Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 19.252953] ================================================================== [ 19.260090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 19.267028] Write of size 1 at addr ffff000801781a78 by task kunit_try_catch/180 [ 19.274406] [ 19.275891] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 19.275944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.275960] Hardware name: WinLink E850-96 board (DT) [ 19.275981] Call trace: [ 19.275992] show_stack+0x20/0x38 (C) [ 19.276024] dump_stack_lvl+0x8c/0xd0 [ 19.276062] print_report+0x118/0x608 [ 19.276098] kasan_report+0xdc/0x128 [ 19.276129] __asan_report_store1_noabort+0x20/0x30 [ 19.276160] kmalloc_oob_right+0x538/0x660 [ 19.276188] kunit_try_run_case+0x170/0x3f0 [ 19.276223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.276260] kthread+0x328/0x630 [ 19.276289] ret_from_fork+0x10/0x20 [ 19.276323] [ 19.339596] Allocated by task 180: [ 19.342985] kasan_save_stack+0x3c/0x68 [ 19.346801] kasan_save_track+0x20/0x40 [ 19.350620] kasan_save_alloc_info+0x40/0x58 [ 19.354874] __kasan_kmalloc+0xd4/0xd8 [ 19.358606] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.363120] kmalloc_oob_right+0xb0/0x660 [ 19.367113] kunit_try_run_case+0x170/0x3f0 [ 19.371280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.376748] kthread+0x328/0x630 [ 19.379960] ret_from_fork+0x10/0x20 [ 19.383519] [ 19.384996] The buggy address belongs to the object at ffff000801781a00 [ 19.384996] which belongs to the cache kmalloc-128 of size 128 [ 19.397496] The buggy address is located 5 bytes to the right of [ 19.397496] allocated 115-byte region [ffff000801781a00, ffff000801781a73) [ 19.410428] [ 19.411907] The buggy address belongs to the physical page: [ 19.417464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780 [ 19.425449] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.433086] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.440030] page_type: f5(slab) [ 19.443163] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.450886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.458612] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.466423] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.474236] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff [ 19.482048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.489854] page dumped because: kasan: bad access detected [ 19.495411] [ 19.496885] Memory state around the buggy address: [ 19.501666] ffff000801781900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.508869] ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.516075] >ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.523274] ^ [ 19.530395] ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.537600] ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544801] ================================================================== [ 18.950581] ================================================================== [ 18.957142] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.964081] Write of size 1 at addr ffff000801781a73 by task kunit_try_catch/180 [ 18.971459] [ 18.972945] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250530 #1 PREEMPT [ 18.972999] Tainted: [N]=TEST [ 18.973014] Hardware name: WinLink E850-96 board (DT) [ 18.973033] Call trace: [ 18.973047] show_stack+0x20/0x38 (C) [ 18.973082] dump_stack_lvl+0x8c/0xd0 [ 18.973120] print_report+0x118/0x608 [ 18.973156] kasan_report+0xdc/0x128 [ 18.973188] __asan_report_store1_noabort+0x20/0x30 [ 18.973217] kmalloc_oob_right+0x5a4/0x660 [ 18.973248] kunit_try_run_case+0x170/0x3f0 [ 18.973287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.973323] kthread+0x328/0x630 [ 18.973352] ret_from_fork+0x10/0x20 [ 18.973386] [ 19.035435] Allocated by task 180: [ 19.038823] kasan_save_stack+0x3c/0x68 [ 19.042639] kasan_save_track+0x20/0x40 [ 19.046458] kasan_save_alloc_info+0x40/0x58 [ 19.050711] __kasan_kmalloc+0xd4/0xd8 [ 19.054445] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.058958] kmalloc_oob_right+0xb0/0x660 [ 19.062951] kunit_try_run_case+0x170/0x3f0 [ 19.067118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.072586] kthread+0x328/0x630 [ 19.075798] ret_from_fork+0x10/0x20 [ 19.079357] [ 19.080835] The buggy address belongs to the object at ffff000801781a00 [ 19.080835] which belongs to the cache kmalloc-128 of size 128 [ 19.093335] The buggy address is located 0 bytes to