Date
June 17, 2025, 3:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.139567] ================================================================== [ 22.139896] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 22.140095] Read of size 1 at addr fff00000c794b473 by task kunit_try_catch/196 [ 22.140640] [ 22.140743] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 22.141356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.141553] Hardware name: linux,dummy-virt (DT) [ 22.141643] Call trace: [ 22.141987] show_stack+0x20/0x38 (C) [ 22.142121] dump_stack_lvl+0x8c/0xd0 [ 22.142186] print_report+0x118/0x608 [ 22.142239] kasan_report+0xdc/0x128 [ 22.142289] __asan_report_load1_noabort+0x20/0x30 [ 22.142345] ksize_unpoisons_memory+0x628/0x740 [ 22.142401] kunit_try_run_case+0x170/0x3f0 [ 22.142457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.142517] kthread+0x328/0x630 [ 22.142569] ret_from_fork+0x10/0x20 [ 22.142625] [ 22.142647] Allocated by task 196: [ 22.142681] kasan_save_stack+0x3c/0x68 [ 22.142744] kasan_save_track+0x20/0x40 [ 22.142791] kasan_save_alloc_info+0x40/0x58 [ 22.142835] __kasan_kmalloc+0xd4/0xd8 [ 22.142874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.142921] ksize_unpoisons_memory+0xc0/0x740 [ 22.142967] kunit_try_run_case+0x170/0x3f0 [ 22.143007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.143056] kthread+0x328/0x630 [ 22.143094] ret_from_fork+0x10/0x20 [ 22.143133] [ 22.143157] The buggy address belongs to the object at fff00000c794b400 [ 22.143157] which belongs to the cache kmalloc-128 of size 128 [ 22.143224] The buggy address is located 0 bytes to the right of [ 22.143224] allocated 115-byte region [fff00000c794b400, fff00000c794b473) [ 22.143295] [ 22.143318] The buggy address belongs to the physical page: [ 22.143356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b [ 22.143417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.143475] page_type: f5(slab) [ 22.143525] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.143583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.143629] page dumped because: kasan: bad access detected [ 22.143664] [ 22.143683] Memory state around the buggy address: [ 22.143720] fff00000c794b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.143973] fff00000c794b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.144079] >fff00000c794b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.144190] ^ [ 22.144387] fff00000c794b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.144686] fff00000c794b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.145003] ================================================================== [ 22.146702] ================================================================== [ 22.146845] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 22.146975] Read of size 1 at addr fff00000c794b478 by task kunit_try_catch/196 [ 22.147098] [ 22.147185] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 22.147398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.147470] Hardware name: linux,dummy-virt (DT) [ 22.147555] Call trace: [ 22.147613] show_stack+0x20/0x38 (C) [ 22.147960] dump_stack_lvl+0x8c/0xd0 [ 22.148118] print_report+0x118/0x608 [ 22.148240] kasan_report+0xdc/0x128 [ 22.148345] __asan_report_load1_noabort+0x20/0x30 [ 22.148471] ksize_unpoisons_memory+0x618/0x740 [ 22.148624] kunit_try_run_case+0x170/0x3f0 [ 22.148753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.149370] kthread+0x328/0x630 [ 22.149501] ret_from_fork+0x10/0x20 [ 22.149617] [ 22.149693] Allocated by task 196: [ 22.149775] kasan_save_stack+0x3c/0x68 [ 22.149866] kasan_save_track+0x20/0x40 [ 22.149947] kasan_save_alloc_info+0x40/0x58 [ 22.150039] __kasan_kmalloc+0xd4/0xd8 [ 22.150132] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.150241] ksize_unpoisons_memory+0xc0/0x740 [ 22.150531] kunit_try_run_case+0x170/0x3f0 [ 22.150645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.150809] kthread+0x328/0x630 [ 22.150914] ret_from_fork+0x10/0x20 [ 22.151051] [ 22.151223] The buggy address belongs to the object at fff00000c794b400 [ 22.151223] which belongs to the cache kmalloc-128 of size 128 [ 22.151379] The buggy address is located 5 bytes to the right of [ 22.151379] allocated 115-byte region [fff00000c794b400, fff00000c794b473) [ 22.151547] [ 22.152052] The buggy address belongs to the physical page: [ 22.152160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b [ 22.152839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.153008] page_type: f5(slab) [ 22.153341] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.153788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.154101] page dumped because: kasan: bad access detected [ 22.154220] [ 22.154283] Memory state around the buggy address: [ 22.154874] fff00000c794b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.155271] fff00000c794b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.155422] >fff00000c794b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.155517] ^ [ 22.155625] fff00000c794b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.155751] fff00000c794b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.156347] ================================================================== [ 22.159658] ================================================================== [ 22.159795] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 22.159940] Read of size 1 at addr fff00000c794b47f by task kunit_try_catch/196 [ 22.160071] [ 22.160538] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 22.161523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.161760] Hardware name: linux,dummy-virt (DT) [ 22.161857] Call trace: [ 22.161998] show_stack+0x20/0x38 (C) [ 22.162134] dump_stack_lvl+0x8c/0xd0 [ 22.162492] print_report+0x118/0x608 [ 22.162857] kasan_report+0xdc/0x128 [ 22.163079] __asan_report_load1_noabort+0x20/0x30 [ 22.163233] ksize_unpoisons_memory+0x690/0x740 [ 22.163442] kunit_try_run_case+0x170/0x3f0 [ 22.163800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.163970] kthread+0x328/0x630 [ 22.164400] ret_from_fork+0x10/0x20 [ 22.164545] [ 22.164593] Allocated by task 196: [ 22.164912] kasan_save_stack+0x3c/0x68 [ 22.165310] kasan_save_track+0x20/0x40 [ 22.165444] kasan_save_alloc_info+0x40/0x58 [ 22.165693] __kasan_kmalloc+0xd4/0xd8 [ 22.165807] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.166143] ksize_unpoisons_memory+0xc0/0x740 [ 22.166253] kunit_try_run_case+0x170/0x3f0 [ 22.166650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.166994] kthread+0x328/0x630 [ 22.167197] ret_from_fork+0x10/0x20 [ 22.167327] [ 22.167387] The buggy address belongs to the object at fff00000c794b400 [ 22.167387] which belongs to the cache kmalloc-128 of size 128 [ 22.168013] The buggy address is located 12 bytes to the right of [ 22.168013] allocated 115-byte region [fff00000c794b400, fff00000c794b473) [ 22.168328] [ 22.168389] The buggy address belongs to the physical page: [ 22.168480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b [ 22.169055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.169340] page_type: f5(slab) [ 22.169779] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.169911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.170257] page dumped because: kasan: bad access detected [ 22.170367] [ 22.170610] Memory state around the buggy address: [ 22.170875] fff00000c794b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.171000] fff00000c794b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.171119] >fff00000c794b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.171218] ^ [ 22.171324] fff00000c794b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.171435] fff00000c794b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.171543] ==================================================================
[ 19.971396] ================================================================== [ 19.972212] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.973686] Read of size 1 at addr ffff888103096778 by task kunit_try_catch/214 [ 19.974378] [ 19.974687] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 19.974855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.974892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.974944] Call Trace: [ 19.974994] <TASK> [ 19.975042] dump_stack_lvl+0x73/0xb0 [ 19.975128] print_report+0xd1/0x650 [ 19.975270] ? __virt_addr_valid+0x1db/0x2d0 [ 19.975373] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.975447] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.975521] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.975583] kasan_report+0x141/0x180 [ 19.975618] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.975663] __asan_report_load1_noabort+0x18/0x20 [ 19.975694] ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.975732] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 19.975765] ? finish_task_switch.isra.0+0x153/0x700 [ 19.975799] ? __switch_to+0x5d9/0xf60 [ 19.975827] ? dequeue_task_fair+0x166/0x4e0 [ 19.975860] ? __schedule+0x10cc/0x2b60 [ 19.975922] ? __pfx_read_tsc+0x10/0x10 [ 19.975954] ? ktime_get_ts64+0x86/0x230 [ 19.975991] kunit_try_run_case+0x1a5/0x480 [ 19.976026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.976087] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.976125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.976159] ? __kthread_parkme+0x82/0x180 [ 19.976190] ? preempt_count_sub+0x50/0x80 [ 19.976224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.976259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.976315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.976351] kthread+0x337/0x6f0 [ 19.976376] ? trace_preempt_on+0x20/0xc0 [ 19.976411] ? __pfx_kthread+0x10/0x10 [ 19.976437] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.976468] ? calculate_sigpending+0x7b/0xa0 [ 