Date
July 9, 2025, 12:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.250842] ================================================================== [ 19.252298] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 19.253776] Write of size 1 at addr fff00000c638da73 by task kunit_try_catch/137 [ 19.253884] [ 19.255330] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT [ 19.256210] Tainted: [N]=TEST [ 19.256347] Hardware name: linux,dummy-virt (DT) [ 19.257850] Call trace: [ 19.258473] show_stack+0x20/0x38 (C) [ 19.259562] dump_stack_lvl+0x8c/0xd0 [ 19.259653] print_report+0x118/0x608 [ 19.259704] kasan_report+0xdc/0x128 [ 19.259751] __asan_report_store1_noabort+0x20/0x30 [ 19.259803] kmalloc_oob_right+0x5a4/0x660 [ 19.259849] kunit_try_run_case+0x170/0x3f0 [ 19.259901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.259963] kthread+0x328/0x630 [ 19.260022] ret_from_fork+0x10/0x20 [ 19.261482] [ 19.261647] Allocated by task 137: [ 19.261931] kasan_save_stack+0x3c/0x68 [ 19.262251] kasan_save_track+0x20/0x40 [ 19.262341] kasan_save_alloc_info+0x40/0x58 [ 19.262418] __kasan_kmalloc+0xd4/0xd8 [ 19.262458] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.262513] kmalloc_oob_right+0xb0/0x660 [ 19.262560] kunit_try_run_case+0x170/0x3f0 [ 19.262597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.262649] kthread+0x328/0x630 [ 19.262682] ret_from_fork+0x10/0x20 [ 19.262763] [ 19.262883] The buggy address belongs to the object at fff00000c638da00 [ 19.262883] which belongs to the cache kmalloc-128 of size 128 [ 19.262999] The buggy address is located 0 bytes to the right of [ 19.262999] allocated 115-byte region [fff00000c638da00, fff00000c638da73) [ 19.263092] [ 19.263231] The buggy address belongs to the physical page: [ 19.263481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638d [ 19.263786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.264129] page_type: f5(slab) [ 19.264451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.264516] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.264622] page dumped because: kasan: bad access detected [ 19.264662] [ 19.264687] Memory state around the buggy address: [ 19.264908] fff00000c638d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.267258] fff00000c638d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.267339] >fff00000c638da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.267456] ^ [ 19.267606] fff00000c638da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.267650] fff00000c638db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.267746] ================================================================== [ 19.274505] ================================================================== [ 19.274550] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 19.274632] Read of size 1 at addr fff00000c638da80 by task kunit_try_catch/137 [ 19.274696] [ 19.274725] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.274803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.274829] Hardware name: linux,dummy-virt (DT) [ 19.274857] Call trace: [ 19.274877] show_stack+0x20/0x38 (C) [ 19.274937] dump_stack_lvl+0x8c/0xd0 [ 19.275096] print_report+0x118/0x608 [ 19.275181] kasan_report+0xdc/0x128 [ 19.275228] __asan_report_load1_noabort+0x20/0x30 [ 19.275298] kmalloc_oob_right+0x5d0/0x660 [ 19.275387] kunit_try_run_case+0x170/0x3f0 [ 19.275457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.275531] kthread+0x328/0x630 [ 19.275573] ret_from_fork+0x10/0x20 [ 19.275705] [ 19.275737] Allocated by task 137: [ 19.275765] kasan_save_stack+0x3c/0x68 [ 19.275844] kasan_save_track+0x20/0x40 [ 19.275910] kasan_save_alloc_info+0x40/0x58 [ 19.275998] __kasan_kmalloc+0xd4/0xd8 [ 19.276124] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.276204] kmalloc_oob_right+0xb0/0x660 [ 19.276279] kunit_try_run_case+0x170/0x3f0 [ 19.276357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.276453] kthread+0x328/0x630 [ 19.276487] ret_from_fork+0x10/0x20 [ 19.276534] [ 19.276552] The buggy address belongs to the object at fff00000c638da00 [ 19.276552] which belongs to the cache kmalloc-128 of size 128 [ 19.276756] The buggy address is located 13 bytes to the right of [ 19.276756] allocated 115-byte region [fff00000c638da00, fff00000c638da73) [ 19.276987] [ 19.277030] The buggy address belongs to the physical page: [ 19.277080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638d [ 19.277163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.277209] page_type: f5(slab) [ 19.277301] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.277389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.277497] page dumped because: kasan: bad access detected [ 19.277564] [ 19.277623] Memory state around the