Date
May 13, 2025, 12:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.533210] ================================================================== [ 19.533362] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.533437] Read of size 1 at addr fff00000c406577f by task kunit_try_catch/194 [ 19.533491] [ 19.533537] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.533633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.533677] Hardware name: linux,dummy-virt (DT) [ 19.533719] Call trace: [ 19.533748] show_stack+0x20/0x38 (C) [ 19.533846] dump_stack_lvl+0x8c/0xd0 [ 19.533910] print_report+0x118/0x608 [ 19.533994] kasan_report+0xdc/0x128 [ 19.534105] __asan_report_load1_noabort+0x20/0x30 [ 19.534192] ksize_unpoisons_memory+0x690/0x740 [ 19.534247] kunit_try_run_case+0x170/0x3f0 [ 19.534300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.534356] kthread+0x328/0x630 [ 19.534408] ret_from_fork+0x10/0x20 [ 19.534507] [ 19.534531] Allocated by task 194: [ 19.534564] kasan_save_stack+0x3c/0x68 [ 19.534684] kasan_save_track+0x20/0x40 [ 19.534729] kasan_save_alloc_info+0x40/0x58 [ 19.534775] __kasan_kmalloc+0xd4/0xd8 [ 19.534815] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.534860] ksize_unpoisons_memory+0xc0/0x740 [ 19.534904] kunit_try_run_case+0x170/0x3f0 [ 19.534944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.535005] kthread+0x328/0x630 [ 19.535047] ret_from_fork+0x10/0x20 [ 19.535087] [ 19.535109] The buggy address belongs to the object at fff00000c4065700 [ 19.535109] which belongs to the cache kmalloc-128 of size 128 [ 19.535197] The buggy address is located 12 bytes to the right of [ 19.535197] allocated 115-byte region [fff00000c4065700, fff00000c4065773) [ 19.535272] [ 19.535310] The buggy address belongs to the physical page: [ 19.535346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.535406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.535459] page_type: f5(slab) [ 19.535507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.535629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.535765] page dumped because: kasan: bad access detected [ 19.535816] [ 19.535870] Memory state around the buggy address: [ 19.535911] fff00000c4065600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.535969] fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536089] >fff00000c4065700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.536135] ^ [ 19.536183] fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536230] fff00000c4065800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536279] ================================================================== [ 19.514890] ================================================================== [ 19.516651] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.517206] Read of size 1 at addr fff00000c4065773 by task kunit_try_catch/194 [ 19.517602] [ 19.517677] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.517816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.518146] Hardware name: linux,dummy-virt (DT) [ 19.518240] Call trace: [ 19.518454] show_stack+0x20/0x38 (C) [ 19.518664] dump_stack_lvl+0x8c/0xd0 [ 19.518950] print_report+0x118/0x608 [ 19.519048] kasan_report+0xdc/0x128 [ 19.519108] __asan_report_load1_noabort+0x20/0x30 [ 19.519170] ksize_unpoisons_memory+0x628/0x740 [ 19.519722] kunit_try_run_case+0x170/0x3f0 [ 19.519867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.519938] kthread+0x328/0x630 [ 19.520199] ret_from_fork+0x10/0x20 [ 19.520441] [ 19.520851] Allocated by task 194: [ 19.521172] kasan_save_stack+0x3c/0x68 [ 19.521243] kasan_save_track+0x20/0x40 [ 19.521285] kasan_save_alloc_info+0x40/0x58 [ 19.521343] __kasan_kmalloc+0xd4/0xd8 [ 19.521394] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.521621] ksize_unpoisons_memory+0xc0/0x740 [ 19.521705] kunit_try_run_case+0x170/0x3f0 [ 19.521776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.522057] kthread+0x328/0x630 [ 19.522118] ret_from_fork+0x10/0x20 [ 19.522162] [ 19.522187] The buggy address belongs to the object at fff00000c4065700 [ 19.522187] which belongs to the cache kmalloc-128 of size 128 [ 19.522258] The buggy address is located 0 bytes to the right of [ 19.522258] allocated 115-byte region [fff00000c4065700, fff00000c4065773) [ 19.522404] [ 19.522436] The buggy address belongs to the physical page: [ 19.522475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.522742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.523006] page_type: f5(slab) [ 19.523225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.523338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.523415] page dumped because: kasan: bad access detected [ 19.523457] [ 19.523486] Memory state around the buggy address: [ 19.523533] fff00000c4065600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.523585] fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.523635] >fff00000c4065700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.523679] ^ [ 19.523725] fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.523773] fff00000c4065800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.523816] ================================================================== [ 19.526223] ================================================================== [ 19.526310] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.526398] Read of size 1 at addr fff00000c4065778 by task kunit_try_catch/194 [ 19.526498] [ 19.526657] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 19.526773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.527439] Hardware name: linux,dummy-virt (DT) [ 19.527507] Call trace: [ 19.528045] show_stack+0x20/0x38 (C) [ 19.528393] dump_stack_lvl+0x8c/0xd0 [ 19.528485] print_report+0x118/0x608 [ 19.528677] kasan_report+0xdc/0x128 [ 19.528862] __asan_report_load1_noabort+0x20/0x30 [ 19.529173] ksize_unpoisons_memory+0x618/0x740 [ 19.529250] kunit_try_run_case+0x170/0x3f0 [ 19.529361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.529515] kthread+0x328/0x630 [ 19.529966] ret_from_fork+0x10/0x20 [ 19.530048] [ 19.530073] Allocated by task 194: [ 19.530112] kasan_save_stack+0x3c/0x68 [ 19.530166] kasan_save_track+0x20/0x40 [ 19.530235] kasan_save_alloc_info+0x40/0x58 [ 19.530284] __kasan_kmalloc+0xd4/0xd8 [ 19.530328] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.530487] ksize_unpoisons_memory+0xc0/0x740 [ 19.530582] kunit_try_run_case+0x170/0x3f0 [ 19.530629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.530692] kthread+0x328/0x630 [ 19.530774] ret_from_fork+0x10/0x20 [ 19.530826] [ 19.530859] The buggy address belongs to the object at fff00000c4065700 [ 19.530859] which belongs to the cache kmalloc-128 of size 128 [ 19.531004] The buggy address is located 5 bytes to the right of [ 19.531004] allocated 115-byte region [fff00000c4065700, fff00000c4065773) [ 19.531227] [ 19.531317] The buggy address belongs to the physical page: [ 19.531360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065 [ 19.531425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.531505] page_type: f5(slab) [ 19.531561] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.531621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.531667] page dumped because: kasan: bad access detected [ 19.531704] [ 19.531725] Memory state around the buggy address: [ 19.531765] fff00000c4065600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.531817] fff00000c4065680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.531867] >fff00000c4065700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.531910] ^ [ 19.532015] fff00000c4065780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.532137] fff00000c4065800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.532207] ==================================================================
[ 11.538243] ================================================================== [ 11.538887] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.539164] Read of size 1 at addr ffff8881026a8a78 by task kunit_try_catch/211 [ 11.539503] [ 11.539598] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 11.539654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.539666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.539686] Call Trace: [ 11.539700] <TASK> [ 11.539714] dump_stack_lvl+0x73/0xb0 [ 11.539740] print_report+0xd1/0x650 [ 11.539761] ? __virt_addr_valid+0x1db/0x2d0 [ 11.539783] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.539805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.539827] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.539851] kasan_report+0x141/0x180 [ 11.539873] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.539901] __asan_report_load1_noabort+0x18/0x20 [ 11.539921] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.539945] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.539967] ? finish_task_switch.isra.0+0x153/0x700 [ 11.539988] ? __switch_to+0x47/0xf50 [ 11.540014] ? __schedule+0x10cc/0x2b60 [ 11.540035] ? __pfx_read_tsc+0x10/0x10 [ 11.540055] ? ktime_get_ts64+0x86/0x230 [ 11.540078] kunit_try_run_case+0x1a5/0x480 [ 11.540101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.540122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.540144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.540167] ? __kthread_parkme+0x82/0x180 [ 11.540187] ? preempt_count_sub+0x50/0x80 [ 11.540210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.540233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.540255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.540278] kthread+0x337/0x6f0 [ 11.540297] ? trace_preempt_on+0x20/0xc0 [ 11.540320] ? __pfx_kthread+0x10/0x10 [ 11.540341] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.540361] ? calculate_sigpending+0x7b/0xa0 [ 