19.976499] ? __pfx_kthread+0x10/0x10 [ 19.976526] ret_from_fork+0x41/0x80 [ 19.976557] ? __pfx_kthread+0x10/0x10 [ 19.976582] ret_from_fork_asm+0x1a/0x30 [ 19.976626] </TASK> [ 19.976642] [ 19.993972] Allocated by task 214: [ 19.994530] kasan_save_stack+0x45/0x70 [ 19.994999] kasan_save_track+0x18/0x40 [ 19.995593] kasan_save_alloc_info+0x3b/0x50 [ 19.996162] __kasan_kmalloc+0xb7/0xc0 [ 19.996670] __kmalloc_cache_noprof+0x189/0x420 [ 19.997158] ksize_unpoisons_memory+0xc7/0x9b0 [ 19.997744] kunit_try_run_case+0x1a5/0x480 [ 19.998275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.998673] kthread+0x337/0x6f0 [ 19.998951] ret_from_fork+0x41/0x80 [ 19.999440] ret_from_fork_asm+0x1a/0x30 [ 20.000050] [ 20.000376] The buggy address belongs to the object at ffff888103096700 [ 20.000376] which belongs to the cache kmalloc-128 of size 128 [ 20.001661] The buggy address is located 5 bytes to the right of [ 20.001661] allocated 115-byte region [ffff888103096700, ffff888103096773) [ 20.002889] [ 20.003102] The buggy address belongs to the physical page: [ 20.003747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103096 [ 20.004568] flags: 0x200000000000000(node=0|zone=2) [ 20.004926] page_type: f5(slab) [ 20.005265] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.006125] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.006896] page dumped because: kasan: bad access detected [ 20.007573] [ 20.007856] Memory state around the buggy address: [ 20.008480] ffff888103096600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.008917] ffff888103096680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.009822] >ffff888103096700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.010604] ^ [ 20.011349] ffff888103096780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.011793] ffff888103096800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.012914] ================================================================== [ 19.926180] ================================================================== [ 19.927130] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 19.927963] Read of size 1 at addr ffff888103096773 by task kunit_try_catch/214 [ 19.928586] [ 19.928836] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 19.929011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.929052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.929128] Call Trace: [ 19.929171] <TASK> [ 19.929218] dump_stack_lvl+0x73/0xb0 [ 19.929313] print_report+0xd1/0x650 [ 19.929391] ? __virt_addr_valid+0x1db/0x2d0 [ 19.929466] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 19.929537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.929607] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 19.929681] kasan_report+0x141/0x180 [ 19.929754] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 19.929840] __asan_report_load1_noabort+0x18/0x20 [ 19.929960] ksize_unpoisons_memory+0x81c/0x9b0 [ 19.930090] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 19.930168] ? finish_task_switch.isra.0+0x153/0x700 [ 19.930232] ? __switch_to+0x5d9/0xf60 [ 19.930268] ? dequeue_task_fair+0x166/0x4e0 [ 19.930332] ? __schedule+0x10cc/0x2b60 [ 19.930371] ? __pfx_read_tsc+0x10/0x10 [ 19.930403] ? ktime_get_ts64+0x86/0x230 [ 19.930443] kunit_try_run_case+0x1a5/0x480 [ 19.930483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.930518] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.930555] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.930591] ? __kthread_parkme+0x82/0x180 [ 19.930625] ? preempt_count_sub+0x50/0x80 [ 19.930660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.930695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.930730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.930763] kthread+0x337/0x6f0 [ 19.930788] ? trace_preempt_on+0x20/0xc0 [ 19.930824] ? __pfx_kthread+0x10/0x10 [ 19.930851] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.930882] ? calculate_sigpending+0x7b/0xa0 [ 19.930916] ? __pfx_kthread+0x10/0x10 [ 19.930943] ret_from_fork+0x41/0x80 [ 19.930975] ? __pfx_kthread+0x10/0x10 [ 19.931002] ret_from_fork_asm+0x1a/0x30 [ 19.931085] </TASK> [ 19.931109] [ 19.950042] Allocated by task 214: [ 19.951478] kasan_save_stack+0x45/0x70 [ 19.952102] kasan_save_track+0x18/0x40 [ 19.952535] kasan_save_alloc_info+0x3b/0x50 [ 19.953259] __kasan_kmalloc+0xb7/0xc0 [ 19.953864] __kmalloc_cache_noprof+0x189/0x420 [ 19.954447] ksize_unpoisons_memory+0xc7/0x9b0 [ 19.954883] kunit_try_run_case+0x1a5/0x480 [ 19.955498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.956002] kthread+0x337/0x6f0 [ 19.956382] ret_from_fork+0x41/0x80 [ 19.956775] ret_from_fork_asm+0x1a/0x30 [ 19.957212] [ 19.957570] The buggy address belongs to the object at ffff888103096700 [ 19.957570] which belongs to the cache kmalloc-128 of size 128 [ 19.958653] The buggy address is located 0 bytes to the right of [ 19.958653] allocated 115-byte region [ffff888103096700, ffff888103096773) [ 