Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.224042] ================================================================== [ 19.224899] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 19.225975] Read of size 1 at addr fff00000c5a72c73 by task kunit_try_catch/184 [ 19.226822] [ 19.227216] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 19.227459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.227530] Hardware name: linux,dummy-virt (DT) [ 19.227612] Call trace: [ 19.227646] show_stack+0x20/0x38 (C) [ 19.227721] dump_stack_lvl+0x8c/0xd0 [ 19.227777] print_report+0x118/0x608 [ 19.227832] kasan_report+0xdc/0x128 [ 19.227886] __asan_report_load1_noabort+0x20/0x30 [ 19.227940] ksize_unpoisons_memory+0x638/0x750 [ 19.227994] kunit_try_run_case+0x170/0x3f0 [ 19.228048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.228105] kthread+0x318/0x620 [ 19.228182] ret_from_fork+0x10/0x20 [ 19.228242] [ 19.232740] Allocated by task 184: [ 19.233226] kasan_save_stack+0x3c/0x68 [ 19.233789] kasan_save_track+0x20/0x40 [ 19.234243] kasan_save_alloc_info+0x40/0x58 [ 19.234665] __kasan_kmalloc+0xd4/0xd8 [ 19.235213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.235776] ksize_unpoisons_memory+0xc0/0x750 [ 19.236349] kunit_try_run_case+0x170/0x3f0 [ 19.236838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.237375] kthread+0x318/0x620 [ 19.237865] ret_from_fork+0x10/0x20 [ 19.238368] [ 19.238646] The buggy address belongs to the object at fff00000c5a72c00 [ 19.238646] which belongs to the cache kmalloc-128 of size 128 [ 19.239671] The buggy address is located 0 bytes to the right of [ 19.239671] allocated 115-byte region [fff00000c5a72c00, fff00000c5a72c73) [ 19.240638] [ 19.240935] The buggy address belongs to the physical page: [ 19.241477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a72 [ 19.242176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.242784] page_type: f5(slab) [ 19.243135] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.243856] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.244516] page dumped because: kasan: bad access detected [ 19.245092] [ 19.245361] Memory state around the buggy address: [ 19.245820] fff00000c5a72b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.246460] fff00000c5a72b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.247098] >fff00000c5a72c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.247688] ^ [ 19.248290] fff00000c5a72c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.248804] fff00000c5a72d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.249356] ================================================================== [ 19.280929] ================================================================== [ 19.281393] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 19.281817] Read of size 1 at addr fff00000c5a72c7f by task kunit_try_catch/184 [ 19.282200] [ 19.282494] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 19.282777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.282839] Hardware name: linux,dummy-virt (DT) [ 19.282918] Call trace: [ 19.282962] show_stack+0x20/0x38 (C) [ 19.283105] dump_stack_lvl+0x8c/0xd0 [ 19.283240] print_report+0x118/0x608 [ 19.283354] kasan_report+0xdc/0x128 [ 19.283497] __asan_report_load1_noabort+0x20/0x30 [ 19.283640] ksize_unpoisons_memory+0x6a0/0x750 [ 19.283782] kunit_try_run_case+0x170/0x3f0 [ 19.283912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.284048] kthread+0x318/0x620 [ 19.284181] ret_from_fork+0x10/0x20 [ 19.284253] [ 19.289599] Allocated by task 184: [ 19.289881] kasan_save_stack+0x3c/0x68 [ 19.290171] kasan_save_track+0x20/0x40 [ 19.291673] kasan_save_alloc_info+0x40/0x58 [ 19.292203] __kasan_kmalloc+0xd4/0xd8 [ 19.292620] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.293123] ksize_unpoisons_memory+0xc0/0x750 [ 19.293625] kunit_try_run_case+0x170/0x3f0 [ 19.293994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.294573] kthread+0x318/0x620 [ 19.294992] ret_from_fork+0x10/0x20 [ 19.295393] [ 19.295667] The buggy address belongs to the object at fff00000c5a72c00 [ 19.295667] which belongs to the cache kmalloc-128 of size 128 [ 19.296510] The buggy address is located 12 bytes to the right of [ 19.296510] allocated 115-byte region [fff00000c5a72c00, fff00000c5a72c73) [ 19.297578] [ 19.297904] The buggy address belongs to the physical page: [ 19.298331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a72 [ 19.299118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.299704] page_type: f5(slab) [ 19.300035] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.300708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.301341] page dumped because: kasan: bad access detected [ 19.301833] [ 19.302118] Memory state around the buggy address: [ 