buggy address: [ 19.277654] fff00000c638d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.278844] fff00000c638da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.278922] >fff00000c638da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.278960] ^ [ 19.278987] fff00000c638db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.279028] fff00000c638db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.279500] ================================================================== [ 19.270301] ================================================================== [ 19.270343] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 19.270393] Write of size 1 at addr fff00000c638da78 by task kunit_try_catch/137 [ 19.270523] [ 19.270559] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.270748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.270782] Hardware name: linux,dummy-virt (DT) [ 19.270961] Call trace: [ 19.271154] show_stack+0x20/0x38 (C) [ 19.271208] dump_stack_lvl+0x8c/0xd0 [ 19.271254] print_report+0x118/0x608 [ 19.271299] kasan_report+0xdc/0x128 [ 19.271345] __asan_report_store1_noabort+0x20/0x30 [ 19.271408] kmalloc_oob_right+0x538/0x660 [ 19.271453] kunit_try_run_case+0x170/0x3f0 [ 19.271504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.271555] kthread+0x328/0x630 [ 19.271597] ret_from_fork+0x10/0x20 [ 19.271645] [ 19.271662] Allocated by task 137: [ 19.271689] kasan_save_stack+0x3c/0x68 [ 19.271729] kasan_save_track+0x20/0x40 [ 19.271766] kasan_save_alloc_info+0x40/0x58 [ 19.271806] __kasan_kmalloc+0xd4/0xd8 [ 19.271843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.271881] kmalloc_oob_right+0xb0/0x660 [ 19.271916] kunit_try_run_case+0x170/0x3f0 [ 19.271953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.272076] kthread+0x328/0x630 [ 19.272131] ret_from_fork+0x10/0x20 [ 19.272353] [ 19.272448] The buggy address belongs to the object at fff00000c638da00 [ 19.272448] which belongs to the cache kmalloc-128 of size 128 [ 19.272556] The buggy address is located 5 bytes to the right of [ 19.272556] allocated 115-byte region [fff00000c638da00, fff00000c638da73) [ 19.272696] [ 19.272753] The buggy address belongs to the physical page: [ 19.272783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638d [ 19.272867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.272917] page_type: f5(slab) [ 19.272955] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.273005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.273045] page dumped because: kasan: bad access detected [ 19.273083] [ 19.273268] Memory state around the buggy address: [ 19.273353] fff00000c638d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.273467] fff00000c638d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.273572] >fff00000c638da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.273673] ^ [ 19.273730] fff00000c638da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.273774] fff00000c638db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.274093] ==================================================================
[ 11.944832] ================================================================== [ 11.945169] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.945525] Write of size 1 at addr ffff88810269aa78 by task kunit_try_catch/153 [ 11.945801] [ 11.945886] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.945936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.945949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.945970] Call Trace: [ 11.945986] <TASK> [ 11.946002] dump_stack_lvl+0x73/0xb0 [ 11.946029] print_report+0xd1/0x650 [ 11.946067] ? __virt_addr_valid+0x1db/0x2d0 [ 11.946091] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.946111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.946134] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.946156] kasan_report+0x141/0x180 [ 11.946177] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.946204] __asan_report_store1_noabort+0x1b/0x30 [ 11.946229] kmalloc_oob_right+0x6bd/0x7f0 [ 11.946259] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.946284] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.946309] kunit_try_run_case+0x1a5/0x480 [ 11.946334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.946356] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.946380] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.946403] ? __kthread_parkme+0x82/0x180 [ 11.946423] ? preempt_count_sub+0x50/0x80 [ 11.946447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.946471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.946495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.946520] kthread+0x337/0x6f0 [ 11.946538] ? trace_preempt_on+0x20/0xc0 [ 11.946562] ? __pfx_kthread+0x10/0x10 [ 11.946582] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.946603] ? calculate_sigpending+0x7b/0xa0 [ 11.946628] ? __pfx_kthread+0x10/0x10 [ 11.946650] ret_from_fork+0x116/0x1d0 [ 11.946668] ? __pfx_kthread+0x10/0x10 [ 11.946688] ret_from_fork_asm+0x1a/0x30 [ 11.946726] </TASK> [ 11.946736] [ 11.954207] Allocated by task 153: [ 11.954335] kasan_save_stack+0x45/0x70 [ 11.954477] kasan_save_track+0x18/0x40 [ 11.954692] kasan_save_alloc_info+0x3b/0x50 [ 11.955146] __kasan_kmalloc+0xb7/0xc0 [ 11.955430] __kmalloc_cache_noprof+0x189/0x420 [ 11.955664] kmalloc_oob_right+0xa9/0x7f0 [ 11.955830] kunit_try_run_case+0x1a5/0x480 [ 11.956072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.956378] kthread+0x337/0x6f0 [ 11.956539] ret_from_fork+0x116/0x1d0 [ 11.956718] ret_from_fork_asm+0x1a/0x30 [ 11.956895] [ 11.957044] The buggy address belongs to the object at ffff88810269aa00 [ 11.957044] which belongs to the cache kmalloc-128 of size 128 [ 11.957482] The buggy address is located 5 bytes to the right of [ 11.957482] allocated 115-byte region [ffff88810269aa00, ffff88810269aa73) [ 11.957962] [ 11.958033] The buggy address belongs to the physical page: [ 11.958201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10269a [ 11.958546] flags: 0x200000000000000(node=0|zone=2) [ 11.958957] page_type: f5(slab) [ 11.959103] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.959528] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.959795] page dumped because: kasan: bad access detected [ 11.959972] [ 11.960063] Memory state around the buggy address: [ 11.960298] ffff88810269a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.960717] ffff88810269a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.961123] >ffff88810269aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.961457] ^ [ 11.961714] ffff88810269aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.962098] ffff88810269ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.962365] ================================================================== [ 11.962933] ================================================================== [ 11.963291] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.963624] Read of size 1 at addr ffff88810269aa80 by task kunit_try_catch/153 [ 11.963852] [ 11.963975] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.964015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.964026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.964045] Call Trace: [ 11.964062] <TASK> [ 11.964077] dump_stack_lvl+0x73/0xb0 [ 11.964104] print_report+0xd1/0x650 [ 11.964125] ? __virt_addr_valid+0x1db/0x2d0 [ 11.964147] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.964168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.964191] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.964213] kasan_report+0x141/0x180 [ 11.964234] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.964260] __asan_report_load1_noabort+0x18/0x20 [ 11.964284] kmalloc_oob_right+0x68a/0x7f0 [ 11.964306] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.964331] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.964356] kunit_try_run_case+0x1a5/0x480 [ 11.964380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.964402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.964426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.964449] ? __kthread_parkme+0x82/0x180 [ 11.964469] ? preempt_count_sub+0x50/0x80 [ 11.964493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.964516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.964540] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.964565] kthread+0x337/0x6f0 [ 11.964583] ? trace_preempt_on+0x20/0xc0 [ 11.964607] ? __pfx_kthread+0x10/0x10 [ 11.964627] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.964648] ? calculate_sigpending+0x7b/0xa0 [ 11.964672] ? __pfx_kthread+0x10/0x10 [ 11.964693] ret_from_fork+0x116/0x1d0 [ 11.964711] ? __pfx_kthread+0x10/0x10 [ 11.964731] ret_from_fork_asm+0x1a/0x30 [ 11.964761] </TASK> [ 11.964771] [ 11.971452] Allocated by task 153: [ 11.971638] kasan_save_stack+0x45/0x70 [ 11.971797] kasan_save_track+0x18/0x40 [ 11.971993] kasan_save_alloc_info+0x3b/0x50 [ 11.972202] __kasan_kmalloc+0xb7/0xc0 [ 11.972467] __kmalloc_cache_noprof+0x189/0x420 [ 11.972621] kmalloc_oob_right+0xa9/0x7f0 [ 11.972760] kunit_try_run_case+0x1a5/0x480 [ 11.972904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.973089] kthread+0x337/0x6f0 [ 11.973209] ret_from_fork+0x116/0x1d0 [ 11.973339] ret_from_fork_asm+0x1a/0x30 [ 11.973479] [ 11.973546] The buggy address belongs to the object at ffff88810269aa00 [ 11.973546] which belongs to the cache kmalloc-128 of size 128 [ 11.974656] The buggy address is located 13 