Date
July 15, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.495867] ================================================================== [ 17.495919] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.496036] Read of size 1 at addr fff00000c47f9a80 by task kunit_try_catch/138 [ 17.496090] [ 17.496119] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.496198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.496243] Hardware name: linux,dummy-virt (DT) [ 17.496375] Call trace: [ 17.496400] show_stack+0x20/0x38 (C) [ 17.496485] dump_stack_lvl+0x8c/0xd0 [ 17.496762] print_report+0x118/0x5d0 [ 17.496948] kasan_report+0xdc/0x128 [ 17.496993] __asan_report_load1_noabort+0x20/0x30 [ 17.497157] kmalloc_oob_right+0x5d0/0x660 [ 17.497228] kunit_try_run_case+0x170/0x3f0 [ 17.497275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.497565] kthread+0x328/0x630 [ 17.497903] ret_from_fork+0x10/0x20 [ 17.498022] [ 17.498057] Allocated by task 138: [ 17.498084] kasan_save_stack+0x3c/0x68 [ 17.498124] kasan_save_track+0x20/0x40 [ 17.498160] kasan_save_alloc_info+0x40/0x58 [ 17.498198] __kasan_kmalloc+0xd4/0xd8 [ 17.498243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.498291] kmalloc_oob_right+0xb0/0x660 [ 17.498331] kunit_try_run_case+0x170/0x3f0 [ 17.498368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.498420] kthread+0x328/0x630 [ 17.498463] ret_from_fork+0x10/0x20 [ 17.498505] [ 17.498535] The buggy address belongs to the object at fff00000c47f9a00 [ 17.498535] which belongs to the cache kmalloc-128 of size 128 [ 17.498594] The buggy address is located 13 bytes to the right of [ 17.498594] allocated 115-byte region [fff00000c47f9a00, fff00000c47f9a73) [ 17.498667] [ 17.498687] The buggy address belongs to the physical page: [ 17.498717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.498768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.498825] page_type: f5(slab) [ 17.498870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.498921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.498961] page dumped because: kasan: bad access detected [ 17.498991] [ 17.499014] Memory state around the buggy address: [ 17.499053] fff00000c47f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.499103] fff00000c47f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.499155] >fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.499192] ^ [ 17.499237] fff00000c47f9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.499286] fff00000c47f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.499333] ================================================================== [ 17.488487] ================================================================== [ 17.488528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.488575] Write of size 1 at addr fff00000c47f9a78 by task kunit_try_catch/138 [ 17.488624] [ 17.488652] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.488731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.488771] Hardware name: linux,dummy-virt (DT) [ 17.488801] Call trace: [ 17.488821] show_stack+0x20/0x38 (C) [ 17.488867] dump_stack_lvl+0x8c/0xd0 [ 17.488923] print_report+0x118/0x5d0 [ 17.488968] kasan_report+0xdc/0x128 [ 17.489029] __asan_report_store1_noabort+0x20/0x30 [ 17.489095] kmalloc_oob_right+0x538/0x660 [ 17.489313] kunit_try_run_case+0x170/0x3f0 [ 17.489421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.489505] kthread+0x328/0x630 [ 17.489902] ret_from_fork+0x10/0x20 [ 17.489961] [ 17.489979] Allocated by task 138: [ 17.490005] kasan_save_stack+0x3c/0x68 [ 17.490052] kasan_save_track+0x20/0x40 [ 17.490358] kasan_save_alloc_info+0x40/0x58 [ 17.490437] __kasan_kmalloc+0xd4/0xd8 [ 17.490473] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.491361] kmalloc_oob_right+0xb0/0x660 [ 17.491694] kunit_try_run_case+0x170/0x3f0 [ 17.491745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.492037] kthread+0x328/0x630 [ 17.492131] ret_from_fork+0x10/0x20 [ 17.492233] [ 17.492310] The buggy address belongs to the object at fff00000c47f9a00 [ 17.492310] which belongs to the cache kmalloc-128 of size 128 [ 17.492413] The buggy address is located 5 bytes to the right of [ 17.492413] allocated 115-byte region [fff00000c47f9a00, fff00000c47f9a73) [ 17.492796] [ 17.493055] The buggy address belongs to the physical page: [ 17.493111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.493234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.493285] page_type: f5(slab) [ 17.493370] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.493421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.493462] page dumped because: kasan: bad access detected [ 17.493492] [ 17.493510] Memory state around the buggy