the right of [ 19.093335] allocated 115-byte region [ffff000801781a00, ffff000801781a73) [ 19.106266] [ 19.107745] The buggy address belongs to the physical page: [ 19.113303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780 [ 19.121287] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.128926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.135868] page_type: f5(slab) [ 19.139006] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.146724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.154451] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.162261] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.170074] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff [ 19.177886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.185692] page dumped because: kasan: bad access detected [ 19.191249] [ 19.192723] Memory state around the buggy address: [ 19.197504] ffff000801781900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.204706] ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.211912] >ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.219111] ^ [ 19.225973] ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.233178] ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.240380] ================================================================== [ 19.552183] ================================================================== [ 19.559215] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 19.566155] Read of size 1 at addr ffff000801781a80 by task kunit_try_catch/180 [ 19.573447] [ 19.574930] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 19.574980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.574995] Hardware name: WinLink E850-96 board (DT) [ 19.575012] Call trace: [ 19.575023] show_stack+0x20/0x38 (C) [ 19.575054] dump_stack_lvl+0x8c/0xd0 [ 19.575088] print_report+0x118/0x608 [ 19.575124] kasan_report+0xdc/0x128 [ 19.575155] __asan_report_load1_noabort+0x20/0x30 [ 19.575183] kmalloc_oob_right+0x5d0/0x660 [ 19.575212] kunit_try_run_case+0x170/0x3f0 [ 19.575245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.575282] kthread+0x328/0x630 [ 19.575308] ret_from_fork+0x10/0x20 [ 19.575342] [ 19.638550] Allocated by task 180: [ 19.641937] kasan_save_stack+0x3c/0x68 [ 19.645755] kasan_save_track+0x20/0x40 [ 19.649574] kasan_save_alloc_info+0x40/0x58 [ 19.653828] __kasan_kmalloc+0xd4/0xd8 [ 19.657560] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.662074] kmalloc_oob_right+0xb0/0x660 [ 19.666067] kunit_try_run_case+0x170/0x3f0 [ 19.670234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.675702] kthread+0x328/0x630 [ 19.678914] ret_from_fork+0x10/0x20 [ 19.682473] [ 19.683950] The buggy address belongs to the object at ffff000801781a00 [ 19.683950] which belongs to the cache kmalloc-128 of size 128 [ 19.696449] The buggy address is located 13 bytes to the right of [ 19.696449] allocated 115-byte region [ffff000801781a00, ffff000801781a73) [ 19.709469] [ 19.710946] The buggy address belongs to the physical page: [ 19.716503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881780 [ 19.724488] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.732127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.739071] page_type: f5(slab) [ 19.742204] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.749926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.757653] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.765464] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.773277] head: 0bfffe0000000001 fffffdffe005e001 00000000ffffffff 00000000ffffffff [ 19.781089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.788895] page dumped because: kasan: bad access detected [ 19.794452] [ 19.795926] Memory state around the buggy address: [ 19.800706] ffff000801781980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.807909] ffff000801781a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.815113] >ffff000801781a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.822314] ^ [ 19.825530] ffff000801781b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.832735] ffff000801781b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.839936] ==================================================================
