Date
May 12, 2025, 6:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.159577] ================================================================== [ 19.160115] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 19.160681] Read of size 1 at addr fff00000c5a05378 by task kunit_try_catch/183 [ 19.162331] [ 19.162694] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.163032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.163106] Hardware name: linux,dummy-virt (DT) [ 19.163163] Call trace: [ 19.163192] show_stack+0x20/0x38 (C) [ 19.163264] dump_stack_lvl+0x8c/0xd0 [ 19.163320] print_report+0x118/0x608 [ 19.163375] kasan_report+0xdc/0x128 [ 19.163428] __asan_report_load1_noabort+0x20/0x30 [ 19.163481] ksize_unpoisons_memory+0x628/0x750 [ 19.163535] kunit_try_run_case+0x170/0x3f0 [ 19.163590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.163647] kthread+0x318/0x620 [ 19.163698] ret_from_fork+0x10/0x20 [ 19.163782] [ 19.169137] Allocated by task 183: [ 19.169658] kasan_save_stack+0x3c/0x68 [ 19.170264] kasan_save_track+0x20/0x40 [ 19.171017] kasan_save_alloc_info+0x40/0x58 [ 19.171553] __kasan_kmalloc+0xd4/0xd8 [ 19.172076] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.172586] ksize_unpoisons_memory+0xc0/0x750 [ 19.173084] kunit_try_run_case+0x170/0x3f0 [ 19.173615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.174209] kthread+0x318/0x620 [ 19.174946] ret_from_fork+0x10/0x20 [ 19.175497] [ 19.175812] The buggy address belongs to the object at fff00000c5a05300 [ 19.175812] which belongs to the cache kmalloc-128 of size 128 [ 19.176805] The buggy address is located 5 bytes to the right of [ 19.176805] allocated 115-byte region [fff00000c5a05300, fff00000c5a05373) [ 19.177889] [ 19.178242] The buggy address belongs to the physical page: [ 19.178913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 19.179579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.180242] page_type: f5(slab) [ 19.180642] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.182190] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.182938] page dumped because: kasan: bad access detected [ 19.183181] [ 19.183284] Memory state around the buggy address: [ 19.183452] fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.183673] fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.183910] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.184123] ^ [ 19.184341] fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.184563] fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.185051] ================================================================== [ 19.186081] ================================================================== [ 19.188626] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 19.189228] Read of size 1 at addr fff00000c5a0537f by task kunit_try_catch/183 [ 19.189960] [ 19.190238] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.190400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.190436] Hardware name: linux,dummy-virt (DT) [ 19.190913] Call trace: [ 19.190971] show_stack+0x20/0x38 (C) [ 19.191044] dump_stack_lvl+0x8c/0xd0 [ 19.191101] print_report+0x118/0x608 [ 19.191155] kasan_report+0xdc/0x128 [ 19.191207] __asan_report_load1_noabort+0x20/0x30 [ 19.191262] ksize_unpoisons_memory+0x6a0/0x750 [ 19.191316] kunit_try_run_case+0x170/0x3f0 [ 19.191372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.191430] kthread+0x318/0x620 [ 19.191481] ret_from_fork+0x10/0x20 [ 19.191537] [ 19.196968] Allocated by task 183: [ 19.197277] kasan_save_stack+0x3c/0x68 [ 19.197681] kasan_save_track+0x20/0x40 [ 19.198403] kasan_save_alloc_info+0x40/0x58 [ 19.199187] __kasan_kmalloc+0xd4/0xd8 [ 19.199571] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.199948] ksize_unpoisons_memory+0xc0/0x750 [ 19.200318] kunit_try_run_case+0x170/0x3f0 [ 19.200680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.201519] kthread+0x318/0x620 [ 19.201877] ret_from_fork+0x10/0x20 [ 19.202245] [ 19.202476] The buggy address belongs to the object at fff00000c5a05300 [ 19.202476] which belongs to the cache kmalloc-128 of size 128 [ 19.203769] The buggy address is located 12 bytes to the right of [ 19.203769] allocated 115-byte region [fff00000c5a05300, fff00000c5a05373) [ 19.204863] [ 19.205268] The buggy address belongs to the physical page: [ 19.205560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 19.206432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.207205] page_type: f5(slab) [ 19.207456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.207854] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.208176] page dumped because: kasan: bad access detected [ 19.208357] [ 19.208455] Memory state around the buggy address: [ 19.208621] fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.210228] fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.210924] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.211162] ^ [ 19.211385] fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.211605] fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.211893] ================================================================== [ 19.130358] ================================================================== [ 19.131604] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 19.132256] Read of size 1 at addr fff00000c5a05373 by task kunit_try_catch/183 [ 19.132922] [ 19.133725] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.133868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.133903] Hardware name: linux,dummy-virt (DT) [ 19.133941] Call trace: [ 19.133970] show_stack+0x20/0x38 (C) [ 19.134037] dump_stack_lvl+0x8c/0xd0 [ 19.134107] print_report+0x118/0x608 [ 19.134164] kasan_report+0xdc/0x128 [ 19.134218] __asan_report_load1_noabort+0x20/0x30 [ 19.134273] ksize_unpoisons_memory+0x638/0x750 [ 19.134327] kunit_try_run_case+0x170/0x3f0 [ 19.134382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.134440] kthread+0x318/0x620 [ 19.134560] ret_from_fork+0x10/0x20 [ 19.134669] [ 19.139732] Allocated by task 183: [ 19.139918] kasan_save_stack+0x3c/0x68 [ 19.140103] kasan_save_track+0x20/0x40 [ 19.140265] kasan_save_alloc_info+0x40/0x58 [ 19.140430] __kasan_kmalloc+0xd4/0xd8 [ 19.140588] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.140821] ksize_unpoisons_memory+0xc0/0x750 [ 19.142066] kunit_try_run_case+0x170/0x3f0 [ 19.142570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.143826] kthread+0x318/0x620 [ 19.144170] ret_from_fork+0x10/0x20 [ 19.144516] [ 19.144768] The buggy address belongs to the object at fff00000c5a05300 [ 19.144768] which belongs to the cache kmalloc-128 of size 128 [ 19.145583] The buggy address is located 0 bytes to the right of [ 19.145583] allocated 115-byte region [fff00000c5a05300, fff00000c5a05373) [ 19.146406] [ 19.146687] The buggy address belongs to the physical page: [ 19.147713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 19.149331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.149880] page_type: f5(slab) [ 19.150228] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.150861] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.151689] page dumped because: kasan: bad access detected [ 19.152314] [ 19.152565] Memory state around the buggy address: [ 19.153089] fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.153862] fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.154831] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.155414] ^ [ 19.156038] fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.156758] fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.157391] ==================================================================
[ 12.855058] ================================================================== [ 12.855788] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.856379] Read of size 1 at addr ffff888102add078 by task kunit_try_catch/202 [ 12.856695] [ 12.856809] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 12.856863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.856875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.856897] Call Trace: [ 12.856918] <TASK> [ 12.856938] dump_stack_lvl+0x73/0xb0 [ 12.856967] print_report+0xd1/0x650 [ 12.856988] ? __virt_addr_valid+0x1db/0x2d0 [ 12.857010] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.857032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.857057] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.857078] kasan_report+0x140/0x180 [ 12.857099] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.857125] __asan_report_load1_noabort+0x18/0x20 [ 12.857148] ksize_unpoisons_memory+0x7eb/0x9b0 [ 12.857171] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.857192] ? finish_task_switch.isra.0+0x153/0x700 [ 12.857215] ? __switch_to+0x5d9/0xf60 [ 12.857241] ? __schedule+0xce8/0x2840 [ 12.857266] ? __pfx_read_tsc+0x10/0x10 [ 12.857287] ? ktime_get_ts64+0x86/0x230 [ 12.857312] kunit_try_run_case+0x1a6/0x480 [ 12.857334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.857354] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.857374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.857397] ? __kthread_parkme+0x82/0x160 [ 12.857419] ? preempt_count_sub+0x50/0x80 [ 12.857442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.857475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.857524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.857548] kthread+0x324/0x6e0 [ 12.857569] ? trace_preempt_on+0x20/0xc0 [ 12.857592] ? __pfx_kthread+0x10/0x10 [ 12.857613] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.857636] ? calculate_sigpending+0x7b/0xa0 [ 12.857657] ? __pfx_kthread+0x10/0x10 [ 12.857679] ret_from_fork+0x41/0x80 [ 12.857696] ? __pfx_kthread+0x10/0x10 [ 12.858036] ret_from_fork_asm+0x1a/0x30 [ 12.858112] </TASK> [ 12.858123] [ 12.866420] Allocated by task 202: [ 12.866793] kasan_save_stack+0x45/0x70 [ 12.867135] kasan_save_track+0x18/0x40 [ 12.867278] kasan_save_alloc_info+0x3b/0x50 [ 12.867513] __kasan_kmalloc+0xb7/0xc0 [ 12.867855] __kmalloc_cache_noprof+0x18a/0x420 [ 12.868080] ksize_unpoisons_memory+0xc8/0x9b0 [ 12.868526] kunit_try_run_case+0x1a6/0x480 [ 12.868762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.868986] kthread+0x324/0x6e0 [ 12.869237] ret_from_fork+0x41/0x80 [ 12.869373] ret_from_fork_asm+0x1a/0x30 [ 12.869515] [ 12.869587] The buggy address belongs to the object at ffff888102add000 [ 12.869587] which belongs to the cache kmalloc-128 of size 128 [ 12.870263] The buggy address is located 5 bytes to the right of [ 12.870263] allocated 115-byte region [ffff888102add000, ffff888102add073) [ 12.870850] [ 12.870954] The buggy address belongs to the physical page: [ 12.871434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add [ 12.871744] flags: 0x200000000000000(node=0|zone=2) [ 12.871923] page_type: f5(slab) [ 12.872063] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.872413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.872764] page dumped because: kasan: bad access detected [ 12.872942] [ 12.873014] Memory state around the buggy address: [ 12.873208] ffff888102adcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.873536] ffff888102adcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.873864] >ffff888102add000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.874158] ^ [ 12.874468] ffff888102add080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.874686] ffff888102add100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.874987] ================================================================== [ 12.834927] ================================================================== [ 12.835537] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 12.835797] Read of size 1 at addr ffff888102add073 by task kunit_try_catch/202 [ 12.836061] [ 12.836663] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 12.836715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.836728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.836776] Call Trace: [ 12.836802] <TASK> [ 12.836825] dump_stack_lvl+0x73/0xb0 [ 12.836876] print_report+0xd1/0x650 [ 12.836898] ? __virt_addr_valid+0x1db/0x2d0 [ 12.836923] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 12.836945] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.836970] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 12.836993] kasan_report+0x140/0x180 [ 12.837060] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 12.837087] __asan_report_load1_noabort+0x18/0x20 [ 12.837110] ksize_unpoisons_memory+0x81e/0x9b0 [ 12.837132] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.837153] ? finish_task_switch.isra.0+0x153/0x700 [ 12.837178] ? __switch_to+0x5d9/0xf60 [ 12.837205] ? __schedule+0xce8/0x2840 [ 12.837234] ? __pfx_read_tsc+0x10/0x10 [ 12.837256] ? ktime_get_ts64+0x86/0x230 [ 12.837285] kunit_try_run_case+0x1a6/0x480 [ 12.837310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.837331] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.837352] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.837376] ? __kthread_parkme+0x82/0x160 [ 12.837399] ? preempt_count_sub+0x50/0x80 [ 12.837423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.837446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.837471] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.837497] kthread+0x324/0x6e0 [ 12.837519] ? trace_preempt_on+0x20/0xc0 [ 12.837548] ? __pfx_kthread+0x10/0x10 [ 12.837572] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.837595] ? calculate_sigpending+0x7b/0xa0 [ 12.837617] ? __pfx_kthread+0x10/0x10 [ 12.837639] ret_from_fork+0x41/0x80 [ 12.837659] ? __pfx_kthread+0x10/0x10 [ 12.837681] ret_from_fork_asm+0x1a/0x30 [ 12.837713] </TASK> [ 12.837724] [ 12.845833] Allocated by task 202: [ 12.846068] kasan_save_stack+0x45/0x70 [ 12.846283] kasan_save_track+0x18/0x40 [ 12.846419] kasan_save_alloc_info+0x3b/0x50 [ 12.846567] __kasan_kmalloc+0xb7/0xc0 [ 12.846734] __kmalloc_cache_noprof+0x18a/0x420 [ 12.846964] ksize_unpoisons_memory+0xc8/0x9b0 [ 12.847177] kunit_try_run_case+0x1a6/0x480 [ 12.847532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.847725] kthread+0x324/0x6e0 [ 12.847861] ret_from_fork+0x41/0x80 [ 12.847991] ret_from_fork_asm+0x1a/0x30 [ 12.848265] [ 12.848358] The buggy address belongs to the object at ffff888102add000 [ 12.848358] which belongs to the cache kmalloc-128 of size 128 [ 12.848832] The buggy address is located 0 bytes to the right of [ 12.848832] allocated 115-byte region [ffff888102add000, ffff888102add073) [ 12.849567] [ 