Date
June 3, 2025, 7:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.472862] ================================================================== [ 18.472934] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.472999] Read of size 1 at addr fff00000c65b1578 by task kunit_try_catch/194 [ 18.473063] [ 18.473113] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.473214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.473243] Hardware name: linux,dummy-virt (DT) [ 18.473275] Call trace: [ 18.473295] show_stack+0x20/0x38 (C) [ 18.473407] dump_stack_lvl+0x8c/0xd0 [ 18.473527] print_report+0x118/0x608 [ 18.473596] kasan_report+0xdc/0x128 [ 18.473672] __asan_report_load1_noabort+0x20/0x30 [ 18.473739] ksize_unpoisons_memory+0x618/0x740 [ 18.473807] kunit_try_run_case+0x170/0x3f0 [ 18.473880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.473933] kthread+0x328/0x630 [ 18.473999] ret_from_fork+0x10/0x20 [ 18.474046] [ 18.474065] Allocated by task 194: [ 18.474193] kasan_save_stack+0x3c/0x68 [ 18.474341] kasan_save_track+0x20/0x40 [ 18.474378] kasan_save_alloc_info+0x40/0x58 [ 18.474414] __kasan_kmalloc+0xd4/0xd8 [ 18.474460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.474518] ksize_unpoisons_memory+0xc0/0x740 [ 18.474575] kunit_try_run_case+0x170/0x3f0 [ 18.474642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.474736] kthread+0x328/0x630 [ 18.474769] ret_from_fork+0x10/0x20 [ 18.474802] [ 18.474827] The buggy address belongs to the object at fff00000c65b1500 [ 18.474827] which belongs to the cache kmalloc-128 of size 128 [ 18.475023] The buggy address is located 5 bytes to the right of [ 18.475023] allocated 115-byte region [fff00000c65b1500, fff00000c65b1573) [ 18.475098] [ 18.475204] The buggy address belongs to the physical page: [ 18.475253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.475321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.475376] page_type: f5(slab) [ 18.475445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.475603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.475713] page dumped because: kasan: bad access detected [ 18.475745] [ 18.475763] Memory state around the buggy address: [ 18.475794] fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.475857] fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.475900] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.475938] ^ [ 18.475977] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.476040] fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.476227] ================================================================== [ 18.477353] ================================================================== [ 18.477409] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.477491] Read of size 1 at addr fff00000c65b157f by task kunit_try_catch/194 [ 18.477558] [ 18.477606] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.477696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.477724] Hardware name: linux,dummy-virt (DT) [ 18.477754] Call trace: [ 18.477880] show_stack+0x20/0x38 (C) [ 18.477939] dump_stack_lvl+0x8c/0xd0 [ 18.478000] print_report+0x118/0x608 [ 18.478045] kasan_report+0xdc/0x128 [ 18.478095] __asan_report_load1_noabort+0x20/0x30 [ 18.478144] ksize_unpoisons_memory+0x690/0x740 [ 18.478194] kunit_try_run_case+0x170/0x3f0 [ 18.478241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.478292] kthread+0x328/0x630 [ 18.478335] ret_from_fork+0x10/0x20 [ 18.478380] [ 18.478414] Allocated by task 194: [ 18.478460] kasan_save_stack+0x3c/0x68 [ 18.478500] kasan_save_track+0x20/0x40 [ 18.478545] kasan_save_alloc_info+0x40/0x58 [ 18.478581] __kasan_kmalloc+0xd4/0xd8 [ 18.478616] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.478670] ksize_unpoisons_memory+0xc0/0x740 [ 18.478706] kunit_try_run_case+0x170/0x3f0 [ 18.478744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.478786] kthread+0x328/0x630 [ 18.478817] ret_from_fork+0x10/0x20 [ 18.478852] [ 18.478875] The buggy address belongs to the object at fff00000c65b1500 [ 18.478875] which belongs to the cache kmalloc-128 of size 128 [ 18.478930] The buggy address is located 12 bytes to the right of [ 18.478930] allocated 115-byte region [fff00000c65b1500, fff00000c65b1573) [ 18.478994] [ 18.479013] The buggy address belongs to the physical page: [ 18.479052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.479103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.479150] page_type: f5(slab) [ 18.479187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.479237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.479290] page dumped because: kasan: bad access detected [ 18.479322] [ 18.479339] Memory state around the buggy address: [ 