Date
June 5, 2025, 7:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 25.538275] ================================================================== [ 25.538433] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 25.538569] Read of size 1 at addr fff00000c6419773 by task kunit_try_catch/194 [ 25.538709] [ 25.538880] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.539776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.539852] Hardware name: linux,dummy-virt (DT) [ 25.539946] Call trace: [ 25.540026] show_stack+0x20/0x38 (C) [ 25.540164] dump_stack_lvl+0x8c/0xd0 [ 25.540552] print_report+0x118/0x608 [ 25.540896] kasan_report+0xdc/0x128 [ 25.541019] __asan_report_load1_noabort+0x20/0x30 [ 25.541140] ksize_unpoisons_memory+0x628/0x740 [ 25.541268] kunit_try_run_case+0x170/0x3f0 [ 25.541428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.541567] kthread+0x328/0x630 [ 25.541681] ret_from_fork+0x10/0x20 [ 25.541798] [ 25.541843] Allocated by task 194: [ 25.541930] kasan_save_stack+0x3c/0x68 [ 25.542050] kasan_save_track+0x20/0x40 [ 25.542169] kasan_save_alloc_info+0x40/0x58 [ 25.542497] __kasan_kmalloc+0xd4/0xd8 [ 25.542951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.543190] ksize_unpoisons_memory+0xc0/0x740 [ 25.543304] kunit_try_run_case+0x170/0x3f0 [ 25.543427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.543561] kthread+0x328/0x630 [ 25.543664] ret_from_fork+0x10/0x20 [ 25.544007] [ 25.544278] The buggy address belongs to the object at fff00000c6419700 [ 25.544278] which belongs to the cache kmalloc-128 of size 128 [ 25.544437] The buggy address is located 0 bytes to the right of [ 25.544437] allocated 115-byte region [fff00000c6419700, fff00000c6419773) [ 25.545061] [ 25.545197] The buggy address belongs to the physical page: [ 25.545271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.545447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.545560] page_type: f5(slab) [ 25.545651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.545776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.545871] page dumped because: kasan: bad access detected [ 25.545945] [ 25.546012] Memory state around the buggy address: [ 25.546088] fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.546194] fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.546301] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.546415] ^ [ 25.546509] fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.546615] fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.546732] ================================================================== [ 25.558931] ================================================================== [ 25.559143] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 25.559349] Read of size 1 at addr fff00000c641977f by task kunit_try_catch/194 [ 25.559476] [ 25.559541] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.559737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.559804] Hardware name: linux,dummy-virt (DT) [ 25.560361] Call trace: [ 25.560450] show_stack+0x20/0x38 (C) [ 25.560577] dump_stack_lvl+0x8c/0xd0 [ 25.560804] print_report+0x118/0x608 [ 25.561065] kasan_report+0xdc/0x128 [ 25.561350] __asan_report_load1_noabort+0x20/0x30 [ 25.561937] ksize_unpoisons_memory+0x690/0x740 [ 25.562088] kunit_try_run_case+0x170/0x3f0 [ 25.562210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.562360] kthread+0x328/0x630 [ 25.562549] ret_from_fork+0x10/0x20 [ 25.563269] [ 25.563423] Allocated by task 194: [ 25.563847] kasan_save_stack+0x3c/0x68 [ 25.563959] kasan_save_track+0x20/0x40 [ 25.564083] kasan_save_alloc_info+0x40/0x58 [ 25.564616] __kasan_kmalloc+0xd4/0xd8 [ 25.564959] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.565076] ksize_unpoisons_memory+0xc0/0x740 [ 25.565175] kunit_try_run_case+0x170/0x3f0 [ 25.565858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.566113] kthread+0x328/0x630 [ 25.566552] ret_from_fork+0x10/0x20 [ 25.566926] [ 25.567417] The buggy address belongs to the object at fff00000c6419700 [ 25.567417] which belongs to the cache kmalloc-128 of size 128 [ 25.567600] The buggy address is located 12 bytes to the right of [ 25.567600] allocated 115-byte region [fff00000c6419700, fff00000c6419773) [ 25.568378] [ 25.568442] The buggy address belongs to the physical page: [ 25.568483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.568549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.568666] page_type: f5(slab) [ 25.568715] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.568781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.568832] page dumped because: kasan: bad access detected [ 25.568872] [ 25.568893] Memory state around the buggy address: [ 25.568932] fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.568991] fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.569047] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.569095] ^ [ 25.569145] fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.569203] fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.569254] ================================================================== [ 25.548566] ================================================================== [ 25.548688] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 25.548881] Read of size 1 at addr fff00000c6419778 by task kunit_try_catch/194 [ 25.549433] [ 25.549650] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 25.550179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.550440] Hardware name: linux,dummy-virt (DT) [ 25.550544] Call trace: [ 25.550596] show_stack+0x20/0x38 (C) [ 25.550714] dump_stack_lvl+0x8c/0xd0 [ 25.551193] print_report+0x118/0x608 [ 25.551592] kasan_report+0xdc/0x128 [ 25.551729] __asan_report_load1_noabort+0x20/0x30 [ 25.551918] ksize_unpoisons_memory+0x618/0x740 [ 25.551998] kunit_try_run_case+0x170/0x3f0 [ 25.552059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.552182] kthread+0x328/0x630 [ 25.552240] ret_from_fork+0x10/0x20 [ 25.552301] [ 25.552323] Allocated by task 194: [ 25.552469] kasan_save_stack+0x3c/0x68 [ 25.552631] kasan_save_track+0x20/0x40 [ 25.552831] kasan_save_alloc_info+0x40/0x58 [ 25.552944] __kasan_kmalloc+0xd4/0xd8 [ 25.553043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.553216] ksize_unpoisons_memory+0xc0/0x740 [ 25.553449] kunit_try_run_case+0x170/0x3f0 [ 25.553581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.553883] kthread+0x328/0x630 [ 25.554103] ret_from_fork+0x10/0x20 [ 25.554194] [ 25.554293] The buggy address belongs to the object at fff00000c6419700 [ 25.554293] which belongs to the cache kmalloc-128 of size 128 [ 25.555046] The buggy address is located 5 bytes to the right of [ 25.555046] allocated 115-byte region [fff00000c6419700, fff00000c6419773) [ 25.555223] [ 25.555278] The buggy address belongs to the physical page: [ 25.555377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419 [ 25.555687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.555828] page_type: f5(slab) [ 25.555966] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.556090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.556242] page dumped because: kasan: bad access detected [ 25.556348] [ 25.556424] Memory state around the buggy address: [ 25.556549] fff00000c6419600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.556864] fff00000c6419680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.556977] >fff00000c6419700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.557125] ^ [ 25.557383] fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.557539] fff00000c6419800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.557679] ==================================================================
[ 11.829942] ================================================================== [ 11.830171] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.830410] Read of size 1 at addr ffff88810276e77f by task kunit_try_catch/211 [ 11.830633] [ 11.830717] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 11.830758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.830769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.830787] Call Trace: [ 11.830800] <TASK> [ 11.830812] dump_stack_lvl+0x73/0xb0 [ 11.830834] print_report+0xd1/0x650 [ 11.830856] ? __virt_addr_valid+0x1db/0x2d0 [ 11.830879] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.830967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.830992] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.831016] kasan_report+0x141/0x180 [ 11.831039] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.831067] __asan_report_load1_noabort+0x18/0x20 [ 11.831092] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.831176] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.831201] ? finish_task_switch.isra.0+0x153/0x700 [ 11.831224] ? __switch_to+0x47/0xf50 [ 11.831249] ? __schedule+0x10cc/0x2b60 [ 11.831271] ? __pfx_read_tsc+0x10/0x10 [ 11.831292] ? ktime_get_ts64+0x86/0x230 [ 11.831315] kunit_try_run_case+0x1a5/0x480 [ 11.831337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.831357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.831382] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.831407] ? __kthread_parkme+0x82/0x180 [ 11.831427] ? preempt_count_sub+0x50/0x80 [ 11.831450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.831474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.831500] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.831527] kthread+0x337/0x6f0 [ 11.831546] ? trace_preempt_on+0x20/0xc0 [ 11.831568] ? __pfx_kthread+0x10/0x10 [ 11.831588] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.831611] ? calculate_sigpending+0x7b/0xa0 [ 11.831635] ? __pfx_kthread+0x10/0x10 [ 