Date
June 23, 2025, 1:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 25.087382] ================================================================== [ 25.087512] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 25.087633] Read of size 1 at addr fff00000c76cf37f by task kunit_try_catch/196 [ 25.087748] [ 25.087829] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 25.088024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.088095] Hardware name: linux,dummy-virt (DT) [ 25.088188] Call trace: [ 25.088262] show_stack+0x20/0x38 (C) [ 25.088865] dump_stack_lvl+0x8c/0xd0 [ 25.089077] print_report+0x118/0x608 [ 25.089384] kasan_report+0xdc/0x128 [ 25.089717] __asan_report_load1_noabort+0x20/0x30 [ 25.089847] ksize_unpoisons_memory+0x690/0x740 [ 25.089975] kunit_try_run_case+0x170/0x3f0 [ 25.090109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.090353] kthread+0x328/0x630 [ 25.090505] ret_from_fork+0x10/0x20 [ 25.090653] [ 25.090705] Allocated by task 196: [ 25.090810] kasan_save_stack+0x3c/0x68 [ 25.091546] kasan_save_track+0x20/0x40 [ 25.091878] kasan_save_alloc_info+0x40/0x58 [ 25.091985] __kasan_kmalloc+0xd4/0xd8 [ 25.092094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.092199] ksize_unpoisons_memory+0xc0/0x740 [ 25.092652] kunit_try_run_case+0x170/0x3f0 [ 25.092874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.093093] kthread+0x328/0x630 [ 25.093345] ret_from_fork+0x10/0x20 [ 25.093495] [ 25.093556] The buggy address belongs to the object at fff00000c76cf300 [ 25.093556] which belongs to the cache kmalloc-128 of size 128 [ 25.093979] The buggy address is located 12 bytes to the right of [ 25.093979] allocated 115-byte region [fff00000c76cf300, fff00000c76cf373) [ 25.094168] [ 25.094273] The buggy address belongs to the physical page: [ 25.094353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cf [ 25.094525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.094666] page_type: f5(slab) [ 25.095148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.095532] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.095642] page dumped because: kasan: bad access detected [ 25.095731] [ 25.095783] Memory state around the buggy address: [ 25.096058] fff00000c76cf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.096154] fff00000c76cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.096251] >fff00000c76cf300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.096385] ^ [ 25.096588] fff00000c76cf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.096729] fff00000c76cf400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.096825] ================================================================== [ 25.054271] ================================================================== [ 25.054530] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 25.054759] Read of size 1 at addr fff00000c76cf373 by task kunit_try_catch/196 [ 25.054883] [ 25.054971] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 25.055189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.055381] Hardware name: linux,dummy-virt (DT) [ 25.055592] Call trace: [ 25.057426] show_stack+0x20/0x38 (C) [ 25.057589] dump_stack_lvl+0x8c/0xd0 [ 25.058609] print_report+0x118/0x608 [ 25.058752] kasan_report+0xdc/0x128 [ 25.058877] __asan_report_load1_noabort+0x20/0x30 [ 25.059076] ksize_unpoisons_memory+0x628/0x740 [ 25.059476] kunit_try_run_case+0x170/0x3f0 [ 25.059831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.060102] kthread+0x328/0x630 [ 25.060257] ret_from_fork+0x10/0x20 [ 25.060588] [ 25.060635] Allocated by task 196: [ 25.060706] kasan_save_stack+0x3c/0x68 [ 25.061946] kasan_save_track+0x20/0x40 [ 25.062080] kasan_save_alloc_info+0x40/0x58 [ 25.062245] __kasan_kmalloc+0xd4/0xd8 [ 25.062499] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.062654] ksize_unpoisons_memory+0xc0/0x740 [ 25.062772] kunit_try_run_case+0x170/0x3f0 [ 25.062967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.063118] kthread+0x328/0x630 [ 25.063216] ret_from_fork+0x10/0x20 [ 25.063414] [ 25.063469] The buggy address belongs to the object at fff00000c76cf300 [ 25.063469] which belongs to the cache kmalloc-128 of size 128 [ 25.063748] The buggy address is located 0 bytes to the right of [ 25.063748] allocated 115-byte region [fff00000c76cf300, fff00000c76cf373) [ 25.064072] [ 25.064123] The buggy address belongs to the physical page: [ 25.064197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cf [ 25.064403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.064561] page_type: f5(slab) [ 25.064687] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.064896] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.065134] page dumped because: kasan: bad access detected [ 25.065251] [ 25.065378] Memory state around the buggy address: [ 