Date
July 5, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.441108] ================================================================== [ 18.441528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.442755] Write of size 1 at addr fff00000c56f1573 by task kunit_try_catch/137 [ 18.442967] [ 18.443938] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT [ 18.444104] Tainted: [N]=TEST [ 18.444143] Hardware name: linux,dummy-virt (DT) [ 18.444420] Call trace: [ 18.444618] show_stack+0x20/0x38 (C) [ 18.444787] dump_stack_lvl+0x8c/0xd0 [ 18.444857] print_report+0x118/0x608 [ 18.444910] kasan_report+0xdc/0x128 [ 18.444956] __asan_report_store1_noabort+0x20/0x30 [ 18.445005] kmalloc_oob_right+0x5a4/0x660 [ 18.445051] kunit_try_run_case+0x170/0x3f0 [ 18.445102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.445155] kthread+0x328/0x630 [ 18.445199] ret_from_fork+0x10/0x20 [ 18.445383] [ 18.445429] Allocated by task 137: [ 18.445553] kasan_save_stack+0x3c/0x68 [ 18.445625] kasan_save_track+0x20/0x40 [ 18.445666] kasan_save_alloc_info+0x40/0x58 [ 18.445707] __kasan_kmalloc+0xd4/0xd8 [ 18.445743] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.445784] kmalloc_oob_right+0xb0/0x660 [ 18.445820] kunit_try_run_case+0x170/0x3f0 [ 18.445856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.445898] kthread+0x328/0x630 [ 18.445930] ret_from_fork+0x10/0x20 [ 18.445984] [ 18.446231] The buggy address belongs to the object at fff00000c56f1500 [ 18.446231] which belongs to the cache kmalloc-128 of size 128 [ 18.446436] The buggy address is located 0 bytes to the right of [ 18.446436] allocated 115-byte region [fff00000c56f1500, fff00000c56f1573) [ 18.446520] [ 18.446619] The buggy address belongs to the physical page: [ 18.446862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 18.447166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.447510] page_type: f5(slab) [ 18.447848] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.447913] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.448030] page dumped because: kasan: bad access detected [ 18.448074] [ 18.448102] Memory state around the buggy address: [ 18.448339] fff00000c56f1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.448432] fff00000c56f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.448489] >fff00000c56f1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.448542] ^ [ 18.448629] fff00000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.448671] fff00000c56f1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.448735] ================================================================== [ 18.455236] ================================================================== [ 18.455338] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 18.455461] Read of size 1 at addr fff00000c56f1580 by task kunit_try_catch/137 [ 18.455570] [ 18.455641] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.455802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.455852] Hardware name: linux,dummy-virt (DT) [ 18.455913] Call trace: [ 18.455957] show_stack+0x20/0x38 (C) [ 18.456047] dump_stack_lvl+0x8c/0xd0 [ 18.456132] print_report+0x118/0x608 [ 18.456211] kasan_report+0xdc/0x128 [ 18.456336] __asan_report_load1_noabort+0x20/0x30 [ 18.456475] kmalloc_oob_right+0x5d0/0x660 [ 18.456560] kunit_try_run_case+0x170/0x3f0 [ 18.456657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.456764] kthread+0x328/0x630 [ 18.456910] ret_from_fork+0x10/0x20 [ 18.457082] [ 18.457133] Allocated by task 137: [ 18.457404] kasan_save_stack+0x3c/0x68 [ 18.457507] kasan_save_track+0x20/0x40 [ 18.457603] kasan_save_alloc_info+0x40/0x58 [ 18.457691] __kasan_kmalloc+0xd4/0xd8 [ 18.457772] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.457857] kmalloc_oob_right+0xb0/0x660 [ 18.457934] kunit_try_run_case+0x170/0x3f0 [ 18.458030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.458323] kthread+0x328/0x630 [ 18.458420] ret_from_fork+0x10/0x20 [ 18.458507] [ 18.458550] The buggy address belongs to the object at fff00000c56f1500 [ 18.458550] which belongs to the cache kmalloc-128 of size 128 [ 18.458661] The buggy address is located 13 bytes to the right of [ 18.458661] allocated 115-byte region [fff00000c56f1500, fff00000c56f1573) [ 18.458779] [ 18.459147] The buggy address belongs to the physical page: [ 18.459218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 18.459369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.459481] page_type: f5(slab) [ 18.459565] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.459678] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.459765] page dumped because: kasan: bad access detected [ 18.459837] [ 18.459881] Memory state around the buggy address: [ 