11.831656] ret_from_fork+0x116/0x1d0 [ 11.831674] ? __pfx_kthread+0x10/0x10 [ 11.831694] ret_from_fork_asm+0x1a/0x30 [ 11.831725] </TASK> [ 11.831734] [ 11.849855] Allocated by task 211: [ 11.850268] kasan_save_stack+0x45/0x70 [ 11.850882] kasan_save_track+0x18/0x40 [ 11.851265] kasan_save_alloc_info+0x3b/0x50 [ 11.851422] __kasan_kmalloc+0xb7/0xc0 [ 11.851555] __kmalloc_cache_noprof+0x189/0x420 [ 11.851964] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.852540] kunit_try_run_case+0x1a5/0x480 [ 11.853086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.853619] kthread+0x337/0x6f0 [ 11.854042] ret_from_fork+0x116/0x1d0 [ 11.854452] ret_from_fork_asm+0x1a/0x30 [ 11.854778] [ 11.855149] The buggy address belongs to the object at ffff88810276e700 [ 11.855149] which belongs to the cache kmalloc-128 of size 128 [ 11.855638] The buggy address is located 12 bytes to the right of [ 11.855638] allocated 115-byte region [ffff88810276e700, ffff88810276e773) [ 11.857030] [ 11.857269] The buggy address belongs to the physical page: [ 11.857466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276e [ 11.857938] flags: 0x200000000000000(node=0|zone=2) [ 11.858613] page_type: f5(slab) [ 11.859055] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.859623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.859853] page dumped because: kasan: bad access detected [ 11.860541] [ 11.860664] Memory state around the buggy address: [ 11.860824] ffff88810276e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.861444] ffff88810276e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.862174] >ffff88810276e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.862966] ^ [ 11.863391] ffff88810276e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.863611] ffff88810276e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.864359] ================================================================== [ 11.791006] ================================================================== [ 11.791570] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.791997] Read of size 1 at addr ffff88810276e773 by task kunit_try_catch/211 [ 11.792270] [ 11.792382] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 11.792427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.792438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.792458] Call Trace: [ 11.792468] <TASK> [ 11.792482] dump_stack_lvl+0x73/0xb0 [ 11.792508] print_report+0xd1/0x650 [ 11.792531] ? __virt_addr_valid+0x1db/0x2d0 [ 11.792556] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.792580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.792604] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.792639] kasan_report+0x141/0x180 [ 11.792662] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.792691] __asan_report_load1_noabort+0x18/0x20 [ 11.792716] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.792741] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.792765] ? finish_task_switch.isra.0+0x153/0x700 [ 11.792789] ? __switch_to+0x47/0xf50 [ 11.792816] ? __schedule+0x10cc/0x2b60 [ 11.792839] ? __pfx_read_tsc+0x10/0x10 [ 11.792861] ? ktime_get_ts64+0x86/0x230 [ 11.792885] kunit_try_run_case+0x1a5/0x480 [ 11.792920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.792940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.792966] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.792991] ? __kthread_parkme+0x82/0x180 [ 11.793012] ? preempt_count_sub+0x50/0x80 [ 11.793036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.793062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.793088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.793114] kthread+0x337/0x6f0 [ 11.793134] ? trace_preempt_on+0x20/0xc0 [ 11.793157] ? __pfx_kthread+0x10/0x10 [ 11.793223] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.793249] ? calculate_sigpending+0x7b/0xa0 [ 11.793276] ? __pfx_kthread+0x10/0x10 [ 11.793298] ret_from_fork+0x116/0x1d0 [ 11.793317] ? __pfx_kthread+0x10/0x10 [ 11.793338] ret_from_fork_asm+0x1a/0x30 [ 11.793369] </TASK> [ 11.793379] [ 11.801585] Allocated by task 211: [ 11.801768] kasan_save_stack+0x45/0x70 [ 11.801926] kasan_save_track+0x18/0x40 [ 11.802063] kasan_save_alloc_info+0x3b/0x50 [ 11.802271] __kasan_kmalloc+0xb7/0xc0 [ 11.802464] __kmalloc_cache_noprof+0x189/0x420 [ 11.802784] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.803010] kunit_try_run_case+0x1a5/0x480 [ 11.803155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.803668] kthread+0x337/0x6f0 [ 11.803850] ret_from_fork+0x116/0x1d0 [ 11.804111] ret_from_fork_asm+0x1a/0x30 [ 11.804321] [ 11.804392] The buggy address belongs to the object at ffff88810276e700 [ 11.804392] which belongs to the cache kmalloc-128 of size 128 [ 11.805083] The buggy address is located 0 bytes to the right of [ 11.805083] allocated 115-byte region [ffff88810276e700, ffff88810276e773) [ 