25.065764] fff00000c76cf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.065888] fff00000c76cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.066002] >fff00000c76cf300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.066164] ^ [ 25.066373] fff00000c76cf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.066648] fff00000c76cf400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.066752] ================================================================== [ 25.068478] ================================================================== [ 25.068580] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 25.068693] Read of size 1 at addr fff00000c76cf378 by task kunit_try_catch/196 [ 25.068810] [ 25.068888] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 25.069074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.069142] Hardware name: linux,dummy-virt (DT) [ 25.069229] Call trace: [ 25.069285] show_stack+0x20/0x38 (C) [ 25.069421] dump_stack_lvl+0x8c/0xd0 [ 25.069547] print_report+0x118/0x608 [ 25.070627] kasan_report+0xdc/0x128 [ 25.071553] __asan_report_load1_noabort+0x20/0x30 [ 25.071788] ksize_unpoisons_memory+0x618/0x740 [ 25.071966] kunit_try_run_case+0x170/0x3f0 [ 25.072095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.072361] kthread+0x328/0x630 [ 25.072645] ret_from_fork+0x10/0x20 [ 25.072872] [ 25.072918] Allocated by task 196: [ 25.073266] kasan_save_stack+0x3c/0x68 [ 25.073404] kasan_save_track+0x20/0x40 [ 25.073532] kasan_save_alloc_info+0x40/0x58 [ 25.073893] __kasan_kmalloc+0xd4/0xd8 [ 25.074093] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.074247] ksize_unpoisons_memory+0xc0/0x740 [ 25.074457] kunit_try_run_case+0x170/0x3f0 [ 25.074597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.074725] kthread+0x328/0x630 [ 25.074821] ret_from_fork+0x10/0x20 [ 25.075174] [ 25.075552] The buggy address belongs to the object at fff00000c76cf300 [ 25.075552] which belongs to the cache kmalloc-128 of size 128 [ 25.075790] The buggy address is located 5 bytes to the right of [ 25.075790] allocated 115-byte region [fff00000c76cf300, fff00000c76cf373) [ 25.076043] [ 25.076105] The buggy address belongs to the physical page: [ 25.076226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cf [ 25.076797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.077113] page_type: f5(slab) [ 25.077443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.077890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.078144] page dumped because: kasan: bad access detected [ 25.078538] [ 25.078784] Memory state around the buggy address: [ 25.079113] fff00000c76cf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.079341] fff00000c76cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.080383] >fff00000c76cf300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.080541] ^ [ 25.081753] fff00000c76cf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.081949] fff00000c76cf400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.082835] ==================================================================
[ 17.922815] ================================================================== [ 17.923467] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.924154] Read of size 1 at addr ffff888102a13378 by task kunit_try_catch/215 [ 17.925084] [ 17.925442] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 17.925563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.925596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.925671] Call Trace: [ 17.925710] <TASK> [ 17.925765] dump_stack_lvl+0x73/0xb0 [ 17.925839] print_report+0xd1/0x650 [ 17.925908] ? __virt_addr_valid+0x1db/0x2d0 [ 17.925981] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.926020] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.926057] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.926087] kasan_report+0x141/0x180 [ 17.926122] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.926157] __asan_report_load1_noabort+0x18/0x20 [ 17.926187] ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.926238] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.926288] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.926335] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.926370] kunit_try_run_case+0x1a5/0x480 [ 17.926408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.926442] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.926478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.926512] ? __kthread_parkme+0x82/0x180 [ 17.926544] ? preempt_count_sub+0x50/0x80 [ 17.926582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.926642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.926681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.926716] kthread+0x337/0x6f0 [ 17.926741] ? trace_preempt_on+0x20/0xc0 [ 17.926776] ? __pfx_kthread+0x10/0x10 [ 