18.479405] fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.479460] fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.479503] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.479542] ^ [ 18.479581] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.479623] fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.479662] ================================================================== [ 18.467730] ================================================================== [ 18.467858] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.467951] Read of size 1 at addr fff00000c65b1573 by task kunit_try_catch/194 [ 18.468085] [ 18.468175] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.468300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.468382] Hardware name: linux,dummy-virt (DT) [ 18.468497] Call trace: [ 18.468580] show_stack+0x20/0x38 (C) [ 18.468680] dump_stack_lvl+0x8c/0xd0 [ 18.468780] print_report+0x118/0x608 [ 18.468883] kasan_report+0xdc/0x128 [ 18.468930] __asan_report_load1_noabort+0x20/0x30 [ 18.469006] ksize_unpoisons_memory+0x628/0x740 [ 18.469055] kunit_try_run_case+0x170/0x3f0 [ 18.469104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.469288] kthread+0x328/0x630 [ 18.469334] ret_from_fork+0x10/0x20 [ 18.469383] [ 18.469402] Allocated by task 194: [ 18.469516] kasan_save_stack+0x3c/0x68 [ 18.469590] kasan_save_track+0x20/0x40 [ 18.469628] kasan_save_alloc_info+0x40/0x58 [ 18.469712] __kasan_kmalloc+0xd4/0xd8 [ 18.469800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.469862] ksize_unpoisons_memory+0xc0/0x740 [ 18.469939] kunit_try_run_case+0x170/0x3f0 [ 18.470035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.470077] kthread+0x328/0x630 [ 18.470155] ret_from_fork+0x10/0x20 [ 18.470299] [ 18.470320] The buggy address belongs to the object at fff00000c65b1500 [ 18.470320] which belongs to the cache kmalloc-128 of size 128 [ 18.470399] The buggy address is located 0 bytes to the right of [ 18.470399] allocated 115-byte region [fff00000c65b1500, fff00000c65b1573) [ 18.470510] [ 18.470558] The buggy address belongs to the physical page: [ 18.470630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.470716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.470824] page_type: f5(slab) [ 18.470904] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.470956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.470996] page dumped because: kasan: bad access detected [ 18.471275] [ 18.471337] Memory state around the buggy address: [ 18.471471] fff00000c65b1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.471555] fff00000c65b1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.471597] >fff00000c65b1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.471636] ^ [ 18.471702] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.471745] fff00000c65b1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.471785] ==================================================================
[ 15.143297] ================================================================== [ 15.143710] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.144698] Read of size 1 at addr ffff8881033dc17f by task kunit_try_catch/211 [ 15.145280] [ 15.145540] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.145649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.145678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.145726] Call Trace: [ 15.145765] <TASK> [ 15.145793] dump_stack_lvl+0x73/0xb0 [ 15.145840] print_report+0xd1/0x650 [ 15.145867] ? __virt_addr_valid+0x1db/0x2d0 [ 15.145897] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.145938] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.145967] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.145993] kasan_report+0x141/0x180 [ 15.146018] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.146048] __asan_report_load1_noabort+0x18/0x20 [ 15.146071] ksize_unpoisons_memory+0x7b6/0x9b0 [ 15.146098] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 15.146123] ? finish_task_switch.isra.0+0x153/0x700 [ 15.146148] ? __switch_to+0x47/0xf50 [ 15.146176] ? __schedule+0x10cc/0x2b60 [ 15.146211] ? __pfx_read_tsc+0x10/0x10 [ 15.146538] ? ktime_get_ts64+0x86/0x230 [ 15.146622] kunit_try_run_case+0x1a5/0x480 [ 15.146678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.146740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.146772] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.146800] ? __kthread_parkme+0x82/0x180 [ 15.146824] ? preempt_count_sub+0x50/0x80 [ 15.146849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.146871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.146899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.146925] kthread+0x337/0x6f0 [ 15.146947] ? trace_preempt_on+0x20/0xc0 [ 