Date
July 3, 2025, 10:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 32.395637] ================================================================== [ 32.402962] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 32.411163] Write of size 1 at addr ffff000080df5778 by task kunit_try_catch/251 [ 32.418663] [ 32.420202] CPU: 2 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 32.420230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.420239] Hardware name: Thundercomm Dragonboard 845c (DT) [ 32.420250] Call trace: [ 32.420257] show_stack+0x20/0x38 (C) [ 32.420274] dump_stack_lvl+0x8c/0xd0 [ 32.420297] print_report+0x118/0x608 [ 32.420317] kasan_report+0xdc/0x128 [ 32.420335] __asan_report_store1_noabort+0x20/0x30 [ 32.420354] kmalloc_track_caller_oob_right+0x418/0x488 [ 32.420374] kunit_try_run_case+0x170/0x3f0 [ 32.420392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.420414] kthread+0x328/0x630 [ 32.420430] ret_from_fork+0x10/0x20 [ 32.420448] [ 32.487278] Allocated by task 251: [ 32.490738] kasan_save_stack+0x3c/0x68 [ 32.494648] kasan_save_track+0x20/0x40 [ 32.498556] kasan_save_alloc_info+0x40/0x58 [ 32.502892] __kasan_kmalloc+0xd4/0xd8 [ 32.506712] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.512375] kmalloc_track_caller_oob_right+0x184/0x488 [ 32.517688] kunit_try_run_case+0x170/0x3f0 [ 32.521941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.527511] kthread+0x328/0x630 [ 32.530803] ret_from_fork+0x10/0x20 [ 32.534440] [ 32.535973] The buggy address belongs to the object at ffff000080df5700 [ 32.535973] which belongs to the cache kmalloc-128 of size 128 [ 32.548632] The buggy address is located 0 bytes to the right of [ 32.548632] allocated 120-byte region [ffff000080df5700, ffff000080df5778) [ 32.561737] [ 32.563265] The buggy address belongs to the physical page: [ 32.568920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4 [ 32.577031] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.584785] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.591839] page_type: f5(slab) [ 32.595046] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 32.602889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.610732] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 32.618670] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.626611] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff [ 32.634550] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.642485] page dumped because: kasan: bad access detected [ 32.648138] [ 32.649668] Memory state around the buggy address: [ 32.654531] ffff000080df5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.661852] ffff000080df5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.669174] >ffff000080df5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.676494] ^ [ 32.683718] ffff000080df5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.691030] ffff000080df5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.698350] ================================================================== [ 32.081276] ================================================================== [ 32.092839] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.101042] Write of size 1 at addr ffff000080df5678 by task kunit_try_catch/251 [ 32.108538] [ 32.110075] CPU: 2 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 32.110106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.110114] Hardware name: Thundercomm Dragonboard 845c (DT) [ 32.110126] Call trace: [ 32.110132] show_stack+0x20/0x38 (C) [ 32.110153] dump_stack_lvl+0x8c/0xd0 [ 32.110176] print_report+0x118/0x608 [ 32.110195] kasan_report+0xdc/0x128 [ 32.110214] __asan_report_store1_noabort+0x20/0x30 [ 32.110234] kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.110253] kunit_try_run_case+0x170/0x3f0 [ 32.110273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.110295] kthread+0x328/0x630 [ 32.110311] ret_from_fork+0x10/0x20 [ 32.110330] [ 32.177174] Allocated by task 251: [ 32.180632] kasan_save_stack+0x3c/0x68 [ 32.184542] kasan_save_track+0x20/0x40 [ 32.188450] kasan_save_alloc_info+0x40/0x58 [ 32.192788] __kasan_kmalloc+0xd4/0xd8 [ 32.196609] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.202268] kmalloc_track_caller_oob_right+0xa8/0x488 [ 32.207494] kunit_try_run_case+0x170/0x3f0 [ 32.211754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.217323] kthread+0x328/0x630 [ 32.220613] ret_from_fork+0x10/0x20 [ 32.224261] [ 32.225793] The buggy address belongs to the object at ffff000080df5600 [ 32.225793] which belongs to the cache kmalloc-128 of size 128 [ 32.238454] The buggy address is located 0 bytes to the right of [ 32.238454] allocated 120-byte region [ffff000080df5600, ffff000080df5678) [ 32.251557] [ 