Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 57.994628] ================================================================== [ 58.001892] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f0/0x908 [ 58.009338] Read of size 1 at addr cc228e78 by task kunit_try_catch/250 [ 58.016021] [ 58.017517] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 58.017547] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.017547] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.017578] Call trace: [ 58.017578] unwind_backtrace from show_stack+0x18/0x1c [ 58.017608] show_stack from dump_stack_lvl+0x70/0x90 [ 58.017608] dump_stack_lvl from print_report+0x158/0x528 [ 58.017639] print_report from kasan_report+0xdc/0x118 [ 58.017669] kasan_report from ksize_unpoisons_memory+0x7f0/0x908 [ 58.017700] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 58.017730] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.017730] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.017761] kthread from ret_from_fork+0x14/0x20 [ 58.017791] Exception stack(0xf24ebfb0 to 0xf24ebff8) [ 58.017791] bfa0: 00000000 00000000 00000000 00000000 [ 58.017822] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.017852] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.017852] [ 58.123596] Allocated by task 250: [ 58.127014] kasan_save_track+0x30/0x5c [ 58.130889] __kasan_kmalloc+0x8c/0x94 [ 58.134674] ksize_unpoisons_memory+0xe8/0x908 [ 58.139160] kunit_try_run_case+0x22c/0x5a8 [ 58.143371] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.148895] kthread+0x464/0x810 [ 58.152160] ret_from_fork+0x14/0x20 [ 58.155761] [ 58.157257] The buggy address belongs to the object at cc228e00 [ 58.157257] which belongs to the cache kmalloc-128 of size 128 [ 58.169158] The buggy address is located 5 bytes to the right of [ 58.169158] allocated 115-byte region [cc228e00, cc228e73) [ 58.180816] [ 58.182312] The buggy address belongs to the physical page: [ 58.187927] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 58.195190] flags: 0x0(zone=0) [ 58.198272] page_type: f5(slab) [ 58.201446] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.209594] raw: 00000000 [ 58.212219] page dumped because: kasan: bad access detected [ 58.217834] [ 58.219329] Memory state around the buggy address: [ 58.224151] cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.230712] cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.237304] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 58.243865] ^ [ 58.250366] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.256927] cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.263488] ================================================================== [ 57.713684] ================================================================== [ 57.725158] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f8/0x908 [ 57.732604] Read of size 1 at addr cc228e73 by task kunit_try_catch/250 [ 57.739288] [ 57.740783] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 57.740814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 57.740814] Hardware name: Generic DRA74X (Flattened Device Tree) [ 57.740844] Call trace: [ 57.740844] unwind_backtrace from show_stack+0x18/0x1c [ 57.740875] show_stack from dump_stack_lvl+0x70/0x90 [ 57.740905] dump_stack_lvl from print_report+0x158/0x528 [ 57.740905] print_report from kasan_report+0xdc/0x118 [ 57.740936] kasan_report from ksize_unpoisons_memory+0x7f8/0x908 [ 57.740966] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 57.740997] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.741027] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 57.741027] kthread from ret_from_fork+0x14/0x20 [ 57.741058] Exception stack(0xf24ebfb0 to 0xf24ebff8) [ 57.741088] bfa0: 00000000 00000000 00000000 00000000 [ 57.741088] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 57.741119] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 57.741119] [ 57.846862] Allocated by task 250: [ 57.850280] kasan_save_track+0x30/0x5c [ 57.854156] __kasan_kmalloc+0x8c/0x94 [ 57.857940] ksize_unpoisons_memory+0xe8/0x908 [ 57.862426] kunit_try_run_case+0x22c/0x5a8 [ 57.866638] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.872161] kthread+0x464/0x810 [ 57.875427] ret_from_fork+0x14/0x20 [ 57.879028] [ 57.880523] The buggy address belongs to the object at cc228e00 [ 57.880523] which belongs to the cache kmalloc-128 of size 128 [ 57.892425] The buggy address is located 0 bytes to the right of [ 57.892425] allocated 115-byte region [cc228e00, cc228e73) [ 57.904083] [ 57.905578] The buggy address belongs to the physical page: [ 57.911193] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 57.918457] flags: 0x0(zone=0) [ 57.921539] page_type: f5(slab) [ 57.924713] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 57.932861] raw: 00000000 [ 57.935485] page dumped because: kasan: bad