Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 31.073984] ================================================================== [ 31.081004] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.088378] Read of size 1 at addr ffff000803eb5878 by task kunit_try_catch/238 [ 31.095670] [ 31.097155] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.097210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.097225] Hardware name: WinLink E850-96 board (DT) [ 31.097246] Call trace: [ 31.097260] show_stack+0x20/0x38 (C) [ 31.097295] dump_stack_lvl+0x8c/0xd0 [ 31.097331] print_report+0x118/0x608 [ 31.097366] kasan_report+0xdc/0x128 [ 31.097398] __asan_report_load1_noabort+0x20/0x30 [ 31.097429] ksize_unpoisons_memory+0x618/0x740 [ 31.097460] kunit_try_run_case+0x170/0x3f0 [ 31.097494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.097532] kthread+0x328/0x630 [ 31.097560] ret_from_fork+0x10/0x20 [ 31.097596] [ 31.161207] Allocated by task 238: [ 31.164595] kasan_save_stack+0x3c/0x68 [ 31.168412] kasan_save_track+0x20/0x40 [ 31.172231] kasan_save_alloc_info+0x40/0x58 [ 31.176484] __kasan_kmalloc+0xd4/0xd8 [ 31.180217] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.184731] ksize_unpoisons_memory+0xc0/0x740 [ 31.189157] kunit_try_run_case+0x170/0x3f0 [ 31.193325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.198793] kthread+0x328/0x630 [ 31.202005] ret_from_fork+0x10/0x20 [ 31.205564] [ 31.207039] The buggy address belongs to the object at ffff000803eb5800 [ 31.207039] which belongs to the cache kmalloc-128 of size 128 [ 31.219539] The buggy address is located 5 bytes to the right of [ 31.219539] allocated 115-byte region [ffff000803eb5800, ffff000803eb5873) [ 31.232473] [ 31.233951] The buggy address belongs to the physical page: [ 31.239507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 31.247492] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.255129] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.262075] page_type: f5(slab) [ 31.265210] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.272930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.280657] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.288468] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.296281] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 31.304093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.311899] page dumped because: kasan: bad access detected [ 31.317456] [ 31.318930] Memory state around the buggy address: [ 31.323709] ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.330913] ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.338117] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.345319] ^ [ 31.352440] ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359645] ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.366846] ================================================================== [ 30.771339] ================================================================== [ 30.781008] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.788384] Read of size 1 at addr ffff000803eb5873 by task kunit_try_catch/238 [ 30.795675] [ 30.797163] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 30.797221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.797236] Hardware name: WinLink E850-96 board (DT) [ 30.797256] Call trace: [ 30.797273] show_stack+0x20/0x38 (C) [ 30.797310] dump_stack_lvl+0x8c/0xd0 [ 30.797351] print_report+0x118/0x608 [ 30.797387] kasan_report+0xdc/0x128 [ 30.797418] __asan_report_load1_noabort+0x20/0x30 [ 30.797448] ksize_unpoisons_memory+0x628/0x740 [ 30.797481] kunit_try_run_case+0x170/0x3f0 [ 30.797519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.797559] kthread+0x328/0x630 [ 30.797590] ret_from_fork+0x10/0x20 [ 30.797627] [ 30.861211] Allocated by task 238: [ 30.864599] kasan_save_stack+0x3c/0x68 [ 30.868416] kasan_save_track+0x20/0x40 [ 30.872235] kasan_save_alloc_info+0x40/0x58 [ 30.876489] __kasan_kmalloc+0xd4/0xd8 [ 30.880223] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.884735] ksize_unpoisons_memory+0xc0/0x740 [ 30.889162] kunit_try_run_case+0x170/0x3f0 [ 30.893329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.898798] kthread+0x328/0x630 [ 30.902009] ret_from_fork+0x10/0x20 [ 30.905568] [ 30.907046] The buggy address belongs to the object at ffff000803eb5800 [ 30.907046] which belongs to the cache kmalloc-128 of size 128 [ 30.919547] The buggy address is located 0 bytes to the right of [ 30.919547] allocated 115-byte region [ffff000803eb5800, ffff000803eb5873) [ 30.932477] [ 30.933956] The buggy address belongs to the physical page: [ 30.939514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 30.947497] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.955137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.962079] page_type: f5(slab) [ 30.965217] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.972935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.980663] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.988473] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.996286] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 31.004097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.011903] page dumped because: kasan: bad access detected [ 31.017460] [ 31.018934] Memory state around the buggy address: [ 31.023715] ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.030917] ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.038122] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.045323] ^ [ 31.052184] ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.059389] ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.066590] ================================================================== [ 31.374165] ================================================================== [ 31.381260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.388637] Read of size 1 at addr ffff000803eb587f by task kunit_try_catch/238 [ 31.395925] [ 31.397410] CPU: 4 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 31.397462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.397479] Hardware name: WinLink E850-96 board (DT) [ 31.397499] Call trace: [ 31.397511] show_stack+0x20/0x38 (C) [ 31.397546] dump_stack_lvl+0x8c/0xd0 [ 31.397582] print_report+0x118/0x608 [ 31.397619] kasan_report+0xdc/0x128 [ 31.397651] __asan_report_load1_noabort+0x20/0x30 [ 31.397679] ksize_unpoisons_memory+0x690/0x740 [ 31.397710] kunit_try_run_case+0x170/0x3f0 [ 31.397743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.397783] kthread+0x328/0x630 [ 31.397811] ret_from_fork+0x10/0x20 [ 31.397846] [ 31.461463] Allocated by task 238: [ 31.464848] kasan_save_stack+0x3c/0x68 [ 31.468668] kasan_save_track+0x20/0x40 [ 31.472487] kasan_save_alloc_info+0x40/0x58 [ 31.476740] __kasan_kmalloc+0xd4/0xd8 [ 31.480473] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.484987] ksize_unpoisons_memory+0xc0/0x740 [ 31.489414] kunit_try_run_case+0x170/0x3f0 [ 31.493580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.499049] kthread+0x328/0x630 [ 31.502261] ret_from_fork+0x10/0x20 [ 31.505820] [ 31.507297] The buggy address belongs to the object at ffff000803eb5800 [ 31.507297] which belongs to the cache kmalloc-128 of size 128 [ 31.519796] The buggy address is located 12 bytes to the right of [ 31.519796] allocated 115-byte region [ffff000803eb5800, ffff000803eb5873) [ 31.532816] [ 31.534295] The buggy address belongs to the physical page: [ 31.539850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4 [ 31.547836] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.555473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.562416] page_type: f5(slab) [ 31.565552] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.573273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.581001] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.588811] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.596624] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff [ 31.604436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.612242] page dumped because: kasan: bad access detected [ 31.617798] [ 31.619273] Memory state around the buggy address: [ 31.624053] ffff000803eb5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.631256] ffff000803eb5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.638460] >ffff000803eb5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.645661] ^ [ 31.652782] ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.659987] ffff000803eb5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.667189] ==================================================================