[ 23.996572] ================================================================== [ 23.996669] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 23.996805] Read of size 1 at addr fff00000c5eee980 by task kunit_try_catch/137 [ 23.996922] [ 23.996992] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.997177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.997239] Hardware name: linux,dummy-virt (DT) [ 23.997321] Call trace: [ 23.997370] show_stack+0x20/0x38 (C) [ 23.997504] dump_stack_lvl+0x8c/0xd0 [ 23.997646] print_report+0x118/0x608 [ 23.998015] kasan_report+0xdc/0x128 [ 23.998153] __asan_report_load1_noabort+0x20/0x30 [ 23.999247] kmalloc_oob_right+0x5d0/0x660 [ 23.999430] kunit_try_run_case+0x170/0x3f0 [ 23.999568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.000286] kthread+0x328/0x630 [ 24.000443] ret_from_fork+0x10/0x20 [ 24.000562] [ 24.000606] Allocated by task 137: [ 24.001155] kasan_save_stack+0x3c/0x68 [ 24.001717] kasan_save_track+0x20/0x40 [ 24.001825] kasan_save_alloc_info+0x40/0x58 [ 24.001943] __kasan_kmalloc+0xd4/0xd8 [ 24.002053] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.002721] kmalloc_oob_right+0xb0/0x660 [ 24.003180] kunit_try_run_case+0x170/0x3f0 [ 24.003565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.003700] kthread+0x328/0x630 [ 24.003792] ret_from_fork+0x10/0x20 [ 24.003884] [ 24.004500] The buggy address belongs to the object at fff00000c5eee900 [ 24.004500] which belongs to the cache kmalloc-128 of size 128 [ 24.004667] The buggy address is located 13 bytes to the right of [ 24.004667] allocated 115-byte region [fff00000c5eee900, fff00000c5eee973) [ 24.004842] [ 24.004892] The buggy address belongs to the physical page: [ 24.005066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 24.005285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.005475] page_type: f5(slab) [ 24.005572] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.005708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.005801] page dumped because: kasan: bad access detected [ 24.006242] [ 24.006302] Memory state around the buggy address: [ 24.006383] fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.006496] fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.006607] >fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.007062] ^ [ 24.007268] fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.007388] fff00000c5eeea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.007475] ================================================================== [ 23.985409] ================================================================== [ 23.985652] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 23.985956] Write of size 1 at addr fff00000c5eee978 by task kunit_try_catch/137 [ 23.986266] [ 23.986456] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 23.986749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.986807] Hardware name: linux,dummy-virt (DT) [ 23.986876] Call trace: [ 23.986931] show_stack+0x20/0x38 (C) [ 23.987063] dump_stack_lvl+0x8c/0xd0 [ 23.987193] print_report+0x118/0x608 [ 23.987326] kasan_report+0xdc/0x128 [ 23.987466] __asan_report_store1_noabort+0x20/0x30 [ 23.988308] kmalloc_oob_right+0x538/0x660 [ 23.989081] kunit_try_run_case+0x170/0x3f0 [ 23.989221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.989369] kthread+0x328/0x630 [ 23.989478] ret_from_fork+0x10/0x20 [ 23.989664] [ 23.989786] Allocated by task 137: [ 23.989858] kasan_save_stack+0x3c/0x68 [ 23.989963] kasan_save_track+0x20/0x40 [ 23.990223] kasan_save_alloc_info+0x40/0x58 [ 23.990319] __kasan_kmalloc+0xd4/0xd8 [ 23.990553] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.990655] kmalloc_oob_right+0xb0/0x660 [ 23.990781] kunit_try_run_case+0x170/0x3f0 [ 23.991241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.991370] kthread+0x328/0x630 [ 23.991495] ret_from_fork+0x10/0x20 [ 23.991850] [ 23.992120] The buggy address belongs to the object at fff00000c5eee900 [ 23.992120] which belongs to the cache kmalloc-128 of size 128 [ 23.992285] The buggy address is located 5 bytes to the right of [ 23.992285] allocated 115-byte region [fff00000c5eee900, fff00000c5eee973) [ 23.992620] [ 23.992669] The buggy address belongs to the physical page: [ 23.992784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 23.992924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.993032] page_type: f5(slab) [ 23.993122] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.993238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.993343] page dumped because: kasan: bad access detected [ 23.993422] [ 23.993541] Memory state around the buggy address: [ 