Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.101852] ================================================================== [ 30.102986] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 30.103794] Write of size 1 at addr fff00000c6089f78 by task kunit_try_catch/131 [ 30.104703] [ 30.105064] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.106131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.106729] Hardware name: linux,dummy-virt (DT) [ 30.107321] Call trace: [ 30.107768] show_stack+0x20/0x38 (C) [ 30.109019] dump_stack_lvl+0x8c/0xd0 [ 30.109602] print_report+0x118/0x5e0 [ 30.110313] kasan_report+0xc8/0x118 [ 30.110762] __asan_report_store1_noabort+0x20/0x30 [ 30.111315] kmalloc_track_caller_oob_right+0x414/0x490 [ 30.111839] kunit_try_run_case+0x14c/0x3d0 [ 30.113550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.114485] kthread+0x24c/0x2d0 [ 30.115000] ret_from_fork+0x10/0x20 [ 30.115504] [ 30.115839] Allocated by task 131: [ 30.116981] kasan_save_stack+0x3c/0x68 [ 30.117434] kasan_save_track+0x20/0x40 [ 30.117956] kasan_save_alloc_info+0x40/0x58 [ 30.119141] __kasan_kmalloc+0xd4/0xd8 [ 30.119873] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 30.120837] kmalloc_track_caller_oob_right+0xa8/0x490 [ 30.122017] kunit_try_run_case+0x14c/0x3d0 [ 30.122587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.123262] kthread+0x24c/0x2d0 [ 30.123722] ret_from_fork+0x10/0x20 [ 30.124688] [ 30.125346] The buggy address belongs to the object at fff00000c6089f00 [ 30.125346] which belongs to the cache kmalloc-128 of size 128 [ 30.126282] The buggy address is located 0 bytes to the right of [ 30.126282] allocated 120-byte region [fff00000c6089f00, fff00000c6089f78) [ 30.127678] [ 30.128117] The buggy address belongs to the physical page: [ 30.129491] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106089 [ 30.130635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.131603] page_type: f5(slab) [ 30.132333] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.133229] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.133821] page dumped because: kasan: bad access detected [ 30.134563] [ 30.134862] Memory state around the buggy address: [ 30.135509] fff00000c6089e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.136863] fff00000c6089e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.138189] >fff00000c6089f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.138962] ^ [ 30.139732] fff00000c6089f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.140778] fff00000c608a000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 30.142248] ==================================================================
[ 30.086841] ================================================================== [ 30.087901] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 30.088797] Write of size 1 at addr fff00000c5e7d478 by task kunit_try_catch/131 [ 30.089414] [ 30.089867] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.091092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.091709] Hardware name: linux,dummy-virt (DT) [ 30.092197] Call trace: [ 30.092624] show_stack+0x20/0x38 (C) [ 30.093661] dump_stack_lvl+0x8c/0xd0 [ 30.094204] print_report+0x118/0x5e0 [ 30.094908] kasan_report+0xc8/0x118 [ 30.095633] __asan_report_store1_noabort+0x20/0x30 [ 30.096459] kmalloc_track_caller_oob_right+0x420/0x490 [ 30.097271] kunit_try_run_case+0x14c/0x3d0 [ 30.098012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.098910] kthread+0x24c/0x2d0 [ 30.099631] ret_from_fork+0x10/0x20 [ 30.100223] [ 30.100653] Allocated by task 131: [ 30.101128] kasan_save_stack+0x3c/0x68 [ 30.101780] kasan_save_track+0x20/0x40 [ 30.102288] kasan_save_alloc_info+0x40/0x58 [ 30.102986] __kasan_kmalloc+0xd4/0xd8 [ 30.103630] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 30.104330] kmalloc_track_caller_oob_right+0x184/0x490 [ 30.105058] kunit_try_run_case+0x14c/0x3d0 [ 30.105775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.106462] kthread+0x24c/0x2d0 [ 30.107095] ret_from_fork+0x10/0x20 [ 30.107646] [ 30.108060] The buggy address belongs to the object at fff00000c5e7d400 [ 30.108060] which belongs to the cache kmalloc-128 of size 128 [ 30.109343] The buggy address is located 0 bytes to the right of [ 30.109343] allocated 120-byte region [fff00000c5e7d400, fff00000c5e7d478) [ 30.110768] [ 30.111115] The buggy address belongs to the physical page: [ 30.111908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7d [ 30.112839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.113699] page_type: f5(slab) [ 30.114294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.115190] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.116104] page