32.253094] The buggy address belongs to the physical page: [ 32.258743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4 [ 32.266856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.274610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.281665] page_type: f5(slab) [ 32.284868] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 32.292710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.300554] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 32.308492] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.316431] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff [ 32.324360] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.332284] page dumped because: kasan: bad access detected [ 32.337936] [ 32.339466] Memory state around the buggy address: [ 32.344334] ffff000080df5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.351648] ffff000080df5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.358962] >ffff000080df5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.366281] ^ [ 32.373512] ffff000080df5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.380834] ffff000080df5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.388153] ==================================================================
[ 30.711447] ================================================================== [ 30.711749] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.711848] Write of size 1 at addr fff00000c58afd78 by task kunit_try_catch/174 [ 30.712131] [ 30.712214] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.712538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.712569] Hardware name: linux,dummy-virt (DT) [ 30.712604] Call trace: [ 30.712625] show_stack+0x20/0x38 (C) [ 30.712819] dump_stack_lvl+0x8c/0xd0 [ 30.713161] print_report+0x118/0x608 [ 30.713212] kasan_report+0xdc/0x128 [ 30.713424] __asan_report_store1_noabort+0x20/0x30 [ 30.713602] kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.713862] kunit_try_run_case+0x170/0x3f0 [ 30.714059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.714250] kthread+0x328/0x630 [ 30.714398] ret_from_fork+0x10/0x20 [ 30.714705] [ 30.714751] Allocated by task 174: [ 30.714910] kasan_save_stack+0x3c/0x68 [ 30.714979] kasan_save_track+0x20/0x40 [ 30.715172] kasan_save_alloc_info+0x40/0x58 [ 30.715397] __kasan_kmalloc+0xd4/0xd8 [ 30.715458] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.715656] kmalloc_track_caller_oob_right+0xa8/0x488 [ 30.716139] kunit_try_run_case+0x170/0x3f0 [ 30.716203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.716266] kthread+0x328/0x630 [ 30.716308] ret_from_fork+0x10/0x20 [ 30.716448] [ 30.716521] The buggy address belongs to the object at fff00000c58afd00 [ 30.716521] which belongs to the cache kmalloc-128 of size 128 [ 30.716771] The buggy address is located 0 bytes to the right of [ 30.716771] allocated 120-byte region [fff00000c58afd00, fff00000c58afd78) [ 30.716972] [ 30.717083] The buggy address belongs to the physical page: [ 30.717144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058af [ 30.717213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.717528] page_type: f5(slab) [ 30.717637] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.717792] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.717995] page dumped because: kasan: bad access detected [ 30.718030] [ 30.718048] Memory state around the buggy address: [ 30.718124] fff00000c58afc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.718175] fff00000c58afc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.718227] >fff00000c58afd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.718264] ^ [ 30.718304] fff00000c58afd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.718346] fff00000c58afe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.718384] ================================================================== [ 30.719734] ================================================================== [ 30.719783] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 30.719853] Write of size 1 at addr fff00000c58afe78 by task kunit_try_catch/174 [ 30.720240] [ 30.720623] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.720750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.720795] Hardware name: linux,dummy-virt (DT) [ 30.721194] Call trace: [ 30.721268] show_stack+0x20/0x38 (C) [ 30.721325] dump_stack_lvl+0x8c/0xd0 [ 30.721382] print_report+0x118/0x608 [ 30.721429] kasan_report+0xdc/0x128 [ 30.721775] __asan_report_store1_noabort+0x20/0x30 [ 30.721986] kmalloc_track_caller_oob_right+0x418/0x488 [ 30.722183] kunit_try_run_case+0x170/0x3f0 [ 30.722332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.722387] kthread+0x328/0x630 [ 30.722570] ret_from_fork+0x10/0x20 [ 30.722823] [ 30.722880] Allocated by task 174: [ 30.722969] kasan_save_stack+0x3c/0x68 [ 30.723107] kasan_save_track+0x20/0x40 [ 30.723165] kasan_save_alloc_info+0x40/0x58 [ 30.723367] __kasan_kmalloc+0xd4/0xd8 [ 30.723529] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.723618] kmalloc_track_caller_oob_right+0x184/0x488 [ 30.723943] kunit_try_run_case+0x170/0x3f0 [ 30.724208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.724401] kthread+0x328/0x630 [ 30.724564] ret_from_fork+0x10/0x20 [ 30.724765] [ 30.724857] The buggy address belongs to the object at fff00000c58afe00 [ 30.724857] which belongs to the cache kmalloc-128 of size 128 [ 30.725031] The buggy address is located 0 bytes to the right of [ 30.725031] allocated 120-byte region [fff00000c58afe00, fff00000c58afe78) [ 30.725122] [ 30.725141] The buggy address belongs to the physical page: [ 30.725178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058af [ 30.725615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.725767] page_type: f5(slab) [ 30.725998] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.726098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.726141] page dumped because: kasan: bad access detected [ 30.726589] [ 30.726744] Memory state around the buggy address: [ 30.726925] fff00000c58afd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.726999] fff00000c58afd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.727047] >fff00000c58afe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.727346] ^ [ 30.727483] fff00000c58afe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.727764] fff00000c58aff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.727867] ==================================================================
[ 22.561997] ================================================================== [ 22.562776] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 22.563044] Write of size 1 at addr ffff888105ab1178 by task kunit_try_catch/191 [ 22.563272] [ 22.563360] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.563410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.563423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.563446] Call Trace: [ 22.563468] <TASK> [ 22.563487] dump_stack_lvl+0x73/0xb0 [ 22.563518] print_report+0xd1/0x650 [ 22.563540] ? __virt_addr_valid+0x1db/0x2d0 [ 22.563564] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 22.563587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.563612] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 22.563636] kasan_report+0x141/0x180 [ 22.563656] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 22.563684] __asan_report_store1_noabort+0x1b/0x30 [ 22.563708] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 22.563732] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 22.563756] ? __schedule+0x10cc/0x2b60 [ 22.563782] ? __pfx_read_tsc+0x10/0x10 [ 22.563803] ? ktime_get_ts64+0x86/0x230 [ 22.563829] kunit_try_run_case+0x1a5/0x480 [ 22.563856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.563878] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.563900] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.563925] ? __kthread_parkme+0x82/0x180 [ 22.563946] ? preempt_count_sub+0x50/0x80 [ 22.564251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.564276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.564359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.564384] kthread+0x337/0x6f0 [ 22.564478] ? trace_preempt_on+0x20/0xc0 [ 22.564506] ? __pfx_kthread+0x10/0x10 [ 22.564528] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.564552] ? calculate_sigpending+0x7b/0xa0 [ 22.564576] ? __pfx_kthread+0x10/0x10 [ 22.564598] ret_from_fork+0x116/0x1d0 [ 22.564617] ? __pfx_kthread+0x10/0x10 [ 22.564637] ret_from_fork_asm+0x1a/0x30 [ 22.564668] </TASK> [ 22.564680] [ 22.574924] Allocated by task 191: [ 22.575116] kasan_save_stack+0x45/0x70 [ 22.575415] kasan_save_track+0x18/0x40 [ 22.575602] kasan_save_alloc_info+0x3b/0x50 [ 22.575808] __kasan_kmalloc+0xb7/0xc0 [ 22.575977] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 22.576212] kmalloc_track_caller_oob_right+0x99/0x520 [ 22.576983] kunit_try_run_case+0x1a5/0x480 [ 22.577171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.577528] kthread+0x337/0x6f0 [ 22.577690] ret_from_fork+0x116/0x1d0 [ 22.577859] ret_from_fork_asm+0x1a/0x30 [ 22.578031] [ 22.578112] The buggy address belongs to the object at ffff888105ab1100 [ 22.578112] which belongs to the cache kmalloc-128 of size 128 [ 22.579106] The buggy address is located 0 bytes to the right of [ 22.579106] allocated 120-byte region [ffff888105ab1100, ffff888105ab1178) [ 22.579728] [ 22.579803] The buggy address belongs to the physical