Date
June 2, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.398381] ================================================================== [ 20.399093] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x720 [ 20.400492] Read of size 1 at addr fff00000c6492c73 by task kunit_try_catch/181 [ 20.401393] [ 20.401785] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.402080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.402165] Hardware name: linux,dummy-virt (DT) [ 20.402281] Call trace: [ 20.402339] dump_backtrace+0x9c/0x128 [ 20.402409] show_stack+0x20/0x38 [ 20.402454] dump_stack_lvl+0x8c/0xd0 [ 20.402503] print_report+0x118/0x5f0 [ 20.402546] kasan_report+0xdc/0x128 [ 20.402588] __asan_report_load1_noabort+0x20/0x30 [ 20.402636] ksize_unpoisons_memory+0x630/0x720 [ 20.402683] kunit_try_run_case+0x170/0x3f0 [ 20.402730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.402780] kthread+0x24c/0x2d0 [ 20.402823] ret_from_fork+0x10/0x20 [ 20.402870] [ 20.408893] Allocated by task 181: [ 20.409369] kasan_save_stack+0x3c/0x68 [ 20.409916] kasan_save_track+0x20/0x40 [ 20.410440] kasan_save_alloc_info+0x40/0x58 [ 20.410921] __kasan_kmalloc+0xd4/0xd8 [ 20.411652] __kmalloc_cache_noprof+0x154/0x320 [ 20.412114] ksize_unpoisons_memory+0xc0/0x720 [ 20.412654] kunit_try_run_case+0x170/0x3f0 [ 20.413194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.413751] kthread+0x24c/0x2d0 [ 20.414160] ret_from_fork+0x10/0x20 [ 20.414585] [ 20.414888] The buggy address belongs to the object at fff00000c6492c00 [ 20.414888] which belongs to the cache kmalloc-128 of size 128 [ 20.416616] The buggy address is located 0 bytes to the right of [ 20.416616] allocated 115-byte region [fff00000c6492c00, fff00000c6492c73) [ 20.417700] [ 20.417984] The buggy address belongs to the physical page: [ 20.418591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.419165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.419957] page_type: f5(slab) [ 20.420334] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.420925] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.421782] page dumped because: kasan: bad access detected [ 20.422432] [ 20.422760] Memory state around the buggy address: [ 20.423798] fff00000c6492b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.424398] fff00000c6492b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.425141] >fff00000c6492c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.425858] ^ [ 20.426424] fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.427457] fff00000c6492d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.427912] ================================================================== [ 20.456677] ================================================================== [ 20.457378] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x720 [ 20.457988] Read of size 1 at addr fff00000c6492c7f by task kunit_try_catch/181 [ 20.458720] [ 20.459611] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.459860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.459936] Hardware name: linux,dummy-virt (DT) [ 20.460022] Call trace: [ 20.460084] dump_backtrace+0x9c/0x128 [ 20.460211] show_stack+0x20/0x38 [ 20.460299] dump_stack_lvl+0x8c/0xd0 [ 20.460348] print_report+0x118/0x5f0 [ 20.460393] kasan_report+0xdc/0x128 [ 20.460433] __asan_report_load1_noabort+0x20/0x30 [ 20.460478] ksize_unpoisons_memory+0x690/0x720 [ 20.460527] kunit_try_run_case+0x170/0x3f0 [ 20.460574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.460622] kthread+0x24c/0x2d0 [ 20.460665] ret_from_fork+0x10/0x20 [ 20.460713] [ 20.465649] Allocated by task 181: [ 20.466200] kasan_save_stack+0x3c/0x68 [ 20.466720] kasan_save_track+0x20/0x40 [ 20.467326] kasan_save_alloc_info+0x40/0x58 [ 20.467760] __kasan_kmalloc+0xd4/0xd8 [ 20.468192] __kmalloc_cache_noprof+0x154/0x320 [ 20.468620] ksize_unpoisons_memory+0xc0/0x720 [ 20.469015] kunit_try_run_case+0x170/0x3f0 [ 20.469708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.470253] kthread+0x24c/0x2d0 [ 20.470574] ret_from_fork+0x10/0x20 [ 20.471088] [ 20.471719] The buggy address belongs to the object at fff00000c6492c00 [ 20.471719] which belongs to the cache kmalloc-128 of size 128 [ 20.472902] The buggy address is located 12 bytes to the right of [ 20.472902] allocated 115-byte region [fff00000c6492c00, fff00000c6492c73) [ 20.473962] [ 20.474324] The buggy address belongs to the physical page: [ 20.474801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.475793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.476561] page_type: f5(slab) [ 20.477118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.477933] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.478663] page dumped because: kasan: bad access detected [ 20.480222] [ 