dumped because: kasan: bad access detected [ 30.116823] [ 30.117190] Memory state around the buggy address: [ 30.117794] fff00000c5e7d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.118771] fff00000c5e7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.119547] >fff00000c5e7d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.120477] ^ [ 30.121256] fff00000c5e7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.122162] fff00000c5e7d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.123006] ================================================================== [ 30.047218] ================================================================== [ 30.048423] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 30.049388] Write of size 1 at addr fff00000c5e7d378 by task kunit_try_catch/131 [ 30.050542] [ 30.050943] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.052196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.052793] Hardware name: linux,dummy-virt (DT) [ 30.053326] Call trace: [ 30.053798] show_stack+0x20/0x38 (C) [ 30.054334] dump_stack_lvl+0x8c/0xd0 [ 30.054969] print_report+0x118/0x5e0 [ 30.055610] kasan_report+0xc8/0x118 [ 30.056153] __asan_report_store1_noabort+0x20/0x30 [ 30.056888] kmalloc_track_caller_oob_right+0x414/0x490 [ 30.057589] kunit_try_run_case+0x14c/0x3d0 [ 30.058271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.058986] kthread+0x24c/0x2d0 [ 30.059591] ret_from_fork+0x10/0x20 [ 30.060159] [ 30.060509] Allocated by task 131: [ 30.061083] kasan_save_stack+0x3c/0x68 [ 30.061603] kasan_save_track+0x20/0x40 [ 30.062221] kasan_save_alloc_info+0x40/0x58 [ 30.062807] __kasan_kmalloc+0xd4/0xd8 [ 30.063429] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 30.064155] kmalloc_track_caller_oob_right+0xa8/0x490 [ 30.064917] kunit_try_run_case+0x14c/0x3d0 [ 30.065606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.066310] kthread+0x24c/0x2d0 [ 30.066893] ret_from_fork+0x10/0x20 [ 30.067440] [ 30.067829] The buggy address belongs to the object at fff00000c5e7d300 [ 30.067829] which belongs to the cache kmalloc-128 of size 128 [ 30.069013] The buggy address is located 0 bytes to the right of [ 30.069013] allocated 120-byte region [fff00000c5e7d300, fff00000c5e7d378) [ 30.070347] [ 30.070739] The buggy address belongs to the physical page: [ 30.071476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7d [ 30.072347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.073036] page_type: f5(slab) [ 30.073622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.074453] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.075751] page dumped because: kasan: bad access detected [ 30.076469] [ 30.076857] Memory state around the buggy address: [ 30.077598] fff00000c5e7d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.078267] fff00000c5e7d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.079821] >fff00000c5e7d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.080807] ^ [ 30.081841] fff00000c5e7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.082608] fff00000c5e7d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.083401] ==================================================================
[ 24.027414] ================================================================== [ 24.028316] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4ca/0x530 [ 24.029112] Write of size 1 at addr ffff8881028d8a78 by task kunit_try_catch/149 [ 24.030494] [ 24.030946] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.032650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.033246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.034418] Call Trace: [ 24.034873] <TASK> [ 24.035445] dump_stack_lvl+0x73/0xb0 [ 24.036195] print_report+0xd1/0x640 [ 24.037079] ? __virt_addr_valid+0x1db/0x2d0 [ 24.037724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.038598] kasan_report+0x102/0x140 [ 24.039191] ? kmalloc_track_caller_oob_right+0x4ca/0x530 [ 24.040377] ? kmalloc_track_caller_oob_right+0x4ca/0x530 [ 24.041050] __asan_report_store1_noabort+0x1b/0x30 [ 24.041556] kmalloc_track_caller_oob_right+0x4ca/0x530 [ 24.042758] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 24.043776] ? __schedule+0xc3e/0x2790 [ 24.044541] ? __pfx_read_tsc+0x10/0x10 [ 24.045243] ? ktime_get_ts64+0x84/0x230 [ 24.045816] kunit_try_run_case+0x1b3/0x490 [ 24.046466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.047131] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.048273] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.048629] ? __kthread_parkme+0x82/0x160 [ 24.048979] ? preempt_count_sub+0x50/0x80 [ 