Date
March 19, 2025, 10:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.292935] ================================================================== [ 33.293660] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 33.295071] Write of size 1 at addr fff00000c6818473 by task kunit_try_catch/138 [ 33.295256] [ 33.296557] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.296984] Tainted: [N]=TEST [ 33.297108] Hardware name: linux,dummy-virt (DT) [ 33.297611] Call trace: [ 33.297857] show_stack+0x20/0x38 (C) [ 33.298107] dump_stack_lvl+0x8c/0xd0 [ 33.298218] print_report+0x118/0x5f0 [ 33.298295] kasan_report+0xc8/0x118 [ 33.298368] __asan_report_store1_noabort+0x20/0x30 [ 33.298449] kmalloc_oob_right+0x5a4/0x660 [ 33.298527] kunit_try_run_case+0x14c/0x3d0 [ 33.298609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.298696] kthread+0x318/0x618 [ 33.298771] ret_from_fork+0x10/0x20 [ 33.299028] [ 33.299108] Allocated by task 138: [ 33.299301] kasan_save_stack+0x3c/0x68 [ 33.299406] kasan_save_track+0x20/0x40 [ 33.299469] kasan_save_alloc_info+0x40/0x58 [ 33.299532] __kasan_kmalloc+0xd4/0xd8 [ 33.299589] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.299658] kmalloc_oob_right+0xb0/0x660 [ 33.299719] kunit_try_run_case+0x14c/0x3d0 [ 33.299783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.299855] kthread+0x318/0x618 [ 33.299912] ret_from_fork+0x10/0x20 [ 33.300006] [ 33.300120] The buggy address belongs to the object at fff00000c6818400 [ 33.300120] which belongs to the cache kmalloc-128 of size 128 [ 33.300274] The buggy address is located 0 bytes to the right of [ 33.300274] allocated 115-byte region [fff00000c6818400, fff00000c6818473) [ 33.300459] [ 33.300684] The buggy address belongs to the physical page: [ 33.301191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 33.301870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.302375] page_type: f5(slab) [ 33.302854] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.302970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.303168] page dumped because: kasan: bad access detected [ 33.303242] [ 33.303285] Memory state around the buggy address: [ 33.303647] fff00000c6818300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.303769] fff00000c6818380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.303863] >fff00000c6818400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.303954] ^ [ 33.304102] fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.304175] fff00000c6818500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.304281] ================================================================== [ 33.305688] ================================================================== [ 33.305929] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 33.306091] Write of size 1 at addr fff00000c6818478 by task kunit_try_catch/138 [ 33.306247] [ 33.306333] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.306593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.306678] Hardware name: linux,dummy-virt (DT) [ 33.306776] Call trace: [ 33.306842] show_stack+0x20/0x38 (C) [ 33.307001] dump_stack_lvl+0x8c/0xd0 [ 33.310020] print_report+0x118/0x5f0 [ 33.310190] kasan_report+0xc8/0x118 [ 33.310330] __asan_report_store1_noabort+0x20/0x30 [ 33.310481] kmalloc_oob_right+0x538/0x660 [ 33.310629] kunit_try_run_case+0x14c/0x3d0 [ 33.311653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.312133] kthread+0x318/0x618 [ 33.312590] ret_from_fork+0x10/0x20 [ 33.312763] [ 33.312820] Allocated by task 138: [ 33.312901] kasan_save_stack+0x3c/0x68 [ 33.313394] kasan_save_track+0x20/0x40 [ 33.313537] kasan_save_alloc_info+0x40/0x58 [ 33.313662] __kasan_kmalloc+0xd4/0xd8 [ 33.313957] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.314313] kmalloc_oob_right+0xb0/0x660 [ 33.314703] kunit_try_run_case+0x14c/0x3d0 [ 33.315154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.315319] kthread+0x318/0x618 [ 33.315447] ret_from_fork+0x10/0x20 [ 33.315576] [ 33.315636] The buggy address belongs to the object at fff00000c6818400 [ 33.315636] which belongs to the cache kmalloc-128 of size 128 [ 33.315878] The buggy address is located 5 bytes to the right of [ 33.315878] allocated 115-byte region [fff00000c6818400, fff00000c6818473) [ 33.316206] [ 33.316266] The buggy address belongs to the physical page: [ 33.316412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 33.316572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.316720] page_type: f5(slab) [ 33.316831] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.316979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.317133] page dumped because: kasan: bad access detected [ 33.317248] [ 33.317341] Memory state