17.926802] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.926834] ? calculate_sigpending+0x7b/0xa0 [ 17.926867] ? __pfx_kthread+0x10/0x10 [ 17.926894] ret_from_fork+0x41/0x80 [ 17.926924] ? __pfx_kthread+0x10/0x10 [ 17.926949] ret_from_fork_asm+0x1a/0x30 [ 17.926991] </TASK> [ 17.927004] [ 17.944152] Allocated by task 215: [ 17.944476] kasan_save_stack+0x45/0x70 [ 17.944918] kasan_save_track+0x18/0x40 [ 17.945395] kasan_save_alloc_info+0x3b/0x50 [ 17.945789] __kasan_kmalloc+0xb7/0xc0 [ 17.946203] __kmalloc_cache_noprof+0x189/0x420 [ 17.946683] ksize_unpoisons_memory+0xc7/0x9b0 [ 17.947016] kunit_try_run_case+0x1a5/0x480 [ 17.947961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.948741] kthread+0x337/0x6f0 [ 17.949197] ret_from_fork+0x41/0x80 [ 17.949663] ret_from_fork_asm+0x1a/0x30 [ 17.950019] [ 17.950254] The buggy address belongs to the object at ffff888102a13300 [ 17.950254] which belongs to the cache kmalloc-128 of size 128 [ 17.951240] The buggy address is located 5 bytes to the right of [ 17.951240] allocated 115-byte region [ffff888102a13300, ffff888102a13373) [ 17.952862] [ 17.953044] The buggy address belongs to the physical page: [ 17.953822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a13 [ 17.954504] flags: 0x200000000000000(node=0|zone=2) [ 17.955174] page_type: f5(slab) [ 17.955804] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.956644] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.957695] page dumped because: kasan: bad access detected [ 17.957906] [ 17.957993] Memory state around the buggy address: [ 17.958161] ffff888102a13200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.959283] ffff888102a13280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.960137] >ffff888102a13300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.960886] ^ [ 17.961644] ffff888102a13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.962359] ffff888102a13400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.963075] ================================================================== [ 17.881151] ================================================================== [ 17.882219] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 17.882921] Read of size 1 at addr ffff888102a13373 by task kunit_try_catch/215 [ 17.883925] [ 17.884462] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 17.884621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.884660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.884715] Call Trace: [ 17.884752] <TASK> [ 17.884798] dump_stack_lvl+0x73/0xb0 [ 17.884877] print_report+0xd1/0x650 [ 17.884951] ? __virt_addr_valid+0x1db/0x2d0 [ 17.885022] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 17.885084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.885123] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 17.885153] kasan_report+0x141/0x180 [ 17.885188] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 17.885250] __asan_report_load1_noabort+0x18/0x20 [ 17.885292] ksize_unpoisons_memory+0x81c/0x9b0 [ 17.885323] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.885351] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.885399] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.885433] kunit_try_run_case+0x1a5/0x480 [ 17.885472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.885505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.885541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.885576] ? __kthread_parkme+0x82/0x180 [ 17.885632] ? preempt_count_sub+0x50/0x80 [ 17.885675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.885712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.885746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.885796] kthread+0x337/0x6f0 [ 17.885820] ? trace_preempt_on+0x20/0xc0 [ 17.885857] ? __pfx_kthread+0x10/0x10 [ 17.885883] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.885914] ? calculate_sigpending+0x7b/0xa0 [ 17.885946] ? __pfx_kthread+0x10/0x10 [ 17.885973] ret_from_fork+0x41/0x80 [ 17.886005] ? __pfx_kthread+0x10/0x10 [ 17.886031] ret_from_fork_asm+0x1a/0x30 [ 17.886075] </TASK> [ 17.886089] [ 17.903252] Allocated by task 215: [ 17.903690] kasan_save_stack+0x45/0x70 [ 17.904090] kasan_save_track+0x18/0x40 [ 17.904458] kasan_save_alloc_info+0x3b/0x50 [ 17.904908] __kasan_kmalloc+0xb7/0xc0 [ 17.905330] __kmalloc_cache_noprof+0x189/0x420 [ 17.905788] ksize_unpoisons_memory+0xc7/0x9b0 [ 17.906256] kunit_try_run_case+0x1a5/0x480 [ 17.906663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.907137] kthread+0x337/0x6f0 [ 17.907463] ret_from_fork+0x41/0x80 [ 17.907777] ret_from_fork_asm+0x1a/0x30 [ 17.908092] [ 17.908327] The buggy address belongs to the object at ffff888102a13300 [ 17.908327] which belongs to the cache kmalloc-128 of size 128 [ 17.909340] The buggy address is located 0 bytes to the right of [ 17.909340] allocated 