Date
July 20, 2025, 8:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 14.856509] ================================================================== [ 14.856548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 14.856594] Write of size 1 at addr fff00000c6094778 by task kunit_try_catch/137 [ 14.856642] [ 14.856677] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 14.856755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.856781] Hardware name: linux,dummy-virt (DT) [ 14.856811] Call trace: [ 14.856832] show_stack+0x20/0x38 (C) [ 14.856900] dump_stack_lvl+0x8c/0xd0 [ 14.856947] print_report+0x118/0x5d0 [ 14.856992] kasan_report+0xdc/0x128 [ 14.857042] __asan_report_store1_noabort+0x20/0x30 [ 14.857104] kmalloc_oob_right+0x538/0x660 [ 14.857149] kunit_try_run_case+0x170/0x3f0 [ 14.857218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.857270] kthread+0x328/0x630 [ 14.857311] ret_from_fork+0x10/0x20 [ 14.857367] [ 14.857385] Allocated by task 137: [ 14.857412] kasan_save_stack+0x3c/0x68 [ 14.857450] kasan_save_track+0x20/0x40 [ 14.857486] kasan_save_alloc_info+0x40/0x58 [ 14.857524] __kasan_kmalloc+0xd4/0xd8 [ 14.857559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.857596] kmalloc_oob_right+0xb0/0x660 [ 14.857640] kunit_try_run_case+0x170/0x3f0 [ 14.857677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.857718] kthread+0x328/0x630 [ 14.857757] ret_from_fork+0x10/0x20 [ 14.857792] [ 14.857810] The buggy address belongs to the object at fff00000c6094700 [ 14.857810] which belongs to the cache kmalloc-128 of size 128 [ 14.857863] The buggy address is located 5 bytes to the right of [ 14.857863] allocated 115-byte region [fff00000c6094700, fff00000c6094773) [ 14.857930] [ 14.857958] The buggy address belongs to the physical page: [ 14.857987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094 [ 14.858037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.858081] page_type: f5(slab) [ 14.858118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.858176] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.858862] page dumped because: kasan: bad access detected [ 14.858902] [ 14.858920] Memory state around the buggy address: [ 14.858951] fff00000c6094600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.858992] fff00000c6094680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.859033] >fff00000c6094700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.859070] ^ [ 14.859109] fff00000c6094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.859149] fff00000c6094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.859383] ================================================================== [ 14.859943] ================================================================== [ 14.859990] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 14.860077] Read of size 1 at addr fff00000c6094780 by task kunit_try_catch/137 [ 14.860135] [ 14.860164] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 14.860487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.860581] Hardware name: linux,dummy-virt (DT) [ 14.860628] Call trace: [ 14.860657] show_stack+0x20/0x38 (C) [ 14.860798] dump_stack_lvl+0x8c/0xd0 [ 14.860845] print_report+0x118/0x5d0 [ 14.861003] kasan_report+0xdc/0x128 [ 14.861141] __asan_report_load1_noabort+0x20/0x30 [ 14.861246] kmalloc_oob_right+0x5d0/0x660 [ 14.861310] kunit_try_run_case+0x170/0x3f0 [ 14.861395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.861697] kthread+0x328/0x630 [ 14.861744] ret_from_fork+0x10/0x20 [ 14.861802] [ 14.861820] Allocated by task 137: [ 14.861847] kasan_save_stack+0x3c/0x68 [ 14.861886] kasan_save_track+0x20/0x40 [ 14.861922] kasan_save_alloc_info+0x40/0x58 [ 14.861960] __kasan_kmalloc+0xd4/0xd8 [ 14.862090] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.862157] kmalloc_oob_right+0xb0/0x660 [ 14.862240] kunit_try_run_case+0x170/0x3f0 [ 14.862335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.862443] kthread+0x328/0x630 [ 14.862550] ret_from_fork+0x10/0x20 [ 14.862584] [ 14.862621] The buggy address belongs to the object at fff00000c6094700 [ 14.862621] which belongs to the cache kmalloc-128 of size 128 [ 14.862916] The buggy address is located 13 bytes to the right of [ 14.862916] allocated 115-byte region [fff00000c6094700, fff00000c6094773) [ 14.863025] [ 14.863083] The buggy address belongs to the physical page: [ 14.863146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094 [ 14.863263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.863353] page_type: f5(slab) [ 14.863406] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.863465] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.863504] page dumped because: kasan: bad access detected [ 14.863534] [ 14.863552] Memory