15.146973] ? __pfx_kthread+0x10/0x10 [ 15.146996] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.147021] ? calculate_sigpending+0x7b/0xa0 [ 15.147050] ? __pfx_kthread+0x10/0x10 [ 15.147073] ret_from_fork+0x116/0x1d0 [ 15.147094] ? __pfx_kthread+0x10/0x10 [ 15.147116] ret_from_fork_asm+0x1a/0x30 [ 15.147150] </TASK> [ 15.147164] [ 15.162874] Allocated by task 211: [ 15.163659] kasan_save_stack+0x45/0x70 [ 15.163957] kasan_save_track+0x18/0x40 [ 15.164176] kasan_save_alloc_info+0x3b/0x50 [ 15.164807] __kasan_kmalloc+0xb7/0xc0 [ 15.165032] __kmalloc_cache_noprof+0x189/0x420 [ 15.165242] ksize_unpoisons_memory+0xc7/0x9b0 [ 15.165761] kunit_try_run_case+0x1a5/0x480 [ 15.166345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.167096] kthread+0x337/0x6f0 [ 15.167318] ret_from_fork+0x116/0x1d0 [ 15.167505] ret_from_fork_asm+0x1a/0x30 [ 15.167674] [ 15.167774] The buggy address belongs to the object at ffff8881033dc100 [ 15.167774] which belongs to the cache kmalloc-128 of size 128 [ 15.168172] The buggy address is located 12 bytes to the right of [ 15.168172] allocated 115-byte region [ffff8881033dc100, ffff8881033dc173) [ 15.168582] [ 15.168676] The buggy address belongs to the physical page: [ 15.168876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.169140] flags: 0x200000000000000(node=0|zone=2) [ 15.169332] page_type: f5(slab) [ 15.170704] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.171091] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.171356] page dumped because: kasan: bad access detected [ 15.172236] [ 15.172420] Memory state around the buggy address: [ 15.172872] ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.174190] ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.174735] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.175700] ^ [ 15.176032] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.176574] ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.177112] ================================================================== [ 15.066074] ================================================================== [ 15.066637] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 15.067403] Read of size 1 at addr ffff8881033dc173 by task kunit_try_catch/211 [ 15.067907] [ 15.068902] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.069300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.069324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.069350] Call Trace: [ 15.069370] <TASK> [ 15.069396] dump_stack_lvl+0x73/0xb0 [ 15.069443] print_report+0xd1/0x650 [ 15.069496] ? __virt_addr_valid+0x1db/0x2d0 [ 15.069524] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 15.069550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.069575] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 15.069601] kasan_report+0x141/0x180 [ 15.069625] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 15.069655] __asan_report_load1_noabort+0x18/0x20 [ 15.069677] ksize_unpoisons_memory+0x81c/0x9b0 [ 15.069752] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 15.069800] ? finish_task_switch.isra.0+0x153/0x700 [ 15.069842] ? __switch_to+0x47/0xf50 [ 15.069885] ? __schedule+0x10cc/0x2b60 [ 15.069925] ? __pfx_read_tsc+0x10/0x10 [ 15.069960] ? ktime_get_ts64+0x86/0x230 [ 15.069999] kunit_try_run_case+0x1a5/0x480 [ 15.070037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.070103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.070140] ? __kthread_parkme+0x82/0x180 [ 15.070174] ? preempt_count_sub+0x50/0x80 [ 15.070225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.070381] kthread+0x337/0x6f0 [ 15.070405] ? trace_preempt_on+0x20/0xc0 [ 15.070432] ? __pfx_kthread+0x10/0x10 [ 15.070473] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.070505] ? calculate_sigpending+0x7b/0xa0 [ 15.070534] ? __pfx_kthread+0x10/0x10 [ 15.070557] ret_from_fork+0x116/0x1d0 [ 15.070579] ? __pfx_kthread+0x10/0x10 [ 15.070602] ret_from_fork_asm+0x1a/0x30 [ 15.070639] </TASK> [ 15.070653] [ 15.085618] Allocated by task 211: [ 15.085990] kasan_save_stack+0x45/0x70 [ 15.086260] kasan_save_track+0x18/0x40 [ 15.086574] kasan_save_alloc_info+0x3b/0x50 [ 15.086860] __kasan_kmalloc+0xb7/0xc0 [ 15.087130] __kmalloc_cache_noprof+0x189/0x420 [ 15.087418] ksize_unpoisons_memory+0xc7/0x9b0 [ 15.088825] kunit_try_run_case+0x1a5/0x480 [ 15.089063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090122] kthread+0x337/0x6f0 [ 15.090426] ret_from_fork+0x116/0x1d0 [ 15.090612] ret_from_fork_asm+0x1a/0x30 [ 15.091274] [ 15.091549] The buggy address belongs to the object at ffff8881033dc100 [ 15.091549] which belongs to the cache kmalloc-128 of size 128 [ 15.091947] The buggy address is located 0 bytes to the right of [ 15.091947] allocated 115-byte region [ffff8881033dc100, ffff8881033dc173) [ 