12.849691] The buggy address belongs to the physical page: [ 12.849943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add [ 12.850382] flags: 0x200000000000000(node=0|zone=2) [ 12.850610] page_type: f5(slab) [ 12.850738] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.851120] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.851630] page dumped because: kasan: bad access detected [ 12.851798] [ 12.851877] Memory state around the buggy address: [ 12.852310] ffff888102adcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.852626] ffff888102adcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.852858] >ffff888102add000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.853070] ^ [ 12.853668] ffff888102add080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.854012] ffff888102add100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.854461] ================================================================== [ 12.876206] ================================================================== [ 12.876518] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.876874] Read of size 1 at addr ffff888102add07f by task kunit_try_catch/202 [ 12.877196] [ 12.877298] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 12.877344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.877356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.877377] Call Trace: [ 12.877398] <TASK> [ 12.877420] dump_stack_lvl+0x73/0xb0 [ 12.877448] print_report+0xd1/0x650 [ 12.877470] ? __virt_addr_valid+0x1db/0x2d0 [ 12.877494] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.877516] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.877540] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.877562] kasan_report+0x140/0x180 [ 12.877583] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.877609] __asan_report_load1_noabort+0x18/0x20 [ 12.877631] ksize_unpoisons_memory+0x7b8/0x9b0 [ 12.877653] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.877674] ? finish_task_switch.isra.0+0x153/0x700 [ 12.877697] ? __switch_to+0x5d9/0xf60 [ 12.877723] ? __schedule+0xce8/0x2840 [ 12.877753] ? __pfx_read_tsc+0x10/0x10 [ 12.877774] ? ktime_get_ts64+0x86/0x230 [ 12.877800] kunit_try_run_case+0x1a6/0x480 [ 12.877823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.877855] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 12.877876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.877900] ? __kthread_parkme+0x82/0x160 [ 12.877922] ? preempt_count_sub+0x50/0x80 [ 12.877945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.877967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.877992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.878017] kthread+0x324/0x6e0 [ 12.878038] ? trace_preempt_on+0x20/0xc0 [ 12.878061] ? __pfx_kthread+0x10/0x10 [ 12.878083] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.878105] ? calculate_sigpending+0x7b/0xa0 [ 12.878126] ? __pfx_kthread+0x10/0x10 [ 12.878148] ret_from_fork+0x41/0x80 [ 12.878166] ? __pfx_kthread+0x10/0x10 [ 12.878202] ret_from_fork_asm+0x1a/0x30 [ 12.878234] </TASK> [ 12.878244] [ 12.886387] Allocated by task 202: [ 12.886568] kasan_save_stack+0x45/0x70 [ 12.886781] kasan_save_track+0x18/0x40 [ 12.886985] kasan_save_alloc_info+0x3b/0x50 [ 12.887290] __kasan_kmalloc+0xb7/0xc0 [ 12.887424] __kmalloc_cache_noprof+0x18a/0x420 [ 12.887580] ksize_unpoisons_memory+0xc8/0x9b0 [ 12.887784] kunit_try_run_case+0x1a6/0x480 [ 12.888013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.888269] kthread+0x324/0x6e0 [ 12.888444] ret_from_fork+0x41/0x80 [ 12.888632] ret_from_fork_asm+0x1a/0x30 [ 12.888829] [ 12.888924] The buggy address belongs to the object at ffff888102add000 [ 12.888924] which belongs to the cache kmalloc-128 of size 128 [ 12.889325] The buggy address is located 12 bytes to the right of [ 12.889325] allocated 115-byte region [ffff888102add000, ffff888102add073) [ 12.890565] [ 12.890674] The buggy address belongs to the physical page: [ 12.890915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add [ 12.891331] flags: 0x200000000000000(node=0|zone=2) [ 12.891503] page_type: f5(slab) [ 12.891631] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.891914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.892627] page dumped because: kasan: bad access detected [ 12.892902] [ 12.892998] Memory state around the buggy address: [ 12.893257] ffff888102adcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.893866] ffff888102adcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.894233] >ffff888102add000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.894451] ^ [ 12.894763] ffff888102add080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.895096] ffff888102add100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.895517] ==================================================================