115-byte region [ffff888102a13300, ffff888102a13373) [ 17.910415] [ 17.910601] The buggy address belongs to the physical page: [ 17.911123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a13 [ 17.911781] flags: 0x200000000000000(node=0|zone=2) [ 17.912135] page_type: f5(slab) [ 17.912484] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.913145] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.913838] page dumped because: kasan: bad access detected [ 17.914391] [ 17.914633] Memory state around the buggy address: [ 17.915075] ffff888102a13200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.915735] ffff888102a13280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.917085] >ffff888102a13300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.918020] ^ [ 17.918711] ffff888102a13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.919232] ffff888102a13400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.919829] ================================================================== [ 17.965861] ================================================================== [ 17.966625] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.967191] Read of size 1 at addr ffff888102a1337f by task kunit_try_catch/215 [ 17.967778] [ 17.968073] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 17.968193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.968228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.968283] Call Trace: [ 17.968319] <TASK> [ 17.968361] dump_stack_lvl+0x73/0xb0 [ 17.968437] print_report+0xd1/0x650 [ 17.968508] ? __virt_addr_valid+0x1db/0x2d0 [ 17.968584] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.968669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.968746] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.968814] kasan_report+0x141/0x180 [ 17.968887] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.968967] __asan_report_load1_noabort+0x18/0x20 [ 17.969035] ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.969097] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.969129] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.969174] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.969211] kunit_try_run_case+0x1a5/0x480 [ 17.969276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.969314] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.969351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.969388] ? __kthread_parkme+0x82/0x180 [ 17.969420] ? preempt_count_sub+0x50/0x80 [ 17.969458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.969494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.969529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.969563] kthread+0x337/0x6f0 [ 17.969587] ? trace_preempt_on+0x20/0xc0 [ 17.969646] ? __pfx_kthread+0x10/0x10 [ 17.969674] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.969707] ? calculate_sigpending+0x7b/0xa0 [ 17.969740] ? __pfx_kthread+0x10/0x10 [ 17.969776] ret_from_fork+0x41/0x80 [ 17.969808] ? __pfx_kthread+0x10/0x10 [ 17.969834] ret_from_fork_asm+0x1a/0x30 [ 17.969876] </TASK> [ 17.969890] [ 17.984180] Allocated by task 215: [ 17.984589] kasan_save_stack+0x45/0x70 [ 17.985074] kasan_save_track+0x18/0x40 [ 17.985504] kasan_save_alloc_info+0x3b/0x50 [ 17.986049] __kasan_kmalloc+0xb7/0xc0 [ 17.986364] __kmalloc_cache_noprof+0x189/0x420 [ 17.987062] ksize_unpoisons_memory+0xc7/0x9b0 [ 17.987572] kunit_try_run_case+0x1a5/0x480 [ 17.987934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.988645] kthread+0x337/0x6f0 [ 17.989025] ret_from_fork+0x41/0x80 [ 17.989472] ret_from_fork_asm+0x1a/0x30 [ 17.990642] [ 17.990895] The buggy address belongs to the object at ffff888102a13300 [ 17.990895] which belongs to the cache kmalloc-128 of size 128 [ 17.992012] The buggy address is located 12 bytes to the right of [ 17.992012] allocated 115-byte region [ffff888102a13300, ffff888102a13373) [ 17.993018] [ 17.993290] The buggy address belongs to the physical page: [ 17.993782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a13 [ 17.994442] flags: 0x200000000000000(node=0|zone=2) [ 17.994915] page_type: f5(slab) [ 17.995278] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.995980] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.996678] page dumped because: kasan: bad access detected [ 17.997104] [ 17.997309] Memory state around the buggy address: [ 17.997834] ffff888102a13200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.998495] ffff888102a13280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.999110] >ffff888102a13300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.999841] ^ [ 18.000460] ffff888102a13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.001048] ffff888102a13400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.001961] ==================================================================