Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.545045] ================================================================== [ 21.546507] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 21.548015] Read of size 1 at addr fff00000c6331b80 by task kunit_try_catch/125 [ 21.548804] [ 21.549321] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.549580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.549656] Hardware name: linux,dummy-virt (DT) [ 21.549741] Call trace: [ 21.549793] show_stack+0x20/0x38 (C) [ 21.549864] dump_stack_lvl+0x8c/0xd0 [ 21.549958] print_report+0x118/0x608 [ 21.550016] kasan_report+0xdc/0x128 [ 21.550071] __asan_report_load1_noabort+0x20/0x30 [ 21.550128] kmalloc_oob_right+0x5d0/0x660 [ 21.550209] kunit_try_run_case+0x170/0x3f0 [ 21.550268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.550331] kthread+0x318/0x620 [ 21.550384] ret_from_fork+0x10/0x20 [ 21.550441] [ 21.556841] Allocated by task 125: [ 21.557479] kasan_save_stack+0x3c/0x68 [ 21.557935] kasan_save_track+0x20/0x40 [ 21.558465] kasan_save_alloc_info+0x40/0x58 [ 21.559189] __kasan_kmalloc+0xd4/0xd8 [ 21.560034] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.560949] kmalloc_oob_right+0xb0/0x660 [ 21.561637] kunit_try_run_case+0x170/0x3f0 [ 21.562465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.563123] kthread+0x318/0x620 [ 21.563486] ret_from_fork+0x10/0x20 [ 21.564021] [ 21.564443] The buggy address belongs to the object at fff00000c6331b00 [ 21.564443] which belongs to the cache kmalloc-128 of size 128 [ 21.565754] The buggy address is located 13 bytes to the right of [ 21.565754] allocated 115-byte region [fff00000c6331b00, fff00000c6331b73) [ 21.567171] [ 21.567439] The buggy address belongs to the physical page: [ 21.567946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106331 [ 21.568757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.569604] page_type: f5(slab) [ 21.570129] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.571149] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.571798] page dumped because: kasan: bad access detected [ 21.573073] [ 21.573465] Memory state around the buggy address: [ 21.574638] fff00000c6331a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.575493] fff00000c6331b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.576247] >fff00000c6331b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.576991] ^ [ 21.577556] fff00000c6331c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.578364] fff00000c6331c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.579119] ================================================================== [ 21.447266] ================================================================== [ 21.448652] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 21.450607] Write of size 1 at addr fff00000c6331b73 by task kunit_try_catch/125 [ 21.451278] [ 21.452591] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.14.11-rc1 #1 [ 21.454476] Tainted: [N]=TEST [ 21.454567] Hardware name: linux,dummy-virt (DT) [ 21.455034] Call trace: [ 21.455302] show_stack+0x20/0x38 (C) [ 21.455513] dump_stack_lvl+0x8c/0xd0 [ 21.455668] print_report+0x118/0x608 [ 21.455739] kasan_report+0xdc/0x128 [ 21.455796] __asan_report_store1_noabort+0x20/0x30 [ 21.455853] kmalloc_oob_right+0x5a4/0x660 [ 21.455945] kunit_try_run_case+0x170/0x3f0 [ 21.456017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.456105] kthread+0x318/0x620 [ 21.456165] ret_from_fork+0x10/0x20 [ 21.456364] [ 21.466347] Allocated by task 125: [ 21.467003] kasan_save_stack+0x3c/0x68 [ 21.467486] kasan_save_track+0x20/0x40 [ 21.468331] kasan_save_alloc_info+0x40/0x58 [ 21.469566] __kasan_kmalloc+0xd4/0xd8 [ 21.470195] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.470632] kmalloc_oob_right+0xb0/0x660 [ 21.471516] kunit_try_run_case+0x170/0x3f0 [ 21.475136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.475928] kthread+0x318/0x620 [ 21.476519] ret_from_fork+0x10/0x20 [ 21.478069] [ 21.478645] The buggy address belongs to the object at fff00000c6331b00 [ 21.478645] which belongs to the cache kmalloc-128 of size 128 [ 21.480493] The buggy address is located 0 bytes to the right of [ 21.480493] allocated 115-byte region [fff00000c6331b00, fff00000c6331b73) [ 21.482565] [ 21.483059] The buggy address belongs to the physical page: [ 21.484905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106331 [ 21.487366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.488787] page_type: f5(slab) [ 21.491170] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.492062] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.492706] page dumped because: kasan: bad access detected [ 21.493846] [ 21.494179] Memory state around the buggy address: [ 