Date
June 24, 2025, 12:47 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.273629] ================================================================== [ 24.273728] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 24.274491] Read of size 1 at addr fff00000c59ef478 by task kunit_try_catch/196 [ 24.275224] [ 24.276087] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 24.276971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.277057] Hardware name: linux,dummy-virt (DT) [ 24.277450] Call trace: [ 24.277688] show_stack+0x20/0x38 (C) [ 24.278100] dump_stack_lvl+0x8c/0xd0 [ 24.278560] print_report+0x118/0x608 [ 24.278699] kasan_report+0xdc/0x128 [ 24.279233] __asan_report_load1_noabort+0x20/0x30 [ 24.279819] ksize_unpoisons_memory+0x618/0x740 [ 24.280235] kunit_try_run_case+0x170/0x3f0 [ 24.280650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.280936] kthread+0x328/0x630 [ 24.281058] ret_from_fork+0x10/0x20 [ 24.281190] [ 24.281240] Allocated by task 196: [ 24.281308] kasan_save_stack+0x3c/0x68 [ 24.281863] kasan_save_track+0x20/0x40 [ 24.282707] kasan_save_alloc_info+0x40/0x58 [ 24.283273] __kasan_kmalloc+0xd4/0xd8 [ 24.283919] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.284236] ksize_unpoisons_memory+0xc0/0x740 [ 24.284344] kunit_try_run_case+0x170/0x3f0 [ 24.285171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.285572] kthread+0x328/0x630 [ 24.285668] ret_from_fork+0x10/0x20 [ 24.286289] [ 24.286341] The buggy address belongs to the object at fff00000c59ef400 [ 24.286341] which belongs to the cache kmalloc-128 of size 128 [ 24.286581] The buggy address is located 5 bytes to the right of [ 24.286581] allocated 115-byte region [fff00000c59ef400, fff00000c59ef473) [ 24.287287] [ 24.287343] The buggy address belongs to the physical page: [ 24.287704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ef [ 24.287989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.288164] page_type: f5(slab) [ 24.290181] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.291090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.291239] page dumped because: kasan: bad access detected [ 24.291332] [ 24.291398] Memory state around the buggy address: [ 24.291883] fff00000c59ef300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.291999] fff00000c59ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.292306] >fff00000c59ef400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.292443] ^ [ 24.292621] fff00000c59ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.292866] fff00000c59ef500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.293153] ================================================================== [ 24.258822] ================================================================== [ 24.258893] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 24.258966] Read of size 1 at addr fff00000c59ef473 by task kunit_try_catch/196 [ 24.259027] [ 24.259067] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 24.259166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.259198] Hardware name: linux,dummy-virt (DT) [ 24.259238] Call trace: [ 24.259265] show_stack+0x20/0x38 (C) [ 24.259327] dump_stack_lvl+0x8c/0xd0 [ 24.259658] print_report+0x118/0x608 [ 24.259960] kasan_report+0xdc/0x128 [ 24.260082] __asan_report_load1_noabort+0x20/0x30 [ 24.260296] ksize_unpoisons_memory+0x628/0x740 [ 24.260768] kunit_try_run_case+0x170/0x3f0 [ 24.260913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.261151] kthread+0x328/0x630 [ 24.261412] ret_from_fork+0x10/0x20 [ 24.261547] [ 24.262054] Allocated by task 196: [ 24.262136] kasan_save_stack+0x3c/0x68 [ 24.262348] kasan_save_track+0x20/0x40 [ 24.262483] kasan_save_alloc_info+0x40/0x58 [ 24.262849] __kasan_kmalloc+0xd4/0xd8 [ 24.263489] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.263763] ksize_unpoisons_memory+0xc0/0x740 [ 24.263932] kunit_try_run_case+0x170/0x3f0 [ 24.264248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.264515] kthread+0x328/0x630 [ 24.265013] ret_from_fork+0x10/0x20 [ 24.265114] [ 24.265165] The buggy address belongs to the object at fff00000c59ef400 [ 24.265165] which belongs to the cache kmalloc-128 of size 128 [ 24.265527] The buggy address is located 0 bytes to the right of [ 24.265527] allocated 115-byte region [fff00000c59ef400, fff00000c59ef473) [ 24.266859] [ 24.266927] The buggy address belongs to the physical page: [ 24.267186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ef [ 24.267415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.267998] page_type: f5(slab) [ 24.268426] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.268873] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.269361] page dumped because: kasan: bad access detected [ 24.269487] [ 24.269553] Memory state around the buggy address: [ 24.269922] fff00000c59ef300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.270373] fff00000c59ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.270725] >fff00000c59ef400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.270885] ^ [ 24.271281] fff00000c59ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.271831] fff00000c59ef500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.272239] ================================================================== [ 24.296409] ================================================================== [ 24.296573] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 24.296773] Read of size 1 at addr fff00000c59ef47f by task kunit_try_catch/196 [ 24.296910] [ 24.297012] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 24.297827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.297927] Hardware name: linux,dummy-virt (DT) [ 24.298007] Call trace: [ 24.298064] show_stack+0x20/0x38 (C) [ 24.298192] dump_stack_lvl+0x8c/0xd0 [ 24.298323] print_report+0x118/0x608 [ 24.298460] kasan_report+0xdc/0x128 [ 24.299189] __asan_report_load1_noabort+0x20/0x30 [ 24.299918] ksize_unpoisons_memory+0x690/0x740 [ 24.300191] kunit_try_run_case+0x170/0x3f0 [ 24.300794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.301049] kthread+0x328/0x630 [ 24.301536] ret_from_fork+0x10/0x20 [ 24.302437] [ 24.302566] Allocated by task 196: [ 24.302735] kasan_save_stack+0x3c/0x68 [ 24.303325] kasan_save_track+0x20/0x40 [ 24.303616] kasan_save_alloc_info+0x40/0x58 [ 24.304270] __kasan_kmalloc+0xd4/0xd8 [ 24.304530] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.304644] ksize_unpoisons_memory+0xc0/0x740 [ 24.304751] kunit_try_run_case+0x170/0x3f0 [ 24.304846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.304955] kthread+0x328/0x630 [ 24.305039] ret_from_fork+0x10/0x20 [ 24.305131] [ 24.305226] The buggy address belongs to the object at fff00000c59ef400 [ 24.305226] which belongs to the cache kmalloc-128 of size 128 [ 24.305608] The buggy address is located 12 bytes to the right of [ 24.305608] allocated 115-byte region [fff00000c59ef400, fff00000c59ef473) [ 24.305911] [ 24.306053] The buggy address belongs to the physical page: [ 24.306101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ef [ 24.306171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.306312] page_type: f5(slab) [ 24.306441] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.306732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.306860] page dumped because: kasan: bad access detected [ 24.307391] [ 24.307487] Memory state around the buggy address: [ 24.307843] fff00000c59ef300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.308122] fff00000c59ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.308235] >fff00000c59ef400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.308330] ^ [ 24.308708] fff00000c59ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.309000] fff00000c59ef500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.309673] ==================================================================
[ 12.191990] ================================================================== [ 12.192789] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.193313] Read of size 1 at addr ffff888102d97673 by task kunit_try_catch/214 [ 12.193973] [ 12.194141] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 12.194200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.194212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.194236] Call Trace: [ 12.194252] <TASK> [ 12.194274] dump_stack_lvl+0x73/0xb0 [ 12.194311] print_report+0xd1/0x650 [ 12.194335] ? __virt_addr_valid+0x1db/0x2d0 [ 12.194358] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.194377] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.194398] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.194417] kasan_report+0x141/0x180 [ 12.194438] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.194460] __asan_report_load1_noabort+0x18/0x20 [ 12.194479] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.194498] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.194516] ? finish_task_switch.isra.0+0x153/0x700 [ 12.194542] ? __switch_to+0x5d9/0xf60 [ 12.194572] ? dequeue_task_fair+0x166/0x4e0 [ 12.194606] ? __schedule+0x10cc/0x2b60 [ 12.194657] ? __pfx_read_tsc+0x10/0x10 [ 12.194691] ? ktime_get_ts64+0x86/0x230 [ 12.194733] kunit_try_run_case+0x1a5/0x480 [ 12.194776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.194812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.194857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.194900] ? __kthread_parkme+0x82/0x180 [ 12.194942] ? preempt_count_sub+0x50/0x80 [ 12.194989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.195026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.195058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.195088] kthread+0x337/0x6f0 [ 12.195113] ? trace_preempt_on+0x20/0xc0 [ 12.195150] ? __pfx_kthread+0x10/0x10 [ 12.195255] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.195305] ? calculate_sigpending+0x7b/0xa0 [ 