address: [ 17.493540] fff00000c47f9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.493916] fff00000c47f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494014] >fff00000c47f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.494189] ^ [ 17.494257] fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494302] fff00000c47f9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494350] ================================================================== [ 17.480004] ================================================================== [ 17.480380] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.481194] Write of size 1 at addr fff00000c47f9a73 by task kunit_try_catch/138 [ 17.481318] [ 17.482232] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.7-rc1 #1 PREEMPT [ 17.482376] Tainted: [N]=TEST [ 17.482408] Hardware name: linux,dummy-virt (DT) [ 17.482620] Call trace: [ 17.482785] show_stack+0x20/0x38 (C) [ 17.482915] dump_stack_lvl+0x8c/0xd0 [ 17.482978] print_report+0x118/0x5d0 [ 17.483031] kasan_report+0xdc/0x128 [ 17.483077] __asan_report_store1_noabort+0x20/0x30 [ 17.483128] kmalloc_oob_right+0x5a4/0x660 [ 17.483176] kunit_try_run_case+0x170/0x3f0 [ 17.483239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.483293] kthread+0x328/0x630 [ 17.483340] ret_from_fork+0x10/0x20 [ 17.483493] [ 17.483531] Allocated by task 138: [ 17.483639] kasan_save_stack+0x3c/0x68 [ 17.483702] kasan_save_track+0x20/0x40 [ 17.483739] kasan_save_alloc_info+0x40/0x58 [ 17.483777] __kasan_kmalloc+0xd4/0xd8 [ 17.483811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.483849] kmalloc_oob_right+0xb0/0x660 [ 17.483887] kunit_try_run_case+0x170/0x3f0 [ 17.483925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.483968] kthread+0x328/0x630 [ 17.484003] ret_from_fork+0x10/0x20 [ 17.484054] [ 17.484110] The buggy address belongs to the object at fff00000c47f9a00 [ 17.484110] which belongs to the cache kmalloc-128 of size 128 [ 17.484217] The buggy address is located 0 bytes to the right of [ 17.484217] allocated 115-byte region [fff00000c47f9a00, fff00000c47f9a73) [ 17.484286] [ 17.484368] The buggy address belongs to the physical page: [ 17.484537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.484796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.485076] page_type: f5(slab) [ 17.485385] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.485454] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.485562] page dumped because: kasan: bad access detected [ 17.485602] [ 17.485627] Memory state around the buggy address: [ 17.485838] fff00000c47f9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.485904] fff00000c47f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.485958] >fff00000c47f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.486011] ^ [ 17.486091] fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.486133] fff00000c47f9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.486196] ==================================================================
[ 10.343077] ================================================================== [ 10.343347] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.343649] Write of size 1 at addr ffff888102f2a878 by task kunit_try_catch/155 [ 10.343961] [ 10.344194] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 10.344237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.344247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.344266] Call Trace: [ 10.344278] <TASK> [ 10.344291] dump_stack_lvl+0x73/0xb0 [ 10.344315] print_report+0xd1/0x610 [ 10.344336] ? __virt_addr_valid+0x1db/0x2d0 [ 10.344356] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.344376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.344397] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.344419] kasan_report+0x141/0x180 [ 10.344440] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.344466] __asan_report_store1_noabort+0x1b/0x30 [ 10.344486] kmalloc_oob_right+0x6bd/0x7f0 [ 10.344508] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.344532] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.344558] kunit_try_run_case+0x1a5/0x480 [ 10.344578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.344595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.344617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.344640] ? __kthread_parkme+0x82/0x180 [ 10.344660] ? preempt_count_sub+0x50/0x80 [ 10.344735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.344758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.344780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.344802] kthread+0x337/0x6f0 [ 10.344818] ? trace_preempt_on+0x20/0xc0 [ 10.344840] ? __pfx_kthread+0x10/0x10 [ 