[ 25.225453] ================================================================== [ 25.225621] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 25.225784] Read of size 1 at addr fff00000c77e8273 by task kunit_try_catch/195 [ 25.225899] [ 25.225983] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.226183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.226249] Hardware name: linux,dummy-virt (DT) [ 25.226324] Call trace: [ 25.226375] show_stack+0x20/0x38 (C) [ 25.226502] dump_stack_lvl+0x8c/0xd0 [ 25.226622] print_report+0x118/0x608 [ 25.226777] kasan_report+0xdc/0x128 [ 25.226895] __asan_report_load1_noabort+0x20/0x30 [ 25.227010] ksize_unpoisons_memory+0x628/0x740 [ 25.227133] kunit_try_run_case+0x170/0x3f0 [ 25.227258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.227389] kthread+0x328/0x630 [ 25.228810] ret_from_fork+0x10/0x20 [ 25.229083] [ 25.229134] Allocated by task 195: [ 25.229207] kasan_save_stack+0x3c/0x68 [ 25.229391] kasan_save_track+0x20/0x40 [ 25.229750] kasan_save_alloc_info+0x40/0x58 [ 25.230422] __kasan_kmalloc+0xd4/0xd8 [ 25.230539] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.230668] ksize_unpoisons_memory+0xc0/0x740 [ 25.231832] kunit_try_run_case+0x170/0x3f0 [ 25.232046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.232572] kthread+0x328/0x630 [ 25.233053] ret_from_fork+0x10/0x20 [ 25.233191] [ 25.233474] The buggy address belongs to the object at fff00000c77e8200 [ 25.233474] which belongs to the cache kmalloc-128 of size 128 [ 25.233746] The buggy address is located 0 bytes to the right of [ 25.233746] allocated 115-byte region [fff00000c77e8200, fff00000c77e8273) [ 25.234040] [ 25.234093] The buggy address belongs to the physical page: [ 25.234569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 25.234882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.235016] page_type: f5(slab) [ 25.235324] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.235466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.236048] page dumped because: kasan: bad access detected [ 25.236146] [ 25.236199] Memory state around the buggy address: [ 25.236788] fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.237496] fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.237631] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.237988] ^ [ 25.238278] fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.238386] fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.238481] ================================================================== [ 25.241366] ================================================================== [ 25.241472] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 25.241587] Read of size 1 at addr fff00000c77e8278 by task kunit_try_catch/195 [ 25.241722] [ 25.241799] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.241993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.242056] Hardware name: linux,dummy-virt (DT) [ 25.242135] Call trace: [ 25.242187] show_stack+0x20/0x38 (C) [ 25.243640] dump_stack_lvl+0x8c/0xd0 [ 25.243905] print_report+0x118/0x608 [ 25.244040] kasan_report+0xdc/0x128 [ 25.244202] __asan_report_load1_noabort+0x20/0x30 [ 25.244454] ksize_unpoisons_memory+0x618/0x740 [ 25.245286] kunit_try_run_case+0x170/0x3f0 [ 25.245700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.246323] kthread+0x328/0x630 [ 25.246795] ret_from_fork+0x10/0x20 [ 25.247174] [ 25.247223] Allocated by task 195: [ 25.247299] kasan_save_stack+0x3c/0x68 [ 25.247405] kasan_save_track+0x20/0x40 [ 25.247497] kasan_save_alloc_info+0x40/0x58 [ 25.248202] __kasan_kmalloc+0xd4/0xd8 [ 25.248492] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.249401] ksize_unpoisons_memory+0xc0/0x740 [ 25.249722] kunit_try_run_case+0x170/0x3f0 [ 25.250261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.250489] kthread+0x328/0x630 [ 25.250699] ret_from_fork+0x10/0x20 [ 25.251171] [ 25.251222] The buggy address belongs to the object at fff00000c77e8200 [ 25.251222] which belongs to the cache kmalloc-128 of size 128 [ 25.251643] The buggy address is located 5 bytes to the right of [ 25.251643] allocated 115-byte region [fff00000c77e8200, fff00000c77e8273) [ 25.252241] [ 25.252503] The buggy address belongs to the physical page: [ 25.252572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 25.252715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.252830] page_type: f5(slab) [ 25.252925] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.253044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.254352] page dumped because: kasan: bad access detected [ 25.254458] [ 25.254509] Memory state around the buggy address: [ 25.254595] fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.254777] fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.254838] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.254894] ^ [ 