Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.930372] ================================================================== [ 31.931263] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 31.932274] Read of size 1 at addr fff00000c5e99178 by task kunit_try_catch/183 [ 31.932992] [ 31.933311] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.934975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.935511] Hardware name: linux,dummy-virt (DT) [ 31.936197] Call trace: [ 31.936694] show_stack+0x20/0x38 (C) [ 31.937353] dump_stack_lvl+0x8c/0xd0 [ 31.938287] print_report+0x118/0x5e0 [ 31.938852] kasan_report+0xc8/0x118 [ 31.939506] __asan_report_load1_noabort+0x20/0x30 [ 31.940187] ksize_unpoisons_memory+0x628/0x750 [ 31.940887] kunit_try_run_case+0x14c/0x3d0 [ 31.941496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.942569] kthread+0x24c/0x2d0 [ 31.943037] ret_from_fork+0x10/0x20 [ 31.943669] [ 31.944039] Allocated by task 183: [ 31.944486] kasan_save_stack+0x3c/0x68 [ 31.945135] kasan_save_track+0x20/0x40 [ 31.946014] kasan_save_alloc_info+0x40/0x58 [ 31.946638] __kasan_kmalloc+0xd4/0xd8 [ 31.947259] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.948275] ksize_unpoisons_memory+0xc0/0x750 [ 31.949136] kunit_try_run_case+0x14c/0x3d0 [ 31.949984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.951138] kthread+0x24c/0x2d0 [ 31.952188] ret_from_fork+0x10/0x20 [ 31.952832] [ 31.953254] The buggy address belongs to the object at fff00000c5e99100 [ 31.953254] which belongs to the cache kmalloc-128 of size 128 [ 31.954877] The buggy address is located 5 bytes to the right of [ 31.954877] allocated 115-byte region [fff00000c5e99100, fff00000c5e99173) [ 31.956377] [ 31.956828] The buggy address belongs to the physical page: [ 31.957462] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99 [ 31.958863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.959665] page_type: f5(slab) [ 31.960225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.961027] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.961946] page dumped because: kasan: bad access detected [ 31.962637] [ 31.963171] Memory state around the buggy address: [ 31.964012] fff00000c5e99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.964992] fff00000c5e99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.966138] >fff00000c5e99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.966889] ^ [ 31.967437] fff00000c5e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.968192] fff00000c5e99200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.969051] ================================================================== [ 31.888836] ================================================================== [ 31.889930] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 31.890791] Read of size 1 at addr fff00000c5e99173 by task kunit_try_catch/183 [ 31.891620] [ 31.892246] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.893393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.894958] Hardware name: linux,dummy-virt (DT) [ 31.895547] Call trace: [ 31.895997] show_stack+0x20/0x38 (C) [ 31.896558] dump_stack_lvl+0x8c/0xd0 [ 31.897173] print_report+0x118/0x5e0 [ 31.898125] kasan_report+0xc8/0x118 [ 31.898761] __asan_report_load1_noabort+0x20/0x30 [ 31.899467] ksize_unpoisons_memory+0x638/0x750 [ 31.900139] kunit_try_run_case+0x14c/0x3d0 [ 31.900789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.901544] kthread+0x24c/0x2d0 [ 31.902423] ret_from_fork+0x10/0x20 [ 31.903078] [ 31.903389] Allocated by task 183: [ 31.903963] kasan_save_stack+0x3c/0x68 [ 31.904519] kasan_save_track+0x20/0x40 [ 31.905171] kasan_save_alloc_info+0x40/0x58 [ 31.906145] __kasan_kmalloc+0xd4/0xd8 [ 31.906748] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.907329] ksize_unpoisons_memory+0xc0/0x750 [ 31.908026] kunit_try_run_case+0x14c/0x3d0 [ 31.908700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.909507] kthread+0x24c/0x2d0 [ 31.910562] ret_from_fork+0x10/0x20 [ 31.911113] [ 31.911479] The buggy address belongs to the object at fff00000c5e99100 [ 31.911479] which belongs to the cache kmalloc-128 of size 128 [ 31.912752] The buggy address is located 0 bytes to the right of [ 31.912752] allocated 115-byte region [fff00000c5e99100, fff00000c5e99173) [ 31.914356] [ 31.914752] The buggy address belongs to the physical page: [ 31.915416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99 [ 31.916367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.917294] page_type: f5(slab) [ 31.918193] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.919042] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.920053] page dumped