Date
July 22, 2025, 2:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.802324] ================================================================== [ 16.802393] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.802512] Write of size 1 at addr fff00000c6fb0078 by task kunit_try_catch/138 [ 16.802578] [ 16.802638] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 16.802783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.802853] Hardware name: linux,dummy-virt (DT) [ 16.802896] Call trace: [ 16.802918] show_stack+0x20/0x38 (C) [ 16.803014] dump_stack_lvl+0x8c/0xd0 [ 16.803081] print_report+0x118/0x5d0 [ 16.803125] kasan_report+0xdc/0x128 [ 16.803167] __asan_report_store1_noabort+0x20/0x30 [ 16.803216] kmalloc_oob_right+0x538/0x660 [ 16.803266] kunit_try_run_case+0x170/0x3f0 [ 16.803323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.803401] kthread+0x328/0x630 [ 16.803447] ret_from_fork+0x10/0x20 [ 16.803492] [ 16.803510] Allocated by task 138: [ 16.803537] kasan_save_stack+0x3c/0x68 [ 16.803573] kasan_save_track+0x20/0x40 [ 16.803607] kasan_save_alloc_info+0x40/0x58 [ 16.803643] __kasan_kmalloc+0xd4/0xd8 [ 16.803677] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.803877] kmalloc_oob_right+0xb0/0x660 [ 16.803920] kunit_try_run_case+0x170/0x3f0 [ 16.804045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.804098] kthread+0x328/0x630 [ 16.804132] ret_from_fork+0x10/0x20 [ 16.804201] [ 16.804270] The buggy address belongs to the object at fff00000c6fb0000 [ 16.804270] which belongs to the cache kmalloc-128 of size 128 [ 16.804347] The buggy address is located 5 bytes to the right of [ 16.804347] allocated 115-byte region [fff00000c6fb0000, fff00000c6fb0073) [ 16.804407] [ 16.804428] The buggy address belongs to the physical page: [ 16.804456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0 [ 16.804504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.804849] page_type: f5(slab) [ 16.805030] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.805142] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.805209] page dumped because: kasan: bad access detected [ 16.805239] [ 16.805257] Memory state around the buggy address: [ 16.806067] fff00000c6faff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.806146] fff00000c6faff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.806204] >fff00000c6fb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.806304] ^ [ 16.806399] fff00000c6fb0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.806455] fff00000c6fb0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.806522] ================================================================== [ 16.795456] ================================================================== [ 16.795799] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.796638] Write of size 1 at addr fff00000c6fb0073 by task kunit_try_catch/138 [ 16.796743] [ 16.797511] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.8-rc1 #1 PREEMPT [ 16.797652] Tainted: [N]=TEST [ 16.797684] Hardware name: linux,dummy-virt (DT) [ 16.797901] Call trace: [ 16.798064] show_stack+0x20/0x38 (C) [ 16.798194] dump_stack_lvl+0x8c/0xd0 [ 16.798256] print_report+0x118/0x5d0 [ 16.798315] kasan_report+0xdc/0x128 [ 16.798358] __asan_report_store1_noabort+0x20/0x30 [ 16.798407] kmalloc_oob_right+0x5a4/0x660 [ 16.798454] kunit_try_run_case+0x170/0x3f0 [ 16.798505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.798554] kthread+0x328/0x630 [ 16.798600] ret_from_fork+0x10/0x20 [ 16.798793] [ 16.798855] Allocated by task 138: [ 16.798972] kasan_save_stack+0x3c/0x68 [ 16.799038] kasan_save_track+0x20/0x40 [ 16.799074] kasan_save_alloc_info+0x40/0x58 [ 16.799111] __kasan_kmalloc+0xd4/0xd8 [ 16.799145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.799182] kmalloc_oob_right+0xb0/0x660 [ 16.799219] kunit_try_run_case+0x170/0x3f0 [ 16.799257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.799309] kthread+0x328/0x630 [ 16.799343] ret_from_fork+0x10/0x20 [ 16.799397] [ 16.799455] The buggy address belongs to the object at fff00000c6fb0000 [ 16.799455] which belongs to the cache kmalloc-128 of size 128 [ 16.799546] The buggy address is located 0 bytes to the right of [ 16.799546] allocated 115-byte region [fff00000c6fb0000, fff00000c6fb0073) [ 16.799610] [ 16.799690] The buggy address belongs to the physical page: [ 16.799864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0 [ 16.800122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.800417] page_type: f5(slab) [ 16.800704] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.800766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.800869] page dumped because: kasan: bad access detected [ 16.800908] [ 16.800933] Memory state