18.459975] fff00000c56f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.460103] fff00000c56f1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.460202] >fff00000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.460286] ^ [ 18.460349] fff00000c56f1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.460439] fff00000c56f1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.460514] ================================================================== [ 18.449641] ================================================================== [ 18.449728] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 18.449890] Write of size 1 at addr fff00000c56f1578 by task kunit_try_catch/137 [ 18.450003] [ 18.450069] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.450232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.450290] Hardware name: linux,dummy-virt (DT) [ 18.450371] Call trace: [ 18.450422] show_stack+0x20/0x38 (C) [ 18.450540] dump_stack_lvl+0x8c/0xd0 [ 18.450644] print_report+0x118/0x608 [ 18.450745] kasan_report+0xdc/0x128 [ 18.450845] __asan_report_store1_noabort+0x20/0x30 [ 18.450951] kmalloc_oob_right+0x538/0x660 [ 18.451052] kunit_try_run_case+0x170/0x3f0 [ 18.451158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.451278] kthread+0x328/0x630 [ 18.451427] ret_from_fork+0x10/0x20 [ 18.451568] [ 18.451624] Allocated by task 137: [ 18.451705] kasan_save_stack+0x3c/0x68 [ 18.451819] kasan_save_track+0x20/0x40 [ 18.451923] kasan_save_alloc_info+0x40/0x58 [ 18.452008] __kasan_kmalloc+0xd4/0xd8 [ 18.452119] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.452236] kmalloc_oob_right+0xb0/0x660 [ 18.452315] kunit_try_run_case+0x170/0x3f0 [ 18.452434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.452514] kthread+0x328/0x630 [ 18.452578] ret_from_fork+0x10/0x20 [ 18.452646] [ 18.452681] The buggy address belongs to the object at fff00000c56f1500 [ 18.452681] which belongs to the cache kmalloc-128 of size 128 [ 18.452786] The buggy address is located 5 bytes to the right of [ 18.452786] allocated 115-byte region [fff00000c56f1500, fff00000c56f1573) [ 18.452912] [ 18.452956] The buggy address belongs to the physical page: [ 18.453017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 18.453127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.453224] page_type: f5(slab) [ 18.453306] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.453436] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.453516] page dumped because: kasan: bad access detected [ 18.453582] [ 18.453624] Memory state around the buggy address: [ 18.454025] fff00000c56f1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.454132] fff00000c56f1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.454214] >fff00000c56f1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.454283] ^ [ 18.454378] fff00000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.454470] fff00000c56f1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.454552] ==================================================================
[ 12.718451] ================================================================== [ 12.718978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.719371] Write of size 1 at addr ffff888103324f78 by task kunit_try_catch/153 [ 12.720248] [ 12.720370] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.720425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.720439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.720466] Call Trace: [ 12.720489] <TASK> [ 12.720512] dump_stack_lvl+0x73/0xb0 [ 12.720546] print_report+0xd1/0x650 [ 12.720572] ? __virt_addr_valid+0x1db/0x2d0 [ 12.720599] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.720624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.720666] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.720691] kasan_report+0x141/0x180 [ 12.720717] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.720747] __asan_report_store1_noabort+0x1b/0x30 [ 12.720770] kmalloc_oob_right+0x6bd/0x7f0 [ 12.720807] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.720836] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.720866] kunit_try_run_case+0x1a5/0x480 [ 12.720937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.720963] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.721006] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.721032] ? __kthread_parkme+0x82/0x180 [ 12.721055] ? preempt_count_sub+0x50/0x80 [ 12.721084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.721111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.721137] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.721163] kthread+0x337/0x6f0 [ 12.721186] ? trace_preempt_on+0x20/0xc0 [ 12.721213] ? __pfx_kthread+0x10/0x10 [ 