10.344857] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.344889] ? calculate_sigpending+0x7b/0xa0 [ 10.344910] ? __pfx_kthread+0x10/0x10 [ 10.344927] ret_from_fork+0x41/0x80 [ 10.344947] ? __pfx_kthread+0x10/0x10 [ 10.344964] ret_from_fork_asm+0x1a/0x30 [ 10.344993] </TASK> [ 10.345002] [ 10.351145] Allocated by task 155: [ 10.351318] kasan_save_stack+0x45/0x70 [ 10.351522] kasan_save_track+0x18/0x40 [ 10.351708] kasan_save_alloc_info+0x3b/0x50 [ 10.352144] __kasan_kmalloc+0xb7/0xc0 [ 10.352345] __kmalloc_cache_noprof+0x189/0x420 [ 10.352500] kmalloc_oob_right+0xa9/0x7f0 [ 10.352639] kunit_try_run_case+0x1a5/0x480 [ 10.352780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.353324] kthread+0x337/0x6f0 [ 10.353499] ret_from_fork+0x41/0x80 [ 10.353683] ret_from_fork_asm+0x1a/0x30 [ 10.354001] [ 10.354081] The buggy address belongs to the object at ffff888102f2a800 [ 10.354081] which belongs to the cache kmalloc-128 of size 128 [ 10.354542] The buggy address is located 5 bytes to the right of [ 10.354542] allocated 115-byte region [ffff888102f2a800, ffff888102f2a873) [ 10.355118] [ 10.355213] The buggy address belongs to the physical page: [ 10.355423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f2a [ 10.355775] flags: 0x200000000000000(node=0|zone=2) [ 10.356188] page_type: f5(slab) [ 10.356367] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.356656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.356999] page dumped because: kasan: bad access detected [ 10.357177] [ 10.357245] Memory state around the buggy address: [ 10.357398] ffff888102f2a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.357653] ffff888102f2a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.358074] >ffff888102f2a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.358391] ^ [ 10.358696] ffff888102f2a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.359076] ffff888102f2a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.359347] ================================================================== [ 10.315067] ================================================================== [ 10.315857] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.316573] Write of size 1 at addr ffff888102f2a873 by task kunit_try_catch/155 [ 10.317086] [ 10.318069] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 10.318342] Tainted: [N]=TEST [ 10.318373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.318602] Call Trace: [ 10.318670] <TASK> [ 10.318842] dump_stack_lvl+0x73/0xb0 [ 10.318937] print_report+0xd1/0x610 [ 10.318965] ? __virt_addr_valid+0x1db/0x2d0 [ 10.318988] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.319009] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.319031] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.319053] kasan_report+0x141/0x180 [ 10.319075] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.319101] __asan_report_store1_noabort+0x1b/0x30 [ 10.319122] kmalloc_oob_right+0x6f0/0x7f0 [ 10.319143] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.319167] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.319193] kunit_try_run_case+0x1a5/0x480 [ 10.319215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.319232] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.319257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.319280] ? __kthread_parkme+0x82/0x180 [ 10.319302] ? preempt_count_sub+0x50/0x80 [ 10.319328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.319347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.319369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.319391] kthread+0x337/0x6f0 [ 10.319407] ? trace_preempt_on+0x20/0xc0 [ 10.319431] ? __pfx_kthread+0x10/0x10 [ 10.319448] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.319469] ? calculate_sigpending+0x7b/0xa0 [ 10.319491] ? __pfx_kthread+0x10/0x10 [ 10.319508] ret_from_fork+0x41/0x80 [ 10.319529] ? __pfx_kthread+0x10/0x10 [ 10.319546] ret_from_fork_asm+0x1a/0x30 [ 10.319595] </TASK> [ 10.319656] [ 10.328846] Allocated by task 155: [ 10.329632] kasan_save_stack+0x45/0x70 [ 10.330025] kasan_save_track+0x18/0x40 [ 10.330222] kasan_save_alloc_info+0x3b/0x50 [ 10.330590] __kasan_kmalloc+0xb7/0xc0 [ 10.330753] __kmalloc_cache_noprof+0x189/0x420 [ 10.331347] kmalloc_oob_right+0xa9/0x7f0 [ 10.331542] kunit_try_run_case+0x1a5/0x480 [ 10.331928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.332185] kthread+0x337/0x6f0 [ 10.332558] ret_from_fork+0x41/0x80 [ 10.332748] ret_from_fork_asm+0x1a/0x30 [ 10.333242] [ 10.333393] The buggy address belongs to the object at ffff888102f2a800 [ 10.333393] which belongs to the cache kmalloc-128 of size 128 [ 10.334369] The buggy address is located 0 bytes to the right of [ 10.334369] allocated 