around the buggy address: [ 16.801140] fff00000c6faff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.801203] fff00000c6faff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.801254] >fff00000c6fb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.801320] ^ [ 16.801412] fff00000c6fb0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.801459] fff00000c6fb0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.801523] ================================================================== [ 16.807495] ================================================================== [ 16.807543] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.807591] Read of size 1 at addr fff00000c6fb0080 by task kunit_try_catch/138 [ 16.807637] [ 16.807675] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 16.807766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.807798] Hardware name: linux,dummy-virt (DT) [ 16.807830] Call trace: [ 16.807859] show_stack+0x20/0x38 (C) [ 16.807905] dump_stack_lvl+0x8c/0xd0 [ 16.807951] print_report+0x118/0x5d0 [ 16.807994] kasan_report+0xdc/0x128 [ 16.808036] __asan_report_load1_noabort+0x20/0x30 [ 16.808091] kmalloc_oob_right+0x5d0/0x660 [ 16.808147] kunit_try_run_case+0x170/0x3f0 [ 16.808193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.808241] kthread+0x328/0x630 [ 16.808297] ret_from_fork+0x10/0x20 [ 16.808342] [ 16.808360] Allocated by task 138: [ 16.808385] kasan_save_stack+0x3c/0x68 [ 16.808421] kasan_save_track+0x20/0x40 [ 16.808455] kasan_save_alloc_info+0x40/0x58 [ 16.808491] __kasan_kmalloc+0xd4/0xd8 [ 16.808524] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.808560] kmalloc_oob_right+0xb0/0x660 [ 16.808829] kunit_try_run_case+0x170/0x3f0 [ 16.808882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.808942] kthread+0x328/0x630 [ 16.809163] ret_from_fork+0x10/0x20 [ 16.809203] [ 16.809260] The buggy address belongs to the object at fff00000c6fb0000 [ 16.809260] which belongs to the cache kmalloc-128 of size 128 [ 16.809357] The buggy address is located 13 bytes to the right of [ 16.809357] allocated 115-byte region [fff00000c6fb0000, fff00000c6fb0073) [ 16.809424] [ 16.809443] The buggy address belongs to the physical page: [ 16.809491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0 [ 16.809557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.809602] page_type: f5(slab) [ 16.809637] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.809690] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.809736] page dumped because: kasan: bad access detected [ 16.809765] [ 16.809782] Memory state around the buggy address: [ 16.809811] fff00000c6faff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.809851] fff00000c6fb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.809902] >fff00000c6fb0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.809938] ^ [ 16.809963] fff00000c6fb0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.810003] fff00000c6fb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.810040] ==================================================================
[ 10.347960] ================================================================== [ 10.348415] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 10.349025] Write of size 1 at addr ffff88810306a578 by task kunit_try_catch/156 [ 10.349589] [ 10.349795] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 10.349841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.349852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.349873] Call Trace: [ 10.349890] <TASK> [ 10.349907] dump_stack_lvl+0x73/0xb0 [ 10.349933] print_report+0xd1/0x610 [ 10.349955] ? __virt_addr_valid+0x1db/0x2d0 [ 10.349977] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.349998] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.350019] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.350041] kasan_report+0x141/0x180 [ 10.350062] ? kmalloc_oob_right+0x6bd/0x7f0 [ 10.350089] __asan_report_store1_noabort+0x1b/0x30 [ 10.350109] kmalloc_oob_right+0x6bd/0x7f0 [ 10.350131] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.350154] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.350180] kunit_try_run_case+0x1a5/0x480 [ 10.350235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.350254] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.350274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.350309] ? __kthread_parkme+0x82/0x180 [ 10.350331] ? preempt_count_sub+0x50/0x80 [ 10.350356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.350376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.350399] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.350421] kthread+0x337/0x6f0 [ 10.350437] ? trace_preempt_on+0x20/0xc0 [ 