around the buggy address: [ 33.317470] fff00000c6818300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.317624] fff00000c6818380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.317815] >fff00000c6818400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.317988] ^ [ 33.318170] fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.318304] fff00000c6818500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.318421] ================================================================== [ 33.319152] ================================================================== [ 33.319277] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 33.319470] Read of size 1 at addr fff00000c6818480 by task kunit_try_catch/138 [ 33.319794] [ 33.319945] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.320918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.321247] Hardware name: linux,dummy-virt (DT) [ 33.321367] Call trace: [ 33.321549] show_stack+0x20/0x38 (C) [ 33.321716] dump_stack_lvl+0x8c/0xd0 [ 33.321860] print_report+0x118/0x5f0 [ 33.322001] kasan_report+0xc8/0x118 [ 33.322158] __asan_report_load1_noabort+0x20/0x30 [ 33.323224] kmalloc_oob_right+0x5d0/0x660 [ 33.323389] kunit_try_run_case+0x14c/0x3d0 [ 33.323540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.323709] kthread+0x318/0x618 [ 33.323852] ret_from_fork+0x10/0x20 [ 33.324006] [ 33.324121] Allocated by task 138: [ 33.324226] kasan_save_stack+0x3c/0x68 [ 33.324399] kasan_save_track+0x20/0x40 [ 33.324582] kasan_save_alloc_info+0x40/0x58 [ 33.324708] __kasan_kmalloc+0xd4/0xd8 [ 33.324817] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.324935] kmalloc_oob_right+0xb0/0x660 [ 33.325112] kunit_try_run_case+0x14c/0x3d0 [ 33.325236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.325374] kthread+0x318/0x618 [ 33.325486] ret_from_fork+0x10/0x20 [ 33.325650] [ 33.325723] The buggy address belongs to the object at fff00000c6818400 [ 33.325723] which belongs to the cache kmalloc-128 of size 128 [ 33.326007] The buggy address is located 13 bytes to the right of [ 33.326007] allocated 115-byte region [fff00000c6818400, fff00000c6818473) [ 33.326271] [ 33.326329] The buggy address belongs to the physical page: [ 33.326423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 33.326585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.326733] page_type: f5(slab) [ 33.326888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.327302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.327714] page dumped because: kasan: bad access detected [ 33.327835] [ 33.327890] Memory state around the buggy address: [ 33.327984] fff00000c6818380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328349] fff00000c6818400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.328552] >fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328685] ^ [ 33.328775] fff00000c6818500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328944] fff00000c6818580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.329122] ==================================================================
[ 20.259193] ================================================================== [ 20.260581] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 20.262257] Write of size 1 at addr ffff88810305a073 by task kunit_try_catch/157 [ 20.263227] [ 20.265942] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 20.266398] Tainted: [N]=TEST [ 20.266449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.266880] Call Trace: [ 20.266997] <TASK> [ 20.267240] dump_stack_lvl+0x73/0xb0 [ 20.267374] print_report+0xd1/0x660 [ 20.267421] ? __virt_addr_valid+0x1db/0x2d0 [ 20.267490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.267527] kasan_report+0x104/0x140 [ 20.267556] ? kmalloc_oob_right+0x6f0/0x7f0 [ 20.267599] ? kmalloc_oob_right+0x6f0/0x7f0 [ 20.267659] __asan_report_store1_noabort+0x1b/0x30 [ 20.267738] kmalloc_oob_right+0x6f0/0x7f0 [ 20.267825] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 20.267889] ? __schedule+0xd46/0x29c0 [ 20.267959] ? __pfx_read_tsc+0x10/0x10 [ 20.268012] ? ktime_get_ts64+0x86/0x240 [ 20.268077] kunit_try_run_case+0x1b2/0x490 [ 20.268170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.268203] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.268237] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.268268] ? __kthread_parkme+0x82/0x160 [ 20.268300] ? preempt_count_sub+0x50/0x80 [ 20.268338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.268371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.268404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.268436] kthread+0x323/0x710 [ 20.268465] ? trace_preempt_on+0x20/0xc0 [ 20.268500] ? __pfx_kthread+0x10/0x10 [ 