23.993696] fff00000c5eee800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.993812] fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.993928] >fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.994028] ^ [ 23.994128] fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.994429] fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.994936] ================================================================== [ 23.972652] ================================================================== [ 23.974135] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 23.976157] Write of size 1 at addr fff00000c5eee973 by task kunit_try_catch/137 [ 23.976383] [ 23.978053] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250530 #1 PREEMPT [ 23.978238] Tainted: [N]=TEST [ 23.978281] Hardware name: linux,dummy-virt (DT) [ 23.978552] Call trace: [ 23.978930] show_stack+0x20/0x38 (C) [ 23.979175] dump_stack_lvl+0x8c/0xd0 [ 23.979264] print_report+0x118/0x608 [ 23.979328] kasan_report+0xdc/0x128 [ 23.979384] __asan_report_store1_noabort+0x20/0x30 [ 23.979443] kmalloc_oob_right+0x5a4/0x660 [ 23.979501] kunit_try_run_case+0x170/0x3f0 [ 23.979565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.979629] kthread+0x328/0x630 [ 23.979709] ret_from_fork+0x10/0x20 [ 23.979914] [ 23.979965] Allocated by task 137: [ 23.980104] kasan_save_stack+0x3c/0x68 [ 23.980195] kasan_save_track+0x20/0x40 [ 23.980246] kasan_save_alloc_info+0x40/0x58 [ 23.980292] __kasan_kmalloc+0xd4/0xd8 [ 23.980336] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.980387] kmalloc_oob_right+0xb0/0x660 [ 23.980431] kunit_try_run_case+0x170/0x3f0 [ 23.980476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.980528] kthread+0x328/0x630 [ 23.980566] ret_from_fork+0x10/0x20 [ 23.980632] [ 23.980733] The buggy address belongs to the object at fff00000c5eee900 [ 23.980733] which belongs to the cache kmalloc-128 of size 128 [ 23.980853] The buggy address is located 0 bytes to the right of [ 23.980853] allocated 115-byte region [fff00000c5eee900, fff00000c5eee973) [ 23.980936] [ 23.981034] The buggy address belongs to the physical page: [ 23.981243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee [ 23.981577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.981956] page_type: f5(slab) [ 23.982296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.982375] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.982513] page dumped because: kasan: bad access detected [ 23.982591] [ 23.982626] Memory state around the buggy address: [ 23.983102] fff00000c5eee800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.983194] fff00000c5eee880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.983265] >fff00000c5eee900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.983333] ^ [ 23.983434] fff00000c5eee980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.983485] fff00000c5eeea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.983562] ==================================================================
[ 16.603697] ================================================================== [ 16.604560] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 16.605364] Write of size 1 at addr ffff888102b56178 by task kunit_try_catch/153 [ 16.606096] [ 16.606400] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 16.606519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.606560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.606616] Call Trace: [ 16.606661] <TASK> [ 16.606707] dump_stack_lvl+0x73/0xb0 [ 16.606758] print_report+0xd1/0x650 [ 16.606873] ? __virt_addr_valid+0x1db/0x2d0 [ 16.606953] ? kmalloc_oob_right+0x6bd/0x7f0 [ 16.606988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.607020] ? kmalloc_oob_right+0x6bd/0x7f0 [ 16.607053] kasan_report+0x141/0x180 [ 16.607142] ? kmalloc_oob_right+0x6bd/0x7f0 [ 16.607229] __asan_report_store1_noabort+0x1b/0x30 [ 16.607299] kmalloc_oob_right+0x6bd/0x7f0 [ 16.607375] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.607449] ? __schedule+0x10cc/0x2b60 [ 16.607525] ? __pfx_read_tsc+0x10/0x10 [ 16.607586] ? ktime_get_ts64+0x86/0x230 [ 16.607622] kunit_try_run_case+0x1a5/0x480 [ 16.607651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.607678] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.607712] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.607747] ? __kthread_parkme+0x82/0x180 [ 16.607774] ? preempt_count_sub+0x50/0x80 [ 