because: kasan: bad access detected [ 31.920727] [ 31.921134] Memory state around the buggy address: [ 31.922134] fff00000c5e99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.923043] fff00000c5e99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.923890] >fff00000c5e99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.924775] ^ [ 31.925949] fff00000c5e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.926765] fff00000c5e99200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.927603] ================================================================== [ 31.971222] ================================================================== [ 31.971862] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 31.972797] Read of size 1 at addr fff00000c5e9917f by task kunit_try_catch/183 [ 31.973648] [ 31.974257] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.975357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.975899] Hardware name: linux,dummy-virt (DT) [ 31.976674] Call trace: [ 31.977073] show_stack+0x20/0x38 (C) [ 31.978018] dump_stack_lvl+0x8c/0xd0 [ 31.978584] print_report+0x118/0x5e0 [ 31.979239] kasan_report+0xc8/0x118 [ 31.979880] __asan_report_load1_noabort+0x20/0x30 [ 31.980504] ksize_unpoisons_memory+0x6a0/0x750 [ 31.981317] kunit_try_run_case+0x14c/0x3d0 [ 31.982287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.983127] kthread+0x24c/0x2d0 [ 31.983766] ret_from_fork+0x10/0x20 [ 31.984349] [ 31.984741] Allocated by task 183: [ 31.985317] kasan_save_stack+0x3c/0x68 [ 31.986298] kasan_save_track+0x20/0x40 [ 31.986965] kasan_save_alloc_info+0x40/0x58 [ 31.987617] __kasan_kmalloc+0xd4/0xd8 [ 31.988285] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.989005] ksize_unpoisons_memory+0xc0/0x750 [ 31.990149] kunit_try_run_case+0x14c/0x3d0 [ 31.991040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.991737] kthread+0x24c/0x2d0 [ 31.992312] ret_from_fork+0x10/0x20 [ 31.993077] [ 31.993470] The buggy address belongs to the object at fff00000c5e99100 [ 31.993470] which belongs to the cache kmalloc-128 of size 128 [ 31.995097] The buggy address is located 12 bytes to the right of [ 31.995097] allocated 115-byte region [fff00000c5e99100, fff00000c5e99173) [ 31.996477] [ 31.996873] The buggy address belongs to the physical page: [ 31.997509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99 [ 31.998867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.999741] page_type: f5(slab) [ 32.000208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.001227] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.002473] page dumped because: kasan: bad access detected [ 32.003239] [ 32.003666] Memory state around the buggy address: [ 32.004248] fff00000c5e99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 32.005235] fff00000c5e99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.006163] >fff00000c5e99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.007232] ^ [ 32.008087] fff00000c5e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.009025] fff00000c5e99200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.010224] ==================================================================
[ 31.990593] ================================================================== [ 31.991304] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 31.992077] Read of size 1 at addr fff00000c591527f by task kunit_try_catch/183 [ 31.992748] [ 31.993829] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.995142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.995568] Hardware name: linux,dummy-virt (DT) [ 31.996537] Call trace: [ 31.997263] show_stack+0x20/0x38 (C) [ 31.997698] dump_stack_lvl+0x8c/0xd0 [ 31.998358] print_report+0x118/0x5e0 [ 31.999030] kasan_report+0xc8/0x118 [ 31.999560] __asan_report_load1_noabort+0x20/0x30 [ 32.000316] ksize_unpoisons_memory+0x6a0/0x750 [ 32.001506] kunit_try_run_case+0x14c/0x3d0 [ 32.002147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.002959] kthread+0x24c/0x2d0 [ 32.003544] ret_from_fork+0x10/0x20 [ 32.004200] [ 32.004564] Allocated by task 183: [ 32.005433] kasan_save_stack+0x3c/0x68 [ 32.006076] kasan_save_track+0x20/0x40 [ 32.006577] kasan_save_alloc_info+0x40/0x58 [ 32.007151] __kasan_kmalloc+0xd4/0xd8 [ 32.007754] __kmalloc_cache_noprof+0x15c/0x3c8 [ 32.009070] ksize_unpoisons_memory+0xc0/0x750 [ 32.009547] kunit_try_run_case+0x14c/0x3d0 [ 32.009834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.010750] kthread+0x24c/0x2d0 [ 32.011373] ret_from_fork+0x10/0x20 [ 32.012083] [ 32.012950] The buggy address belongs to the object at fff00000c5915200 [ 32.012950] which belongs to the cache kmalloc-128 of size 128 [ 