20.268531] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.268560] ? calculate_sigpending+0x7b/0xa0 [ 20.268591] ? __pfx_kthread+0x10/0x10 [ 20.268623] ret_from_fork+0x41/0x80 [ 20.268653] ? __pfx_kthread+0x10/0x10 [ 20.268684] ret_from_fork_asm+0x1a/0x30 [ 20.268891] </TASK> [ 20.269011] [ 20.281844] Allocated by task 157: [ 20.282649] kasan_save_stack+0x3d/0x60 [ 20.283277] kasan_save_track+0x18/0x40 [ 20.283870] kasan_save_alloc_info+0x3b/0x50 [ 20.284426] __kasan_kmalloc+0xb7/0xc0 [ 20.284905] __kmalloc_cache_noprof+0x183/0x410 [ 20.285436] kmalloc_oob_right+0xa9/0x7f0 [ 20.286385] kunit_try_run_case+0x1b2/0x490 [ 20.286799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.287351] kthread+0x323/0x710 [ 20.287957] ret_from_fork+0x41/0x80 [ 20.288443] ret_from_fork_asm+0x1a/0x30 [ 20.289045] [ 20.289423] The buggy address belongs to the object at ffff88810305a000 [ 20.289423] which belongs to the cache kmalloc-128 of size 128 [ 20.291433] The buggy address is located 0 bytes to the right of [ 20.291433] allocated 115-byte region [ffff88810305a000, ffff88810305a073) [ 20.292984] [ 20.293527] The buggy address belongs to the physical page: [ 20.295006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305a [ 20.296884] flags: 0x200000000000000(node=0|zone=2) [ 20.299090] page_type: f5(slab) [ 20.301031] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.302038] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.302932] page dumped because: kasan: bad access detected [ 20.303509] [ 20.303796] Memory state around the buggy address: [ 20.305560] ffff888103059f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.306644] ffff888103059f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.307417] >ffff88810305a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.308292] ^ [ 20.309389] ffff88810305a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.310279] ffff88810305a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.311053] ================================================================== [ 20.351477] ================================================================== [ 20.352388] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 20.353017] Read of size 1 at addr ffff88810305a080 by task kunit_try_catch/157 [ 20.353557] [ 20.353741] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 20.353858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.353891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.353944] Call Trace: [ 20.353975] <TASK> [ 20.354006] dump_stack_lvl+0x73/0xb0 [ 20.354080] print_report+0xd1/0x660 [ 20.354169] ? __virt_addr_valid+0x1db/0x2d0 [ 20.354291] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.354365] kasan_report+0x104/0x140 [ 20.354424] ? kmalloc_oob_right+0x68a/0x7f0 [ 20.354490] ? kmalloc_oob_right+0x68a/0x7f0 [ 20.354568] __asan_report_load1_noabort+0x18/0x20 [ 20.354632] kmalloc_oob_right+0x68a/0x7f0 [ 20.354699] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 20.354765] ? __schedule+0xd46/0x29c0 [ 20.354827] ? __pfx_read_tsc+0x10/0x10 [ 20.354884] ? ktime_get_ts64+0x86/0x240 [ 20.354953] kunit_try_run_case+0x1b2/0x490 [ 20.355022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.355083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.355536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.355644] ? __kthread_parkme+0x82/0x160 [ 20.355709] ? preempt_count_sub+0x50/0x80 [ 20.355783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.355853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.355921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.355998] kthread+0x323/0x710 [ 20.356056] ? trace_preempt_on+0x20/0xc0 [ 20.356141] ? __pfx_kthread+0x10/0x10 [ 20.356207] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.356265] ? calculate_sigpending+0x7b/0xa0 [ 20.356325] ? __pfx_kthread+0x10/0x10 [ 20.356388] ret_from_fork+0x41/0x80 [ 20.356448] ? __pfx_kthread+0x10/0x10 [ 20.356510] ret_from_fork_asm+0x1a/0x30 [ 20.356600] </TASK> [ 20.356630] [ 20.378333] Allocated by task 157: [ 20.378573] kasan_save_stack+0x3d/0x60 [ 20.379058] kasan_save_track+0x18/0x40 [ 20.379580] kasan_save_alloc_info+0x3b/0x50 [ 20.381062] __kasan_kmalloc+0xb7/0xc0 [ 20.381495] __kmalloc_cache_noprof+0x183/0x410 [ 20.382209] kmalloc_oob_right+0xa9/0x7f0 [ 20.382646] kunit_try_run_case+0x1b2/0x490 [ 20.383324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.384314] kthread+0x323/0x710 [ 20.384880] ret_from_fork+0x41/0x80 [ 20.385329] ret_from_fork_asm+0x1a/0x30 [ 20.386031] [ 20.386277] The buggy address belongs to the object at ffff88810305a000 [ 20.386277] which belongs to the cache kmalloc-128 of size 128 [ 20.387275] The buggy address is located 13 bytes to the right of [ 