16.607849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.607880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.607915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.607949] kthread+0x337/0x6f0 [ 16.607975] ? trace_preempt_on+0x20/0xc0 [ 16.608005] ? __pfx_kthread+0x10/0x10 [ 16.608033] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.608090] ? calculate_sigpending+0x7b/0xa0 [ 16.608128] ? __pfx_kthread+0x10/0x10 [ 16.608157] ret_from_fork+0x116/0x1d0 [ 16.608181] ? __pfx_kthread+0x10/0x10 [ 16.608209] ret_from_fork_asm+0x1a/0x30 [ 16.608250] </TASK> [ 16.608263] [ 16.627494] Allocated by task 153: [ 16.627875] kasan_save_stack+0x45/0x70 [ 16.628597] kasan_save_track+0x18/0x40 [ 16.629321] kasan_save_alloc_info+0x3b/0x50 [ 16.629624] __kasan_kmalloc+0xb7/0xc0 [ 16.630297] __kmalloc_cache_noprof+0x189/0x420 [ 16.630944] kmalloc_oob_right+0xa9/0x7f0 [ 16.631348] kunit_try_run_case+0x1a5/0x480 [ 16.632075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.632737] kthread+0x337/0x6f0 [ 16.633257] ret_from_fork+0x116/0x1d0 [ 16.633624] ret_from_fork_asm+0x1a/0x30 [ 16.634339] [ 16.634711] The buggy address belongs to the object at ffff888102b56100 [ 16.634711] which belongs to the cache kmalloc-128 of size 128 [ 16.635660] The buggy address is located 5 bytes to the right of [ 16.635660] allocated 115-byte region [ffff888102b56100, ffff888102b56173) [ 16.637481] [ 16.637712] The buggy address belongs to the physical page: [ 16.638245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56 [ 16.638881] flags: 0x200000000000000(node=0|zone=2) [ 16.639323] page_type: f5(slab) [ 16.639662] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.640766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.641496] page dumped because: kasan: bad access detected [ 16.642150] [ 16.642468] Memory state around the buggy address: [ 16.643195] ffff888102b56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.643875] ffff888102b56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.644543] >ffff888102b56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.645420] ^ [ 16.645872] ffff888102b56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646552] ffff888102b56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.647188] ================================================================== [ 16.648484] ================================================================== [ 16.649085] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 16.649693] Read of size 1 at addr ffff888102b56180 by task kunit_try_catch/153 [ 16.650316] [ 16.650764] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 16.650882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.650918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.650976] Call Trace: [ 16.651021] <TASK> [ 16.651057] dump_stack_lvl+0x73/0xb0 [ 16.651153] print_report+0xd1/0x650 [ 16.651228] ? __virt_addr_valid+0x1db/0x2d0 [ 16.651350] ? kmalloc_oob_right+0x68a/0x7f0 [ 16.651425] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.651500] ? kmalloc_oob_right+0x68a/0x7f0 [ 16.651595] kasan_report+0x141/0x180 [ 16.651703] ? kmalloc_oob_right+0x68a/0x7f0 [ 16.651794] __asan_report_load1_noabort+0x18/0x20 [ 16.651872] kmalloc_oob_right+0x68a/0x7f0 [ 16.651971] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.652095] ? __schedule+0x10cc/0x2b60 [ 16.652178] ? __pfx_read_tsc+0x10/0x10 [ 16.652250] ? ktime_get_ts64+0x86/0x230 [ 16.652330] kunit_try_run_case+0x1a5/0x480 [ 16.652405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.652496] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.652603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.652682] ? __kthread_parkme+0x82/0x180 [ 16.652735] ? preempt_count_sub+0x50/0x80 [ 16.652768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.652839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.652880] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.652915] kthread+0x337/0x6f0 [ 16.652942] ? trace_preempt_on+0x20/0xc0 [ 16.652973] ? __pfx_kthread+0x10/0x10 [ 16.653000] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.653032] ? calculate_sigpending+0x7b/0xa0 [ 16.653088] ? __pfx_kthread+0x10/0x10 [ 16.653121] ret_from_fork+0x116/0x1d0 [ 16.653145] ? __pfx_kthread+0x10/0x10 [ 16.653172] ret_from_fork_asm+0x1a/0x30 [ 16.653213] </TASK> [ 16.653226] [ 16.671154] Allocated by task 153: [ 16.671546] kasan_save_stack+0x45/0x70 [ 16.672041] kasan_save_track+0x18/0x40 [ 16.672787] kasan_save_alloc_info+0x3b/0x50 [ 16.673473] __kasan_kmalloc+0xb7/0xc0 [ 16.673801] __kmalloc_cache_noprof+0x189/0x420 [ 16.674181] kmalloc_oob_right+0xa9/0x7f0 [ 16.674503] kunit_try_run_case+0x1a5/0x480 [ 16.675411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.676051] kthread+0x337/0x6f0 [ 16.676488] ret_from_fork+0x116/0x1d0 [ 16.676852] ret_from_fork_asm+0x1a/0x30 [ 16.677416] [ 16.677728] The buggy address belongs to the object at ffff888102b56100 [ 16.677728] which belongs to the cache kmalloc-128 of size 128 [ 16.678588] The buggy address is located 13 bytes to the right of [ 16.678588] allocated 115-byte region [ffff888102b56100, ffff888102b56173) [ 16.679551] [ 16.679793] The buggy address belongs to the physical page: [ 16.680385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56 [ 16.681172] flags: 0x200000000000000(node=0|zone=2) [ 16.681564] page_type: f5(slab) [ 16.682008] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.682571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.683612] page dumped because: kasan: bad access detected [ 16.684374] [ 16.684587] Memory state around the buggy address: [ 16.685233] ffff888102b56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.685770] ffff888102b56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.686612] >ffff888102b56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.687357] ^ [ 16.687826] ffff888102b56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.688368] ffff888102b56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.689168] ================================================================== [ 16.557469] ================================================================== [ 16.558772] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 16.559821] Write of size 1 at addr ffff888102b56173 by task kunit_try_catch/153 [ 16.560637] [ 16.562540] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 16.563128] Tainted: [N]=TEST [ 16.563176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.563439] Call Trace: [ 16.563524] <TASK> [ 16.563695] dump_stack_lvl+0x73/0xb0 [ 16.563844] print_report+0xd1/0x650 [ 16.563899] ? __virt_addr_valid+0x1db/0x2d0 [ 16.563936] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.563966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.563997] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.564028] kasan_report+0x141/0x180 [ 16.564058] ? kmalloc_oob_right+0x6f0/0x7f0 [ 16.564122] __asan_report_store1_noabort+0x1b/0x30 [ 16.564154] kmalloc_oob_right+0x6f0/0x7f0 [ 16.564185] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 16.564217] ? __schedule+0x10cc/0x2b60 [ 16.564251] ? __pfx_read_tsc+0x10/0x10 [ 16.564281] ? ktime_get_ts64+0x86/0x230 [ 16.564315] kunit_try_run_case+0x1a5/0x480 [ 16.564345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.564372] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.564407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.564440] ? __kthread_parkme+0x82/0x180 [ 16.564469] ? preempt_count_sub+0x50/0x80 [ 16.564500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.564528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.564562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.564596] kthread+0x337/0x6f0 [ 16.564622] ? trace_preempt_on+0x20/0xc0 [ 16.564654] ? __pfx_kthread+0x10/0x10 [ 16.564681] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.564712] ? calculate_sigpending+0x7b/0xa0 [ 16.564745] ? __pfx_kthread+0x10/0x10 [ 16.564774] ret_from_fork+0x116/0x1d0 [ 16.564840] ? __pfx_kthread+0x10/0x10 [ 16.564875] ret_from_fork_asm+0x1a/0x30 [ 16.564953] </TASK> [ 16.565038] [ 16.581252] Allocated by task 153: [ 16.581934] kasan_save_stack+0x45/0x70 [ 16.582429] kasan_save_track+0x18/0x40 [ 16.582881] kasan_save_alloc_info+0x3b/0x50 [ 16.583271] __kasan_kmalloc+0xb7/0xc0 [ 16.583672] __kmalloc_cache_noprof+0x189/0x420 [ 16.584144] kmalloc_oob_right+0xa9/0x7f0 [ 16.584474] kunit_try_run_case+0x1a5/0x480 [ 16.584966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.585532] kthread+0x337/0x6f0 [ 16.585957] ret_from_fork+0x116/0x1d0 [ 16.586374] ret_from_fork_asm+0x1a/0x30 [ 16.586867] [ 16.587188] The buggy address belongs to the object at ffff888102b56100 [ 16.587188] which belongs to the cache kmalloc-128 of size 128 [ 16.588407] The buggy address is located 0 bytes to the right of [ 16.588407] allocated 115-byte region [ffff888102b56100, ffff888102b56173) [ 16.589435] [ 16.589777] The buggy address belongs to