10.350460] ? __pfx_kthread+0x10/0x10 [ 10.350477] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.350499] ? calculate_sigpending+0x7b/0xa0 [ 10.350520] ? __pfx_kthread+0x10/0x10 [ 10.350538] ret_from_fork+0x41/0x80 [ 10.350559] ? __pfx_kthread+0x10/0x10 [ 10.350576] ret_from_fork_asm+0x1a/0x30 [ 10.350607] </TASK> [ 10.350617] [ 10.362569] Allocated by task 156: [ 10.363021] kasan_save_stack+0x45/0x70 [ 10.363453] kasan_save_track+0x18/0x40 [ 10.363862] kasan_save_alloc_info+0x3b/0x50 [ 10.364290] __kasan_kmalloc+0xb7/0xc0 [ 10.364458] __kmalloc_cache_noprof+0x189/0x420 [ 10.364617] kmalloc_oob_right+0xa9/0x7f0 [ 10.364757] kunit_try_run_case+0x1a5/0x480 [ 10.364900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.365181] kthread+0x337/0x6f0 [ 10.365364] ret_from_fork+0x41/0x80 [ 10.365549] ret_from_fork_asm+0x1a/0x30 [ 10.365832] [ 10.365930] The buggy address belongs to the object at ffff88810306a500 [ 10.365930] which belongs to the cache kmalloc-128 of size 128 [ 10.366401] The buggy address is located 5 bytes to the right of [ 10.366401] allocated 115-byte region [ffff88810306a500, ffff88810306a573) [ 10.366988] [ 10.367118] The buggy address belongs to the physical page: [ 10.367395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10306a [ 10.367642] flags: 0x200000000000000(node=0|zone=2) [ 10.367929] page_type: f5(slab) [ 10.368098] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.368602] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.369047] page dumped because: kasan: bad access detected [ 10.369328] [ 10.369454] Memory state around the buggy address: [ 10.369613] ffff88810306a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.370249] ffff88810306a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.370647] >ffff88810306a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.370858] ^ [ 10.371068] ffff88810306a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.371686] ffff88810306a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.371998] ================================================================== [ 10.372627] ================================================================== [ 10.373100] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 10.373532] Read of size 1 at addr ffff88810306a580 by task kunit_try_catch/156 [ 10.373900] [ 10.373994] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 10.374037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.374048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.374068] Call Trace: [ 10.374086] <TASK> [ 10.374103] dump_stack_lvl+0x73/0xb0 [ 10.374128] print_report+0xd1/0x610 [ 10.374151] ? __virt_addr_valid+0x1db/0x2d0 [ 10.374172] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.374192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.374215] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.374246] kasan_report+0x141/0x180 [ 10.374269] ? kmalloc_oob_right+0x68a/0x7f0 [ 10.374296] __asan_report_load1_noabort+0x18/0x20 [ 10.374316] kmalloc_oob_right+0x68a/0x7f0 [ 10.374338] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.374374] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.374401] kunit_try_run_case+0x1a5/0x480 [ 10.374456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.374476] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.374496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.374548] ? __kthread_parkme+0x82/0x180 [ 10.374570] ? preempt_count_sub+0x50/0x80 [ 10.374623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.374642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.374665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.374687] kthread+0x337/0x6f0 [ 10.374703] ? trace_preempt_on+0x20/0xc0 [ 10.374726] ? __pfx_kthread+0x10/0x10 [ 10.374743] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.374764] ? calculate_sigpending+0x7b/0xa0 [ 10.374785] ? __pfx_kthread+0x10/0x10 [ 10.374803] ret_from_fork+0x41/0x80 [ 10.374825] ? __pfx_kthread+0x10/0x10 [ 10.374842] ret_from_fork_asm+0x1a/0x30 [ 10.374873] </TASK> [ 10.374883] [ 10.382043] Allocated by task 156: [ 10.382346] kasan_save_stack+0x45/0x70 [ 10.382524] kasan_save_track+0x18/0x40 [ 10.382686] kasan_save_alloc_info+0x3b/0x50 [ 10.382827] __kasan_kmalloc+0xb7/0xc0 [ 10.382953] __kmalloc_cache_noprof+0x189/0x420 [ 10.383099] kmalloc_oob_right+0xa9/0x7f0 [ 10.383242] kunit_try_run_case+0x1a5/0x480 [ 10.383378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.383646] kthread+0x337/0x6f0 [ 10.383812] ret_from_fork+0x41/0x80 [ 10.383996] ret_from_fork_asm+0x1a/0x30 [ 10.384183] [ 10.384284] The buggy address belongs to the object at ffff88810306a500 [ 10.384284] which belongs to the cache kmalloc-128 of size 128 [ 10.384793] The buggy address is located 13 bytes