access detected [ 57.941101] [ 57.942596] Memory state around the buggy address: [ 57.947418] cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.953979] cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.960571] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 57.967132] ^ [ 57.973358] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.979919] cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.986511] ================================================================== [ 58.270843] ================================================================== [ 58.278106] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x858/0x908 [ 58.285552] Read of size 1 at addr cc228e7f by task kunit_try_catch/250 [ 58.292205] [ 58.293731] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 58.293762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.293762] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.293762] Call trace: [ 58.293792] unwind_backtrace from show_stack+0x18/0x1c [ 58.293792] show_stack from dump_stack_lvl+0x70/0x90 [ 58.293823] dump_stack_lvl from print_report+0x158/0x528 [ 58.293853] print_report from kasan_report+0xdc/0x118 [ 58.293884] kasan_report from ksize_unpoisons_memory+0x858/0x908 [ 58.293884] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 58.293914] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.293945] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.293975] kthread from ret_from_fork+0x14/0x20 [ 58.294006] Exception stack(0xf24ebfb0 to 0xf24ebff8) [ 58.294006] bfa0: 00000000 00000000 00000000 00000000 [ 58.294036] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.294036] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.294067] [ 58.399810] Allocated by task 250: [ 58.403228] kasan_save_track+0x30/0x5c [ 58.407104] __kasan_kmalloc+0x8c/0x94 [ 58.410888] ksize_unpoisons_memory+0xe8/0x908 [ 58.415374] kunit_try_run_case+0x22c/0x5a8 [ 58.419586] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.425109] kthread+0x464/0x810 [ 58.428375] ret_from_fork+0x14/0x20 [ 58.431976] [ 58.433471] The buggy address belongs to the object at cc228e00 [ 58.433471] which belongs to the cache kmalloc-128 of size 128 [ 58.445373] The buggy address is located 12 bytes to the right of [ 58.445373] allocated 115-byte region [cc228e00, cc228e73) [ 58.457092] [ 58.458587] The buggy address belongs to the physical page: [ 58.464202] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 58.471466] flags: 0x0(zone=0) [ 58.474548] page_type: f5(slab) [ 58.477722] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.485870] raw: 00000000 [ 58.488494] page dumped because: kasan: bad access detected [ 58.494110] [ 58.495605] Memory state around the buggy address: [ 58.500427] cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.507019] cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.513580] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 58.520141] ^ [ 58.526641] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.533203] cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.539764] ==================================================================
[ 29.515305] ================================================================== [ 29.522536] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.529935] Read of size 1 at addr ffff888107f05378 by task kunit_try_catch/237 [ 29.537244] [ 29.538765] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 29.538773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.538775] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.538778] Call Trace: [ 29.538779] <TASK> [ 29.538781] dump_stack_lvl+0x73/0xb0 [ 29.538785] print_report+0xd1/0x650 [ 29.538789] ? __virt_addr_valid+0x1db/0x2d0 [ 29.538792] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.538797] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.538801] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.538805] kasan_report+0x141/0x180 [ 29.538810] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.538815] __asan_report_load1_noabort+0x18/0x20 [ 29.538819] ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.538823] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 29.538828] ? finish_task_switch.isra.0+0x153/0x700 [ 29.538832] ? __switch_to+0x5d9/0xf60 [ 29.538836] ? dequeue_task_fair+0x166/0x4e0 [ 29.538840] ? __schedule+0x10cc/0x2b30 [ 29.538844] ? ktime_get_ts64+0x83/0x230 [ 29.538849] kunit_try_run_case+0x1a2/0x480 [ 29.538853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.538857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.538862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.538866] ? __kthread_parkme+0x82/0x180 [ 29.538870] ? preempt_count_sub+0x50/0x80 [ 29.538875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.538879] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.538883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.538887] kthread+0x334/0x6f0 [ 29.538891] ? trace_preempt_on+0x20/0xc0 [ 29.538895] ? __pfx_kthread+0x10/0x10 [ 29.538899] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.538903] ? calculate_sigpending+0x7b/0xa0 [ 29.538907] ? __pfx_kthread+0x10/0x10 [ 29.538911] ret_from_fork+0x3e/0x80 [ 29.538915] ? __pfx_kthread+0x10/0x10 [ 29.538920] ret_from_fork_asm+0x1a/0x30 [ 29.538925] </TASK> [ 29.538927] [ 29.716876] Allocated by task 237: [ 29.720282] kasan_save_stack+0x45/0x70 [ 29.724122] kasan_save_track+0x18/0x40 [ 29.727961] kasan_save_alloc_info+0x3b/0x50 [ 29.732233] __kasan_kmalloc+0xb7/0xc0 [ 29.735986] __kmalloc_cache_noprof+0x189/0x420 [ 29.740518] ksize_unpoisons_memory+0xc7/0x9b0 [ 29.744971] kunit_try_run_case+0x1a2/0x480 [ 29.749158] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.754558] kthread+0x334/0x6f0 [ 29.757789] ret_from_fork+0x3e/0x80 [ 29.761370] ret_from_fork_asm+0x1a/0x30 [ 29.765296] [ 29.766794] The buggy address belongs to the object at ffff888107f05300 [ 29.766794] which belongs to the cache kmalloc-128 of size 128 [ 29.779309] The buggy address is located 5 bytes to the right of [ 29.779309] allocated 115-byte region [ffff888107f05300, ffff888107f05373) [ 29.792255] [ 29.793763] The buggy address belongs to the physical page: [ 29.799336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 29.807336] flags: 0x200000000000000(node=0|zone=2) [ 29.812213] page_type: f5(slab) [ 29.815361] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 29.823110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.830856] page dumped because: kasan: bad access detected [ 29.836428] [ 29.837927] Memory state around the buggy address: [ 29.842763] ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.849982] ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.857201] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.864421] ^ [ 29.871551] ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.878772] ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.885990] ================================================================== [ 29.893231] ================================================================== [ 29.900462] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.907855] Read of size 1 at addr ffff888107f0537f by task kunit_try_catch/237 [ 29.915160] [ 29.916660] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 29.916688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.916690] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.916693] Call Trace: [ 29.916695] <TASK> [ 29.916696] dump_stack_lvl+0x73/0xb0 [ 29.916700] print_report+0xd1/0x650 [ 29.916704] ? __virt_addr_valid+0x1db/0x2d0 [ 29.916720] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.916725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.916741] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.916746] kasan_report+0x141/0x180 [ 29.916750] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.916755] __asan_report_load1_noabort+0x18/0x20 [ 29.916759] ksize_unpoisons_memory+0x7b6/0x9b0 [ 29.916763] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 29.916768] ? finish_task_switch.isra.0+0x153/0x700 [ 29.916772] ? __switch_to+0x5d9/0xf60 [ 29.916775] ? dequeue_task_fair+0x166/0x4e0 [ 29.916780] ? __schedule+0x10cc/0x2b30 [ 29.916784] ? ktime_get_ts64+0x83/0x230 [ 29.916789] kunit_try_run_case+0x1a2/0x480 [ 29.916793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.916797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.916801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.916806] ? __kthread_parkme+0x82/0x180 [ 29.916810] ? preempt_count_sub+0x50/0x80 [ 29.916814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.916818] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.916822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.916826] kthread+0x334/0x6f0 [ 29.916830] ? trace_preempt_on+0x20/0xc0 [ 29.916834] ? __pfx_kthread+0x10/0x10 [ 29.916838] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.916842] ? calculate_sigpending+0x7b/0xa0 [ 29.916846] ? __pfx_kthread+0x10/0x10 [ 29.916850] ret_from_fork+0x3e/0x80 [ 29.916854] ? __pfx_kthread+0x10/0x10 [ 29.916858] ret_from_fork_asm+0x1a/0x30 [ 29.916864] </TASK> [ 29.916865] [ 30.094883] Allocated by task 237: [ 30.098287] kasan_save_stack+0x45/0x70 [ 30.102128] kasan_save_track+0x18/0x40 [ 30.105965] kasan_save_alloc_info+0x3b/0x50 [ 30.110239] __kasan_kmalloc+0xb7/0xc0 [ 30.113990] __kmalloc_cache_noprof+0x189/0x420 [ 30.118523] ksize_unpoisons_memory+0xc7/0x9b0 [ 30.122971] kunit_try_run_case+0x1a2/0x480 [ 30.127165] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.132570] kthread+0x334/0x6f0 [ 30.135803] ret_from_fork+0x3e/0x80 [ 30.139384] ret_from_fork_asm+0x1a/0x30 [ 30.143307] [ 30.144798] The buggy address belongs to the object at ffff888107f05300 [ 30.144798] which belongs to the cache