page: [ 22.580030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab1 [ 22.580374] flags: 0x200000000000000(node=0|zone=2) [ 22.580590] page_type: f5(slab) [ 22.580761] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.581063] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.581898] page dumped because: kasan: bad access detected [ 22.582086] [ 22.582173] Memory state around the buggy address: [ 22.582819] ffff888105ab1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.583262] ffff888105ab1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.583723] >ffff888105ab1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.584086] ^ [ 22.584571] ffff888105ab1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.584970] ffff888105ab1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.585360] ================================================================== [ 22.587336] ================================================================== [ 22.587666] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 22.588006] Write of size 1 at addr ffff888105ab1278 by task kunit_try_catch/191 [ 22.588814] [ 22.588921] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 22.588971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.588984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.589006] Call Trace: [ 22.589020] <TASK> [ 22.589037] dump_stack_lvl+0x73/0xb0 [ 22.589066] print_report+0xd1/0x650 [ 22.589088] ? __virt_addr_valid+0x1db/0x2d0 [ 22.589111] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 22.589134] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.589395] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 22.589421] kasan_report+0x141/0x180 [ 22.589443] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 22.589487] __asan_report_store1_noabort+0x1b/0x30 [ 22.589511] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 22.589534] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 22.589559] ? __schedule+0x10cc/0x2b60 [ 22.589587] ? __pfx_read_tsc+0x10/0x10 [ 22.589609] ? ktime_get_ts64+0x86/0x230 [ 22.589633] kunit_try_run_case+0x1a5/0x480 [ 22.589658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.589681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.589702] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.589727] ? __kthread_parkme+0x82/0x180 [ 22.589747] ? preempt_count_sub+0x50/0x80 [ 22.589771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.589795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.589818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.589848] kthread+0x337/0x6f0 [ 22.589868] ? trace_preempt_on+0x20/0xc0 [ 22.589890] ? __pfx_kthread+0x10/0x10 [ 22.589910] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.589933] ? calculate_sigpending+0x7b/0xa0 [ 22.589958] ? __pfx_kthread+0x10/0x10 [ 22.589979] ret_from_fork+0x116/0x1d0 [ 22.589998] ? __pfx_kthread+0x10/0x10 [ 22.590019] ret_from_fork_asm+0x1a/0x30 [ 22.590050] </TASK> [ 22.590061] [ 22.600003] Allocated by task 191: [ 22.600190] kasan_save_stack+0x45/0x70 [ 22.600714] kasan_save_track+0x18/0x40 [ 22.600888] kasan_save_alloc_info+0x3b/0x50 [ 22.601093] __kasan_kmalloc+0xb7/0xc0 [ 22.601265] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 22.601893] kmalloc_track_caller_oob_right+0x19a/0x520 [ 22.602119] kunit_try_run_case+0x1a5/0x480 [ 22.602451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.602849] kthread+0x337/0x6f0 [ 22.603023] ret_from_fork+0x116/0x1d0 [ 22.603416] ret_from_fork_asm+0x1a/0x30 [ 22.603691] [ 22.603771] The buggy address belongs to the object at ffff888105ab1200 [ 22.603771] which belongs to the cache kmalloc-128 of size 128 [ 22.604526] The buggy address is located 0 bytes to the right of [ 22.604526] allocated 120-byte region [ffff888105ab1200, ffff888105ab1278) [ 22.605010] [ 22.605107] The buggy address belongs to the physical page: [ 22.605334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab1 [ 22.605657] flags: 0x200000000000000(node=0|zone=2) [ 22.605888] page_type: f5(slab) [ 22.606039] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.606750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.607070] page dumped because: kasan: bad access detected [ 22.607536] [ 22.607629] Memory state around the buggy address: [ 22.607929] ffff888105ab1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.608292] ffff888105ab1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.608710] >ffff888105ab1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.609066] ^ [ 22.609523] ffff888105ab1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.609794] ffff888105ab1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.610107] ==================================================================