20.480578] Memory state around the buggy address: [ 20.481082] fff00000c6492b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.481717] fff00000c6492b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.482276] >fff00000c6492c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.482805] ^ [ 20.483646] fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.484370] fff00000c6492d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.485003] ================================================================== [ 20.429962] ================================================================== [ 20.430460] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x720 [ 20.430968] Read of size 1 at addr fff00000c6492c78 by task kunit_try_catch/181 [ 20.432057] [ 20.432387] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.432603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.432666] Hardware name: linux,dummy-virt (DT) [ 20.432751] Call trace: [ 20.432803] dump_backtrace+0x9c/0x128 [ 20.432922] show_stack+0x20/0x38 [ 20.433019] dump_stack_lvl+0x8c/0xd0 [ 20.433149] print_report+0x118/0x5f0 [ 20.433253] kasan_report+0xdc/0x128 [ 20.433352] __asan_report_load1_noabort+0x20/0x30 [ 20.433470] ksize_unpoisons_memory+0x628/0x720 [ 20.433595] kunit_try_run_case+0x170/0x3f0 [ 20.433704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.433795] kthread+0x24c/0x2d0 [ 20.433845] ret_from_fork+0x10/0x20 [ 20.433896] [ 20.438115] Allocated by task 181: [ 20.438390] kasan_save_stack+0x3c/0x68 [ 20.438758] kasan_save_track+0x20/0x40 [ 20.439097] kasan_save_alloc_info+0x40/0x58 [ 20.439644] __kasan_kmalloc+0xd4/0xd8 [ 20.440870] __kmalloc_cache_noprof+0x154/0x320 [ 20.441485] ksize_unpoisons_memory+0xc0/0x720 [ 20.441853] kunit_try_run_case+0x170/0x3f0 [ 20.442188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.442658] kthread+0x24c/0x2d0 [ 20.443098] ret_from_fork+0x10/0x20 [ 20.443530] [ 20.443800] The buggy address belongs to the object at fff00000c6492c00 [ 20.443800] which belongs to the cache kmalloc-128 of size 128 [ 20.444569] The buggy address is located 5 bytes to the right of [ 20.444569] allocated 115-byte region [fff00000c6492c00, fff00000c6492c73) [ 20.445942] [ 20.446301] The buggy address belongs to the physical page: [ 20.446906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.447767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.448460] page_type: f5(slab) [ 20.448842] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.449679] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.450383] page dumped because: kasan: bad access detected [ 20.451021] [ 20.451571] Memory state around the buggy address: [ 20.451893] fff00000c6492b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.452268] fff00000c6492b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.452631] >fff00000c6492c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.453691] ^ [ 20.454464] fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.455306] fff00000c6492d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.455720] ==================================================================
[ 12.514874] ================================================================== [ 12.515650] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.516129] Read of size 1 at addr ffff88810261cc7f by task kunit_try_catch/199 [ 12.516377] [ 12.516498] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 12.516574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.516597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.516634] Call Trace: [ 12.516882] <TASK> [ 12.516929] dump_stack_lvl+0x73/0xb0 [ 12.516990] print_report+0xd1/0x640 [ 12.517036] ? __virt_addr_valid+0x1db/0x2d0 [ 12.517179] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.517220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.517254] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.517287] kasan_report+0x140/0x180 [ 12.517314] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.517337] __asan_report_load1_noabort+0x18/0x20 [ 12.517356] ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.517376] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.517394] ? finish_task_switch.isra.0+0x153/0x700 [ 12.517415] ? __switch_to+0x5d9/0xf60 [ 12.517438] ? __schedule+0xc49/0x27a0 [ 12.517457] ? __pfx_read_tsc+0x10/0x10 [ 12.517475] ? ktime_get_ts64+0x84/0x230 [ 12.517499] kunit_try_run_case+0x1a6/0x480 [ 12.517519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.517537] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.517556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.517580] ? __kthread_parkme+0x82/0x160 [ 12.517599] ? preempt_count_sub+0x50/0x80 [ 