21.495392] fff00000c6331a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.496159] fff00000c6331a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.497911] >fff00000c6331b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.498733] ^ [ 21.499531] fff00000c6331b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.500460] fff00000c6331c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.501078] ================================================================== [ 21.506095] ================================================================== [ 21.506727] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 21.507326] Write of size 1 at addr fff00000c6331b78 by task kunit_try_catch/125 [ 21.508540] [ 21.509777] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.510046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.510119] Hardware name: linux,dummy-virt (DT) [ 21.510195] Call trace: [ 21.510224] show_stack+0x20/0x38 (C) [ 21.510289] dump_stack_lvl+0x8c/0xd0 [ 21.510346] print_report+0x118/0x608 [ 21.510402] kasan_report+0xdc/0x128 [ 21.510461] __asan_report_store1_noabort+0x20/0x30 [ 21.510520] kmalloc_oob_right+0x538/0x660 [ 21.510575] kunit_try_run_case+0x170/0x3f0 [ 21.510630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.510691] kthread+0x318/0x620 [ 21.510744] ret_from_fork+0x10/0x20 [ 21.510802] [ 21.518984] Allocated by task 125: [ 21.519736] kasan_save_stack+0x3c/0x68 [ 21.520223] kasan_save_track+0x20/0x40 [ 21.520860] kasan_save_alloc_info+0x40/0x58 [ 21.521506] __kasan_kmalloc+0xd4/0xd8 [ 21.522452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.522962] kmalloc_oob_right+0xb0/0x660 [ 21.523709] kunit_try_run_case+0x170/0x3f0 [ 21.524305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.525380] kthread+0x318/0x620 [ 21.526002] ret_from_fork+0x10/0x20 [ 21.526407] [ 21.526824] The buggy address belongs to the object at fff00000c6331b00 [ 21.526824] which belongs to the cache kmalloc-128 of size 128 [ 21.528117] The buggy address is located 5 bytes to the right of [ 21.528117] allocated 115-byte region [fff00000c6331b00, fff00000c6331b73) [ 21.529592] [ 21.530069] The buggy address belongs to the physical page: [ 21.531159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106331 [ 21.531866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.532647] page_type: f5(slab) [ 21.533555] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.534424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.535246] page dumped because: kasan: bad access detected [ 21.535915] [ 21.536282] Memory state around the buggy address: [ 21.537428] fff00000c6331a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.538804] fff00000c6331a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.539986] >fff00000c6331b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.540716] ^ [ 21.541864] fff00000c6331b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.542615] fff00000c6331c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.543496] ==================================================================
[ 16.341372] ================================================================== [ 16.342469] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 16.343639] Write of size 1 at addr ffff888102971a73 by task kunit_try_catch/144 [ 16.344305] [ 16.345959] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G N 6.14.11-rc1 #1 [ 16.346379] Tainted: [N]=TEST [ 16.346415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.346709] Call Trace: [ 16.346807] <TASK> [ 16.347020] dump_stack_lvl+0x73/0xb0 [ 16.347186] print_report+0xd1/0x650 [ 16.347228] ? __virt_addr_valid+0x1db/0x2d0 [ 16.347261] ? kmalloc_oob_right+0x6f2/0x7f0 [ 16.347289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.347332] ? kmalloc_oob_right+0x6f2/0x7f0 [ 16.347364] kasan_report+0x140/0x180 [ 16.347393] ? kmalloc_oob_right+0x6f2/0x7f0 [ 16.347425] __asan_report_store1_noabort+0x1b/0x30 [ 16.347454] kmalloc_oob_right+0x6f2/0x7f0 [ 16.347481] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.347508] ? __schedule+0xce8/0x2840 [ 16.347539] ? __pfx_read_tsc+0x10/0x10 [ 16.347567] ? ktime_get_ts64+0x86/0x230 [ 16.347601] kunit_try_run_case+0x1a6/0x480 [ 16.347632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.347658] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.347687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.347730] ? __kthread_parkme+0x82/0x160 [ 16.347760] ? preempt_count_sub+0x50/0x80 [ 16.347792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.347820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.347852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.347902] kthread+0x324/0x6e0 [ 16.347929] ? trace_preempt_on+0x20/0xc0 [ 16.347959] ? __pfx_kthread+0x10/0x10 [ 