Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.763138] ================================================================== [ 17.763554] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.764336] Write of size 1 at addr fff00000c3e3ee78 by task kunit_try_catch/126 [ 17.765362] [ 17.765818] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 17.766349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.766391] Hardware name: linux,dummy-virt (DT) [ 17.766433] Call trace: [ 17.766460] show_stack+0x20/0x38 (C) [ 17.766529] dump_stack_lvl+0x8c/0xd0 [ 17.766584] print_report+0x118/0x608 [ 17.766637] kasan_report+0xdc/0x128 [ 17.766686] __asan_report_store1_noabort+0x20/0x30 [ 17.766735] kmalloc_oob_right+0x538/0x660 [ 17.766782] kunit_try_run_case+0x170/0x3f0 [ 17.766830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.766882] kthread+0x318/0x620 [ 17.766927] ret_from_fork+0x10/0x20 [ 17.766978] [ 17.772443] Allocated by task 126: [ 17.772790] kasan_save_stack+0x3c/0x68 [ 17.773730] kasan_save_track+0x20/0x40 [ 17.774523] kasan_save_alloc_info+0x40/0x58 [ 17.774902] __kasan_kmalloc+0xd4/0xd8 [ 17.775475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.776059] kmalloc_oob_right+0xb0/0x660 [ 17.776625] kunit_try_run_case+0x170/0x3f0 [ 17.777209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.777693] kthread+0x318/0x620 [ 17.777994] ret_from_fork+0x10/0x20 [ 17.778873] [ 17.779390] The buggy address belongs to the object at fff00000c3e3ee00 [ 17.779390] which belongs to the cache kmalloc-128 of size 128 [ 17.780393] The buggy address is located 5 bytes to the right of [ 17.780393] allocated 115-byte region [fff00000c3e3ee00, fff00000c3e3ee73) [ 17.781242] [ 17.781720] The buggy address belongs to the physical page: [ 17.782052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e3e [ 17.783075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.783775] page_type: f5(slab) [ 17.784232] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.784818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.785375] page dumped because: kasan: bad access detected [ 17.785991] [ 17.786295] Memory state around the buggy address: [ 17.786559] fff00000c3e3ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.786882] fff00000c3e3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.787214] >fff00000c3e3ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.787855] ^ [ 17.788562] fff00000c3e3ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.789309] fff00000c3e3ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.789984] ================================================================== [ 17.725995] ================================================================== [ 17.727661] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.729231] Write of size 1 at addr fff00000c3e3ee73 by task kunit_try_catch/126 [ 17.730743] [ 17.732206] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G N 6.14.10-rc1 #1 [ 17.732733] Tainted: [N]=TEST [ 17.732776] Hardware name: linux,dummy-virt (DT) [ 17.733089] Call trace: [ 17.733288] show_stack+0x20/0x38 (C) [ 17.733474] dump_stack_lvl+0x8c/0xd0 [ 17.733565] print_report+0x118/0x608 [ 17.733625] kasan_report+0xdc/0x128 [ 17.733678] __asan_report_store1_noabort+0x20/0x30 [ 17.733732] kmalloc_oob_right+0x5a4/0x660 [ 17.733783] kunit_try_run_case+0x170/0x3f0 [ 17.733839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.733896] kthread+0x318/0x620 [ 17.733950] ret_from_fork+0x10/0x20 [ 17.734243] [ 17.740416] Allocated by task 126: [ 17.741095] kasan_save_stack+0x3c/0x68 [ 17.741581] kasan_save_track+0x20/0x40 [ 17.741959] kasan_save_alloc_info+0x40/0x58 [ 17.742742] __kasan_kmalloc+0xd4/0xd8 [ 17.743281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.743878] kmalloc_oob_right+0xb0/0x660 [ 17.744448] kunit_try_run_case+0x170/0x3f0 [ 17.744993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.745627] kthread+0x318/0x620 [ 17.745959] ret_from_fork+0x10/0x20 [ 17.746641] [ 17.747131] The buggy address belongs to the object at fff00000c3e3ee00 [ 17.747131] which belongs to the cache kmalloc-128 of size 128 [ 17.748199] The buggy address is located 0 bytes to the right of [ 17.748199] allocated 115-byte region [fff00000c3e3ee00, fff00000c3e3ee73) [ 17.748820] [ 17.749083] The buggy address belongs to the physical page: [ 17.749649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e3e [ 17.751598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.752384] page_type: f5(slab) [ 17.753319] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.753918] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.754911] page dumped because: kasan: bad access detected [ 17.755322] [ 17.755487] Memory