? ktime_get_ts64+0x86/0x230 [ 11.857927] kunit_try_run_case+0x1a5/0x480 [ 11.857951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.857986] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.858010] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.858035] ? __kthread_parkme+0x82/0x180 [ 11.858055] ? preempt_count_sub+0x50/0x80 [ 11.858078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.858102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.858127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.858151] kthread+0x337/0x6f0 [ 11.858170] ? trace_preempt_on+0x20/0xc0 [ 11.858194] ? __pfx_kthread+0x10/0x10 [ 11.858214] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.858235] ? calculate_sigpending+0x7b/0xa0 [ 11.858260] ? __pfx_kthread+0x10/0x10 [ 11.858281] ret_from_fork+0x116/0x1d0 [ 11.858300] ? __pfx_kthread+0x10/0x10 [ 11.858320] ret_from_fork_asm+0x1a/0x30 [ 11.858350] </TASK> [ 11.858359] [ 11.868698] Allocated by task 153: [ 11.868977] kasan_save_stack+0x45/0x70 [ 11.869393] kasan_save_track+0x18/0x40 [ 11.869664] kasan_save_alloc_info+0x3b/0x50 [ 11.869844] __kasan_kmalloc+0xb7/0xc0 [ 11.870333] __kmalloc_cache_noprof+0x189/0x420 [ 11.870604] kmalloc_oob_right+0xa9/0x7f0 [ 11.870922] kunit_try_run_case+0x1a5/0x480 [ 11.871275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.871735] kthread+0x337/0x6f0 [ 11.872055] ret_from_fork+0x116/0x1d0 [ 11.872243] ret_from_fork_asm+0x1a/0x30 [ 11.872655] [ 11.872743] The buggy address belongs to the object at ffff88810305bc00 [ 11.872743] which belongs to the cache kmalloc-128 of size 128 [ 11.873805] The buggy address is located 5 bytes to the right of [ 11.873805] allocated 115-byte region [ffff88810305bc00, ffff88810305bc73) [ 11.874563] [ 11.874672] The buggy address belongs to the physical page: [ 11.875096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b [ 11.875673] flags: 0x200000000000000(node=0|zone=2) [ 11.876106] page_type: f5(slab) [ 11.876376] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.876847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.877438] page dumped because: kasan: bad access detected [ 11.877683] [ 11.877792] Memory state around the buggy address: [ 11.878273] ffff88810305bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.878636] ffff88810305bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.879101] >ffff88810305bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.879549] ^ [ 11.879955] ffff88810305bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.880509] ffff88810305bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.881029] ================================================================== [ 11.881771] ================================================================== [ 11.882260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.883036] Read of size 1 at addr ffff88810305bc80 by task kunit_try_catch/153 [ 11.883549] [ 11.883657] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.883941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.883955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.884012] Call Trace: [ 11.884027] <TASK> [ 11.884041] dump_stack_lvl+0x73/0xb0 [ 11.884072] print_report+0xd1/0x610 [ 11.884094] ? __virt_addr_valid+0x1db/0x2d0 [ 11.884116] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.884137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.884161] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.884183] kasan_report+0x141/0x180 [ 11.884205] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.884231] __asan_report_load1_noabort+0x18/0x20 [ 11.884255] kmalloc_oob_right+0x68a/0x7f0 [ 11.884277] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.884300] ? __schedule+0x10cc/0x2b60 [ 11.884323] ? __pfx_read_tsc+0x10/0x10 [ 11.884344] ? ktime_get_ts64+0x86/0x230 [ 11.884368] kunit_try_run_case+0x1a5/0x480 [ 11.884392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.884414] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.884450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.884474] ? __kthread_parkme+0x82/0x180 [ 11.884494] ? preempt_count_sub+0x50/0x80 [ 11.884518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.884542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.884566] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.884591] kthread+0x337/0x6f0 [ 11.884609] ? trace_preempt_on+0x20/0xc0 [ 11.884632] ? __pfx_kthread+0x10/0x10 [ 11.884652] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.884673] ? calculate_sigpending+0x7b/0xa0 [ 11.884698] ? __pfx_kthread+0x10/0x10 [ 11.884719] ret_from_fork+0x116/0x1d0 [ 11.884737] ? __pfx_kthread+0x10/0x10 [ 11.884769] ret_from_fork_asm+0x1a/0x30 [ 11.884799] </TASK> [ 11.884808] [ 11.895971] Allocated by task 153: [ 11.896495] kasan_save_stack+0x45/0x70 [ 11.896689] kasan_save_track+0x18/0x40 [ 11.896854] kasan_save_alloc_info+0x3b/0x50 [ 11.897425] __kasan_kmalloc+0xb7/0xc0 [ 11.897617] __kmalloc_cache_noprof+0x189/0x420 [ 11.897922] kmalloc_oob_right+0xa9/0x7f0 [ 11.898358] kunit_try_run_case+0x1a5/0x480 [ 11.898680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.899046] kthread+0x337/0x6f0 [ 11.899217] ret_from_fork+0x116/0x1d0 [ 11.899393] ret_from_fork_asm+0x1a/0x30 [ 11.899923] [ 11.900054] The buggy address belongs to the object at ffff88810305bc00 [ 11.900054] which belongs to the cache kmalloc-128 of size 128 [ 11.900866] The buggy address is located 13 bytes to the right of [ 11.900866] allocated 115-byte region [ffff88810305bc00, ffff88810305bc73) [ 11.901866] [ 11.901974] The buggy address belongs to the physical page: [ 11.902457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305b [ 11.903190] flags: 0x200000000000000(node=0|zone=2) [ 11.903646] page_type: f5(slab) [ 11.903787] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.904029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.904258] page dumped because: kasan: bad access detected [ 11.904431] [ 11.904503] Memory state around the buggy address: [ 11.904661] ffff88810305bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.904942] ffff88810305bc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.905163] >ffff88810305bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.905484] ^ [ 11.905652] ffff88810305bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.906028] ffff88810305bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.906661] ==================================================================