12.721236] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.721260] ? calculate_sigpending+0x7b/0xa0 [ 12.721288] ? __pfx_kthread+0x10/0x10 [ 12.721312] ret_from_fork+0x116/0x1d0 [ 12.721334] ? __pfx_kthread+0x10/0x10 [ 12.721358] ret_from_fork_asm+0x1a/0x30 [ 12.721394] </TASK> [ 12.721407] [ 12.731947] Allocated by task 153: [ 12.732502] kasan_save_stack+0x45/0x70 [ 12.732752] kasan_save_track+0x18/0x40 [ 12.733107] kasan_save_alloc_info+0x3b/0x50 [ 12.733333] __kasan_kmalloc+0xb7/0xc0 [ 12.733532] __kmalloc_cache_noprof+0x189/0x420 [ 12.733777] kmalloc_oob_right+0xa9/0x7f0 [ 12.733969] kunit_try_run_case+0x1a5/0x480 [ 12.734212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.734464] kthread+0x337/0x6f0 [ 12.734636] ret_from_fork+0x116/0x1d0 [ 12.735356] ret_from_fork_asm+0x1a/0x30 [ 12.735537] [ 12.735820] The buggy address belongs to the object at ffff888103324f00 [ 12.735820] which belongs to the cache kmalloc-128 of size 128 [ 12.736522] The buggy address is located 5 bytes to the right of [ 12.736522] allocated 115-byte region [ffff888103324f00, ffff888103324f73) [ 12.737609] [ 12.737756] The buggy address belongs to the physical page: [ 12.738200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 12.738941] flags: 0x200000000000000(node=0|zone=2) [ 12.739294] page_type: f5(slab) [ 12.739464] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.740058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.740667] page dumped because: kasan: bad access detected [ 12.741016] [ 12.741269] Memory state around the buggy address: [ 12.741483] ffff888103324e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.742108] ffff888103324e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.742448] >ffff888103324f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.742849] ^ [ 12.743333] ffff888103324f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.744010] ffff888103325000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.744456] ================================================================== [ 12.680202] ================================================================== [ 12.681120] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 12.682006] Write of size 1 at addr ffff888103324f73 by task kunit_try_catch/153 [ 12.682756] [ 12.684277] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.684705] Tainted: [N]=TEST [ 12.684745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.685049] Call Trace: [ 12.685129] <TASK> [ 12.685297] dump_stack_lvl+0x73/0xb0 [ 12.685403] print_report+0xd1/0x650 [ 12.685436] ? __virt_addr_valid+0x1db/0x2d0 [ 12.685466] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.685491] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.685517] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.685542] kasan_report+0x141/0x180 [ 12.685567] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.685598] __asan_report_store1_noabort+0x1b/0x30 [ 12.685622] kmalloc_oob_right+0x6f0/0x7f0 [ 12.685662] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.685691] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.685721] kunit_try_run_case+0x1a5/0x480 [ 12.685752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.685821] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.685850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.685876] ? __kthread_parkme+0x82/0x180 [ 12.685901] ? preempt_count_sub+0x50/0x80 [ 12.685931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.685958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.685984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.686009] kthread+0x337/0x6f0 [ 12.686032] ? trace_preempt_on+0x20/0xc0 [ 12.686060] ? __pfx_kthread+0x10/0x10 [ 12.686084] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.686108] ? calculate_sigpending+0x7b/0xa0 [ 12.686138] ? __pfx_kthread+0x10/0x10 [ 12.686163] ret_from_fork+0x116/0x1d0 [ 12.686187] ? __pfx_kthread+0x10/0x10 [ 12.686211] ret_from_fork_asm+0x1a/0x30 [ 12.686278] </TASK> [ 12.686360] [ 12.698754] Allocated by task 153: [ 12.699290] kasan_save_stack+0x45/0x70 [ 12.699610] kasan_save_track+0x18/0x40 [ 12.700016] kasan_save_alloc_info+0x3b/0x50 [ 12.700221] __kasan_kmalloc+0xb7/0xc0 [ 12.700476] __kmalloc_cache_noprof+0x189/0x420 [ 12.700756] kmalloc_oob_right+0xa9/0x7f0 [ 12.701021] kunit_try_run_case+0x1a5/0x480 [ 12.701315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.702071] kthread+0x337/0x6f0 [ 12.702288] ret_from_fork+0x116/0x1d0 [ 12.702511] ret_from_fork_asm+0x1a/0x30 [ 12.703308] [ 12.703732] The buggy address belongs to the object at ffff888103324f00 [ 12.703732] which belongs to the cache kmalloc-128 of size 128 [ 12.704646] The buggy address is located 0 bytes to the right of [ 12.704646] allocated 