11.805470] [ 11.805541] The buggy address belongs to the physical page: [ 11.805716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276e [ 11.806082] flags: 0x200000000000000(node=0|zone=2) [ 11.806312] page_type: f5(slab) [ 11.806476] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.807118] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.807354] page dumped because: kasan: bad access detected [ 11.807799] [ 11.807910] Memory state around the buggy address: [ 11.808155] ffff88810276e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.808401] ffff88810276e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.808617] >ffff88810276e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.809057] ^ [ 11.809367] ffff88810276e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.809649] ffff88810276e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.809989] ================================================================== [ 11.810445] ================================================================== [ 11.810804] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.811267] Read of size 1 at addr ffff88810276e778 by task kunit_try_catch/211 [ 11.811579] [ 11.811692] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 11.811732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.811743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.811762] Call Trace: [ 11.811774] <TASK> [ 11.811786] dump_stack_lvl+0x73/0xb0 [ 11.811811] print_report+0xd1/0x650 [ 11.811833] ? __virt_addr_valid+0x1db/0x2d0 [ 11.811856] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.811881] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.811920] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.811990] kasan_report+0x141/0x180 [ 11.812016] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.812045] __asan_report_load1_noabort+0x18/0x20 [ 11.812071] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.812096] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.812120] ? finish_task_switch.isra.0+0x153/0x700 [ 11.812144] ? __switch_to+0x47/0xf50 [ 11.812169] ? __schedule+0x10cc/0x2b60 [ 11.812192] ? __pfx_read_tsc+0x10/0x10 [ 11.812213] ? ktime_get_ts64+0x86/0x230 [ 11.812237] kunit_try_run_case+0x1a5/0x480 [ 11.812259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.812281] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.812308] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.812333] ? __kthread_parkme+0x82/0x180 [ 11.812353] ? preempt_count_sub+0x50/0x80 [ 11.812376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.812399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.812425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.812452] kthread+0x337/0x6f0 [ 11.812472] ? trace_preempt_on+0x20/0xc0 [ 11.812494] ? __pfx_kthread+0x10/0x10 [ 11.812515] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.812538] ? calculate_sigpending+0x7b/0xa0 [ 11.812562] ? __pfx_kthread+0x10/0x10 [ 11.812584] ret_from_fork+0x116/0x1d0 [ 11.812603] ? __pfx_kthread+0x10/0x10 [ 11.812623] ret_from_fork_asm+0x1a/0x30 [ 11.812666] </TASK> [ 11.812676] [ 11.820709] Allocated by task 211: [ 11.820837] kasan_save_stack+0x45/0x70 [ 11.820993] kasan_save_track+0x18/0x40 [ 11.821133] kasan_save_alloc_info+0x3b/0x50 [ 11.821390] __kasan_kmalloc+0xb7/0xc0 [ 11.821589] __kmalloc_cache_noprof+0x189/0x420 [ 11.821818] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.822055] kunit_try_run_case+0x1a5/0x480 [ 11.822457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.822733] kthread+0x337/0x6f0 [ 11.822890] ret_from_fork+0x116/0x1d0 [ 11.823198] ret_from_fork_asm+0x1a/0x30 [ 11.823370] [ 11.823442] The buggy address belongs to the object at ffff88810276e700 [ 11.823442] which belongs to the cache kmalloc-128 of size 128 [ 11.823798] The buggy address is located 5 bytes to the right of [ 11.823798] allocated 115-byte region [ffff88810276e700, ffff88810276e773) [ 11.824349] [ 11.824442] The buggy address belongs to the physical page: [ 11.824744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10276e [ 11.825112] flags: 0x200000000000000(node=0|zone=2) [ 11.825318] page_type: f5(slab) [ 11.825435] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.825766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.826528] page dumped because: kasan: bad access detected [ 11.826932] [ 11.827068] Memory state around the buggy address: [ 11.827305] ffff88810276e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.827603] ffff88810276e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.827854] >ffff88810276e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.828843] ^ [ 11.829090] ffff88810276e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.829317] ffff88810276e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.829529] ==================================================================