19.302565] fff00000c5a72b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.303190] fff00000c5a72b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.303794] >fff00000c5a72c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.304409] ^ [ 19.305015] fff00000c5a72c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.305657] fff00000c5a72d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.306306] ================================================================== [ 19.252240] ================================================================== [ 19.252748] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 19.253314] Read of size 1 at addr fff00000c5a72c78 by task kunit_try_catch/184 [ 19.254001] [ 19.254582] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 19.254763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.254795] Hardware name: linux,dummy-virt (DT) [ 19.254833] Call trace: [ 19.254861] show_stack+0x20/0x38 (C) [ 19.254929] dump_stack_lvl+0x8c/0xd0 [ 19.254984] print_report+0x118/0x608 [ 19.255039] kasan_report+0xdc/0x128 [ 19.255089] __asan_report_load1_noabort+0x20/0x30 [ 19.255144] ksize_unpoisons_memory+0x628/0x750 [ 19.255261] kunit_try_run_case+0x170/0x3f0 [ 19.255355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.255466] kthread+0x318/0x620 [ 19.255550] ret_from_fork+0x10/0x20 [ 19.255650] [ 19.261884] Allocated by task 184: [ 19.262269] kasan_save_stack+0x3c/0x68 [ 19.262614] kasan_save_track+0x20/0x40 [ 19.262932] kasan_save_alloc_info+0x40/0x58 [ 19.263282] __kasan_kmalloc+0xd4/0xd8 [ 19.263645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.264015] ksize_unpoisons_memory+0xc0/0x750 [ 19.264999] kunit_try_run_case+0x170/0x3f0 [ 19.265646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.266306] kthread+0x318/0x620 [ 19.266831] ret_from_fork+0x10/0x20 [ 19.267415] [ 19.267806] The buggy address belongs to the object at fff00000c5a72c00 [ 19.267806] which belongs to the cache kmalloc-128 of size 128 [ 19.268766] The buggy address is located 5 bytes to the right of [ 19.268766] allocated 115-byte region [fff00000c5a72c00, fff00000c5a72c73) [ 19.269787] [ 19.270127] The buggy address belongs to the physical page: [ 19.270647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a72 [ 19.271372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.272023] page_type: f5(slab) [ 19.272424] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.273096] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.273766] page dumped because: kasan: bad access detected [ 19.274351] [ 19.274649] Memory state around the buggy address: [ 19.275120] fff00000c5a72b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.275693] fff00000c5a72b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.276407] >fff00000c5a72c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.276969] ^ [ 19.277597] fff00000c5a72c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.278256] fff00000c5a72d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.278863] ==================================================================
[ 13.091873] ================================================================== [ 13.092272] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 13.092520] Read of size 1 at addr ffff888102a2c273 by task kunit_try_catch/202 [ 13.093670] [ 13.093887] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 13.093928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.093940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.093961] Call Trace: [ 13.093973] <TASK> [ 13.093989] dump_stack_lvl+0x73/0xb0 [ 13.094030] print_report+0xd1/0x650 [ 13.094054] ? __virt_addr_valid+0x1db/0x2d0 [ 13.094080] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 13.094104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.094131] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 13.094156] kasan_report+0x140/0x180 [ 13.094180] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 13.094209] __asan_report_load1_noabort+0x18/0x20 [ 13.094235] ksize_unpoisons_memory+0x81e/0x9b0 [ 13.094260] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.094284] ? finish_task_switch.isra.0+0x153/0x700 [ 13.094310] ? __switch_to+0x5d9/0xf60 [ 13.094339] ? __schedule+0xce8/0x2840 [ 13.094365] ? __pfx_read_tsc+0x10/0x10 [ 13.094389] ? ktime_get_ts64+0x86/0x230 [ 13.094417] kunit_try_run_case+0x1a6/0x480 [ 13.094443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.094466] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.094492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.094518] ? __kthread_parkme+0x82/0x160 [ 13.094542] ? preempt_count_sub+0x50/0x80 [ 13.094569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.094594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.094623] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.094651] kthread+0x324/0x6e0 [ 13.094674] ? trace_preempt_on+0x20/0xc0 [ 13.094700] ? __pfx_kthread+0x10/0x10 [ 