state around the buggy address: [ 14.863581] fff00000c6094680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.863692] fff00000c6094700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.863805] >fff00000c6094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.863863] ^ [ 14.863917] fff00000c6094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.864001] fff00000c6094880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.864226] ================================================================== [ 14.847609] ================================================================== [ 14.847951] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 14.848791] Write of size 1 at addr fff00000c6094773 by task kunit_try_catch/137 [ 14.848952] [ 14.849753] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 14.849900] Tainted: [N]=TEST [ 14.849932] Hardware name: linux,dummy-virt (DT) [ 14.850149] Call trace: [ 14.850343] show_stack+0x20/0x38 (C) [ 14.850480] dump_stack_lvl+0x8c/0xd0 [ 14.850540] print_report+0x118/0x5d0 [ 14.850588] kasan_report+0xdc/0x128 [ 14.850634] __asan_report_store1_noabort+0x20/0x30 [ 14.850685] kmalloc_oob_right+0x5a4/0x660 [ 14.850730] kunit_try_run_case+0x170/0x3f0 [ 14.850781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.850833] kthread+0x328/0x630 [ 14.850877] ret_from_fork+0x10/0x20 [ 14.851030] [ 14.851068] Allocated by task 137: [ 14.851182] kasan_save_stack+0x3c/0x68 [ 14.851259] kasan_save_track+0x20/0x40 [ 14.851295] kasan_save_alloc_info+0x40/0x58 [ 14.851334] __kasan_kmalloc+0xd4/0xd8 [ 14.851370] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.851409] kmalloc_oob_right+0xb0/0x660 [ 14.851445] kunit_try_run_case+0x170/0x3f0 [ 14.851482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.851523] kthread+0x328/0x630 [ 14.851554] ret_from_fork+0x10/0x20 [ 14.851607] [ 14.851666] The buggy address belongs to the object at fff00000c6094700 [ 14.851666] which belongs to the cache kmalloc-128 of size 128 [ 14.851756] The buggy address is located 0 bytes to the right of [ 14.851756] allocated 115-byte region [fff00000c6094700, fff00000c6094773) [ 14.851821] [ 14.851902] The buggy address belongs to the physical page: [ 14.852071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094 [ 14.852346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.852625] page_type: f5(slab) [ 14.852921] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.852984] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.853120] page dumped because: kasan: bad access detected [ 14.853164] [ 14.853203] Memory state around the buggy address: [ 14.855320] fff00000c6094600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.855396] fff00000c6094680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855451] >fff00000c6094700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.855505] ^ [ 14.855587] fff00000c6094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855629] fff00000c6094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855691] ==================================================================
[ 12.189341] ================================================================== [ 12.190330] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 12.191753] Write of size 1 at addr ffff888103249273 by task kunit_try_catch/154 [ 12.192694] [ 12.193863] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.194244] Tainted: [N]=TEST [ 12.194277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.194500] Call Trace: [ 12.194565] <TASK> [ 12.194708] dump_stack_lvl+0x73/0xb0 [ 12.194825] print_report+0xd1/0x610 [ 12.194854] ? __virt_addr_valid+0x1db/0x2d0 [ 12.194879] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.194899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.194921] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.194942] kasan_report+0x141/0x180 [ 12.194964] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.194989] __asan_report_store1_noabort+0x1b/0x30 [ 12.195012] kmalloc_oob_right+0x6f0/0x7f0 [ 12.195053] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.195077] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.195101] kunit_try_run_case+0x1a5/0x480 [ 12.195128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.195150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.195189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.195211] ? __kthread_parkme+0x82/0x180 [ 12.195233] ? preempt_count_sub+0x50/0x80 [ 12.195258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.195281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.195304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.195326] kthread+0x337/0x6f0 [ 12.195345] ? trace_preempt_on+0x20/0xc0 [ 12.195369] ? __pfx_kthread+0x10/0x10 [ 