the physical page: [ 16.590736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56 [ 16.592057] flags: 0x200000000000000(node=0|zone=2) [ 16.593292] page_type: f5(slab) [ 16.594234] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.594839] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.595580] page dumped because: kasan: bad access detected [ 16.596116] [ 16.596375] Memory state around the buggy address: [ 16.597352] ffff888102b56000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.598022] ffff888102b56080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.598627] >ffff888102b56100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.599282] ^ [ 16.599957] ffff888102b56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.600545] ffff888102b56200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.601207] ==================================================================
[ 45.316314] ================================================================== [ 45.323577] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6a4/0x744 [ 45.330596] Write of size 1 at addr cc7d8173 by task kunit_try_catch/188 [ 45.337371] [ 45.338867] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G W N 6.15.0-next-20250530 #1 NONE [ 45.338928] Tainted: [W]=WARN, [N]=TEST [ 45.338928] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.338928] Call trace: [ 45.338958] unwind_backtrace from show_stack+0x18/0x1c [ 45.338989] show_stack from dump_stack_lvl+0x70/0x90 [ 45.339019] dump_stack_lvl from print_report+0x158/0x528 [ 45.339050] print_report from kasan_report+0xdc/0x118 [ 45.339080] kasan_report from kmalloc_oob_right+0x6a4/0x744 [ 45.339111] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.339141] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.339172] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.339202] kthread from ret_from_fork+0x14/0x20 [ 45.339233] Exception stack(0xf2193fb0 to 0xf2193ff8) [ 45.339263] 3fa0: 00000000 00000000 00000000 00000000 [ 45.339294] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.339294] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.339324] [ 45.443847] Allocated by task 188: [ 45.447265] kasan_save_track+0x30/0x5c [ 45.451141] __kasan_kmalloc+0x8c/0x94 [ 45.454925] kmalloc_oob_right+0xcc/0x744 [ 45.458953] kunit_try_run_case+0x22c/0x5a8 [ 45.463195] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.468719] kthread+0x464/0x810 [ 45.471984] ret_from_fork+0x14/0x20 [ 45.475585] [ 45.477081] The buggy address belongs to the object at cc7d8100 [ 45.477081] which belongs to the cache kmalloc-128 of size 128 [ 45.488983] The buggy address is located 0 bytes to the right of [ 45.488983] allocated 115-byte region [cc7d8100, cc7d8173) [ 45.500610] [ 45.502105] The buggy address belongs to the physical page: [ 45.507720] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8 [ 45.514984] flags: 0x0(zone=0) [ 45.518066] page_type: f5(slab) [ 45.521240] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 45.529388] raw: 00000000 [ 45.532043] page dumped because: kasan: bad access detected [ 45.537628] [ 45.539154] Memory state around the buggy address: [ 45.543975] cc7d8000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc [ 45.550537] cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.557098] >cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 45.563659] ^ [ 45.569885] cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.576477] cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.583038] ================================================================== [ 45.595733] ================================================================== [ 45.602996] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x660/0x744 [ 45.610015] Write of size 1 at addr cc7d8178 by task kunit_try_catch/188 [ 45.616760] [ 45.618286] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 45.618316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 45.618316] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.618316] Call trace: [ 45.618316] unwind_backtrace from show_stack+0x18/0x1c [ 45.618347] show_stack from dump_stack_lvl+0x70/0x90 [ 45.618377] dump_stack_lvl from print_report+0x158/0x528 [ 45.618408] print_report from kasan_report+0xdc/0x118 [ 45.618438] kasan_report from kmalloc_oob_right+0x660/0x744 [ 45.618438] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.618469] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.618499] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.618530] kthread