20.387275] allocated 115-byte region [ffff88810305a000, ffff88810305a073) [ 20.388972] [ 20.389224] The buggy address belongs to the physical page: [ 20.389747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305a [ 20.390357] flags: 0x200000000000000(node=0|zone=2) [ 20.390813] page_type: f5(slab) [ 20.391094] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.392550] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.393291] page dumped because: kasan: bad access detected [ 20.393594] [ 20.393940] Memory state around the buggy address: [ 20.394415] ffff888103059f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.395342] ffff88810305a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.396504] >ffff88810305a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.397265] ^ [ 20.397658] ffff88810305a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.398391] ffff88810305a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.399234] ================================================================== [ 20.314936] ================================================================== [ 20.315481] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 20.316369] Write of size 1 at addr ffff88810305a078 by task kunit_try_catch/157 [ 20.316864] [ 20.317051] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 20.317192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.317227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.317282] Call Trace: [ 20.317312] <TASK> [ 20.317344] dump_stack_lvl+0x73/0xb0 [ 20.317420] print_report+0xd1/0x660 [ 20.317480] ? __virt_addr_valid+0x1db/0x2d0 [ 20.317603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.317675] kasan_report+0x104/0x140 [ 20.317732] ? kmalloc_oob_right+0x6bd/0x7f0 [ 20.317796] ? kmalloc_oob_right+0x6bd/0x7f0 [ 20.317873] __asan_report_store1_noabort+0x1b/0x30 [ 20.317935] kmalloc_oob_right+0x6bd/0x7f0 [ 20.318000] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 20.318058] ? __schedule+0xd46/0x29c0 [ 20.318328] ? __pfx_read_tsc+0x10/0x10 [ 20.318414] ? ktime_get_ts64+0x86/0x240 [ 20.318485] kunit_try_run_case+0x1b2/0x490 [ 20.318548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.318593] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.318626] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.318658] ? __kthread_parkme+0x82/0x160 [ 20.318690] ? preempt_count_sub+0x50/0x80 [ 20.318795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.318884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.318946] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.319004] kthread+0x323/0x710 [ 20.319056] ? trace_preempt_on+0x20/0xc0 [ 20.319142] ? __pfx_kthread+0x10/0x10 [ 20.319176] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.319206] ? calculate_sigpending+0x7b/0xa0 [ 20.319237] ? __pfx_kthread+0x10/0x10 [ 20.319269] ret_from_fork+0x41/0x80 [ 20.319301] ? __pfx_kthread+0x10/0x10 [ 20.319332] ret_from_fork_asm+0x1a/0x30 [ 20.319380] </TASK> [ 20.319395] [ 20.331994] Allocated by task 157: [ 20.332917] kasan_save_stack+0x3d/0x60 [ 20.333375] kasan_save_track+0x18/0x40 [ 20.333956] kasan_save_alloc_info+0x3b/0x50 [ 20.334446] __kasan_kmalloc+0xb7/0xc0 [ 20.334893] __kmalloc_cache_noprof+0x183/0x410 [ 20.335296] kmalloc_oob_right+0xa9/0x7f0 [ 20.335647] kunit_try_run_case+0x1b2/0x490 [ 20.336742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.337603] kthread+0x323/0x710 [ 20.337991] ret_from_fork+0x41/0x80 [ 20.338292] ret_from_fork_asm+0x1a/0x30 [ 20.338563] [ 20.338919] The buggy address belongs to the object at ffff88810305a000 [ 20.338919] which belongs to the cache kmalloc-128 of size 128 [ 20.340011] The buggy address is located 5 bytes to the right of [ 20.340011] allocated 115-byte region [ffff88810305a000, ffff88810305a073) [ 20.341734] [ 20.341897] The buggy address belongs to the physical page: [ 20.342221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305a [ 20.342640] flags: 0x200000000000000(node=0|zone=2) [ 20.343155] page_type: f5(slab) [ 20.343494] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.344225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.345264] page dumped because: kasan: bad access detected [ 20.345935] [ 20.346168] Memory state around the buggy address: [ 20.346523] ffff888103059f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.347069] ffff888103059f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.348038] >ffff88810305a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.348435] ^ [ 20.348866] ffff88810305a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.349622] ffff88810305a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.350287] ==================================================================