24.050068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.051004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.051569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.052451] kthread+0x257/0x310 [ 24.053628] ? __pfx_kthread+0x10/0x10 [ 24.054069] ret_from_fork+0x41/0x80 [ 24.055207] ? __pfx_kthread+0x10/0x10 [ 24.055582] ret_from_fork_asm+0x1a/0x30 [ 24.056577] </TASK> [ 24.057531] [ 24.057735] Allocated by task 149: [ 24.058488] kasan_save_stack+0x3d/0x60 [ 24.058976] kasan_save_track+0x18/0x40 [ 24.059370] kasan_save_alloc_info+0x3b/0x50 [ 24.059820] __kasan_kmalloc+0xb7/0xc0 [ 24.060209] __kmalloc_node_track_caller_noprof+0x1c6/0x500 [ 24.060921] kmalloc_track_caller_oob_right+0x9a/0x530 [ 24.061489] kunit_try_run_case+0x1b3/0x490 [ 24.062166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.062922] kthread+0x257/0x310 [ 24.063214] ret_from_fork+0x41/0x80 [ 24.064119] ret_from_fork_asm+0x1a/0x30 [ 24.064600] [ 24.065993] The buggy address belongs to the object at ffff8881028d8a00 [ 24.065993] which belongs to the cache kmalloc-128 of size 128 [ 24.067396] The buggy address is located 0 bytes to the right of [ 24.067396] allocated 120-byte region [ffff8881028d8a00, ffff8881028d8a78) [ 24.069412] [ 24.069837] The buggy address belongs to the physical page: [ 24.070650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 24.071036] flags: 0x200000000000000(node=0|zone=2) [ 24.071239] page_type: f5(slab) [ 24.071392] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.071657] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.072185] page dumped because: kasan: bad access detected [ 24.073647] [ 24.073859] Memory state around the buggy address: [ 24.074305] ffff8881028d8900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.075051] ffff8881028d8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.075737] >ffff8881028d8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.076310] ^ [ 24.077149] ffff8881028d8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.077724] ffff8881028d8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.078529] ================================================================== [ 24.079977] ================================================================== [ 24.080958] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b3/0x530 [ 24.081820] Write of size 1 at addr ffff8881028d8b78 by task kunit_try_catch/149 [ 24.082372] [ 24.082555] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.083725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.084153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.084966] Call Trace: [ 24.085369] <TASK> [ 24.085753] dump_stack_lvl+0x73/0xb0 [ 24.086269] print_report+0xd1/0x640 [ 24.086779] ? __virt_addr_valid+0x1db/0x2d0 [ 24.087196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.087908] kasan_report+0x102/0x140 [ 24.088482] ? kmalloc_track_caller_oob_right+0x4b3/0x530 [ 24.088943] ? kmalloc_track_caller_oob_right+0x4b3/0x530 [ 24.089644] __asan_report_store1_noabort+0x1b/0x30 [ 24.090358] kmalloc_track_caller_oob_right+0x4b3/0x530 [ 24.091064] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 24.091542] ? __schedule+0xc3e/0x2790 [ 24.092077] ? __pfx_read_tsc+0x10/0x10 [ 24.092570] ? ktime_get_ts64+0x84/0x230 [ 24.093056] kunit_try_run_case+0x1b3/0x490 [ 24.093720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.094252] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.094793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.095390] ? __kthread_parkme+0x82/0x160 [ 24.095837] ? preempt_count_sub+0x50/0x80 [ 24.096392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.096982] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.097740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.098342] kthread+0x257/0x310 [ 24.098810] ? __pfx_kthread+0x10/0x10 [ 24.099220] ret_from_fork+0x41/0x80 [ 24.099592] ? __pfx_kthread+0x10/0x10 [ 24.101372] ret_from_fork_asm+0x1a/0x30 [ 24.101968] </TASK> [ 24.102518] [ 24.102832] Allocated by task 149: [ 24.103413] kasan_save_stack+0x3d/0x60 [ 24.104768] kasan_save_track+0x18/0x40 [ 24.105688] kasan_save_alloc_info+0x3b/0x50 [ 24.106457] __kasan_kmalloc+0xb7/0xc0 [ 24.106986] __kmalloc_node_track_caller_noprof+0x1c6/0x500 [ 24.107849] kmalloc_track_caller_oob_right+0x19b/0x530 [ 24.108444] kunit_try_run_case+0x1b3/0x490 [ 24.109876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.110303] kthread+0x257/0x310 [ 24.111181] ret_from_fork+0x41/0x80 [ 24.111640] ret_from_fork_asm+0x1a/0x30 [ 24.112578] [ 24.113101] The buggy address belongs to the object at ffff8881028d8b00 [ 24.113101] which belongs to the cache kmalloc-128 of size 128 [ 