12.195346] ? __pfx_kthread+0x10/0x10 [ 12.195382] ret_from_fork+0x41/0x80 [ 12.195422] ? __pfx_kthread+0x10/0x10 [ 12.195457] ret_from_fork_asm+0x1a/0x30 [ 12.195519] </TASK> [ 12.195543] [ 12.208688] Allocated by task 214: [ 12.209034] kasan_save_stack+0x45/0x70 [ 12.209765] kasan_save_track+0x18/0x40 [ 12.209966] kasan_save_alloc_info+0x3b/0x50 [ 12.210121] __kasan_kmalloc+0xb7/0xc0 [ 12.210363] __kmalloc_cache_noprof+0x189/0x420 [ 12.210701] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.211655] kunit_try_run_case+0x1a5/0x480 [ 12.211878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.212045] kthread+0x337/0x6f0 [ 12.212281] ret_from_fork+0x41/0x80 [ 12.213105] ret_from_fork_asm+0x1a/0x30 [ 12.213411] [ 12.213520] The buggy address belongs to the object at ffff888102d97600 [ 12.213520] which belongs to the cache kmalloc-128 of size 128 [ 12.214054] The buggy address is located 0 bytes to the right of [ 12.214054] allocated 115-byte region [ffff888102d97600, ffff888102d97673) [ 12.215375] [ 12.215492] The buggy address belongs to the physical page: [ 12.215714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d97 [ 12.216516] flags: 0x200000000000000(node=0|zone=2) [ 12.216734] page_type: f5(slab) [ 12.217185] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.217802] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.218271] page dumped because: kasan: bad access detected [ 12.218799] [ 12.218916] Memory state around the buggy address: [ 12.219348] ffff888102d97500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.219912] ffff888102d97580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.220493] >ffff888102d97600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.220892] ^ [ 12.221578] ffff888102d97680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.221971] ffff888102d97700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.222438] ================================================================== [ 12.223919] ================================================================== [ 12.224308] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.224871] Read of size 1 at addr ffff888102d97678 by task kunit_try_catch/214 [ 12.225091] [ 12.225232] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 12.225353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.225378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.225418] Call Trace: [ 12.225446] <TASK> [ 12.225476] dump_stack_lvl+0x73/0xb0 [ 12.225521] print_report+0xd1/0x650 [ 12.225580] ? __virt_addr_valid+0x1db/0x2d0 [ 12.225621] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.225669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.225724] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.225753] kasan_report+0x141/0x180 [ 12.225783] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.225815] __asan_report_load1_noabort+0x18/0x20 [ 12.225842] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.225868] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.225893] ? finish_task_switch.isra.0+0x153/0x700 [ 12.225925] ? __switch_to+0x5d9/0xf60 [ 12.225964] ? dequeue_task_fair+0x166/0x4e0 [ 12.226000] ? __schedule+0x10cc/0x2b60 [ 12.226035] ? __pfx_read_tsc+0x10/0x10 [ 12.226064] ? ktime_get_ts64+0x86/0x230 [ 12.226101] kunit_try_run_case+0x1a5/0x480 [ 12.226138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.226169] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.226204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.226237] ? __kthread_parkme+0x82/0x180 [ 12.226270] ? preempt_count_sub+0x50/0x80 [ 12.226327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.226370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.226407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.226470] kthread+0x337/0x6f0 [ 12.226516] ? trace_preempt_on+0x20/0xc0 [ 12.226584] ? __pfx_kthread+0x10/0x10 [ 12.226616] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.226684] ? calculate_sigpending+0x7b/0xa0 [ 12.226732] ? __pfx_kthread+0x10/0x10 [ 12.226777] ret_from_fork+0x41/0x80 [ 12.226826] ? __pfx_kthread+0x10/0x10 [ 12.226868] ret_from_fork_asm+0x1a/0x30 [ 12.226918] </TASK> [ 12.226941] [ 12.239972] Allocated by task 214: [ 12.240267] kasan_save_stack+0x45/0x70 [ 12.240702] kasan_save_track+0x18/0x40 [ 12.240882] kasan_save_alloc_info+0x3b/0x50 [ 12.241152] __kasan_kmalloc+0xb7/0xc0 [ 12.241835] __kmalloc_cache_noprof+0x189/0x420 [ 12.242176] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.242377] kunit_try_run_case+0x1a5/0x480 [ 12.243059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.243514] kthread+0x337/0x6f0 [ 12.244649] ret_from_fork+0x41/0x80 [ 12.244808] ret_from_fork_asm+0x1a/0x30 [ 12.245043] [ 12.245192] The buggy address belongs to the object at ffff888102d97600 [ 12.245192] which belongs to the cache kmalloc-128 of size 128 [ 12.246155] The buggy address is located 5 bytes to the right of [ 12.246155] allocated 115-byte region [ffff888102d97600, ffff888102d97673) [ 12.246987] [ 12.247154] The buggy address belongs to the physical page: [ 12.247585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d97 [ 12.248012] flags: 0x200000000000000(node=0|zone=2) [ 12.248410] page_type: f5(slab) [ 12.249251] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.249653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.250434] page dumped because: kasan: bad access detected [ 12.250802] [ 12.250981] Memory state around the buggy address: [ 12.251209] ffff888102d97500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.251886] ffff888102d97580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.252279] >ffff888102d97600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.252803] ^ [ 12.253139] ffff888102d97680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.254198] ffff888102d97700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.255091] ================================================================== [ 12.256282] ================================================================== [ 12.257074] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.257794] Read of size 1 at addr ffff888102d9767f by task kunit_try_catch/214 [ 12.258239] [ 12.258469] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 12.258563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.258587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.258639] Call Trace: [ 12.258679] <TASK> [ 12.258710] dump_stack_lvl+0x73/0xb0 [ 12.258754] print_report+0xd1/0x650 [ 12.258780] ? __virt_addr_valid+0x1db/0x2d0 [ 12.258812] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.258836] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.258857] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.258876] kasan_report+0x141/0x180 [ 12.258897] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.258919] __asan_report_load1_noabort+0x18/0x20 [ 12.258938] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.258957] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.258975] ? finish_task_switch.isra.0+0x153/0x700 [ 12.258998] ? __switch_to+0x5d9/0xf60 [ 12.259017] ? dequeue_task_fair+0x166/0x4e0 [ 12.259040] ? __schedule+0x10cc/0x2b60 [ 12.259063] ? __pfx_read_tsc+0x10/0x10 [ 12.259082] ? ktime_get_ts64+0x86/0x230 [ 12.259105] kunit_try_run_case+0x1a5/0x480 [ 12.259129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.259149] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.259172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.259193] ? __kthread_parkme+0x82/0x180 [ 12.259214] ? preempt_count_sub+0x50/0x80 [ 12.259236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.259258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.259279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.259300] kthread+0x337/0x6f0 [ 12.259316] ? trace_preempt_on+0x20/0xc0 [ 12.259339] ? __pfx_kthread+0x10/0x10 [ 12.259355] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.259375] ? calculate_sigpending+0x7b/0xa0 [ 12.259395] ? __pfx_kthread+0x10/0x10 [ 12.259412] ret_from_fork+0x41/0x80 [ 12.259431] ? __pfx_kthread+0x10/0x10 [ 12.259448] ret_from_fork_asm+0x1a/0x30 [ 12.259477] </TASK> [ 12.259489] [ 12.271827] Allocated by task 214: [ 12.272134] kasan_save_stack+0x45/0x70 [ 12.272599] kasan_save_track+0x18/0x40 [ 12.272792] kasan_save_alloc_info+0x3b/0x50 [ 12.273060] __kasan_kmalloc+0xb7/0xc0 [ 12.273875] __kmalloc_cache_noprof+0x189/0x420 [ 12.274168] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.274586] kunit_try_run_case+0x1a5/0x480 [ 12.274934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.275402] kthread+0x337/0x6f0 [ 12.275613] ret_from_fork+0x41/0x80 [ 12.275910] ret_from_fork_asm+0x1a/0x30 [ 12.276141] [ 12.276289] The buggy address belongs to the object at ffff888102d97600 [ 12.276289] which belongs to the cache kmalloc-128 of size 128 [ 12.276970] The buggy address is located 12 bytes to the right of [ 12.276970] allocated 115-byte region [ffff888102d97600, ffff888102d97673) [ 12.277564] [ 12.277817] The buggy address belongs to the physical page: [ 12.278394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d97 [ 12.278699] flags: 0x200000000000000(node=0|zone=2) [ 12.278913] page_type: f5(slab) [ 12.279497] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.280534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.280905] page dumped because: kasan: bad access detected [ 12.281182] [ 12.281370] Memory state around the buggy address: [ 12.281866] ffff888102d97500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.282140] ffff888102d97580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.282666] >ffff888102d97600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.282892] ^ [ 12.283908] ffff888102d97680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.284225] ffff888102d97700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.284611] ==================================================================