Date
July 15, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.118598] ================================================================== [ 18.118682] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.118736] Read of size 1 at addr fff00000c59e4278 by task kunit_try_catch/196 [ 18.118936] [ 18.119023] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.119120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.119251] Hardware name: linux,dummy-virt (DT) [ 18.119370] Call trace: [ 18.119397] show_stack+0x20/0x38 (C) [ 18.119474] dump_stack_lvl+0x8c/0xd0 [ 18.119583] print_report+0x118/0x5d0 [ 18.119641] kasan_report+0xdc/0x128 [ 18.119687] __asan_report_load1_noabort+0x20/0x30 [ 18.119756] ksize_unpoisons_memory+0x618/0x740 [ 18.119810] kunit_try_run_case+0x170/0x3f0 [ 18.120201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.120295] kthread+0x328/0x630 [ 18.120404] ret_from_fork+0x10/0x20 [ 18.120500] [ 18.120539] Allocated by task 196: [ 18.120764] kasan_save_stack+0x3c/0x68 [ 18.121012] kasan_save_track+0x20/0x40 [ 18.121085] kasan_save_alloc_info+0x40/0x58 [ 18.121138] __kasan_kmalloc+0xd4/0xd8 [ 18.121175] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.121383] ksize_unpoisons_memory+0xc0/0x740 [ 18.121543] kunit_try_run_case+0x170/0x3f0 [ 18.121589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.122104] kthread+0x328/0x630 [ 18.122221] ret_from_fork+0x10/0x20 [ 18.122308] [ 18.122327] The buggy address belongs to the object at fff00000c59e4200 [ 18.122327] which belongs to the cache kmalloc-128 of size 128 [ 18.122718] The buggy address is located 5 bytes to the right of [ 18.122718] allocated 115-byte region [fff00000c59e4200, fff00000c59e4273) [ 18.122923] [ 18.122982] The buggy address belongs to the physical page: [ 18.123116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 18.123192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.123427] page_type: f5(slab) [ 18.123530] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.123596] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.123772] page dumped because: kasan: bad access detected [ 18.123806] [ 18.123825] Memory state around the buggy address: [ 18.123858] fff00000c59e4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.123903] fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.123949] >fff00000c59e4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.124000] ^ [ 18.124042] fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124094] fff00000c59e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124144] ================================================================== [ 18.110283] ================================================================== [ 18.110508] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.110712] Read of size 1 at addr fff00000c59e4273 by task kunit_try_catch/196 [ 18.110779] [ 18.110987] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.111086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.111114] Hardware name: linux,dummy-virt (DT) [ 18.111150] Call trace: [ 18.111468] show_stack+0x20/0x38 (C) [ 18.111554] dump_stack_lvl+0x8c/0xd0 [ 18.111767] print_report+0x118/0x5d0 [ 18.111924] kasan_report+0xdc/0x128 [ 18.112009] __asan_report_load1_noabort+0x20/0x30 [ 18.112062] ksize_unpoisons_memory+0x628/0x740 [ 18.112164] kunit_try_run_case+0x170/0x3f0 [ 18.112249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.112473] kthread+0x328/0x630 [ 18.112537] ret_from_fork+0x10/0x20 [ 18.112794] [ 18.112827] Allocated by task 196: [ 18.112874] kasan_save_stack+0x3c/0x68 [ 18.112972] kasan_save_track+0x20/0x40 [ 18.113008] kasan_save_alloc_info+0x40/0x58 [ 18.113248] __kasan_kmalloc+0xd4/0xd8 [ 18.113302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.113553] ksize_unpoisons_memory+0xc0/0x740 [ 18.113729] kunit_try_run_case+0x170/0x3f0 [ 18.113850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.113984] kthread+0x328/0x630 [ 18.114043] ret_from_fork+0x10/0x20 [ 18.114100] [ 18.114119] The buggy address belongs to the object at fff00000c59e4200 [ 18.114119] which belongs to the cache kmalloc-128 of size 128 [ 18.114181] The buggy address is located 0 bytes to the right of [ 18.114181] allocated 115-byte region [fff00000c59e4200, fff00000c59e4273) [ 18.114572] [ 18.114627] The buggy address belongs to the physical page: [ 18.114664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 18.115148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.115272] page_type: f5(slab) [ 18.115359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.115466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.115589] page dumped because: kasan: bad access detected [ 18.115642] [ 18.115716] Memory state around the buggy address: [ 18.115882] fff00000c59e4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.115987] fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116180] >fff00000c59e4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.116352] ^ [ 18.116533] fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116582] fff00000c59e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116805] ================================================================== [ 18.125049] ================================================================== [ 18.125284] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.125359] Read of size 1 at addr fff00000c59e427f by task kunit_try_catch/196 [ 18.125693] [ 18.125748] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.125866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.126013] Hardware name: linux,dummy-virt (DT) [ 