from ret_from_fork+0x14/0x20 [ 45.618530] Exception stack(0xf2193fb0 to 0xf2193ff8) [ 45.618560] 3fa0: 00000000 00000000 00000000 00000000 [ 45.618560] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.618591] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.618591] [ 45.724334] Allocated by task 188: [ 45.727783] kasan_save_track+0x30/0x5c [ 45.731628] __kasan_kmalloc+0x8c/0x94 [ 45.735412] kmalloc_oob_right+0xcc/0x744 [ 45.739440] kunit_try_run_case+0x22c/0x5a8 [ 45.743682] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.749206] kthread+0x464/0x810 [ 45.752471] ret_from_fork+0x14/0x20 [ 45.756072] [ 45.757568] The buggy address belongs to the object at cc7d8100 [ 45.757568] which belongs to the cache kmalloc-128 of size 128 [ 45.769470] The buggy address is located 5 bytes to the right of [ 45.769470] allocated 115-byte region [cc7d8100, cc7d8173) [ 45.781097] [ 45.782592] The buggy address belongs to the physical page: [ 45.788208] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8 [ 45.795471] flags: 0x0(zone=0) [ 45.798553] page_type: f5(slab) [ 45.801727] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 45.809875] raw: 00000000 [ 45.812499] page dumped because: kasan: bad access detected [ 45.818115] [ 45.819610] Memory state around the buggy address: [ 45.824432] cc7d8000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc [ 45.830993] cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.837585] >cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 45.844146] ^ [ 45.850616] cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.857177] cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.863769] ================================================================== [ 45.871093] ================================================================== [ 45.878356] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6c0/0x744 [ 45.885375] Read of size 1 at addr cc7d8180 by task kunit_try_catch/188 [ 45.892028] [ 45.893524] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 45.893554] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 45.893554] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.893585] Call trace: [ 45.893585] unwind_backtrace from show_stack+0x18/0x1c [ 45.893615] show_stack from dump_stack_lvl+0x70/0x90 [ 45.893615] dump_stack_lvl from print_report+0x158/0x528 [ 45.893646] print_report from kasan_report+0xdc/0x118 [ 45.893676] kasan_report from kmalloc_oob_right+0x6c0/0x744 [ 45.893707] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.893707] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.893737] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.893768] kthread from ret_from_fork+0x14/0x20 [ 45.893798] Exception stack(0xf2193fb0 to 0xf2193ff8) [ 45.893798] 3fa0: 00000000 00000000 00000000 00000000 [ 45.893829] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.893829] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.893859] [ 45.999603] Allocated by task 188: [ 46.003021] kasan_save_track+0x30/0x5c [ 46.006896] __kasan_kmalloc+0x8c/0x94 [ 46.010650] kmalloc_oob_right+0xcc/0x744 [ 46.014709] kunit_try_run_case+0x22c/0x5a8 [ 46.018920] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.024444] kthread+0x464/0x810 [ 46.027709] ret_from_fork+0x14/0x20 [ 46.031311] [ 46.032806] The buggy address belongs to the object at cc7d8100 [ 46.032806] which belongs to the cache kmalloc-128 of size 128 [ 46.044708] The buggy address is located 13 bytes to the right of [ 46.044708] allocated 115-byte region [cc7d8100, cc7d8173) [ 46.056427] [ 46.057922] The buggy address belongs to the physical page: [ 46.063537] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8 [ 46.070800] flags: 0x0(zone=0) [ 46.073883] page_type: f5(slab) [ 46.077056] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 46.085205] raw: 00000000 [ 46.087829] page dumped because: kasan: bad access detected [ 46.093444] [ 46.094940] Memory state around the buggy address: [ 46.099761] cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.106323] cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.112915] >cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.119476] ^ [ 46.122039] cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.128601] cc7d8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.135162] ==================================================================