12.517619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.517637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.517673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.517699] kthread+0x257/0x310 [ 12.517716] ? __pfx_kthread+0x10/0x10 [ 12.517734] ret_from_fork+0x41/0x80 [ 12.517753] ? __pfx_kthread+0x10/0x10 [ 12.517770] ret_from_fork_asm+0x1a/0x30 [ 12.517798] </TASK> [ 12.517810] [ 12.528002] Allocated by task 199: [ 12.528387] kasan_save_stack+0x45/0x70 [ 12.528582] kasan_save_track+0x18/0x40 [ 12.528755] kasan_save_alloc_info+0x3b/0x50 [ 12.529207] __kasan_kmalloc+0xb7/0xc0 [ 12.529523] __kmalloc_cache_noprof+0x168/0x350 [ 12.529868] ksize_unpoisons_memory+0xc8/0x9b0 [ 12.530624] kunit_try_run_case+0x1a6/0x480 [ 12.530996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.531255] kthread+0x257/0x310 [ 12.531525] ret_from_fork+0x41/0x80 [ 12.531745] ret_from_fork_asm+0x1a/0x30 [ 12.532032] [ 12.532150] The buggy address belongs to the object at ffff88810261cc00 [ 12.532150] which belongs to the cache kmalloc-128 of size 128 [ 12.532903] The buggy address is located 12 bytes to the right of [ 12.532903] allocated 115-byte region [ffff88810261cc00, ffff88810261cc73) [ 12.533530] [ 12.533708] The buggy address belongs to the physical page: [ 12.534231] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261c [ 12.534670] flags: 0x200000000000000(node=0|zone=2) [ 12.535033] page_type: f5(slab) [ 12.535322] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.535848] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 12.536733] page dumped because: kasan: bad access detected [ 12.537256] [ 12.537413] Memory state around the buggy address: [ 12.537738] ffff88810261cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.538323] ffff88810261cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.538644] >ffff88810261cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.539179] ^ [ 12.539602] ffff88810261cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.539951] ffff88810261cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.540517] ================================================================== [ 12.464493] ================================================================== [ 12.464966] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 12.465706] Read of size 1 at addr ffff88810261cc73 by task kunit_try_catch/199 [ 12.466353] [ 12.466549] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 12.466633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.466668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.466706] Call Trace: [ 12.466732] <TASK> [ 12.466763] dump_stack_lvl+0x73/0xb0 [ 12.466812] print_report+0xd1/0x640 [ 12.466846] ? __virt_addr_valid+0x1db/0x2d0 [ 12.466884] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 12.466918] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.466961] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 12.466999] kasan_report+0x140/0x180 [ 12.467044] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 12.467141] __asan_report_load1_noabort+0x18/0x20 [ 12.467174] ksize_unpoisons_memory+0x81e/0x9b0 [ 12.467206] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.467235] ? finish_task_switch.isra.0+0x153/0x700 [ 12.467271] ? __switch_to+0x5d9/0xf60 [ 12.467300] ? __schedule+0xc49/0x27a0 [ 12.467320] ? __pfx_read_tsc+0x10/0x10 [ 12.467338] ? ktime_get_ts64+0x84/0x230 [ 12.467363] kunit_try_run_case+0x1a6/0x480 [ 12.467384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.467402] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.467421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.467444] ? __kthread_parkme+0x82/0x160 [ 12.467462] ? preempt_count_sub+0x50/0x80 [ 12.467482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.467500] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.467523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.467546] kthread+0x257/0x310 [ 12.467563] ? __pfx_kthread+0x10/0x10 [ 12.467581] ret_from_fork+0x41/0x80 [ 12.467599] ? __pfx_kthread+0x10/0x10 [ 12.467616] ret_from_fork_asm+0x1a/0x30 [ 12.467645] </TASK> [ 12.467672] [ 12.475579] Allocated by task 199: [ 12.475873] kasan_save_stack+0x45/0x70 [ 12.476185] kasan_save_track+0x18/0x40 [ 12.476468] kasan_save_alloc_info+0x3b/0x50 [ 12.476795] __kasan_kmalloc+0xb7/0xc0 [ 12.477063] __kmalloc_cache_noprof+0x168/0x350 [ 12.477325] ksize_unpoisons_memory+0xc8/0x9b0 [ 12.477493] kunit_try_run_case+0x1a6/0x480 [ 12.478012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.478383] kthread+0x257/0x310 [ 12.478541] ret_from_fork+0x41/0x80 [ 12.478825] ret_from_fork_asm+0x1a/0x30 [ 12.479228] [ 12.479364] The buggy address belongs to the object at ffff88810261cc00 [ 12.479364] which belongs to the cache kmalloc-128 of size 128 [ 12.479853] The buggy address is located 0 bytes to