25.254999] fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.255138] fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.255258] ================================================================== [ 25.256853] ================================================================== [ 25.256967] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 25.257283] Read of size 1 at addr fff00000c77e827f by task kunit_try_catch/195 [ 25.257405] [ 25.257474] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.257667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.257751] Hardware name: linux,dummy-virt (DT) [ 25.257826] Call trace: [ 25.257890] show_stack+0x20/0x38 (C) [ 25.258145] dump_stack_lvl+0x8c/0xd0 [ 25.258290] print_report+0x118/0x608 [ 25.258430] kasan_report+0xdc/0x128 [ 25.258577] __asan_report_load1_noabort+0x20/0x30 [ 25.258822] ksize_unpoisons_memory+0x690/0x740 [ 25.259079] kunit_try_run_case+0x170/0x3f0 [ 25.259250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.259381] kthread+0x328/0x630 [ 25.259486] ret_from_fork+0x10/0x20 [ 25.259613] [ 25.259735] Allocated by task 195: [ 25.259820] kasan_save_stack+0x3c/0x68 [ 25.260135] kasan_save_track+0x20/0x40 [ 25.260337] kasan_save_alloc_info+0x40/0x58 [ 25.260984] __kasan_kmalloc+0xd4/0xd8 [ 25.261168] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.261279] ksize_unpoisons_memory+0xc0/0x740 [ 25.261394] kunit_try_run_case+0x170/0x3f0 [ 25.261670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.262072] kthread+0x328/0x630 [ 25.262813] ret_from_fork+0x10/0x20 [ 25.263362] [ 25.263431] The buggy address belongs to the object at fff00000c77e8200 [ 25.263431] which belongs to the cache kmalloc-128 of size 128 [ 25.263584] The buggy address is located 12 bytes to the right of [ 25.263584] allocated 115-byte region [fff00000c77e8200, fff00000c77e8273) [ 25.263994] [ 25.264063] The buggy address belongs to the physical page: [ 25.264137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8 [ 25.264260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.264379] page_type: f5(slab) [ 25.264477] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.264612] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.264891] page dumped because: kasan: bad access detected [ 25.264979] [ 25.265107] Memory state around the buggy address: [ 25.265181] fff00000c77e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.265369] fff00000c77e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.265607] >fff00000c77e8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.265720] ^ [ 25.265822] fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.266008] fff00000c77e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.266164] ==================================================================
[ 18.930349] ================================================================== [ 18.931034] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.931737] Read of size 1 at addr ffff888102b56378 by task kunit_try_catch/211 [ 18.932366] [ 18.932649] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 18.932769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.932788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.932820] Call Trace: [ 18.932847] <TASK> [ 18.932897] dump_stack_lvl+0x73/0xb0 [ 18.932981] print_report+0xd1/0x650 [ 18.933940] ? __virt_addr_valid+0x1db/0x2d0 [ 18.933979] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.934040] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.934075] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.934110] kasan_report+0x141/0x180 [ 18.934142] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.934303] __asan_report_load1_noabort+0x18/0x20 [ 18.934345] ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.934382] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.934417] ? finish_task_switch.isra.0+0x153/0x700 [ 18.934448] ? __switch_to+0x47/0xf50 [ 18.934484] ? __schedule+0x10cc/0x2b60 [ 18.934519] ? __pfx_read_tsc+0x10/0x10 [ 18.934549] ? ktime_get_ts64+0x86/0x230 [ 18.934583] kunit_try_run_case+0x1a5/0x480 [ 18.934613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.934640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.934676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.934711] ? __kthread_parkme+0x82/0x180 [ 18.934768] ? preempt_count_sub+0x50/0x80 [ 18.934803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.934832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.934868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.934903] kthread+0x337/0x6f0 [ 18.934931] ? trace_preempt_on+0x20/0xc0 [ 18.934964] ? __pfx_kthread+0x10/0x10 [ 18.934993] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.935051] ? calculate_sigpending+0x7b/0xa0 [ 18.935086] ? __pfx_kthread+0x10/0x10 [ 18.935116] ret_from_fork+0x116/0x1d0 [ 18.935140] ? __pfx_kthread+0x10/0x10 [ 18.935180] ret_from_fork_asm+0x1a/0x30 [ 18.935241] </TASK> [ 18.935257] [ 18.954879] Allocated by task 211: [ 18.955446] kasan_save_stack+0x45/0x70 [ 18.955922] kasan_save_track+0x18/0x40 [ 18.956341] kasan_save_alloc_info+0x3b/0x50 [ 18.956979] __kasan_kmalloc+0xb7/0xc0 [ 18.957526] __kmalloc_cache_noprof+0x189/0x420 [ 18.958087] ksize_unpoisons_memory+0xc7/0x9b0 [ 18.959022] kunit_try_run_case+0x1a5/0x480 [ 18.959623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.960335] kthread+0x337/0x6f0 [ 18.960787] ret_from_fork+0x116/0x1d0 [ 18.961313] ret_from_fork_asm+0x1a/0x30 [ 18.961841] [ 18.962067] The buggy address belongs to the object at ffff888102b56300 [ 18.962067] which belongs to the cache kmalloc-128 of size 128 [ 18.963616] The buggy address is located 5 bytes to the right of [ 18.963616] allocated 115-byte region [ffff888102b56300, ffff888102b56373) [ 18.964761] [ 18.965065] The buggy address belongs to the physical page: [ 18.965762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56 [ 18.966593] flags: 0x200000000000000(node=0|zone=2) [ 18.967399] page_type: f5(slab) [ 18.967808] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.968647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.969403] page dumped because: kasan: bad access detected [ 18.970151] [ 18.970941] Memory state around the buggy address: [ 18.971303] ffff888102b56200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.972238] ffff888102b56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.972918] >ffff888102b56300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.973518] ^ [ 18.974564] ffff888102b56380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.975052] ffff888102b56400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.976380] ================================================================== [ 18.978890] ================================================================== [ 18.979523] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.980674] Read of size 1 at addr ffff888102b5637f by task kunit_try_catch/211 [ 18.981673] [ 18.982134] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 18.982503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.982542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.982595] Call Trace: [ 18.982614] <TASK> [ 18.982633] dump_stack_lvl+0x73/0xb0 [ 18.982671] print_report+0xd1/0x650 [ 18.982703] ? __virt_addr_valid+0x1db/0x2d0 [ 18.982779] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.982818] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.982851] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.982884] kasan_report+0x141/0x180 [ 18.982916] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.982955] __asan_report_load1_noabort+0x18/0x20 [ 18.982985] ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.983045] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.983081] ? finish_task_switch.isra.0+0x153/0x700 [ 18.983112] ? __switch_to+0x47/0xf50 [ 18.983147] ? __schedule+0x10cc/0x2b60 [ 18.983229] ? __pfx_read_tsc+0x10/0x10 [ 18.983305] ? ktime_get_ts64+0x86/0x230 [ 18.983343] kunit_try_run_case+0x1a5/0x480 [ 18.983374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.983402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.983436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.983472] ? __kthread_parkme+0x82/0x180 [ 18.983500] ? preempt_count_sub+0x50/0x80 [ 18.983532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.983561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.983595] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.983630] kthread+0x337/0x6f0 [ 18.983656] ? trace_preempt_on+0x20/0xc0 [ 18.983688] ? __pfx_kthread+0x10/0x10 [ 18.983716] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.983783] ? calculate_sigpending+0x7b/0xa0 [ 18.983821] ? __pfx_kthread+0x10/0x10 [ 18.983851] ret_from_fork+0x116/0x1d0 [ 18.983875] ? __pfx_kthread+0x10/0x10 [ 18.983903] ret_from_fork_asm+0x1a/0x30 [ 18.983943] </TASK> [ 18.983957] [ 19.004210] Allocated by task 211: [ 19.004608] kasan_save_stack+0x45/0x70 [ 19.005187] kasan_save_track+0x18/0x40 [ 19.005658] kasan_save_alloc_info+0x3b/0x50 [ 