24.114640] The buggy address is located 0 bytes to the right of [ 24.114640] allocated 120-byte region [ffff8881028d8b00, ffff8881028d8b78) [ 24.116415] [ 24.117153] The buggy address belongs to the physical page: [ 24.117545] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 24.118846] flags: 0x200000000000000(node=0|zone=2) [ 24.119670] page_type: f5(slab) [ 24.120586] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.121729] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.122751] page dumped because: kasan: bad access detected [ 24.123407] [ 24.123861] Memory state around the buggy address: [ 24.124845] ffff8881028d8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.126071] ffff8881028d8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.127055] >ffff8881028d8b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.128538] ^ [ 24.129514] ffff8881028d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.130817] ffff8881028d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.132000] ==================================================================
[ 19.281634] ================================================================== [ 19.282898] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4ca/0x530 [ 19.283773] Write of size 1 at addr ffff8881028b4778 by task kunit_try_catch/149 [ 19.284721] [ 19.284964] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 19.286698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.286998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.287775] Call Trace: [ 19.288077] <TASK> [ 19.288367] dump_stack_lvl+0x73/0xb0 [ 19.288938] print_report+0xd1/0x640 [ 19.289406] ? __virt_addr_valid+0x1db/0x2d0 [ 19.289906] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.290358] kasan_report+0x102/0x140 [ 19.290927] ? kmalloc_track_caller_oob_right+0x4ca/0x530 [ 19.291674] ? kmalloc_track_caller_oob_right+0x4ca/0x530 [ 19.292390] __asan_report_store1_noabort+0x1b/0x30 [ 19.293079] kmalloc_track_caller_oob_right+0x4ca/0x530 [ 19.293637] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 19.294424] ? __schedule+0xc3e/0x2790 [ 19.294854] ? __pfx_read_tsc+0x10/0x10 [ 19.295354] ? ktime_get_ts64+0x84/0x230 [ 19.295770] kunit_try_run_case+0x1b3/0x490 [ 19.296140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.296816] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.297437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.297913] ? __kthread_parkme+0x82/0x160 [ 19.298543] ? preempt_count_sub+0x50/0x80 [ 19.299232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.299671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.300432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.300867] kthread+0x257/0x310 [ 19.301411] ? __pfx_kthread+0x10/0x10 [ 19.301850] ret_from_fork+0x41/0x80 [ 19.302267] ? __pfx_kthread+0x10/0x10 [ 19.302588] ret_from_fork_asm+0x1a/0x30 [ 19.303050] </TASK> [ 19.303329] [ 19.303518] Allocated by task 149: [ 19.303878] kasan_save_stack+0x3d/0x60 [ 19.304446] kasan_save_track+0x18/0x40 [ 19.304842] kasan_save_alloc_info+0x3b/0x50 [ 19.305406] __kasan_kmalloc+0xb7/0xc0 [ 19.305890] __kmalloc_node_track_caller_noprof+0x1c6/0x500 [ 19.306509] kmalloc_track_caller_oob_right+0x9a/0x530 [ 19.307203] kunit_try_run_case+0x1b3/0x490 [ 19.307512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.308218] kthread+0x257/0x310 [ 19.308617] ret_from_fork+0x41/0x80 [ 19.308998] ret_from_fork_asm+0x1a/0x30 [ 19.309567] [ 19.309765] The buggy address belongs to the object at ffff8881028b4700 [ 19.309765] which belongs to the cache kmalloc-128 of size 128 [ 19.310610] The buggy address is located 0 bytes to the right of [ 19.310610] allocated 120-byte region [ffff8881028b4700, ffff8881028b4778) [ 19.311296] [ 19.311461] The buggy address belongs to the physical page: [ 19.312043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b4 [ 19.314006] flags: 0x200000000000000(node=0|zone=2) [ 19.315166] page_type: f5(slab) [ 19.315558] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.316201] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.317150] page dumped because: kasan: bad access detected [ 19.317725] [ 19.318089] Memory state around the buggy address: [ 19.318619] ffff8881028b4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 19.319400] ffff8881028b4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.320762] >ffff8881028b4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.321568] ^ [ 19.322327] ffff8881028b4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.322781] ffff8881028b4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.323409] ==================================================================