kmalloc-128 of size 128 [ 30.157304] The buggy address is located 12 bytes to the right of [ 30.157304] allocated 115-byte region [ffff888107f05300, ffff888107f05373) [ 30.170339] [ 30.171838] The buggy address belongs to the physical page: [ 30.177412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 30.185418] flags: 0x200000000000000(node=0|zone=2) [ 30.190298] page_type: f5(slab) [ 30.193443] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 30.201183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.208921] page dumped because: kasan: bad access detected [ 30.214494] [ 30.215994] Memory state around the buggy address: [ 30.220787] ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.228015] ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.235240] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.242459] ^ [ 30.249592] ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.256812] ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.264031] ================================================================== [ 29.133247] ================================================================== [ 29.144662] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 29.152131] Read of size 1 at addr ffff888107f05373 by task kunit_try_catch/237 [ 29.159437] [ 29.160937] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 29.160945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.160947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.160951] Call Trace: [ 29.160952] <TASK> [ 29.160954] dump_stack_lvl+0x73/0xb0 [ 29.160958] print_report+0xd1/0x650 [ 29.160962] ? __virt_addr_valid+0x1db/0x2d0 [ 29.160966] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 29.160970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.160974] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 29.160979] kasan_report+0x141/0x180 [ 29.160983] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 29.160988] __asan_report_load1_noabort+0x18/0x20 [ 29.160992] ksize_unpoisons_memory+0x81c/0x9b0 [ 29.160996] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 29.161001] ? finish_task_switch.isra.0+0x153/0x700 [ 29.161005] ? __switch_to+0x5d9/0xf60 [ 29.161009] ? dequeue_task_fair+0x166/0x4e0 [ 29.161013] ? __schedule+0x10cc/0x2b30 [ 29.161018] ? ktime_get_ts64+0x83/0x230 [ 29.161022] kunit_try_run_case+0x1a2/0x480 [ 29.161026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.161031] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.161035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.161039] ? __kthread_parkme+0x82/0x180 [ 29.161043] ? preempt_count_sub+0x50/0x80 [ 29.161048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.161052] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.161056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.161060] kthread+0x334/0x6f0 [ 29.161064] ? trace_preempt_on+0x20/0xc0 [ 29.161068] ? __pfx_kthread+0x10/0x10 [ 29.161072] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.161076] ? calculate_sigpending+0x7b/0xa0 [ 29.161080] ? __pfx_kthread+0x10/0x10 [ 29.161084] ret_from_fork+0x3e/0x80 [ 29.161088] ? __pfx_kthread+0x10/0x10 [ 29.161093] ret_from_fork_asm+0x1a/0x30 [ 29.161098] </TASK> [ 29.161100] [ 29.339106] Allocated by task 237: [ 29.342511] kasan_save_stack+0x45/0x70 [ 29.346351] kasan_save_track+0x18/0x40 [ 29.350189] kasan_save_alloc_info+0x3b/0x50 [ 29.354461] __kasan_kmalloc+0xb7/0xc0 [ 29.358215] __kmalloc_cache_noprof+0x189/0x420 [ 29.362759] ksize_unpoisons_memory+0xc7/0x9b0 [ 29.367211] kunit_try_run_case+0x1a2/0x480 [ 29.371396] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.376794] kthread+0x334/0x6f0 [ 29.380028] ret_from_fork+0x3e/0x80 [ 29.383608] ret_from_fork_asm+0x1a/0x30 [ 29.387532] [ 29.389032] The buggy address belongs to the object at ffff888107f05300 [ 29.389032] which belongs to the cache kmalloc-128 of size 128 [ 29.401547] The buggy address is located 0 bytes to the right of [ 29.401547] allocated 115-byte region [ffff888107f05300, ffff888107f05373) [ 29.414501] [ 29.416000] The buggy address belongs to the physical page: [ 29.421574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 29.429583] flags: 0x200000000000000(node=0|zone=2) [ 29.434469] page_type: f5(slab) [ 29.437616] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 29.445356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.453102] page dumped because: kasan: bad access detected [ 29.458699] [ 29.460243] Memory state around the buggy address: [ 29.465035] ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.472253] ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.479473] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.486699] ^ [ 29.493618] ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.500835] ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.508056] ==================================================================