115-byte region [ffff888103324f00, ffff888103324f73) [ 12.706070] [ 12.706293] The buggy address belongs to the physical page: [ 12.706886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 12.707886] flags: 0x200000000000000(node=0|zone=2) [ 12.709022] page_type: f5(slab) [ 12.709941] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.710546] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.710957] page dumped because: kasan: bad access detected [ 12.711566] [ 12.711783] Memory state around the buggy address: [ 12.712639] ffff888103324e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.713540] ffff888103324e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.714223] >ffff888103324f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.714985] ^ [ 12.715717] ffff888103324f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.716044] ffff888103325000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.716893] ================================================================== [ 12.745360] ================================================================== [ 12.746202] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.746572] Read of size 1 at addr ffff888103324f80 by task kunit_try_catch/153 [ 12.747113] [ 12.747275] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.747533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.747547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.747573] Call Trace: [ 12.747588] <TASK> [ 12.747609] dump_stack_lvl+0x73/0xb0 [ 12.747643] print_report+0xd1/0x650 [ 12.747687] ? __virt_addr_valid+0x1db/0x2d0 [ 12.747713] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.747738] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.747763] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.747788] kasan_report+0x141/0x180 [ 12.747814] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.747845] __asan_report_load1_noabort+0x18/0x20 [ 12.747953] kmalloc_oob_right+0x68a/0x7f0 [ 12.747983] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.748011] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.748041] kunit_try_run_case+0x1a5/0x480 [ 12.748070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.748095] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.748123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.748150] ? __kthread_parkme+0x82/0x180 [ 12.748173] ? preempt_count_sub+0x50/0x80 [ 12.748200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.748227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.748253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.748279] kthread+0x337/0x6f0 [ 12.748302] ? trace_preempt_on+0x20/0xc0 [ 12.748342] ? __pfx_kthread+0x10/0x10 [ 12.748366] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.748390] ? calculate_sigpending+0x7b/0xa0 [ 12.748417] ? __pfx_kthread+0x10/0x10 [ 12.748443] ret_from_fork+0x116/0x1d0 [ 12.748465] ? __pfx_kthread+0x10/0x10 [ 12.748489] ret_from_fork_asm+0x1a/0x30 [ 12.748525] </TASK> [ 12.748541] [ 12.758551] Allocated by task 153: [ 12.758771] kasan_save_stack+0x45/0x70 [ 12.758980] kasan_save_track+0x18/0x40 [ 12.759881] kasan_save_alloc_info+0x3b/0x50 [ 12.760149] __kasan_kmalloc+0xb7/0xc0 [ 12.760316] __kmalloc_cache_noprof+0x189/0x420 [ 12.760507] kmalloc_oob_right+0xa9/0x7f0 [ 12.760688] kunit_try_run_case+0x1a5/0x480 [ 12.761677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.762399] kthread+0x337/0x6f0 [ 12.762600] ret_from_fork+0x116/0x1d0 [ 12.762786] ret_from_fork_asm+0x1a/0x30 [ 12.763020] [ 12.763108] The buggy address belongs to the object at ffff888103324f00 [ 12.763108] which belongs to the cache kmalloc-128 of size 128 [ 12.763724] The buggy address is located 13 bytes to the right of [ 12.763724] allocated 115-byte region [ffff888103324f00, ffff888103324f73) [ 12.764403] [ 12.764491] The buggy address belongs to the physical page: [ 12.764961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 12.765297] flags: 0x200000000000000(node=0|zone=2) [ 12.765554] page_type: f5(slab) [ 12.765778] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.766185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.766561] page dumped because: kasan: bad access detected [ 12.766961] [ 12.767051] Memory state around the buggy address: [ 12.767325] ffff888103324e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.767691] ffff888103324f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.768106] >ffff888103324f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.768515] ^ [ 12.769007] ffff888103325000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.769350] ffff888103325080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.769703] ==================================================================