16.347986] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.348013] ? calculate_sigpending+0x7b/0xa0 [ 16.348043] ? __pfx_kthread+0x10/0x10 [ 16.348070] ret_from_fork+0x41/0x80 [ 16.348094] ? __pfx_kthread+0x10/0x10 [ 16.348121] ret_from_fork_asm+0x1a/0x30 [ 16.348193] </TASK> [ 16.348279] [ 16.361673] Allocated by task 144: [ 16.362460] kasan_save_stack+0x45/0x70 [ 16.362937] kasan_save_track+0x18/0x40 [ 16.363347] kasan_save_alloc_info+0x3b/0x50 [ 16.363682] __kasan_kmalloc+0xb7/0xc0 [ 16.364011] __kmalloc_cache_noprof+0x18a/0x420 [ 16.364468] kmalloc_oob_right+0xaa/0x7f0 [ 16.364784] kunit_try_run_case+0x1a6/0x480 [ 16.365099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.365569] kthread+0x324/0x6e0 [ 16.365900] ret_from_fork+0x41/0x80 [ 16.366144] ret_from_fork_asm+0x1a/0x30 [ 16.366567] [ 16.366924] The buggy address belongs to the object at ffff888102971a00 [ 16.366924] which belongs to the cache kmalloc-128 of size 128 [ 16.368107] The buggy address is located 0 bytes to the right of [ 16.368107] allocated 115-byte region [ffff888102971a00, ffff888102971a73) [ 16.369075] [ 16.369403] The buggy address belongs to the physical page: [ 16.370377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102971 [ 16.371587] flags: 0x200000000000000(node=0|zone=2) [ 16.372734] page_type: f5(slab) [ 16.373703] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.374179] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.374813] page dumped because: kasan: bad access detected [ 16.375359] [ 16.375592] Memory state around the buggy address: [ 16.376661] ffff888102971900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.377331] ffff888102971980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.377827] >ffff888102971a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.378403] ^ [ 16.379012] ffff888102971a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.379554] ffff888102971b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.379979] ================================================================== [ 16.383030] ================================================================== [ 16.383860] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 16.384531] Write of size 1 at addr ffff888102971a78 by task kunit_try_catch/144 [ 16.385043] [ 16.385660] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 16.385767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.385798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.385842] Call Trace: [ 16.385904] <TASK> [ 16.385947] dump_stack_lvl+0x73/0xb0 [ 16.386032] print_report+0xd1/0x650 [ 16.386086] ? __virt_addr_valid+0x1db/0x2d0 [ 16.386136] ? kmalloc_oob_right+0x6bf/0x7f0 [ 16.386185] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.386246] ? kmalloc_oob_right+0x6bf/0x7f0 [ 16.386299] kasan_report+0x140/0x180 [ 16.386353] ? kmalloc_oob_right+0x6bf/0x7f0 [ 16.386420] __asan_report_store1_noabort+0x1b/0x30 [ 16.386482] kmalloc_oob_right+0x6bf/0x7f0 [ 16.386538] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.386592] ? __schedule+0xce8/0x2840 [ 16.386634] ? __pfx_read_tsc+0x10/0x10 [ 16.386664] ? ktime_get_ts64+0x86/0x230 [ 16.386696] kunit_try_run_case+0x1a6/0x480 [ 16.386727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.386753] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.386781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.386810] ? __kthread_parkme+0x82/0x160 [ 16.386837] ? preempt_count_sub+0x50/0x80 [ 16.386888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.386918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.386950] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.386981] kthread+0x324/0x6e0 [ 16.387007] ? trace_preempt_on+0x20/0xc0 [ 16.387036] ? __pfx_kthread+0x10/0x10 [ 16.387102] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.387130] ? calculate_sigpending+0x7b/0xa0 [ 16.387158] ? __pfx_kthread+0x10/0x10 [ 16.387185] ret_from_fork+0x41/0x80 [ 16.387209] ? __pfx_kthread+0x10/0x10 [ 16.387236] ret_from_fork_asm+0x1a/0x30 [ 16.387275] </TASK> [ 16.387289] [ 16.401028] Allocated by task 144: [ 16.401539] kasan_save_stack+0x45/0x70 [ 16.402056] kasan_save_track+0x18/0x40 [ 16.402522] kasan_save_alloc_info+0x3b/0x50 [ 16.403006] __kasan_kmalloc+0xb7/0xc0 [ 16.403339] __kmalloc_cache_noprof+0x18a/0x420 [ 16.403642] kmalloc_oob_right+0xaa/0x7f0 [ 16.404089] kunit_try_run_case+0x1a6/0x480 [ 16.404476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.404983] kthread+0x324/0x6e0 [ 16.405370] ret_from_fork+0x41/0x80 [ 16.405756] ret_from_fork_asm+0x1a/0x30 [ 16.406195] [ 16.406465] The buggy address belongs to the object at ffff888102971a00 [ 16.406465] which belongs to the cache kmalloc-128 of size 128 [ 16.407244] The buggy address is located 5 bytes to the right of [ 16.407244] allocated 