15.093637] [ 15.093936] The buggy address belongs to the physical page: [ 15.094207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.094791] flags: 0x200000000000000(node=0|zone=2) [ 15.095158] page_type: f5(slab) [ 15.096119] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.096726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.097514] page dumped because: kasan: bad access detected [ 15.098277] [ 15.098531] Memory state around the buggy address: [ 15.099145] ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.099480] ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.100536] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.100923] ^ [ 15.101341] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.101758] ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.102204] ================================================================== [ 15.103042] ================================================================== [ 15.103801] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.104257] Read of size 1 at addr ffff8881033dc178 by task kunit_try_catch/211 [ 15.105541] [ 15.105896] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.106009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.106038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.106079] Call Trace: [ 15.106121] <TASK> [ 15.106157] dump_stack_lvl+0x73/0xb0 [ 15.106228] print_report+0xd1/0x650 [ 15.106282] ? __virt_addr_valid+0x1db/0x2d0 [ 15.106333] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.106386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.106437] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.106502] kasan_report+0x141/0x180 [ 15.106546] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.106605] __asan_report_load1_noabort+0x18/0x20 [ 15.106647] ksize_unpoisons_memory+0x7e9/0x9b0 [ 15.106692] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 15.106876] ? finish_task_switch.isra.0+0x153/0x700 [ 15.106930] ? __switch_to+0x47/0xf50 [ 15.106983] ? __schedule+0x10cc/0x2b60 [ 15.107030] ? __pfx_read_tsc+0x10/0x10 [ 15.107070] ? ktime_get_ts64+0x86/0x230 [ 15.107120] kunit_try_run_case+0x1a5/0x480 [ 15.107170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.107232] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.107280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.107309] ? __kthread_parkme+0x82/0x180 [ 15.107333] ? preempt_count_sub+0x50/0x80 [ 15.107370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.107394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.107421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.107448] kthread+0x337/0x6f0 [ 15.107495] ? trace_preempt_on+0x20/0xc0 [ 15.107521] ? __pfx_kthread+0x10/0x10 [ 15.107545] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.107570] ? calculate_sigpending+0x7b/0xa0 [ 15.107598] ? __pfx_kthread+0x10/0x10 [ 15.107622] ret_from_fork+0x116/0x1d0 [ 15.107642] ? __pfx_kthread+0x10/0x10 [ 15.107665] ret_from_fork_asm+0x1a/0x30 [ 15.107741] </TASK> [ 15.107772] [ 15.123262] Allocated by task 211: [ 15.124564] kasan_save_stack+0x45/0x70 [ 15.125164] kasan_save_track+0x18/0x40 [ 15.125884] kasan_save_alloc_info+0x3b/0x50 [ 15.126553] __kasan_kmalloc+0xb7/0xc0 [ 15.126761] __kmalloc_cache_noprof+0x189/0x420 [ 15.127306] ksize_unpoisons_memory+0xc7/0x9b0 [ 15.127776] kunit_try_run_case+0x1a5/0x480 [ 15.128008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.128407] kthread+0x337/0x6f0 [ 15.128668] ret_from_fork+0x116/0x1d0 [ 15.128938] ret_from_fork_asm+0x1a/0x30 [ 15.129148] [ 15.129451] The buggy address belongs to the object at ffff8881033dc100 [ 15.129451] which belongs to the cache kmalloc-128 of size 128 [ 15.130857] The buggy address is located 5 bytes to the right of [ 15.130857] allocated 115-byte region [ffff8881033dc100, ffff8881033dc173) [ 15.131837] [ 15.132606] The buggy address belongs to the physical page: [ 15.132940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.134047] flags: 0x200000000000000(node=0|zone=2) [ 15.134359] page_type: f5(slab) [ 15.134553] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.135414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.136397] page dumped because: kasan: bad access detected [ 15.136719] [ 15.137192] Memory state around the buggy address: [ 15.137622] ffff8881033dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.138088] ffff8881033dc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.138628] >ffff8881033dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.139321] ^ [ 15.140064] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.140937] ffff8881033dc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.141307] ==================================================================