32.014379] The buggy address is located 12 bytes to the right of [ 32.014379] allocated 115-byte region [fff00000c5915200, fff00000c5915273) [ 32.015819] [ 32.016246] The buggy address belongs to the physical page: [ 32.017040] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 32.018337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.019045] page_type: f5(slab) [ 32.019844] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.021044] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.021424] page dumped because: kasan: bad access detected [ 32.021719] [ 32.021870] Memory state around the buggy address: [ 32.022438] fff00000c5915100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.023390] fff00000c5915180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.024047] >fff00000c5915200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.026178] ^ [ 32.027172] fff00000c5915280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.027550] fff00000c5915300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.027942] ================================================================== [ 31.946125] ================================================================== [ 31.946773] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 31.948450] Read of size 1 at addr fff00000c5915278 by task kunit_try_catch/183 [ 31.950836] [ 31.951207] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.953118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.954084] Hardware name: linux,dummy-virt (DT) [ 31.954766] Call trace: [ 31.955424] show_stack+0x20/0x38 (C) [ 31.955972] dump_stack_lvl+0x8c/0xd0 [ 31.956845] print_report+0x118/0x5e0 [ 31.957461] kasan_report+0xc8/0x118 [ 31.958083] __asan_report_load1_noabort+0x20/0x30 [ 31.958796] ksize_unpoisons_memory+0x628/0x750 [ 31.959536] kunit_try_run_case+0x14c/0x3d0 [ 31.960224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.961384] kthread+0x24c/0x2d0 [ 31.961849] ret_from_fork+0x10/0x20 [ 31.962351] [ 31.963396] Allocated by task 183: [ 31.964043] kasan_save_stack+0x3c/0x68 [ 31.964840] kasan_save_track+0x20/0x40 [ 31.965882] kasan_save_alloc_info+0x40/0x58 [ 31.966613] __kasan_kmalloc+0xd4/0xd8 [ 31.967089] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.967771] ksize_unpoisons_memory+0xc0/0x750 [ 31.968612] kunit_try_run_case+0x14c/0x3d0 [ 31.969429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.969992] kthread+0x24c/0x2d0 [ 31.970524] ret_from_fork+0x10/0x20 [ 31.971139] [ 31.971506] The buggy address belongs to the object at fff00000c5915200 [ 31.971506] which belongs to the cache kmalloc-128 of size 128 [ 31.973545] The buggy address is located 5 bytes to the right of [ 31.973545] allocated 115-byte region [fff00000c5915200, fff00000c5915273) [ 31.974803] [ 31.975466] The buggy address belongs to the physical page: [ 31.976200] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 31.977575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.978545] page_type: f5(slab) [ 31.979112] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.980078] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.981285] page dumped because: kasan: bad access detected [ 31.982139] [ 31.982512] Memory state around the buggy address: [ 31.983248] fff00000c5915100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.984089] fff00000c5915180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.985318] >fff00000c5915200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.986112] ^ [ 31.986798] fff00000c5915280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.987524] fff00000c5915300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.988140] ================================================================== [ 31.903352] ================================================================== [ 31.904470] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 31.905299] Read of size 1 at addr fff00000c5915273 by task kunit_try_catch/183 [ 31.906278] [ 31.906708] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.907785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.909076] Hardware name: linux,dummy-virt (DT) [ 31.909732] Call trace: [ 31.910166] show_stack+0x20/0x38 (C) [ 31.910822] dump_stack_lvl+0x8c/0xd0 [ 31.911859] print_report+0x118/0x5e0 [ 31.912754] kasan_report+0xc8/0x118 [ 31.913312] __asan_report_load1_noabort+0x20/0x30 [ 31.913922] ksize_unpoisons_memory+0x638/0x750 [ 31.914627] kunit_try_run_case+0x14c/0x3d0 [ 31.915283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.915979] kthread+0x24c/0x2d0 [ 31.916579] ret_from_fork+0x10/0x20 [ 31.917616] [ 31.918213] Allocated by task 183: [ 31.918760] kasan_save_stack+0x3c/0x68 [ 