115-byte region [ffff888102971a00, ffff888102971a73) [ 16.408199] [ 16.408478] The buggy address belongs to the physical page: [ 16.408969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102971 [ 16.409604] flags: 0x200000000000000(node=0|zone=2) [ 16.410122] page_type: f5(slab) [ 16.410449] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.411053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.411631] page dumped because: kasan: bad access detected [ 16.412176] [ 16.412398] Memory state around the buggy address: [ 16.412733] ffff888102971900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.413464] ffff888102971980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.413832] >ffff888102971a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.414484] ^ [ 16.415092] ffff888102971a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.415614] ffff888102971b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.416228] ================================================================== [ 16.417849] ================================================================== [ 16.418618] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 16.419466] Read of size 1 at addr ffff888102971a80 by task kunit_try_catch/144 [ 16.420066] [ 16.420330] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 16.420466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.420491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.420528] Call Trace: [ 16.420564] <TASK> [ 16.420597] dump_stack_lvl+0x73/0xb0 [ 16.420664] print_report+0xd1/0x650 [ 16.420704] ? __virt_addr_valid+0x1db/0x2d0 [ 16.420740] ? kmalloc_oob_right+0x68c/0x7f0 [ 16.420776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.420821] ? kmalloc_oob_right+0x68c/0x7f0 [ 16.420859] kasan_report+0x140/0x180 [ 16.420922] ? kmalloc_oob_right+0x68c/0x7f0 [ 16.420967] __asan_report_load1_noabort+0x18/0x20 [ 16.421009] kmalloc_oob_right+0x68c/0x7f0 [ 16.421051] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.421091] ? __schedule+0xce8/0x2840 [ 16.421140] ? __pfx_read_tsc+0x10/0x10 [ 16.421191] ? ktime_get_ts64+0x86/0x230 [ 16.421252] kunit_try_run_case+0x1a6/0x480 [ 16.421324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.421378] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.421426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.421470] ? __kthread_parkme+0x82/0x160 [ 16.421513] ? preempt_count_sub+0x50/0x80 [ 16.421557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.421597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.421646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.421691] kthread+0x324/0x6e0 [ 16.421731] ? trace_preempt_on+0x20/0xc0 [ 16.421774] ? __pfx_kthread+0x10/0x10 [ 16.421803] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.421833] ? calculate_sigpending+0x7b/0xa0 [ 16.421860] ? __pfx_kthread+0x10/0x10 [ 16.421921] ret_from_fork+0x41/0x80 [ 16.421958] ? __pfx_kthread+0x10/0x10 [ 16.422006] ret_from_fork_asm+0x1a/0x30 [ 16.422076] </TASK> [ 16.422100] [ 16.434474] Allocated by task 144: [ 16.434911] kasan_save_stack+0x45/0x70 [ 16.435368] kasan_save_track+0x18/0x40 [ 16.436066] kasan_save_alloc_info+0x3b/0x50 [ 16.437074] __kasan_kmalloc+0xb7/0xc0 [ 16.437941] __kmalloc_cache_noprof+0x18a/0x420 [ 16.438915] kmalloc_oob_right+0xaa/0x7f0 [ 16.439592] kunit_try_run_case+0x1a6/0x480 [ 16.440471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.440955] kthread+0x324/0x6e0 [ 16.441427] ret_from_fork+0x41/0x80 [ 16.441920] ret_from_fork_asm+0x1a/0x30 [ 16.442464] [ 16.442614] The buggy address belongs to the object at ffff888102971a00 [ 16.442614] which belongs to the cache kmalloc-128 of size 128 [ 16.443446] The buggy address is located 13 bytes to the right of [ 16.443446] allocated 115-byte region [ffff888102971a00, ffff888102971a73) [ 16.444642] [ 16.444857] The buggy address belongs to the physical page: [ 16.445394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102971 [ 16.446069] flags: 0x200000000000000(node=0|zone=2) [ 16.446597] page_type: f5(slab) [ 16.446890] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.447245] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.447840] page dumped because: kasan: bad access detected [ 16.448418] [ 16.448574] Memory state around the buggy address: [ 16.448826] ffff888102971980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.449281] ffff888102971a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.449857] >ffff888102971a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.450331] ^ [ 16.450677] ffff888102971b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.451164] ffff888102971b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.451810] ==================================================================