13.094724] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.094760] ? calculate_sigpending+0x7b/0xa0 [ 13.094784] ? __pfx_kthread+0x10/0x10 [ 13.094809] ret_from_fork+0x41/0x80 [ 13.094841] ? __pfx_kthread+0x10/0x10 [ 13.094865] ret_from_fork_asm+0x1a/0x30 [ 13.094899] </TASK> [ 13.094910] [ 13.106658] Allocated by task 202: [ 13.107001] kasan_save_stack+0x45/0x70 [ 13.107374] kasan_save_track+0x18/0x40 [ 13.107888] kasan_save_alloc_info+0x3b/0x50 [ 13.108318] __kasan_kmalloc+0xb7/0xc0 [ 13.108743] __kmalloc_cache_noprof+0x18a/0x420 [ 13.109188] ksize_unpoisons_memory+0xc8/0x9b0 [ 13.109618] kunit_try_run_case+0x1a6/0x480 [ 13.110087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.110359] kthread+0x324/0x6e0 [ 13.110590] ret_from_fork+0x41/0x80 [ 13.111035] ret_from_fork_asm+0x1a/0x30 [ 13.111426] [ 13.111646] The buggy address belongs to the object at ffff888102a2c200 [ 13.111646] which belongs to the cache kmalloc-128 of size 128 [ 13.112235] The buggy address is located 0 bytes to the right of [ 13.112235] allocated 115-byte region [ffff888102a2c200, ffff888102a2c273) [ 13.112822] [ 13.113090] The buggy address belongs to the physical page: [ 13.113658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 13.114377] flags: 0x200000000000000(node=0|zone=2) [ 13.114915] page_type: f5(slab) [ 13.115243] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.115921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.116160] page dumped because: kasan: bad access detected [ 13.116330] [ 13.116400] Memory state around the buggy address: [ 13.116555] ffff888102a2c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.116830] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.117103] >ffff888102a2c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.117410] ^ [ 13.117636] ffff888102a2c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.118131] ffff888102a2c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.118432] ================================================================== [ 13.138368] ================================================================== [ 13.140640] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 13.141089] Read of size 1 at addr ffff888102a2c27f by task kunit_try_catch/202 [ 13.141308] [ 13.141388] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 13.141426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.141437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.141456] Call Trace: [ 13.141469] <TASK> [ 13.141484] dump_stack_lvl+0x73/0xb0 [ 13.141511] print_report+0xd1/0x650 [ 13.141535] ? __virt_addr_valid+0x1db/0x2d0 [ 13.141559] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 13.141583] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.141610] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 13.141635] kasan_report+0x140/0x180 [ 13.141659] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 13.141688] __asan_report_load1_noabort+0x18/0x20 [ 13.141786] ksize_unpoisons_memory+0x7b8/0x9b0 [ 13.141817] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.141843] ? finish_task_switch.isra.0+0x153/0x700 [ 13.141881] ? __switch_to+0x5d9/0xf60 [ 13.141908] ? __schedule+0xce8/0x2840 [ 13.141945] ? __pfx_read_tsc+0x10/0x10 [ 13.141969] ? ktime_get_ts64+0x86/0x230 [ 13.141996] kunit_try_run_case+0x1a6/0x480 [ 13.142044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.142077] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.142103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.142128] ? __kthread_parkme+0x82/0x160 [ 13.142164] ? preempt_count_sub+0x50/0x80 [ 13.142190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.142215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.142252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.142280] kthread+0x324/0x6e0 [ 13.142304] ? trace_preempt_on+0x20/0xc0 [ 13.142339] ? __pfx_kthread+0x10/0x10 [ 13.142363] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.142388] ? calculate_sigpending+0x7b/0xa0 [ 13.142420] ? __pfx_kthread+0x10/0x10 [ 13.142445] ret_from_fork+0x41/0x80 [ 13.142508] ? __pfx_kthread+0x10/0x10 [ 13.142534] ret_from_fork_asm+0x1a/0x30 [ 13.142568] </TASK> [ 13.142578] [ 13.150033] Allocated by task 202: [ 13.150167] kasan_save_stack+0x45/0x70 [ 13.150315] kasan_save_track+0x18/0x40 [ 13.150453] kasan_save_alloc_info+0x3b/0x50 [ 13.150609] __kasan_kmalloc+0xb7/0xc0 [ 13.150744] __kmalloc_cache_noprof+0x18a/0x420 [ 13.150901] ksize_unpoisons_memory+0xc8/0x9b0 [ 13.151100] kunit_try_run_case+0x1a6/0x480 [ 13.151365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.151625] kthread+0x324/0x6e0 [ 13.151793] ret_from_fork+0x41/0x80 [ 13.151990] ret_from_fork_asm+0x1a/0x30 [ 13.152203] [ 13.152372] The buggy address belongs to the object at ffff888102a2c200 [ 13.152372] which belongs to the cache kmalloc-128 of size 128 [ 13.152939] The buggy address is located 12 bytes to the right of [ 