the right of [ 12.479853] allocated 115-byte region [ffff88810261cc00, ffff88810261cc73) [ 12.480346] [ 12.480452] The buggy address belongs to the physical page: [ 12.480802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261c [ 12.481418] flags: 0x200000000000000(node=0|zone=2) [ 12.481779] page_type: f5(slab) [ 12.482056] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.482731] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 12.483341] page dumped because: kasan: bad access detected [ 12.483614] [ 12.483772] Memory state around the buggy address: [ 12.484023] ffff88810261cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 12.484386] ffff88810261cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.484835] >ffff88810261cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.485390] ^ [ 12.485773] ffff88810261cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.486284] ffff88810261cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.486624] ================================================================== [ 12.488517] ================================================================== [ 12.488993] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.489614] Read of size 1 at addr ffff88810261cc78 by task kunit_try_catch/199 [ 12.489870] [ 12.490006] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 12.490096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.490120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.490156] Call Trace: [ 12.490182] <TASK> [ 12.490208] dump_stack_lvl+0x73/0xb0 [ 12.490758] print_report+0xd1/0x640 [ 12.490788] ? __virt_addr_valid+0x1db/0x2d0 [ 12.490812] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.490832] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.490854] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.490874] kasan_report+0x140/0x180 [ 12.490896] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.490920] __asan_report_load1_noabort+0x18/0x20 [ 12.490940] ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.490959] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.490978] ? finish_task_switch.isra.0+0x153/0x700 [ 12.490998] ? __switch_to+0x5d9/0xf60 [ 12.491021] ? __schedule+0xc49/0x27a0 [ 12.491040] ? __pfx_read_tsc+0x10/0x10 [ 12.491058] ? ktime_get_ts64+0x84/0x230 [ 12.491082] kunit_try_run_case+0x1a6/0x480 [ 12.491102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.491121] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.491141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.491164] ? __kthread_parkme+0x82/0x160 [ 12.491182] ? preempt_count_sub+0x50/0x80 [ 12.491203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.491222] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.491246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.491270] kthread+0x257/0x310 [ 12.491287] ? __pfx_kthread+0x10/0x10 [ 12.491305] ret_from_fork+0x41/0x80 [ 12.491323] ? __pfx_kthread+0x10/0x10 [ 12.491341] ret_from_fork_asm+0x1a/0x30 [ 12.491370] </TASK> [ 12.491381] [ 12.500713] Allocated by task 199: [ 12.500875] kasan_save_stack+0x45/0x70 [ 12.501356] kasan_save_track+0x18/0x40 [ 12.501746] kasan_save_alloc_info+0x3b/0x50 [ 12.502218] __kasan_kmalloc+0xb7/0xc0 [ 12.502560] __kmalloc_cache_noprof+0x168/0x350 [ 12.502935] ksize_unpoisons_memory+0xc8/0x9b0 [ 12.503440] kunit_try_run_case+0x1a6/0x480 [ 12.503775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.503988] kthread+0x257/0x310 [ 12.504747] ret_from_fork+0x41/0x80 [ 12.505080] ret_from_fork_asm+0x1a/0x30 [ 12.505540] [ 12.505731] The buggy address belongs to the object at ffff88810261cc00 [ 12.505731] which belongs to the cache kmalloc-128 of size 128 [ 12.506287] The buggy address is located 5 bytes to the right of [ 12.506287] allocated 115-byte region [ffff88810261cc00, ffff88810261cc73) [ 12.507041] [ 12.507216] The buggy address belongs to the physical page: [ 12.507551] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261c [ 12.508039] flags: 0x200000000000000(node=0|zone=2) [ 12.508538] page_type: f5(slab) [ 12.508820] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.509277] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 12.509770] page dumped because: kasan: bad access detected [ 12.510461] [ 12.510650] Memory state around the buggy address: [ 12.510986] ffff88810261cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 12.511487] ffff88810261cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.511883] >ffff88810261cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.512335] ^ [ 12.512783] ffff88810261cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.513339] ffff88810261cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.513720] ==================================================================