11.540384] ? __pfx_kthread+0x10/0x10 [ 11.540405] ret_from_fork+0x116/0x1d0 [ 11.540424] ? __pfx_kthread+0x10/0x10 [ 11.540453] ret_from_fork_asm+0x1a/0x30 [ 11.540484] </TASK> [ 11.540493] [ 11.550944] Allocated by task 211: [ 11.551251] kasan_save_stack+0x45/0x70 [ 11.551404] kasan_save_track+0x18/0x40 [ 11.551535] kasan_save_alloc_info+0x3b/0x50 [ 11.551688] __kasan_kmalloc+0xb7/0xc0 [ 11.551822] __kmalloc_cache_noprof+0x189/0x420 [ 11.551971] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.552117] kunit_try_run_case+0x1a5/0x480 [ 11.552599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.553125] kthread+0x337/0x6f0 [ 11.553499] ret_from_fork+0x116/0x1d0 [ 11.553886] ret_from_fork_asm+0x1a/0x30 [ 11.554300] [ 11.554504] The buggy address belongs to the object at ffff8881026a8a00 [ 11.554504] which belongs to the cache kmalloc-128 of size 128 [ 11.555635] The buggy address is located 5 bytes to the right of [ 11.555635] allocated 115-byte region [ffff8881026a8a00, ffff8881026a8a73) [ 11.556845] [ 11.557043] The buggy address belongs to the physical page: [ 11.557580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026a8 [ 11.558113] flags: 0x200000000000000(node=0|zone=2) [ 11.558357] page_type: f5(slab) [ 11.558696] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.558932] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.559156] page dumped because: kasan: bad access detected [ 11.559717] [ 11.559877] Memory state around the buggy address: [ 11.560397] ffff8881026a8900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.561053] ffff8881026a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.561723] >ffff8881026a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.562304] ^ [ 11.562521] ffff8881026a8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.562744] ffff8881026a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.562954] ================================================================== [ 11.520720] ================================================================== [ 11.521179] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.521545] Read of size 1 at addr ffff8881026a8a73 by task kunit_try_catch/211 [ 11.521846] [ 11.521948] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 11.521993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.522004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.522024] Call Trace: [ 11.522036] <TASK> [ 11.522050] dump_stack_lvl+0x73/0xb0 [ 11.522076] print_report+0xd1/0x650 [ 11.522098] ? __virt_addr_valid+0x1db/0x2d0 [ 11.522120] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.522143] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.522165] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.522199] kasan_report+0x141/0x180 [ 11.522221] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.522250] __asan_report_load1_noabort+0x18/0x20 [ 11.522270] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.522294] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.522316] ? finish_task_switch.isra.0+0x153/0x700 [ 11.522337] ? __switch_to+0x47/0xf50 [ 11.522363] ? __schedule+0x10cc/0x2b60 [ 11.522384] ? __pfx_read_tsc+0x10/0x10 [ 11.522404] ? ktime_get_ts64+0x86/0x230 [ 11.522428] kunit_try_run_case+0x1a5/0x480 [ 11.522452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.522479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.522501] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.522523] ? __kthread_parkme+0x82/0x180 [ 11.522543] ? preempt_count_sub+0x50/0x80 [ 11.522567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.522590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.522622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.522646] kthread+0x337/0x6f0 [ 11.522666] ? trace_preempt_on+0x20/0xc0 [ 11.522690] ? __pfx_kthread+0x10/0x10 [ 11.522710] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.522730] ? calculate_sigpending+0x7b/0xa0 [ 11.522755] ? __pfx_kthread+0x10/0x10 [ 11.522777] ret_from_fork+0x116/0x1d0 [ 11.522794] ? __pfx_kthread+0x10/0x10 [ 11.522815] ret_from_fork_asm+0x1a/0x30 [ 11.522847] </TASK> [ 11.522858] [ 11.529945] Allocated by task 211: [ 11.530085] kasan_save_stack+0x45/0x70 [ 11.530279] kasan_save_track+0x18/0x40 [ 11.530486] kasan_save_alloc_info+0x3b/0x50 [ 11.530702] __kasan_kmalloc+0xb7/0xc0 [ 11.530889] __kmalloc_cache_noprof+0x189/0x420 [ 11.531067] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.531321] kunit_try_run_case+0x1a5/0x480 [ 11.531535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.531757] kthread+0x337/0x6f0 [ 11.531913] ret_from_fork+0x116/0x1d0 [ 11.532043] ret_from_fork_asm+0x1a/0x30 [ 11.532179] [ 11.532288] The buggy address belongs to the object at ffff8881026a8a00 [ 11.532288] which belongs to the cache kmalloc-128 of size 128 [ 11.532837] The buggy address is located 0 bytes to the right of [ 11.532837] allocated 115-byte region [ffff8881026a8a00, ffff8881026a8a73) [ 11.533235] [ 11.533309] The buggy address belongs to the physical page: [ 11.533480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026a8 [ 11.534157] flags: 0x200000000000000(node=0|zone=2) [ 11.534556] page_type: f5(slab) [ 11.534687] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.534916] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.535138] page dumped because: kasan: bad access detected [ 11.535307] [ 11.535452] Memory state around the buggy address: [ 11.535687] ffff8881026a8900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.536014] ffff8881026a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.536336] >ffff8881026a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.536689] ^ [ 11.537002] ffff8881026a8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.537479] ffff8881026a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.537747] ================================================================== [ 11.563484] ================================================================== [ 11.563882] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.564795] Read of size 1 at addr ffff8881026a8a7f by task kunit_try_catch/211 [ 11.565630] [ 11.565890] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 11.565937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.565948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.566007] Call Trace: [ 11.566022] <TASK> [ 11.566038] dump_stack_lvl+0x73/0xb0 [ 11.566076] print_report+0xd1/0x650 [ 11.566099] ? __virt_addr_valid+0x1db/0x2d0 [ 11.566122] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.566144] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.566193] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.566225] kasan_report+0x141/0x180 [ 11.566248] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.566312] __asan_report_load1_noabort+0x18/0x20 [ 11.566333] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.566366] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.566389] ? finish_task_switch.isra.0+0x153/0x700 [ 11.566411] ? __switch_to+0x47/0xf50 [ 11.566436] ? __schedule+0x10cc/0x2b60 [ 11.566458] ? __pfx_read_tsc+0x10/0x10 [ 11.566482] ? ktime_get_ts64+0x86/0x230 [ 11.566508] kunit_try_run_case+0x1a5/0x480 [ 11.566532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.566553] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.566575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.566597] ? __kthread_parkme+0x82/0x180 [ 11.566627] ? preempt_count_sub+0x50/0x80 [ 11.566650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.566673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.566696] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.566719] kthread+0x337/0x6f0 [ 11.566739] ? trace_preempt_on+0x20/0xc0 [ 11.566761] ? __pfx_kthread+0x10/0x10 [ 11.566782] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.566802] ? calculate_sigpending+0x7b/0xa0 [ 11.566825] ? __pfx_kthread+0x10/0x10 [ 11.566847] ret_from_fork+0x116/0x1d0 [ 11.566864] ? __pfx_kthread+0x10/0x10 [ 11.566885] ret_from_fork_asm+0x1a/0x30 [ 11.566916] </TASK> [ 11.566927] [ 11.575766] Allocated by task 211: [ 11.575894] kasan_save_stack+0x45/0x70 [ 11.576048] kasan_save_track+0x18/0x40 [ 11.576318] kasan_save_alloc_info+0x3b/0x50 [ 11.576544] __kasan_kmalloc+0xb7/0xc0 [ 11.576743] __kmalloc_cache_noprof+0x189/0x420 [ 11.576960] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.577220] kunit_try_run_case+0x1a5/0x480 [ 11.577406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.577663] kthread+0x337/0x6f0 [ 11.577781] ret_from_fork+0x116/0x1d0 [ 11.577908] ret_from_fork_asm+0x1a/0x30 [ 11.578063] [ 11.578160] The buggy address belongs to the object at ffff8881026a8a00 [ 11.578160] which belongs to the cache kmalloc-128 of size 128 [ 11.578758] The buggy address is located 12 bytes to the right of [ 11.578758] allocated 115-byte region [ffff8881026a8a00, ffff8881026a8a73) [ 11.579299] [ 11.579395] The buggy address belongs to the physical page: [ 11.579652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026a8 [ 11.579966] flags: 0x200000000000000(node=0|zone=2) [ 11.580122] page_type: f5(slab) [ 11.580245] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.580667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.581016] page dumped because: kasan: bad access detected [ 11.581278] [ 11.581446] Memory state around the buggy address: [ 11.581610] ffff8881026a8900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.582051] ffff8881026a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.582330] >ffff8881026a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.582681] ^ [ 11.582884] ffff8881026a8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.583118] ffff8881026a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.583656] ==================================================================