19.006155] __kasan_kmalloc+0xb7/0xc0 [ 19.006809] __kmalloc_cache_noprof+0x189/0x420 [ 19.007181] ksize_unpoisons_memory+0xc7/0x9b0 [ 19.007780] kunit_try_run_case+0x1a5/0x480 [ 19.008341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.008949] kthread+0x337/0x6f0 [ 19.009263] ret_from_fork+0x116/0x1d0 [ 19.009736] ret_from_fork_asm+0x1a/0x30 [ 19.010205] [ 19.010846] The buggy address belongs to the object at ffff888102b56300 [ 19.010846] which belongs to the cache kmalloc-128 of size 128 [ 19.012168] The buggy address is located 12 bytes to the right of [ 19.012168] allocated 115-byte region [ffff888102b56300, ffff888102b56373) [ 19.013256] [ 19.013443] The buggy address belongs to the physical page: [ 19.014021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56 [ 19.015240] flags: 0x200000000000000(node=0|zone=2) [ 19.015712] page_type: f5(slab) [ 19.016057] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.016646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.017840] page dumped because: kasan: bad access detected [ 19.018773] [ 19.018961] Memory state around the buggy address: [ 19.019687] ffff888102b56200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.020542] ffff888102b56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.021374] >ffff888102b56300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.022120] ^ [ 19.023094] ffff888102b56380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.023873] ffff888102b56400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.024624] ================================================================== [ 18.868445] ================================================================== [ 18.869895] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 18.870847] Read of size 1 at addr ffff888102b56373 by task kunit_try_catch/211 [ 18.871866] [ 18.872474] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 18.872582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.872603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.872633] Call Trace: [ 18.872653] <TASK> [ 18.872676] dump_stack_lvl+0x73/0xb0 [ 18.872716] print_report+0xd1/0x650 [ 18.872780] ? __virt_addr_valid+0x1db/0x2d0 [ 18.872816] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 18.872849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.872881] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 18.872914] kasan_report+0x141/0x180 [ 18.872945] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 18.872984] __asan_report_load1_noabort+0x18/0x20 [ 18.873201] ksize_unpoisons_memory+0x81c/0x9b0 [ 18.873289] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.873364] ? finish_task_switch.isra.0+0x153/0x700 [ 18.873469] ? __switch_to+0x47/0xf50 [ 18.873545] ? __schedule+0x10cc/0x2b60 [ 18.873583] ? __pfx_read_tsc+0x10/0x10 [ 18.873614] ? ktime_get_ts64+0x86/0x230 [ 18.873648] kunit_try_run_case+0x1a5/0x480 [ 18.873679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.873706] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.873777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.873816] ? __kthread_parkme+0x82/0x180 [ 18.873845] ? preempt_count_sub+0x50/0x80 [ 18.873876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.873904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.873941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.873975] kthread+0x337/0x6f0 [ 18.874022] ? trace_preempt_on+0x20/0xc0 [ 18.874063] ? __pfx_kthread+0x10/0x10 [ 18.874093] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.874125] ? calculate_sigpending+0x7b/0xa0 [ 18.874158] ? __pfx_kthread+0x10/0x10 [ 18.874308] ret_from_fork+0x116/0x1d0 [ 18.874341] ? __pfx_kthread+0x10/0x10 [ 18.874370] ret_from_fork_asm+0x1a/0x30 [ 18.874413] </TASK> [ 18.874428] [ 18.898311] Allocated by task 211: [ 18.898812] kasan_save_stack+0x45/0x70 [ 18.899931] kasan_save_track+0x18/0x40 [ 18.901278] kasan_save_alloc_info+0x3b/0x50 [ 18.902241] __kasan_kmalloc+0xb7/0xc0 [ 18.902849] __kmalloc_cache_noprof+0x189/0x420 [ 18.904295] ksize_unpoisons_memory+0xc7/0x9b0 [ 18.906354] kunit_try_run_case+0x1a5/0x480 [ 18.906720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.908765] kthread+0x337/0x6f0 [ 18.909069] ret_from_fork+0x116/0x1d0 [ 18.909360] ret_from_fork_asm+0x1a/0x30 [ 18.909653] [ 18.909807] The buggy address belongs to the object at ffff888102b56300 [ 18.909807] which belongs to the cache kmalloc-128 of size 128 [ 18.910841] The buggy address is located 0 bytes to the right of [ 18.910841] allocated 115-byte