bytes to the right of [ 11.974656] allocated 115-byte region [ffff88810269aa00, ffff88810269aa73) [ 11.975792] [ 11.975902] The buggy address belongs to the physical page: [ 11.976941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10269a [ 11.977280] flags: 0x200000000000000(node=0|zone=2) [ 11.977677] page_type: f5(slab) [ 11.977843] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.978405] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.978819] page dumped because: kasan: bad access detected [ 11.979003] [ 11.979071] Memory state around the buggy address: [ 11.979226] ffff88810269a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.979436] ffff88810269aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.979648] >ffff88810269aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.979856] ^ [ 11.979979] ffff88810269ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.980339] ffff88810269ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.982638] ================================================================== [ 11.920294] ================================================================== [ 11.921362] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.922482] Write of size 1 at addr ffff88810269aa73 by task kunit_try_catch/153 [ 11.923094] [ 11.924218] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 11.924579] Tainted: [N]=TEST [ 11.924610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.924821] Call Trace: [ 11.924888] <TASK> [ 11.925056] dump_stack_lvl+0x73/0xb0 [ 11.925149] print_report+0xd1/0x650 [ 11.925179] ? __virt_addr_valid+0x1db/0x2d0 [ 11.925205] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.925226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.925249] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.925271] kasan_report+0x141/0x180 [ 11.925293] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.925319] __asan_report_store1_noabort+0x1b/0x30 [ 11.925344] kmalloc_oob_right+0x6f0/0x7f0 [ 11.925366] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.925390] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.925416] kunit_try_run_case+0x1a5/0x480 [ 11.925442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.925465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.925490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.925514] ? __kthread_parkme+0x82/0x180 [ 11.925535] ? preempt_count_sub+0x50/0x80 [ 11.925561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.925585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.925610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.925634] kthread+0x337/0x6f0 [ 11.925653] ? trace_preempt_on+0x20/0xc0 [ 11.925678] ? __pfx_kthread+0x10/0x10 [ 11.925698] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.925720] ? calculate_sigpending+0x7b/0xa0 [ 11.925744] ? __pfx_kthread+0x10/0x10 [ 11.925766] ret_from_fork+0x116/0x1d0 [ 11.925786] ? __pfx_kthread+0x10/0x10 [ 11.925807] ret_from_fork_asm+0x1a/0x30 [ 11.925860] </TASK> [ 11.925936] [ 11.933753] Allocated by task 153: [ 11.934066] kasan_save_stack+0x45/0x70 [ 11.934235] kasan_save_track+0x18/0x40 [ 11.934474] kasan_save_alloc_info+0x3b/0x50 [ 11.934724] __kasan_kmalloc+0xb7/0xc0 [ 11.935010] __kmalloc_cache_noprof+0x189/0x420 [ 11.935263] kmalloc_oob_right+0xa9/0x7f0 [ 11.935450] kunit_try_run_case+0x1a5/0x480 [ 11.935626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.935800] kthread+0x337/0x6f0 [ 11.935919] ret_from_fork+0x116/0x1d0 [ 11.936114] ret_from_fork_asm+0x1a/0x30 [ 11.936366] [ 11.936513] The buggy address belongs to the object at ffff88810269aa00 [ 11.936513] which belongs to the cache kmalloc-128 of size 128 [ 11.937220] The buggy address is located 0 bytes to the right of [ 11.937220] allocated 115-byte region [ffff88810269aa00, ffff88810269aa73) [ 11.937668] [ 11.937809] The buggy address belongs to the physical page: [ 11.938201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10269a [ 11.938798] flags: 0x200000000000000(node=0|zone=2) [ 11.939507] page_type: f5(slab) [ 11.940014] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.940284] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.940903] page dumped because: kasan: bad access detected [ 11.941134] [ 11.941265] Memory state around the buggy address: [ 11.941858] ffff88810269a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.942255] ffff88810269a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.942516] >ffff88810269aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.942906] ^ [ 11.943333] ffff88810269aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.943660] ffff88810269ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.943904] ==================================================================