12.195389] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.195410] ? calculate_sigpending+0x7b/0xa0 [ 12.195434] ? __pfx_kthread+0x10/0x10 [ 12.195455] ret_from_fork+0x116/0x1d0 [ 12.195483] ? __pfx_kthread+0x10/0x10 [ 12.195503] ret_from_fork_asm+0x1a/0x30 [ 12.195559] </TASK> [ 12.195627] [ 12.208379] Allocated by task 154: [ 12.209137] kasan_save_stack+0x45/0x70 [ 12.209316] kasan_save_track+0x18/0x40 [ 12.209454] kasan_save_alloc_info+0x3b/0x50 [ 12.209617] __kasan_kmalloc+0xb7/0xc0 [ 12.209750] __kmalloc_cache_noprof+0x189/0x420 [ 12.209919] kmalloc_oob_right+0xa9/0x7f0 [ 12.210063] kunit_try_run_case+0x1a5/0x480 [ 12.210383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.210699] kthread+0x337/0x6f0 [ 12.211301] ret_from_fork+0x116/0x1d0 [ 12.211563] ret_from_fork_asm+0x1a/0x30 [ 12.211941] [ 12.212184] The buggy address belongs to the object at ffff888103249200 [ 12.212184] which belongs to the cache kmalloc-128 of size 128 [ 12.212779] The buggy address is located 0 bytes to the right of [ 12.212779] allocated 115-byte region [ffff888103249200, ffff888103249273) [ 12.213339] [ 12.213598] The buggy address belongs to the physical page: [ 12.214186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249 [ 12.214724] flags: 0x200000000000000(node=0|zone=2) [ 12.215417] page_type: f5(slab) [ 12.215916] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.216376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.216775] page dumped because: kasan: bad access detected [ 12.217139] [ 12.217238] Memory state around the buggy address: [ 12.217672] ffff888103249100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.218060] ffff888103249180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.218422] >ffff888103249200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.218733] ^ [ 12.219039] ffff888103249280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.219392] ffff888103249300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.219743] ================================================================== [ 12.220791] ================================================================== [ 12.221484] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.221779] Write of size 1 at addr ffff888103249278 by task kunit_try_catch/154 [ 12.222048] [ 12.222173] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.222306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.222318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.222340] Call Trace: [ 12.222357] <TASK> [ 12.222372] dump_stack_lvl+0x73/0xb0 [ 12.222400] print_report+0xd1/0x610 [ 12.222421] ? __virt_addr_valid+0x1db/0x2d0 [ 12.222443] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.222463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.222497] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.222519] kasan_report+0x141/0x180 [ 12.222540] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.222565] __asan_report_store1_noabort+0x1b/0x30 [ 12.222588] kmalloc_oob_right+0x6bd/0x7f0 [ 12.222610] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.222633] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.222658] kunit_try_run_case+0x1a5/0x480 [ 12.222681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.222703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.222725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.222748] ? __kthread_parkme+0x82/0x180 [ 12.222767] ? preempt_count_sub+0x50/0x80 [ 12.222802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.222826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.222848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.222870] kthread+0x337/0x6f0 [ 12.222889] ? trace_preempt_on+0x20/0xc0 [ 12.222911] ? __pfx_kthread+0x10/0x10 [ 12.222931] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.222951] ? calculate_sigpending+0x7b/0xa0 [ 12.222975] ? __pfx_kthread+0x10/0x10 [ 12.222996] ret_from_fork+0x116/0x1d0 [ 12.223014] ? __pfx_kthread+0x10/0x10 [ 12.223034] ret_from_fork_asm+0x1a/0x30 [ 12.223140] </TASK> [ 12.223150] [ 12.232970] Allocated by task 154: [ 12.233370] kasan_save_stack+0x45/0x70 [ 12.233849] kasan_save_track+0x18/0x40 [ 12.234223] kasan_save_alloc_info+0x3b/0x50 [ 12.234434] __kasan_kmalloc+0xb7/0xc0 [ 12.234625] __kmalloc_cache_noprof+0x189/0x420 [ 12.235263] kmalloc_oob_right+0xa9/0x7f0 [ 12.235459] kunit_try_run_case+0x1a5/0x480 [ 12.235885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.236295] kthread+0x337/0x6f0 [ 12.236670] ret_from_fork+0x116/0x1d0 [ 12.236928] ret_from_fork_asm+0x1a/0x30 [ 12.237252] [ 12.237344] The buggy address belongs to the object at ffff888103249200 [ 12.237344] which belongs to the cache kmalloc-128 of size 128 [ 12.237921] The buggy address is located 5 bytes to the right of [ 12.237921] allocated 