Date
July 4, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.675871] ================================================================== [ 17.675917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.675967] Write of size 1 at addr fff00000c638e778 by task kunit_try_catch/136 [ 17.676014] [ 17.676058] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.676171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.676201] Hardware name: linux,dummy-virt (DT) [ 17.676231] Call trace: [ 17.676252] show_stack+0x20/0x38 (C) [ 17.676467] dump_stack_lvl+0x8c/0xd0 [ 17.676579] print_report+0x118/0x608 [ 17.676703] kasan_report+0xdc/0x128 [ 17.676929] __asan_report_store1_noabort+0x20/0x30 [ 17.677004] kmalloc_oob_right+0x538/0x660 [ 17.677214] kunit_try_run_case+0x170/0x3f0 [ 17.677315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.677475] kthread+0x328/0x630 [ 17.677516] ret_from_fork+0x10/0x20 [ 17.677563] [ 17.677587] Allocated by task 136: [ 17.677691] kasan_save_stack+0x3c/0x68 [ 17.677771] kasan_save_track+0x20/0x40 [ 17.678123] kasan_save_alloc_info+0x40/0x58 [ 17.678242] __kasan_kmalloc+0xd4/0xd8 [ 17.678365] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.678403] kmalloc_oob_right+0xb0/0x660 [ 17.678438] kunit_try_run_case+0x170/0x3f0 [ 17.678474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.678515] kthread+0x328/0x630 [ 17.678972] ret_from_fork+0x10/0x20 [ 17.679025] [ 17.679044] The buggy address belongs to the object at fff00000c638e700 [ 17.679044] which belongs to the cache kmalloc-128 of size 128 [ 17.679213] The buggy address is located 5 bytes to the right of [ 17.679213] allocated 115-byte region [fff00000c638e700, fff00000c638e773) [ 17.679280] [ 17.679299] The buggy address belongs to the physical page: [ 17.679328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e [ 17.679378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.679422] page_type: f5(slab) [ 17.679458] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.679506] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.679544] page dumped because: kasan: bad access detected [ 17.679573] [ 17.679591] Memory state around the buggy address: [ 17.679623] fff00000c638e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.679665] fff00000c638e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.679705] >fff00000c638e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.679740] ^ [ 17.679778] fff00000c638e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.679828] fff00000c638e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.679867] ================================================================== [ 17.664002] ================================================================== [ 17.664366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.665846] Write of size 1 at addr fff00000c638e773 by task kunit_try_catch/136 [ 17.665959] [ 17.667077] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 17.667419] Tainted: [N]=TEST [ 17.667454] Hardware name: linux,dummy-virt (DT) [ 17.667684] Call trace: [ 17.668102] show_stack+0x20/0x38 (C) [ 17.668453] dump_stack_lvl+0x8c/0xd0 [ 17.668668] print_report+0x118/0x608 [ 17.668740] kasan_report+0xdc/0x128 [ 17.668784] __asan_report_store1_noabort+0x20/0x30 [ 17.669290] kmalloc_oob_right+0x5a4/0x660 [ 17.669382] kunit_try_run_case+0x170/0x3f0 [ 17.669433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.669484] kthread+0x328/0x630 [ 17.669527] ret_from_fork+0x10/0x20 [ 17.669783] [ 17.669837] Allocated by task 136: [ 17.670030] kasan_save_stack+0x3c/0x68 [ 17.670115] kasan_save_track+0x20/0x40 [ 17.670155] kasan_save_alloc_info+0x40/0x58 [ 17.670228] __kasan_kmalloc+0xd4/0xd8 [ 17.670265] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.670305] kmalloc_oob_right+0xb0/0x660 [ 17.670339] kunit_try_run_case+0x170/0x3f0 [ 17.670375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.670416] kthread+0x328/0x630 [ 17.670477] ret_from_fork+0x10/0x20 [ 17.670537] [ 17.670599] The buggy address belongs to the object at fff00000c638e700 [ 17.670599] which belongs to the cache kmalloc-128 of size 128 [ 17.670994] The buggy address is located 0 bytes to the right of [ 17.670994] allocated 115-byte region [fff00000c638e700, fff00000c638e773) [ 17.671081] [ 17.671190] The buggy address belongs to the physical page: [ 17.671446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e [ 17.672037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.672447] page_type: f5(slab) [ 17.672878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.673034] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.673241] page dumped because: kasan: bad access detected [ 17.673425] [ 17.673453] Memory state around the buggy address: [ 