31.919304] kasan_save_track+0x20/0x40 [ 31.919824] kasan_save_alloc_info+0x40/0x58 [ 31.921031] __kasan_kmalloc+0xd4/0xd8 [ 31.921773] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.922618] ksize_unpoisons_memory+0xc0/0x750 [ 31.923432] kunit_try_run_case+0x14c/0x3d0 [ 31.924270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.925626] kthread+0x24c/0x2d0 [ 31.926095] ret_from_fork+0x10/0x20 [ 31.926872] [ 31.927430] The buggy address belongs to the object at fff00000c5915200 [ 31.927430] which belongs to the cache kmalloc-128 of size 128 [ 31.928986] The buggy address is located 0 bytes to the right of [ 31.928986] allocated 115-byte region [fff00000c5915200, fff00000c5915273) [ 31.930254] [ 31.930600] The buggy address belongs to the physical page: [ 31.931803] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 31.932809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.933978] page_type: f5(slab) [ 31.934670] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.935712] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.937118] page dumped because: kasan: bad access detected [ 31.937792] [ 31.938122] Memory state around the buggy address: [ 31.938820] fff00000c5915100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.939675] fff00000c5915180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.940399] >fff00000c5915200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.941250] ^ [ 31.941986] fff00000c5915280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.942820] fff00000c5915300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.944059] ==================================================================
[ 26.100234] ================================================================== [ 26.100821] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 26.100821] Read of size 1 at addr ffff8881028e1a78 by task kunit_try_catch/203 [ 26.100821] [ 26.100821] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.100821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.100821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.100821] Call Trace: [ 26.100821] <TASK> [ 26.100821] dump_stack_lvl+0x73/0xb0 [ 26.100821] print_report+0xd1/0x640 [ 26.100821] ? __virt_addr_valid+0x1db/0x2d0 [ 26.100821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.100821] kasan_report+0x102/0x140 [ 26.100821] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 26.100821] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 26.100821] __asan_report_load1_noabort+0x18/0x20 [ 26.100821] ksize_unpoisons_memory+0x7eb/0x9b0 [ 26.100821] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.100821] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.100821] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.100821] kunit_try_run_case+0x1b3/0x490 [ 26.100821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.100821] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.100821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.100821] ? __kthread_parkme+0x82/0x160 [ 26.100821] ? preempt_count_sub+0x50/0x80 [ 26.100821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.100821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.100821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.100821] kthread+0x257/0x310 [ 26.100821] ? __pfx_kthread+0x10/0x10 [ 26.100821] ret_from_fork+0x41/0x80 [ 26.100821] ? __pfx_kthread+0x10/0x10 [ 26.100821] ret_from_fork_asm+0x1a/0x30 [ 26.100821] </TASK> [ 26.100821] [ 26.100821] Allocated by task 203: [ 26.100821] kasan_save_stack+0x3d/0x60 [ 26.100821] kasan_save_track+0x18/0x40 [ 26.100821] kasan_save_alloc_info+0x3b/0x50 [ 26.100821] __kasan_kmalloc+0xb7/0xc0 [ 26.100821] __kmalloc_cache_noprof+0x184/0x410 [ 26.100821] ksize_unpoisons_memory+0xc8/0x9b0 [ 26.100821] kunit_try_run_case+0x1b3/0x490 [ 26.100821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.100821] kthread+0x257/0x310 [ 26.100821] ret_from_fork+0x41/0x80 [ 26.100821] ret_from_fork_asm+0x1a/0x30 [ 26.100821] [ 26.100821] The buggy address belongs to the object at ffff8881028e1a00 [ 26.100821] which belongs to the cache kmalloc-128 of size 128 [ 26.100821] The buggy address is located 5 bytes to the right of [ 26.100821] allocated 115-byte region [ffff8881028e1a00, ffff8881028e1a73) [ 26.100821] [ 26.100821] The buggy address belongs to the physical page: [ 26.100821] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028e1 [ 26.100821] flags: 0x200000000000000(node=0|zone=2) [ 26.100821] page_type: f5(slab) [ 26.100821] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.100821] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 26.100821] page dumped because: kasan: bad access