115-byte region [ffff888103249200, ffff888103249273) [ 12.238446] [ 12.238562] The buggy address belongs to the physical page: [ 12.239488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249 [ 12.239815] flags: 0x200000000000000(node=0|zone=2) [ 12.240214] page_type: f5(slab) [ 12.240536] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.240921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.241420] page dumped because: kasan: bad access detected [ 12.241781] [ 12.241966] Memory state around the buggy address: [ 12.242409] ffff888103249100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.242755] ffff888103249180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.243414] >ffff888103249200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.243844] ^ [ 12.244283] ffff888103249280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.244596] ffff888103249300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.245093] ================================================================== [ 12.245863] ================================================================== [ 12.246693] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.247212] Read of size 1 at addr ffff888103249280 by task kunit_try_catch/154 [ 12.247443] [ 12.247769] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.247840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.247851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.247870] Call Trace: [ 12.247884] <TASK> [ 12.247897] dump_stack_lvl+0x73/0xb0 [ 12.247925] print_report+0xd1/0x610 [ 12.247946] ? __virt_addr_valid+0x1db/0x2d0 [ 12.247967] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.247987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.248008] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.248029] kasan_report+0x141/0x180 [ 12.248243] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.248270] __asan_report_load1_noabort+0x18/0x20 [ 12.248293] kmalloc_oob_right+0x68a/0x7f0 [ 12.248315] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.248338] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.248362] kunit_try_run_case+0x1a5/0x480 [ 12.248385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.248406] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.248428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.248450] ? __kthread_parkme+0x82/0x180 [ 12.248482] ? preempt_count_sub+0x50/0x80 [ 12.248505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.248528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.248550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.248573] kthread+0x337/0x6f0 [ 12.248592] ? trace_preempt_on+0x20/0xc0 [ 12.248613] ? __pfx_kthread+0x10/0x10 [ 12.248633] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.248653] ? calculate_sigpending+0x7b/0xa0 [ 12.248675] ? __pfx_kthread+0x10/0x10 [ 12.248695] ret_from_fork+0x116/0x1d0 [ 12.248713] ? __pfx_kthread+0x10/0x10 [ 12.248733] ret_from_fork_asm+0x1a/0x30 [ 12.248762] </TASK> [ 12.248771] [ 12.259877] Allocated by task 154: [ 12.260164] kasan_save_stack+0x45/0x70 [ 12.260520] kasan_save_track+0x18/0x40 [ 12.260757] kasan_save_alloc_info+0x3b/0x50 [ 12.261100] __kasan_kmalloc+0xb7/0xc0 [ 12.261385] __kmalloc_cache_noprof+0x189/0x420 [ 12.261702] kmalloc_oob_right+0xa9/0x7f0 [ 12.262052] kunit_try_run_case+0x1a5/0x480 [ 12.262241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.262501] kthread+0x337/0x6f0 [ 12.262662] ret_from_fork+0x116/0x1d0 [ 12.263289] ret_from_fork_asm+0x1a/0x30 [ 12.263489] [ 12.263676] The buggy address belongs to the object at ffff888103249200 [ 12.263676] which belongs to the cache kmalloc-128 of size 128 [ 12.264523] The buggy address is located 13 bytes to the right of [ 12.264523] allocated 115-byte region [ffff888103249200, ffff888103249273) [ 12.265429] [ 12.265522] The buggy address belongs to the physical page: [ 12.265775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249 [ 12.266398] flags: 0x200000000000000(node=0|zone=2) [ 12.266763] page_type: f5(slab) [ 12.266959] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.267456] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.267793] page dumped because: kasan: bad access detected [ 12.268365] [ 12.268446] Memory state around the buggy address: [ 12.268920] ffff888103249180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.269424] ffff888103249200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.269874] >ffff888103249280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.270376] ^ [ 12.270528] ffff888103249300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.271242] ffff888103249380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.271531] ==================================================================