115-byte region [ffff888102f2a800, ffff888102f2a873) [ 10.335273] [ 10.335448] The buggy address belongs to the physical page: [ 10.336171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f2a [ 10.336773] flags: 0x200000000000000(node=0|zone=2) [ 10.337398] page_type: f5(slab) [ 10.337887] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.338198] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.338585] page dumped because: kasan: bad access detected [ 10.338807] [ 10.339059] Memory state around the buggy address: [ 10.339554] ffff888102f2a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.340019] ffff888102f2a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.340390] >ffff888102f2a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.340701] ^ [ 10.341074] ffff888102f2a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.341360] ffff888102f2a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.341677] ================================================================== [ 10.360913] ================================================================== [ 10.361260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.361587] Read of size 1 at addr ffff888102f2a880 by task kunit_try_catch/155 [ 10.362356] [ 10.362460] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 10.362501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.362512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.362530] Call Trace: [ 10.362542] <TASK> [ 10.362555] dump_stack_lvl+0x73/0xb0 [ 10.362578] print_report+0xd1/0x610 [ 10.362600] ? __virt_addr_valid+0x1db/0x2d0 [ 10.362619] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.362639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.362661] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.362682] kasan_report+0x141/0x180 [ 10.362818] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.362845] __asan_report_load1_noabort+0x18/0x20 [ 10.362864] kmalloc_oob_right+0x68a/0x7f0 [ 10.362899] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.362923] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.362948] kunit_try_run_case+0x1a5/0x480 [ 10.362969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.362987] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.363010] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.363032] ? __kthread_parkme+0x82/0x180 [ 10.363053] ? preempt_count_sub+0x50/0x80 [ 10.363077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.363095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.363117] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.363139] kthread+0x337/0x6f0 [ 10.363155] ? trace_preempt_on+0x20/0xc0 [ 10.363176] ? __pfx_kthread+0x10/0x10 [ 10.363193] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.363213] ? calculate_sigpending+0x7b/0xa0 [ 10.363233] ? __pfx_kthread+0x10/0x10 [ 10.363250] ret_from_fork+0x41/0x80 [ 10.363269] ? __pfx_kthread+0x10/0x10 [ 10.363286] ret_from_fork_asm+0x1a/0x30 [ 10.363315] </TASK> [ 10.363324] [ 10.370406] Allocated by task 155: [ 10.370582] kasan_save_stack+0x45/0x70 [ 10.370869] kasan_save_track+0x18/0x40 [ 10.371039] kasan_save_alloc_info+0x3b/0x50 [ 10.371224] __kasan_kmalloc+0xb7/0xc0 [ 10.371355] __kmalloc_cache_noprof+0x189/0x420 [ 10.371504] kmalloc_oob_right+0xa9/0x7f0 [ 10.371699] kunit_try_run_case+0x1a5/0x480 [ 10.371916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.372232] kthread+0x337/0x6f0 [ 10.372399] ret_from_fork+0x41/0x80 [ 10.372555] ret_from_fork_asm+0x1a/0x30 [ 10.372743] [ 10.372811] The buggy address belongs to the object at ffff888102f2a800 [ 10.372811] which belongs to the cache kmalloc-128 of size 128 [ 10.373411] The buggy address is located 13 bytes to the right of [ 10.373411] allocated 115-byte region [ffff888102f2a800, ffff888102f2a873) [ 10.373848] [ 10.373931] The buggy address belongs to the physical page: [ 10.374099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f2a [ 10.374836] flags: 0x200000000000000(node=0|zone=2) [ 10.375236] page_type: f5(slab) [ 10.375375] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.375604] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.375827] page dumped because: kasan: bad access detected [ 10.376033] [ 10.376192] Memory state around the buggy address: [ 10.376577] ffff888102f2a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.376905] ffff888102f2a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.377230] >ffff888102f2a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.377552] ^ [ 10.377806] ffff888102f2a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.378166] ffff888102f2a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.378377] ==================================================================