13.152939] allocated 115-byte region [ffff888102a2c200, ffff888102a2c273) [ 13.153773] [ 13.153873] The buggy address belongs to the physical page: [ 13.154148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 13.154387] flags: 0x200000000000000(node=0|zone=2) [ 13.154543] page_type: f5(slab) [ 13.155067] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.155486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.155919] page dumped because: kasan: bad access detected [ 13.156200] [ 13.156295] Memory state around the buggy address: [ 13.156449] ffff888102a2c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.156663] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.156875] >ffff888102a2c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.157275] ^ [ 13.157599] ffff888102a2c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.157975] ffff888102a2c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.158411] ================================================================== [ 13.118979] ================================================================== [ 13.119494] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 13.119887] Read of size 1 at addr ffff888102a2c278 by task kunit_try_catch/202 [ 13.120268] [ 13.120393] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 13.120444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.120456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.120474] Call Trace: [ 13.120489] <TASK> [ 13.120503] dump_stack_lvl+0x73/0xb0 [ 13.120540] print_report+0xd1/0x650 [ 13.120564] ? __virt_addr_valid+0x1db/0x2d0 [ 13.120587] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 13.120622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.120650] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 13.120675] kasan_report+0x140/0x180 [ 13.120699] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 13.120772] __asan_report_load1_noabort+0x18/0x20 [ 13.120813] ksize_unpoisons_memory+0x7eb/0x9b0 [ 13.120839] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.120863] ? finish_task_switch.isra.0+0x153/0x700 [ 13.120888] ? __switch_to+0x5d9/0xf60 [ 13.120916] ? __schedule+0xce8/0x2840 [ 13.120940] ? __pfx_read_tsc+0x10/0x10 [ 13.120964] ? ktime_get_ts64+0x86/0x230 [ 13.120991] kunit_try_run_case+0x1a6/0x480 [ 13.121025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.121049] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.121083] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.121109] ? __kthread_parkme+0x82/0x160 [ 13.121144] ? preempt_count_sub+0x50/0x80 [ 13.121170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.121195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.121223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.121260] kthread+0x324/0x6e0 [ 13.121283] ? trace_preempt_on+0x20/0xc0 [ 13.121320] ? __pfx_kthread+0x10/0x10 [ 13.121345] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.121369] ? calculate_sigpending+0x7b/0xa0 [ 13.121393] ? __pfx_kthread+0x10/0x10 [ 13.121418] ret_from_fork+0x41/0x80 [ 13.121439] ? __pfx_kthread+0x10/0x10 [ 13.121463] ret_from_fork_asm+0x1a/0x30 [ 13.121497] </TASK> [ 13.121506] [ 13.129423] Allocated by task 202: [ 13.129667] kasan_save_stack+0x45/0x70 [ 13.129911] kasan_save_track+0x18/0x40 [ 13.130117] kasan_save_alloc_info+0x3b/0x50 [ 13.130329] __kasan_kmalloc+0xb7/0xc0 [ 13.130526] __kmalloc_cache_noprof+0x18a/0x420 [ 13.130822] ksize_unpoisons_memory+0xc8/0x9b0 [ 13.131072] kunit_try_run_case+0x1a6/0x480 [ 13.131279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.131503] kthread+0x324/0x6e0 [ 13.131822] ret_from_fork+0x41/0x80 [ 13.131992] ret_from_fork_asm+0x1a/0x30 [ 13.132200] [ 13.132310] The buggy address belongs to the object at ffff888102a2c200 [ 13.132310] which belongs to the cache kmalloc-128 of size 128 [ 13.132790] The buggy address is located 5 bytes to the right of [ 13.132790] allocated 115-byte region [ffff888102a2c200, ffff888102a2c273) [ 13.133428] [ 13.133529] The buggy address belongs to the physical page: [ 13.133882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 13.134389] flags: 0x200000000000000(node=0|zone=2) [ 13.134619] page_type: f5(slab) [ 13.134863] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.135189] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.135506] page dumped because: kasan: bad access detected [ 13.135756] [ 13.135824] Memory state around the buggy address: [ 13.135973] ffff888102a2c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.136195] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.136722] >ffff888102a2c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.137092] ^ [ 13.137327] ffff888102a2c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.137539] ffff888102a2c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.137902] ==================================================================