state around the buggy address: [ 17.756001] fff00000c3e3ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.756380] fff00000c3e3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.756724] >fff00000c3e3ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.757066] ^ [ 17.758923] fff00000c3e3ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.759388] fff00000c3e3ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.759993] ================================================================== [ 17.791373] ================================================================== [ 17.791977] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.792643] Read of size 1 at addr fff00000c3e3ee80 by task kunit_try_catch/126 [ 17.793226] [ 17.793501] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 17.793690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.793736] Hardware name: linux,dummy-virt (DT) [ 17.793793] Call trace: [ 17.793837] show_stack+0x20/0x38 (C) [ 17.793956] dump_stack_lvl+0x8c/0xd0 [ 17.794172] print_report+0x118/0x608 [ 17.794296] kasan_report+0xdc/0x128 [ 17.794414] __asan_report_load1_noabort+0x20/0x30 [ 17.794540] kmalloc_oob_right+0x5d0/0x660 [ 17.794659] kunit_try_run_case+0x170/0x3f0 [ 17.794782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.794900] kthread+0x318/0x620 [ 17.795041] ret_from_fork+0x10/0x20 [ 17.795177] [ 17.800443] Allocated by task 126: [ 17.800863] kasan_save_stack+0x3c/0x68 [ 17.801448] kasan_save_track+0x20/0x40 [ 17.801988] kasan_save_alloc_info+0x40/0x58 [ 17.802753] __kasan_kmalloc+0xd4/0xd8 [ 17.803064] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.803625] kmalloc_oob_right+0xb0/0x660 [ 17.804046] kunit_try_run_case+0x170/0x3f0 [ 17.804481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.804969] kthread+0x318/0x620 [ 17.805345] ret_from_fork+0x10/0x20 [ 17.805753] [ 17.806042] The buggy address belongs to the object at fff00000c3e3ee00 [ 17.806042] which belongs to the cache kmalloc-128 of size 128 [ 17.806912] The buggy address is located 13 bytes to the right of [ 17.806912] allocated 115-byte region [fff00000c3e3ee00, fff00000c3e3ee73) [ 17.807777] [ 17.807993] The buggy address belongs to the physical page: [ 17.808741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e3e [ 17.809408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.810130] page_type: f5(slab) [ 17.810731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.811192] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.811968] page dumped because: kasan: bad access detected [ 17.812479] [ 17.812756] Memory state around the buggy address: [ 17.813247] fff00000c3e3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.813963] fff00000c3e3ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.815481] >fff00000c3e3ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.816122] ^ [ 17.816472] fff00000c3e3ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.817004] fff00000c3e3ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.817472] ==================================================================
[ 12.009803] ================================================================== [ 12.010461] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 12.011138] Write of size 1 at addr ffff888101bd1873 by task kunit_try_catch/144 [ 12.011697] [ 12.012467] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G N 6.14.10-rc1 #1 [ 12.012853] Tainted: [N]=TEST [ 12.012881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.013108] Call Trace: [ 12.013176] <TASK> [ 12.013320] dump_stack_lvl+0x73/0xb0 [ 12.013404] print_report+0xd1/0x650 [ 12.013432] ? __virt_addr_valid+0x1db/0x2d0 [ 12.013456] ? kmalloc_oob_right+0x6f2/0x7f0 [ 12.013475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.013500] ? kmalloc_oob_right+0x6f2/0x7f0 [ 12.013520] kasan_report+0x140/0x180 [ 12.013541] ? kmalloc_oob_right+0x6f2/0x7f0 [ 12.013565] __asan_report_store1_noabort+0x1b/0x30 [ 12.013588] kmalloc_oob_right+0x6f2/0x7f0 [ 12.013609] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.013631] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.013655] kunit_try_run_case+0x1a6/0x480 [ 12.013680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.013700] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.013725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.013757] ? __kthread_parkme+0x82/0x160 [ 12.013780] ? preempt_count_sub+0x50/0x80 [ 12.013805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.013827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.013853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.013878] kthread+0x324/0x6e0 [ 12.013899] ? trace_preempt_on+0x20/0xc0 [ 12.013923] ? __pfx_kthread+0x10/0x10 [ 12.013944] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.013966] ? calculate_sigpending+0x7b/0xa0 [ 12.013988] ? __pfx_kthread+0x10/0x10 [ 12.014010] ret_from_fork+0x41/0x80 [ 12.014039] ? __pfx_kthread+0x10/0x10 [ 12.014060] ret_from_fork_asm+0x1a/0x30 [ 12.014113] </TASK> [ 12.014175] [ 12.025067] Allocated by task 144: [ 12.025348] kasan_save_stack+0x45/0x70 [ 12.025568] kasan_save_track+0x18/0x40 [ 12.025778] kasan_save_alloc_info+0x3b/0x50 [ 12.025989] __kasan_kmalloc+0xb7/0xc0 [ 12.026133] __kmalloc_cache_noprof+0x18a/0x420 [ 12.026383] kmalloc_oob_right+0xaa/0x7f0 [ 12.026548] kunit_try_run_case+0x1a6/0x480 [ 12.026773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.027000] kthread+0x324/0x6e0 [ 12.027150] ret_from_fork+0x41/0x80 [ 12.027328] ret_from_fork_asm+0x1a/0x30 [ 12.027556] [ 12.027754] The buggy address belongs to the object at ffff888101bd1800 [ 12.027754] which belongs to the cache kmalloc-128 of size 128 [ 12.028542] The buggy address is located 0 bytes to the right of [ 12.028542] allocated 115-byte region [ffff888101bd1800, ffff888101bd1873) [ 12.029108] [ 12.029259] The buggy address belongs to the physical page: [ 12.029693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1 [ 12.030222] flags: 0x200000000000000(node=0|zone=2) [ 12.030818] page_type: f5(slab) [ 12.031304] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.031684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.032008] page dumped because: kasan: bad access detected [ 12.032286] [ 12.032389] Memory state around the buggy address: [ 12.032909] ffff888101bd1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.033246] ffff888101bd1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.033538] >ffff888101bd1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.033875] ^ [ 12.034190] ffff888101bd1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.034470] ffff888101bd1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.034820] ================================================================== [ 12.036111] ================================================================== [ 12.036366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 12.036662] Write of size 1 at addr ffff888101bd1878 by task kunit_try_catch/144 [ 12.036889] [ 12.036994] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.037057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.037069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.037087] Call Trace: [ 12.037100] <TASK> [ 12.037114] dump_stack_lvl+0x73/0xb0 [ 12.037137] print_report+0xd1/0x650 [ 12.037157] ? __virt_addr_valid+0x1db/0x2d0 [ 12.037178] ? kmalloc_oob_right+0x6bf/0x7f0 [ 12.037198] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.037222] ? kmalloc_oob_right+0x6bf/0x7f0 [ 12.037242] kasan_report+0x140/0x180 [ 12.037263] ? kmalloc_oob_right+0x6bf/0x7f0 [ 12.037288] __asan_report_store1_noabort+0x1b/0x30 [ 12.037310] kmalloc_oob_right+0x6bf/0x7f0 [ 12.037331] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.037354] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.037378] kunit_try_run_case+0x1a6/0x480 [ 12.037400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.037420] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.037443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.037466] ? __kthread_parkme+0x82/0x160 [ 12.037487] ? preempt_count_sub+0x50/0x80 [ 12.037511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.037533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.037558] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.037583] kthread+0x324/0x6e0 [ 12.037603] ? trace_preempt_on+0x20/0xc0 [ 12.037625] ? __pfx_kthread+0x10/0x10 [ 12.037646] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.037667] ? calculate_sigpending+0x7b/0xa0 [ 12.037688] ? __pfx_kthread+0x10/0x10 [ 12.037710] ret_from_fork+0x41/0x80 [ 12.037728] ? __pfx_kthread+0x10/0x10 [ 12.037754] ret_from_fork_asm+0x1a/0x30 [ 12.037783] </TASK> [ 12.037793] [ 12.044608] Allocated by task 144: [ 12.044763] kasan_save_stack+0x45/0x70 [ 12.044901] kasan_save_track+0x18/0x40 [ 12.045047] kasan_save_alloc_info+0x3b/0x50 [ 12.045425] __kasan_kmalloc+0xb7/0xc0 [ 12.045698] __kmalloc_cache_noprof+0x18a/0x420 [ 12.045859] kmalloc_oob_right+0xaa/0x7f0 [ 12.046049] kunit_try_run_case+0x1a6/0x480 [ 12.046254] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.046448] kthread+0x324/0x6e0 [ 12.046568] ret_from_fork+0x41/0x80 [ 12.046694] ret_from_fork_asm+0x1a/0x30 [ 12.046877] [ 12.046980] The buggy address belongs to the object at ffff888101bd1800 [ 12.046980] which belongs to the cache kmalloc-128 of size 128 [ 12.047606] The buggy address is located 5 bytes to the right