17.674220] fff00000c638e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.674325] fff00000c638e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.674380] >fff00000c638e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.674503] ^ [ 17.674714] fff00000c638e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.674795] fff00000c638e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.674876] ================================================================== [ 17.680724] ================================================================== [ 17.680768] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.680828] Read of size 1 at addr fff00000c638e780 by task kunit_try_catch/136 [ 17.680874] [ 17.680902] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.680992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.681018] Hardware name: linux,dummy-virt (DT) [ 17.681047] Call trace: [ 17.681068] show_stack+0x20/0x38 (C) [ 17.681291] dump_stack_lvl+0x8c/0xd0 [ 17.681517] print_report+0x118/0x608 [ 17.681706] kasan_report+0xdc/0x128 [ 17.681750] __asan_report_load1_noabort+0x20/0x30 [ 17.681994] kmalloc_oob_right+0x5d0/0x660 [ 17.682041] kunit_try_run_case+0x170/0x3f0 [ 17.682244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.682485] kthread+0x328/0x630 [ 17.682567] ret_from_fork+0x10/0x20 [ 17.682855] [ 17.682874] Allocated by task 136: [ 17.682902] kasan_save_stack+0x3c/0x68 [ 17.683171] kasan_save_track+0x20/0x40 [ 17.683335] kasan_save_alloc_info+0x40/0x58 [ 17.683455] __kasan_kmalloc+0xd4/0xd8 [ 17.683521] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.683560] kmalloc_oob_right+0xb0/0x660 [ 17.683596] kunit_try_run_case+0x170/0x3f0 [ 17.683632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.683699] kthread+0x328/0x630 [ 17.683815] ret_from_fork+0x10/0x20 [ 17.683855] [ 17.683873] The buggy address belongs to the object at fff00000c638e700 [ 17.683873] which belongs to the cache kmalloc-128 of size 128 [ 17.683932] The buggy address is located 13 bytes to the right of [ 17.683932] allocated 115-byte region [fff00000c638e700, fff00000c638e773) [ 17.683993] [ 17.684011] The buggy address belongs to the physical page: [ 17.684039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e [ 17.684086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.684131] page_type: f5(slab) [ 17.684166] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.684214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.684251] page dumped because: kasan: bad access detected [ 17.684280] [ 17.684297] Memory state around the buggy address: [ 17.684344] fff00000c638e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.684469] fff00000c638e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.684565] >fff00000c638e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.684651] ^ [ 17.684731] fff00000c638e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.684772] fff00000c638e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.684844] ==================================================================
[ 11.129646] ================================================================== [ 11.129910] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.130719] Write of size 1 at addr ffff88810262f778 by task kunit_try_catch/153 [ 11.131264] [ 11.131452] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.131501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.131512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.131545] Call Trace: [ 11.131571] <TASK> [ 11.131591] dump_stack_lvl+0x73/0xb0 [ 11.131624] print_report+0xd1/0x650 [ 11.131657] ? __virt_addr_valid+0x1db/0x2d0 [ 11.131679] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.131699] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.131719] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.131739] kasan_report+0x141/0x180 [ 11.131759] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.131783] __asan_report_store1_noabort+0x1b/0x30 [ 11.131802] kmalloc_oob_right+0x6bd/0x7f0 [ 11.131823] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.131845] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.131869] kunit_try_run_case+0x1a5/0x480 [ 11.131893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.131914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.131936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.131957] ? __kthread_parkme+0x82/0x180 [ 11.131976] ? preempt_count_sub+0x50/0x80 [ 11.131999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.132020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.132041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.132062] kthread+0x337/0x6f0 [ 11.132080] ? trace_preempt_on+0x20/0xc0 [ 11.132102] ? __pfx_kthread+0x10/0x10 [ 11.132121] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.132141] ? calculate_sigpending+0x7b/0xa0 [ 11.132163] ? __pfx_kthread+0x10/0x10 [ 11.132183] ret_from_fork+0x116/0x1d0 [ 11.132201] ? __pfx_kthread+0x10/0x10 [ 11.132230] ret_from_fork_asm+0x1a/0x30 [ 11.132259] </TASK> [ 11.132270] [ 11.143312] Allocated by task 153: [ 11.143596] kasan_save_stack+0x45/0x70 [ 11.143999] kasan_save_track+0x18/0x40 [ 11.144255] kasan_save_alloc_info+0x3b/0x50 [ 11.144652] __kasan_kmalloc+0xb7/0xc0 [ 11.144805] __kmalloc_cache_noprof+0x189/0x420 [ 11.144963] kmalloc_oob_right+0xa9/0x7f0 [ 11.145103] kunit_try_run_case+0x1a5/0x480 [ 11.145280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.145545] kthread+0x337/0x6f0 [ 11.145685] ret_from_fork+0x116/0x1d0 [ 11.145881] ret_from_fork_asm+0x1a/0x30 [ 11.146081] [ 11.146187] The buggy address belongs to the object at ffff88810262f700 [ 11.146187] which belongs to the cache kmalloc-128 of size 128 [ 11.146636] The buggy address is located 5 bytes to the right of [ 11.146636] allocated 115-byte region [ffff88810262f700, ffff88810262f773) [ 11.147087] [ 11.147173] The buggy address belongs to the physical page: [ 11.147669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f [ 11.148049] flags: 0x200000000000000(node=0|zone=2) [ 11.148271] page_type: f5(slab) [ 11.148444] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.148770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.149107] page dumped because: kasan: bad access detected [ 11.149366] [ 11.149472] Memory state around the buggy address: [ 11.149695] ffff88810262f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.150012] ffff88810262f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.150250] >ffff88810262f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.150562] ^ [ 11.150874] ffff88810262f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.151105] ffff88810262f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.151396] ================================================================== [ 11.152189] ================================================================== [ 11.152657] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.152974] Read of size 1 at addr ffff88810262f780 by task kunit_try_catch/153 [ 11.153215] [ 11.153404] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.153449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.153460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.154500] Call Trace: [ 11.154526] <TASK> [ 11.154547] dump_stack_lvl+0x73/0xb0 [ 11.154583] print_report+0xd1/0x650 [ 11.154606] ? __virt_addr_valid+0x1db/0x2d0 [ 11.154628] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.154649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.154670] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.154691] kasan_report+0x141/0x180 [ 11.154711] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.154735] __asan_report_load1_noabort+0x18/0x20 [ 11.154758] kmalloc_oob_right+0x68a/0x7f0 [ 11.154778] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.154801] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.154825] kunit_try_run_case+0x1a5/0x480 [ 11.154849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.154869] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.154891] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.154912] ? __kthread_parkme+0x82/0x180 [ 11.154932] ? preempt_count_sub+0x50/0x80 [ 11.154955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.154977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.154997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.155018] kthread+0x337/0x6f0 [ 11.155036] ? trace_preempt_on+0x20/0xc0 [ 11.155058] ? __pfx_kthread+0x10/0x10 [ 11.155077] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.155096] ? calculate_sigpending+0x7b/0xa0 [ 11.155119] ? __pfx_kthread+0x10/0x10 [ 11.155139] ret_from_fork+0x116/0x1d0 [ 11.155157] ? __pfx_kthread+0x10/0x10 [ 11.155175] ret_from_fork_asm+0x1a/0x30 [ 11.155205] </TASK> [ 11.155215] [ 11.161779] Allocated by task 153: [ 11.162005] kasan_save_stack+0x45/0x70 [ 11.162250] kasan_save_track+0x18/0x40 [ 11.162455] kasan_save_alloc_info+0x3b/0x50 [ 11.162599] __kasan_kmalloc+0xb7/0xc0 [ 11.162726] __kmalloc_cache_noprof+0x189/0x420 [ 11.162875] kmalloc_oob_right+0xa9/0x7f0 [ 11.163010] kunit_try_run_case+0x1a5/0x480 [ 11.163162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.163557] kthread+0x337/0x6f0 [ 11.163901] ret_from_fork+0x116/0x1d0 [ 11.164119] ret_from_fork_asm+0x1a/0x30 [ 11.164856] [ 11.165121] The buggy address belongs to the object at ffff88810262f700 [ 11.165121] which belongs to the cache kmalloc-128 of size 128 [ 11.166272] The buggy address is located 13 bytes