detected [ 26.100821] [ 26.100821] Memory state around the buggy address: [ 26.100821] ffff8881028e1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.100821] ffff8881028e1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.100821] >ffff8881028e1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.100821] ^ [ 26.100821] ffff8881028e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.100821] ffff8881028e1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.100821] ================================================================== [ 26.053635] ================================================================== [ 26.054163] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 26.054163] Read of size 1 at addr ffff8881028e1a73 by task kunit_try_catch/203 [ 26.054163] [ 26.054163] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.054163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.054163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.054163] Call Trace: [ 26.054163] <TASK> [ 26.054163] dump_stack_lvl+0x73/0xb0 [ 26.054163] print_report+0xd1/0x640 [ 26.054163] ? __virt_addr_valid+0x1db/0x2d0 [ 26.054163] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.054163] kasan_report+0x102/0x140 [ 26.054163] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 26.054163] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 26.054163] __asan_report_load1_noabort+0x18/0x20 [ 26.054163] ksize_unpoisons_memory+0x81e/0x9b0 [ 26.054163] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.054163] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.054163] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.054163] kunit_try_run_case+0x1b3/0x490 [ 26.054163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.054163] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.054163] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.054163] ? __kthread_parkme+0x82/0x160 [ 26.054163] ? preempt_count_sub+0x50/0x80 [ 26.054163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.054163] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.054163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.054163] kthread+0x257/0x310 [ 26.054163] ? __pfx_kthread+0x10/0x10 [ 26.054163] ret_from_fork+0x41/0x80 [ 26.054163] ? __pfx_kthread+0x10/0x10 [ 26.054163] ret_from_fork_asm+0x1a/0x30 [ 26.054163] </TASK> [ 26.054163] [ 26.054163] Allocated by task 203: [ 26.054163] kasan_save_stack+0x3d/0x60 [ 26.054163] kasan_save_track+0x18/0x40 [ 26.054163] kasan_save_alloc_info+0x3b/0x50 [ 26.054163] __kasan_kmalloc+0xb7/0xc0 [ 26.054163] __kmalloc_cache_noprof+0x184/0x410 [ 26.054163] ksize_unpoisons_memory+0xc8/0x9b0 [ 26.054163] kunit_try_run_case+0x1b3/0x490 [ 26.054163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.054163] kthread+0x257/0x310 [ 26.054163] ret_from_fork+0x41/0x80 [ 26.054163] ret_from_fork_asm+0x1a/0x30 [ 26.054163] [ 26.054163] The buggy address belongs to the object at ffff8881028e1a00 [ 26.054163] which belongs to the cache kmalloc-128 of size 128 [ 26.054163] The buggy address is located 0 bytes to the right of [ 26.054163] allocated 115-byte region [ffff8881028e1a00, ffff8881028e1a73) [ 26.054163] [ 26.054163] The buggy address belongs to the physical page: [ 26.054163] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028e1 [ 26.054163] flags: 0x200000000000000(node=0|zone=2) [ 26.054163] page_type: f5(slab) [ 26.054163] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.054163] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 26.054163] page dumped because: kasan: bad access detected [ 26.054163] [ 26.054163] Memory state around the buggy address: [ 26.054163] ffff8881028e1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.054163] ffff8881028e1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.054163] >ffff8881028e1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.054163] ^ [ 26.054163] ffff8881028e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.054163] ffff8881028e1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.054163] ================================================================== [ 26.146314] ================================================================== [ 26.146314] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 26.146314] Read of size 1 at addr ffff8881028e1a7f by task kunit_try_catch/203 [ 26.146314] [ 26.146314] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.146314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.146314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.146314] Call Trace: [ 26.146314] <TASK> [ 26.146314] dump_stack_lvl+0x73/0xb0 [ 26.146314] print_report+0xd1/0x640 [ 26.146314] ? __virt_addr_valid+0x1db/0x2d0 [ 26.146314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.146314] kasan_report+0x102/0x140 [ 26.146314] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 26.146314] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 26.146314] __asan_report_load1_noabort+0x18/0x20 [ 26.146314] ksize_unpoisons_memory+0x7b8/0x9b0 [ 26.146314] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.146314] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.146314] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.146314] kunit_try_run_case+0x1b3/0x490 [ 26.146314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.146314] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.146314] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.146314] ? __kthread_parkme+0x82/0x160 [ 26.146314] ? preempt_count_sub+0x50/0x80 [ 26.146314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.146314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.146314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.146314] kthread+0x257/0x310 [ 26.146314] ? __pfx_kthread+0x10/0x10 [ 26.146314] ret_from_fork+0x41/0x80 [ 26.146314] ? __pfx_kthread+0x10/0x10 [ 26.146314] ret_from_fork_asm+0x1a/0x30 [ 26.146314] </TASK> [ 26.146314] [ 26.146314] Allocated by task 203: [ 26.146314] kasan_save_stack+0x3d/0x60 [ 26.146314] kasan_save_track+0x18/0x40 [ 26.146314] kasan_save_alloc_info+0x3b/0x50 [ 26.146314] __kasan_kmalloc+0xb7/0xc0 [ 26.146314] __kmalloc_cache_noprof+0x184/0x410 [ 26.146314] ksize_unpoisons_memory+0xc8/0x9b0 [ 26.146314] kunit_try_run_case+0x1b3/0x490 [ 26.146314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.146314] kthread+0x257/0x310 [ 26.146314] ret_from_fork+0x41/0x80 [ 26.146314] ret_from_fork_asm+0x1a/0x30 [ 26.146314] [ 26.146314] The buggy address belongs to the object at ffff8881028e1a00 [ 26.146314] which belongs to the cache kmalloc-128 of size 128 [ 26.146314] The buggy address is located 12 bytes to the right of [ 26.146314] allocated 115-byte region [ffff8881028e1a00, ffff8881028e1a73) [ 26.146314] [ 26.146314] The buggy address belongs to the physical page: [ 26.146314] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028e1 [ 26.146314] flags: 0x200000000000000(node=0|zone=2) [ 26.146314] page_type: f5(slab) [ 26.146314] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.146314] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 26.146314] page dumped because: kasan: bad access detected [ 26.146314] [ 26.146314] Memory state around the buggy address: [ 26.146314] ffff8881028e1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.146314] ffff8881028e1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.146314] >ffff8881028e1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.146314] ^ [ 26.146314] ffff8881028e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.146314] ffff8881028e1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.146314] ==================================================================
[ 21.156426] ================================================================== [ 21.157069] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 21.158323] Read of size 1 at addr ffff88810296147f by task kunit_try_catch/201 [ 21.158888] [ 21.159231] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 21.160114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.160560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.161516] Call Trace: [ 21.161870] <TASK> [ 21.162755] dump_stack_lvl+0x73/0xb0 [ 21.163088] print_report+0xd1/0x640 [ 21.163583] ? __virt_addr_valid+0x1db/0x2d0 [ 21.164236] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.164852] kasan_report+0x102/0x140 [ 21.165511] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 21.166011] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 21.166392] __asan_report_load1_noabort+0x18/0x20 [ 21.166917] ksize_unpoisons_memory+0x7b8/0x9b0 [ 21.167306] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 21.167817] ? finish_task_switch.isra.0+0x153/0x700 [ 21.168285] ? __switch_to+0x5d9/0xf60 [ 21.168792] ? __schedule+0xc3e/0x2790 [ 21.169885] ? __pfx_read_tsc+0x10/0x10 [ 21.170473] ? ktime_get_ts64+0x84/0x230 [ 21.170915] kunit_try_run_case+0x1b3/0x490 [ 21.171451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.171846] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.172478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.173196] ? __kthread_parkme+0x82/0x160 [ 21.173708] ? preempt_count_sub+0x50/0x80 [ 21.174714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.175421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.176220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.176724] kthread+0x257/0x310 [ 21.177155] ? __pfx_kthread+0x10/0x10 [ 21.177587] ret_from_fork+0x41/0x80 [ 21.178204] ? __pfx_kthread+0x10/0x10 [ 21.178650] ret_from_fork_asm+0x1a/0x30 [ 21.179053] </TASK> [ 21.179324] [ 21.179566] Allocated by task 201: [ 21.179924] kasan_save_stack+0x3d/0x60 [ 21.180266] kasan_save_track+0x18/0x40 [ 21.181388] kasan_save_alloc_info+0x3b/0x50 [ 21.181913] __kasan_kmalloc+0xb7/0xc0 [ 21.182515] __kmalloc_cache_noprof+0x184/0x410 [ 21.183151] ksize_unpoisons_memory+0xc8/0x9b0 [ 21.183502] kunit_try_run_case+0x1b3/0x490 [ 21.184122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.184639] kthread+0x257/0x310 [ 21.185546] ret_from_fork+0x41/0x80 [ 21.185895] ret_from_fork_asm+0x1a/0x30 [ 21.186529] [ 21.187632] The buggy address belongs to the object at ffff888102961400 [ 21.187632] which belongs to the cache kmalloc-128 of size 128 [ 21.188401] The buggy address is located 12 bytes to the right of [ 21.188401] allocated 115-byte region [ffff888102961400, ffff888102961473) [ 21.189304] [ 21.190189] The buggy address belongs to the physical page: [ 21.191023] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102961 [ 21.191825] flags: 0x200000000000000(node=0|zone=2) [ 21.192259] page_type: f5(slab) [ 21.192756] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.193505] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.194406] page dumped because: kasan: bad access detected [ 21.194769] [ 21.194924] Memory state around the buggy address: [ 21.195433] ffff888102961300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.196419] ffff888102961380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.196886] >ffff888102961400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.197738] ^ [ 21.199289] ffff888102961480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.200079] ffff888102961500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.200758] ================================================================== [ 21.109900] ================================================================== [ 21.110783] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 21.111415] Read of size 1 at addr ffff888102961478 by task kunit_try_catch/201 [ 21.112256] [ 21.112522] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 21.113306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.113772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.114897] Call Trace: [ 21.115328] <TASK> [ 21.115642] dump_stack_lvl+0x73/0xb0 [ 21.116273] print_report+0xd1/0x640 [ 21.116746] ? __virt_addr_valid+0x1db/0x2d0 [ 21.117223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.117769] kasan_report+0x102/0x140 [ 21.118171] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 21.119625] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 21.121080] __asan_report_load1_noabort+0x18/0x20 [ 21.121456] ksize_unpoisons_memory+0x7eb/0x9b0 [ 21.122396] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 21.123216] ? finish_task_switch.isra.0+0x153/0x700 [ 21.123694] ? __switch_to+0x5d9/0xf60 [ 21.123996] ? __schedule+0xc3e/0x2790 [ 21.124437] ? __pfx_read_tsc+0x10/0x10 [ 21.124750] ? ktime_get_ts64+0x84/0x230 [ 21.125382] kunit_try_run_case+0x1b3/0x490 [ 21.125967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.126803] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.127091] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.128151] ? __kthread_parkme+0x82/0x160 [ 21.128626] ? preempt_count_sub+0x50/0x80 [ 21.130221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.130658] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.131236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.131872] kthread+0x257/0x310 [ 21.132304] ? __pfx_kthread+0x10/0x10 [ 21.132782] ret_from_fork+0x41/0x80 [ 21.133306] ? __pfx_kthread+0x10/0x10 [ 21.133780] ret_from_fork_asm+0x1a/0x30 [ 21.134788] </TASK> [ 21.135119] [ 21.135404] Allocated by task 201: [ 21.136082] kasan_save_stack+0x3d/0x60 [ 21.136531] kasan_save_track+0x18/0x40 [ 21.136987] kasan_save_alloc_info+0x3b/0x50 [ 21.137301] __kasan_kmalloc+0xb7/0xc0 [ 21.137592] __kmalloc_cache_noprof+0x184/0x410 [ 21.138072] ksize_unpoisons_memory+0xc8/0x9b0 [ 21.138717] kunit_try_run_case+0x1b3/0x490 [ 21.139305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.139744] kthread+0x257/0x310 [ 21.140658] ret_from_fork+0x41/0x80 [ 21.141193] ret_from_fork_asm+0x1a/0x30 [ 21.141474] [ 21.141771] The buggy address belongs to the object at ffff888102961400 [ 21.141771] which belongs to the cache kmalloc-128 of size 128 [ 21.143082] The buggy address is located 5 bytes to the right of [ 21.143082] allocated 115-byte region [ffff888102961400, ffff888102961473) [ 21.144163] [ 21.144368] The buggy address belongs to the physical page: [ 21.144712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102961 [ 21.145453] flags: 0x200000000000000(node=0|zone=2) [ 21.146864] page_type: f5(slab) [ 21.147384] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.148249] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.148774] page dumped because: kasan: bad access detected [ 21.149229] [ 21.149459] Memory state around the buggy address: [ 21.150125] ffff888102961300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.150823] ffff888102961380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.152326] >ffff888102961400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.153131] ^ [ 21.153811] ffff888102961480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.154635] ffff888102961500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.155146] ================================================================== [ 21.064400] ================================================================== [ 21.065619] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 21.066312] Read of size 1 at addr ffff888102961473 by task kunit_try_catch/201 [ 21.067052] [ 21.067833] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 21.069155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.069697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.070751] Call Trace: [ 21.070881] <TASK> [ 21.070993] dump_stack_lvl+0x73/0xb0 [ 21.071158] print_report+0xd1/0x640 [ 21.071306] ? __virt_addr_valid+0x1db/0x2d0 [ 21.071473] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.072573] kasan_report+0x102/0x140 [ 21.073379] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 21.074159] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 21.074782] __asan_report_load1_noabort+0x18/0x20 [ 21.075504] ksize_unpoisons_memory+0x81e/0x9b0 [ 21.076553] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 21.077091] ? finish_task_switch.isra.0+0x153/0x700 [ 21.078140] ? __switch_to+0x5d9/0xf60 [ 21.078750] ? __schedule+0xc3e/0x2790 [ 21.079442] ? __pfx_read_tsc+0x10/0x10 [ 21.080205] ? ktime_get_ts64+0x84/0x230 [ 21.080687] kunit_try_run_case+0x1b3/0x490 [ 21.081333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.081718] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.082620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.083196] ? __kthread_parkme+0x82/0x160 [ 21.083706] ? preempt_count_sub+0x50/0x80 [ 21.084211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.085070] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.085886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.086933] kthread+0x257/0x310 [ 21.087664] ? __pfx_kthread+0x10/0x10 [ 21.087991] ret_from_fork+0x41/0x80 [ 21.088469] ? __pfx_kthread+0x10/0x10 [ 21.088822] ret_from_fork_asm+0x1a/0x30 [ 21.089474] </TASK> [ 21.089850] [ 21.090245] Allocated by task 201: [ 21.090699] kasan_save_stack+0x3d/0x60 [ 21.091672] kasan_save_track+0x18/0x40 [ 21.092166] kasan_save_alloc_info+0x3b/0x50 [ 21.092842] __kasan_kmalloc+0xb7/0xc0 [ 21.093326] __kmalloc_cache_noprof+0x184/0x410 [ 21.093715] ksize_unpoisons_memory+0xc8/0x9b0 [ 21.094339] kunit_try_run_case+0x1b3/0x490 [ 21.094715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.095412] kthread+0x257/0x310 [ 21.095767] ret_from_fork+0x41/0x80 [ 21.096641] ret_from_fork_asm+0x1a/0x30 [ 21.096996] [ 21.097160] The buggy address belongs to the object at ffff888102961400 [ 21.097160] which belongs to the cache kmalloc-128 of size 128 [ 21.098193] The buggy address is located 0 bytes to the right of [ 21.098193] allocated 115-byte region [ffff888102961400, ffff888102961473) [ 21.099201] [ 21.099436] The buggy address belongs to the physical page: [ 21.100130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102961 [ 21.100892] flags: 0x200000000000000(node=0|zone=2) [ 21.101481] page_type: f5(slab) [ 21.101908] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.103194] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.103633] page dumped because: kasan: bad access detected [ 21.104129] [ 21.104310] Memory state around the buggy address: [ 21.104766] ffff888102961300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.105227] ffff888102961380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.105881] >ffff888102961400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.106622] ^ [ 21.107364] ffff888102961480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.107840] ffff888102961500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.108627] ==================================================================