of [ 12.047606] allocated 115-byte region [ffff888101bd1800, ffff888101bd1873) [ 12.047972] [ 12.048065] The buggy address belongs to the physical page: [ 12.048398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1 [ 12.048741] flags: 0x200000000000000(node=0|zone=2) [ 12.048955] page_type: f5(slab) [ 12.049113] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.049366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.049641] page dumped because: kasan: bad access detected [ 12.050039] [ 12.050130] Memory state around the buggy address: [ 12.050330] ffff888101bd1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.050696] ffff888101bd1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.050984] >ffff888101bd1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.051234] ^ [ 12.051445] ffff888101bd1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.051659] ffff888101bd1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.051868] ================================================================== [ 12.052324] ================================================================== [ 12.052825] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 12.053151] Read of size 1 at addr ffff888101bd1880 by task kunit_try_catch/144 [ 12.053728] [ 12.053813] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 12.053849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.053860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.053879] Call Trace: [ 12.053892] <TASK> [ 12.053905] dump_stack_lvl+0x73/0xb0 [ 12.053929] print_report+0xd1/0x650 [ 12.053949] ? __virt_addr_valid+0x1db/0x2d0 [ 12.053970] ? kmalloc_oob_right+0x68c/0x7f0 [ 12.053990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.054014] ? kmalloc_oob_right+0x68c/0x7f0 [ 12.054045] kasan_report+0x140/0x180 [ 12.054066] ? kmalloc_oob_right+0x68c/0x7f0 [ 12.054090] __asan_report_load1_noabort+0x18/0x20 [ 12.054113] kmalloc_oob_right+0x68c/0x7f0 [ 12.054133] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.054156] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.054180] kunit_try_run_case+0x1a6/0x480 [ 12.054202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.054222] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.054245] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.054268] ? __kthread_parkme+0x82/0x160 [ 12.054290] ? preempt_count_sub+0x50/0x80 [ 12.054314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.054337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.054362] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.054387] kthread+0x324/0x6e0 [ 12.054407] ? trace_preempt_on+0x20/0xc0 [ 12.054429] ? __pfx_kthread+0x10/0x10 [ 12.054452] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.054473] ? calculate_sigpending+0x7b/0xa0 [ 12.054494] ? __pfx_kthread+0x10/0x10 [ 12.054515] ret_from_fork+0x41/0x80 [ 12.054533] ? __pfx_kthread+0x10/0x10 [ 12.054554] ret_from_fork_asm+0x1a/0x30 [ 12.054584] </TASK> [ 12.054593] [ 12.061872] Allocated by task 144: [ 12.062047] kasan_save_stack+0x45/0x70 [ 12.062191] kasan_save_track+0x18/0x40 [ 12.062322] kasan_save_alloc_info+0x3b/0x50 [ 12.062468] __kasan_kmalloc+0xb7/0xc0 [ 12.062595] __kmalloc_cache_noprof+0x18a/0x420 [ 12.062747] kmalloc_oob_right+0xaa/0x7f0 [ 12.062883] kunit_try_run_case+0x1a6/0x480 [ 12.063079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.063330] kthread+0x324/0x6e0 [ 12.063597] ret_from_fork+0x41/0x80 [ 12.063777] ret_from_fork_asm+0x1a/0x30 [ 12.063984] [ 12.064088] The buggy address belongs to the object at ffff888101bd1800 [ 12.064088] which belongs to the cache kmalloc-128 of size 128 [ 12.064629] The buggy address is located 13 bytes to the right of [ 12.064629] allocated 115-byte region [ffff888101bd1800, ffff888101bd1873) [ 12.065086] [ 12.065236] The buggy address belongs to the physical page: [ 12.065449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1 [ 12.065874] flags: 0x200000000000000(node=0|zone=2) [ 12.066098] page_type: f5(slab) [ 12.066214] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.066440] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.066970] page dumped because: kasan: bad access detected [ 12.067457] [ 12.067538] Memory state around the buggy address: [ 12.067791] ffff888101bd1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.068061] ffff888101bd1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.068474] >ffff888101bd1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.068882] ^ [ 12.068996] ffff888101bd1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.069324] ffff888101bd1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.069543] ==================================================================