region [ffff888102b56300, ffff888102b56373) [ 18.911904] [ 18.912188] The buggy address belongs to the physical page: [ 18.912688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56 [ 18.917087] flags: 0x200000000000000(node=0|zone=2) [ 18.917915] page_type: f5(slab) [ 18.918907] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.919695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.920740] page dumped because: kasan: bad access detected [ 18.921371] [ 18.921466] Memory state around the buggy address: [ 18.921641] ffff888102b56200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.922592] ffff888102b56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.923941] >ffff888102b56300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.924653] ^ [ 18.925567] ffff888102b56380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.926893] ffff888102b56400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.927466] ==================================================================
[ 57.735504] ================================================================== [ 57.742767] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f0/0x908 [ 57.750213] Read of size 1 at addr cc78ee78 by task kunit_try_catch/246 [ 57.756896] [ 57.758392] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 57.758422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 57.758422] Hardware name: Generic DRA74X (Flattened Device Tree) [ 57.758422] Call trace: [ 57.758453] unwind_backtrace from show_stack+0x18/0x1c [ 57.758453] show_stack from dump_stack_lvl+0x70/0x90 [ 57.758483] dump_stack_lvl from print_report+0x158/0x528 [ 57.758514] print_report from kasan_report+0xdc/0x118 [ 57.758544] kasan_report from ksize_unpoisons_memory+0x7f0/0x908 [ 57.758575] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 57.758575] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.758605] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 57.758636] kthread from ret_from_fork+0x14/0x20 [ 57.758666] Exception stack(0xf232bfb0 to 0xf232bff8) [ 57.758666] bfa0: 00000000 00000000 00000000 00000000 [ 57.758697] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 57.758697] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 57.758728] [ 57.865325] Allocated by task 246: [ 57.868743] kasan_save_track+0x30/0x5c [ 57.872619] __kasan_kmalloc+0x8c/0x94 [ 57.876403] ksize_unpoisons_memory+0xe8/0x908 [ 57.880889] kunit_try_run_case+0x22c/0x5a8 [ 57.885101] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.890624] kthread+0x464/0x810 [ 57.893890] ret_from_fork+0x14/0x20 [ 57.897491] [ 57.898986] The buggy address belongs to the object at cc78ee00 [ 57.898986] which belongs to the cache kmalloc-128 of size 128 [ 57.910888] The buggy address is located 5 bytes to the right of [ 57.910888] allocated 115-byte region [cc78ee00, cc78ee73) [ 57.922546] [ 57.924041] The buggy address belongs to the physical page: [ 57.929626] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 57.936920] flags: 0x0(zone=0) [ 57.939971] page_type: f5(slab) [ 57.943145] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 57.951293] raw: 00000000 [ 57.953948] page dumped because: kasan: bad access detected [ 57.959533] [ 57.961059] Memory state around the buggy address: [ 57.965881] cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.972442] cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.979003] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 57.985565] ^ [ 57.992065] cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.998626] cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.005187] ================================================================== [ 57.454284] ================================================================== [ 57.465759] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f8/0x908 [ 57.473205] Read of size 1 at addr cc78ee73 by task kunit_try_catch/246 [ 57.479858] [ 57.481384] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 57.481414] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 57.481414] Hardware name: Generic DRA74X (Flattened Device Tree) [ 57.481414] Call trace: [ 57.481445] unwind_backtrace from show_stack+0x18/0x1c [ 57.481445] show_stack from dump_stack_lvl+0x70/0x90 [ 57.481475] dump_stack_lvl from print_report+0x158/0x528 [ 57.481506] print_report from kasan_report+0xdc/0x118 [ 57.481536] kasan_report from ksize_unpoisons_memory+0x7f8/0x908 [ 57.481567] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 