to the right of [ 10.384793] allocated 115-byte region [ffff88810306a500, ffff88810306a573) [ 10.385667] [ 10.385735] The buggy address belongs to the physical page: [ 10.385898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10306a [ 10.386129] flags: 0x200000000000000(node=0|zone=2) [ 10.386306] page_type: f5(slab) [ 10.386496] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.386837] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.387554] page dumped because: kasan: bad access detected [ 10.387970] [ 10.388038] Memory state around the buggy address: [ 10.388291] ffff88810306a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.388650] ffff88810306a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.389065] >ffff88810306a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.389468] ^ [ 10.389691] ffff88810306a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.390113] ffff88810306a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.390497] ================================================================== [ 10.308995] ================================================================== [ 10.309955] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 10.310610] Write of size 1 at addr ffff88810306a573 by task kunit_try_catch/156 [ 10.310910] [ 10.311846] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 10.313103] Tainted: [N]=TEST [ 10.313145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.313462] Call Trace: [ 10.313553] <TASK> [ 10.313794] dump_stack_lvl+0x73/0xb0 [ 10.313898] print_report+0xd1/0x610 [ 10.313927] ? __virt_addr_valid+0x1db/0x2d0 [ 10.313951] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.313972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.313993] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.314015] kasan_report+0x141/0x180 [ 10.314037] ? kmalloc_oob_right+0x6f0/0x7f0 [ 10.314064] __asan_report_store1_noabort+0x1b/0x30 [ 10.314084] kmalloc_oob_right+0x6f0/0x7f0 [ 10.314106] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.314130] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 10.314161] kunit_try_run_case+0x1a5/0x480 [ 10.314183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.314201] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 10.314232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 10.314256] ? __kthread_parkme+0x82/0x180 [ 10.314278] ? preempt_count_sub+0x50/0x80 [ 10.314306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.314325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.314354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.314376] kthread+0x337/0x6f0 [ 10.314392] ? trace_preempt_on+0x20/0xc0 [ 10.314417] ? __pfx_kthread+0x10/0x10 [ 10.314434] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.314455] ? calculate_sigpending+0x7b/0xa0 [ 10.314477] ? __pfx_kthread+0x10/0x10 [ 10.314495] ret_from_fork+0x41/0x80 [ 10.314516] ? __pfx_kthread+0x10/0x10 [ 10.314533] ret_from_fork_asm+0x1a/0x30 [ 10.314591] </TASK> [ 10.314657] [ 10.328525] Allocated by task 156: [ 10.329014] kasan_save_stack+0x45/0x70 [ 10.329336] kasan_save_track+0x18/0x40 [ 10.329682] kasan_save_alloc_info+0x3b/0x50 [ 10.329855] __kasan_kmalloc+0xb7/0xc0 [ 10.330172] __kmalloc_cache_noprof+0x189/0x420 [ 10.330673] kmalloc_oob_right+0xa9/0x7f0 [ 10.330968] kunit_try_run_case+0x1a5/0x480 [ 10.331131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.331646] kthread+0x337/0x6f0 [ 10.331828] ret_from_fork+0x41/0x80 [ 10.332263] ret_from_fork_asm+0x1a/0x30 [ 10.332586] [ 10.332825] The buggy address belongs to the object at ffff88810306a500 [ 10.332825] which belongs to the cache kmalloc-128 of size 128 [ 10.333947] The buggy address is located 0 bytes to the right of [ 10.333947] allocated 115-byte region [ffff88810306a500, ffff88810306a573) [ 10.335300] [ 10.335499] The buggy address belongs to the physical page: [ 10.336453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10306a [ 10.337561] flags: 0x200000000000000(node=0|zone=2) [ 10.338567] page_type: f5(slab) [ 10.339017] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.339269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.340198] page dumped because: kasan: bad access detected [ 10.340818] [ 10.341079] Memory state around the buggy address: [ 10.341841] ffff88810306a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.342709] ffff88810306a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.343499] >ffff88810306a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 10.344281] ^ [ 10.345037] ffff88810306a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.345708] ffff88810306a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.346131] ==================================================================