19.959597] [ 19.959834] The buggy address belongs to the physical page: [ 19.960530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103096 [ 19.961068] flags: 0x200000000000000(node=0|zone=2) [ 19.961645] page_type: f5(slab) [ 19.962042] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.962749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.963454] page dumped because: kasan: bad access detected [ 19.963905] [ 19.964109] Memory state around the buggy address: [ 19.964562] ffff888103096600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.965178] ffff888103096680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.965954] >ffff888103096700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.966535] ^ [ 19.967142] ffff888103096780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.967990] ffff888103096800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.968601] ================================================================== [ 20.016856] ================================================================== [ 20.017653] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 20.019001] Read of size 1 at addr ffff88810309677f by task kunit_try_catch/214 [ 20.019990] [ 20.020233] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 20.020698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.020721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.020751] Call Trace: [ 20.020773] <TASK> [ 20.020799] dump_stack_lvl+0x73/0xb0 [ 20.020847] print_report+0xd1/0x650 [ 20.020885] ? __virt_addr_valid+0x1db/0x2d0 [ 20.020919] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 20.020955] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.020989] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 20.021026] kasan_report+0x141/0x180 [ 20.021087] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 20.021132] __asan_report_load1_noabort+0x18/0x20 [ 20.021164] ksize_unpoisons_memory+0x7b6/0x9b0 [ 20.021201] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 20.021236] ? finish_task_switch.isra.0+0x153/0x700 [ 20.021273] ? __switch_to+0x5d9/0xf60 [ 20.021333] ? dequeue_task_fair+0x166/0x4e0 [ 20.021368] ? __schedule+0x10cc/0x2b60 [ 20.021404] ? __pfx_read_tsc+0x10/0x10 [ 20.021436] ? ktime_get_ts64+0x86/0x230 [ 20.021473] kunit_try_run_case+0x1a5/0x480 [ 20.021512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.021546] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.021583] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.021618] ? __kthread_parkme+0x82/0x180 [ 20.021650] ? preempt_count_sub+0x50/0x80 [ 20.021686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.021721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.021754] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.021788] kthread+0x337/0x6f0 [ 20.021813] ? trace_preempt_on+0x20/0xc0 [ 20.021849] ? __pfx_kthread+0x10/0x10 [ 20.021876] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.021909] ? calculate_sigpending+0x7b/0xa0 [ 20.021942] ? __pfx_kthread+0x10/0x10 [ 20.021969] ret_from_fork+0x41/0x80 [ 20.022001] ? __pfx_kthread+0x10/0x10 [ 20.022028] ret_from_fork_asm+0x1a/0x30 [ 20.022101] </TASK> [ 20.022119] [ 20.037150] Allocated by task 214: [ 20.037654] kasan_save_stack+0x45/0x70 [ 20.038205] kasan_save_track+0x18/0x40 [ 20.038645] kasan_save_alloc_info+0x3b/0x50 [ 20.039215] __kasan_kmalloc+0xb7/0xc0 [ 20.039651] __kmalloc_cache_noprof+0x189/0x420 [ 20.040249] ksize_unpoisons_memory+0xc7/0x9b0 [ 20.040757] kunit_try_run_case+0x1a5/0x480 [ 20.041135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.041715] kthread+0x337/0x6f0 [ 20.042134] ret_from_fork+0x41/0x80 [ 20.042576] ret_from_fork_asm+0x1a/0x30 [ 20.042957] [ 20.043269] The buggy address belongs to the object at ffff888103096700 [ 20.043269] which belongs to the cache kmalloc-128 of size 128 [ 20.044321] The buggy address is located 12 bytes to the right of [ 20.044321] allocated 115-byte region [ffff888103096700, ffff888103096773) [ 20.045354] [ 20.045614] The buggy address belongs to the physical page: [ 20.046154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103096 [ 20.046821] flags: 0x200000000000000(node=0|zone=2) [ 20.047428] page_type: f5(slab) [ 20.047784] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.048470] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.049001] page dumped because: kasan: bad access detected [ 20.049483] [ 20.049750] Memory state around the buggy address: [ 20.050315] ffff888103096600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.050958] ffff888103096680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.051660] >ffff888103096700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.052231] ^ [ 20.052854] ffff888103096780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.053589] ffff888103096800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.054197] ==================================================================