to the right of [ 11.166272] allocated 115-byte region [ffff88810262f700, ffff88810262f773) [ 11.167139] [ 11.167247] The buggy address belongs to the physical page: [ 11.167523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f [ 11.168129] flags: 0x200000000000000(node=0|zone=2) [ 11.168704] page_type: f5(slab) [ 11.168841] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.169311] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.169952] page dumped because: kasan: bad access detected [ 11.170190] [ 11.170351] Memory state around the buggy address: [ 11.170622] ffff88810262f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.170940] ffff88810262f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.171163] >ffff88810262f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.171763] ^ [ 11.171893] ffff88810262f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.172226] ffff88810262f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.173025] ================================================================== [ 11.096977] ================================================================== [ 11.097785] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.098544] Write of size 1 at addr ffff88810262f773 by task kunit_try_catch/153 [ 11.099008] [ 11.100260] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.100773] Tainted: [N]=TEST [ 11.100816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.101035] Call Trace: [ 11.101105] <TASK> [ 11.101283] dump_stack_lvl+0x73/0xb0 [ 11.101383] print_report+0xd1/0x650 [ 11.101412] ? __virt_addr_valid+0x1db/0x2d0 [ 11.101436] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.101457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.101478] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.101498] kasan_report+0x141/0x180 [ 11.101518] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.101543] __asan_report_store1_noabort+0x1b/0x30 [ 11.101561] kmalloc_oob_right+0x6f0/0x7f0 [ 11.101582] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.101604] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.101629] kunit_try_run_case+0x1a5/0x480 [ 11.101654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.101674] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.101697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.101718] ? __kthread_parkme+0x82/0x180 [ 11.101739] ? preempt_count_sub+0x50/0x80 [ 11.101762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.101784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.101805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.101826] kthread+0x337/0x6f0 [ 11.101843] ? trace_preempt_on+0x20/0xc0 [ 11.101866] ? __pfx_kthread+0x10/0x10 [ 11.101885] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.101904] ? calculate_sigpending+0x7b/0xa0 [ 11.101928] ? __pfx_kthread+0x10/0x10 [ 11.101947] ret_from_fork+0x116/0x1d0 [ 11.101966] ? __pfx_kthread+0x10/0x10 [ 11.101985] ret_from_fork_asm+0x1a/0x30 [ 11.102035] </TASK> [ 11.102097] [ 11.110964] Allocated by task 153: [ 11.111644] kasan_save_stack+0x45/0x70 [ 11.112054] kasan_save_track+0x18/0x40 [ 11.112516] kasan_save_alloc_info+0x3b/0x50 [ 11.112943] __kasan_kmalloc+0xb7/0xc0 [ 11.113344] __kmalloc_cache_noprof+0x189/0x420 [ 11.113788] kmalloc_oob_right+0xa9/0x7f0 [ 11.114183] kunit_try_run_case+0x1a5/0x480 [ 11.114470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.114642] kthread+0x337/0x6f0 [ 11.114758] ret_from_fork+0x116/0x1d0 [ 11.114887] ret_from_fork_asm+0x1a/0x30 [ 11.115077] [ 11.115206] The buggy address belongs to the object at ffff88810262f700 [ 11.115206] which belongs to the cache kmalloc-128 of size 128 [ 11.116672] The buggy address is located 0 bytes to the right of [ 11.116672] allocated 115-byte region [ffff88810262f700, ffff88810262f773) [ 11.117982] [ 11.118288] The buggy address belongs to the physical page: [ 11.119070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262f [ 11.120001] flags: 0x200000000000000(node=0|zone=2) [ 11.120919] page_type: f5(slab) [ 11.121576] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.121814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.122098] page dumped because: kasan: bad access detected [ 11.122420] [ 11.122660] Memory state around the buggy address: [ 11.123411] ffff88810262f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.124046] ffff88810262f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.124743] >ffff88810262f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.125440] ^ [ 11.126096] ffff88810262f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.126732] ffff88810262f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.127413] ==================================================================