57.481567] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.481597] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 57.481628] kthread from ret_from_fork+0x14/0x20 [ 57.481658] Exception stack(0xf232bfb0 to 0xf232bff8) [ 57.481658] bfa0: 00000000 00000000 00000000 00000000 [ 57.481689] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 57.481689] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 57.481719] [ 57.588317] Allocated by task 246: [ 57.591766] kasan_save_track+0x30/0x5c [ 57.595611] __kasan_kmalloc+0x8c/0x94 [ 57.599395] ksize_unpoisons_memory+0xe8/0x908 [ 57.603881] kunit_try_run_case+0x22c/0x5a8 [ 57.608093] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.613616] kthread+0x464/0x810 [ 57.616882] ret_from_fork+0x14/0x20 [ 57.620483] [ 57.621978] The buggy address belongs to the object at cc78ee00 [ 57.621978] which belongs to the cache kmalloc-128 of size 128 [ 57.633880] The buggy address is located 0 bytes to the right of [ 57.633880] allocated 115-byte region [cc78ee00, cc78ee73) [ 57.645538] [ 57.647033] The buggy address belongs to the physical page: [ 57.652618] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 57.659912] flags: 0x0(zone=0) [ 57.662994] page_type: f5(slab) [ 57.666137] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 57.674285] raw: 00000000 [ 57.676940] page dumped because: kasan: bad access detected [ 57.682556] [ 57.684051] Memory state around the buggy address: [ 57.688873] cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.695434] cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.702026] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 57.708587] ^ [ 57.714813] cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.721374] cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.727935] ================================================================== [ 58.012603] ================================================================== [ 58.019866] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x858/0x908 [ 58.027313] Read of size 1 at addr cc78ee7f by task kunit_try_catch/246 [ 58.033966] [ 58.035461] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 58.035491] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.035522] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.035522] Call trace: [ 58.035522] unwind_backtrace from show_stack+0x18/0x1c [ 58.035552] show_stack from dump_stack_lvl+0x70/0x90 [ 58.035583] dump_stack_lvl from print_report+0x158/0x528 [ 58.035614] print_report from kasan_report+0xdc/0x118 [ 58.035614] kasan_report from ksize_unpoisons_memory+0x858/0x908 [ 58.035644] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 58.035675] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.035705] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.035736] kthread from ret_from_fork+0x14/0x20 [ 58.035736] Exception stack(0xf232bfb0 to 0xf232bff8) [ 58.035766] bfa0: 00000000 00000000 00000000 00000000 [ 58.035766] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.035797] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.035797] [ 58.142425] Allocated by task 246: [ 58.145843] kasan_save_track+0x30/0x5c [ 58.149719] __kasan_kmalloc+0x8c/0x94 [ 58.153503] ksize_unpoisons_memory+0xe8/0x908 [ 58.157958] kunit_try_run_case+0x22c/0x5a8 [ 58.162200] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.167724] kthread+0x464/0x810 [ 58.170959] ret_from_fork+0x14/0x20 [ 58.174591] [ 58.176086] The buggy address belongs to the object at cc78ee00 [ 58.176086] which belongs to the cache kmalloc-128 of size 128 [ 58.187988] The buggy address is located 12 bytes to the right of [ 58.187988] allocated 115-byte region [cc78ee00, cc78ee73) [ 58.199707] [ 58.201202] The buggy address belongs to the physical page: [ 58.206817] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e [ 58.214080] flags: 0x0(zone=0) [ 58.217163] page_type: f5(slab) [ 58.220336] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.228454] raw: 00000000 [ 58.231109] page dumped because: kasan: bad access detected [ 58.236724] [ 58.238220] Memory state around the buggy address: [ 58.243041] cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.249603] cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.256164] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 58.262756] ^ [ 58.269226] cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.275787] cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.282379] ==================================================================