18.126078] Call trace: [ 18.126099] show_stack+0x20/0x38 (C) [ 18.126367] dump_stack_lvl+0x8c/0xd0 [ 18.126541] print_report+0x118/0x5d0 [ 18.126703] kasan_report+0xdc/0x128 [ 18.126802] __asan_report_load1_noabort+0x20/0x30 [ 18.126956] ksize_unpoisons_memory+0x690/0x740 [ 18.127097] kunit_try_run_case+0x170/0x3f0 [ 18.127167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.127572] kthread+0x328/0x630 [ 18.127754] ret_from_fork+0x10/0x20 [ 18.127882] [ 18.128009] Allocated by task 196: [ 18.128036] kasan_save_stack+0x3c/0x68 [ 18.128262] kasan_save_track+0x20/0x40 [ 18.128516] kasan_save_alloc_info+0x40/0x58 [ 18.128596] __kasan_kmalloc+0xd4/0xd8 [ 18.128650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.129433] ksize_unpoisons_memory+0xc0/0x740 [ 18.129504] kunit_try_run_case+0x170/0x3f0 [ 18.129573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.129668] kthread+0x328/0x630 [ 18.129933] ret_from_fork+0x10/0x20 [ 18.130524] [ 18.130560] The buggy address belongs to the object at fff00000c59e4200 [ 18.130560] which belongs to the cache kmalloc-128 of size 128 [ 18.130954] The buggy address is located 12 bytes to the right of [ 18.130954] allocated 115-byte region [fff00000c59e4200, fff00000c59e4273) [ 18.131193] [ 18.131254] The buggy address belongs to the physical page: [ 18.131610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 18.131807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.132091] page_type: f5(slab) [ 18.132164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.132253] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.132305] page dumped because: kasan: bad access detected [ 18.132339] [ 18.132356] Memory state around the buggy address: [ 18.132389] fff00000c59e4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.132434] fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132481] >fff00000c59e4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.132527] ^ [ 18.132569] fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132624] fff00000c59e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132672] ==================================================================
[ 11.393109] ================================================================== [ 11.393566] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.393942] Read of size 1 at addr ffff888102f2ae73 by task kunit_try_catch/213 [ 11.394233] [ 11.394339] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 11.394382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.394393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.394411] Call Trace: [ 11.394422] <TASK> [ 11.394435] dump_stack_lvl+0x73/0xb0 [ 11.394458] print_report+0xd1/0x610 [ 11.394480] ? __virt_addr_valid+0x1db/0x2d0 [ 11.394500] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.394518] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.394539] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.394557] kasan_report+0x141/0x180 [ 11.394579] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.394603] __asan_report_load1_noabort+0x18/0x20 [ 11.394622] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.394641] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.394659] ? finish_task_switch.isra.0+0x153/0x700 [ 11.394680] ? __switch_to+0x5d9/0xf60 [ 11.394700] ? dequeue_task_fair+0x166/0x4e0 [ 11.394723] ? __schedule+0x10cc/0x2b60 [ 11.394745] ? __pfx_read_tsc+0x10/0x10 [ 11.394763] ? ktime_get_ts64+0x86/0x230 [ 11.394785] kunit_try_run_case+0x1a5/0x480 [ 11.394805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.394822] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.394845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.394867] ? __kthread_parkme+0x82/0x180 [ 11.394900] ? preempt_count_sub+0x50/0x80 [ 11.394922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.394941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.394962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.394984] kthread+0x337/0x6f0 [ 11.395000] ? trace_preempt_on+0x20/0xc0 [ 11.395022] ? __pfx_kthread+0x10/0x10 [ 11.395039] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.395059] ? calculate_sigpending+0x7b/0xa0 [ 11.395079] ? __pfx_kthread+0x10/0x10 [ 11.395096] ret_from_fork+0x41/0x80 [ 11.395117] ? __pfx_kthread+0x10/0x10 [ 11.395134] ret_from_fork_asm+0x1a/0x30 [ 11.395175] </TASK> [ 11.395185] [ 11.407318] Allocated by task 213: [ 11.407615] kasan_save_stack+0x45/0x70 [ 11.407973] kasan_save_track+0x18/0x40 [ 11.408318] kasan_save_alloc_info+0x3b/0x50 [ 11.408526] __kasan_kmalloc+0xb7/0xc0 [ 11.408869] __kmalloc_cache_noprof+0x189/0x420 [ 11.409138] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.409446] kunit_try_run_case+0x1a5/0x480 [ 11.409651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.410080] kthread+0x337/0x6f0 [ 11.410364] ret_from_fork+0x41/0x80 [ 11.410544] ret_from_fork_asm+0x1a/0x30 [ 11.410911] [ 11.411127] The buggy address belongs to the object at ffff888102f2ae00 [ 11.411127] which belongs to the cache kmalloc-128 of size 128 [ 11.411627] The buggy address is located 0 bytes to the right of [ 11.411627] allocated 115-byte region [ffff888102f2ae00, ffff888102f2ae73) [ 11.412616] [ 11.412722] The buggy address belongs to the physical page: [ 11.413116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f2a [ 11.413455] flags: 0x200000000000000(node=0|zone=2) [ 11.413670] page_type: f5(slab) [ 11.414142] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.414618] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.415125] page dumped because: kasan: bad access detected [ 11.415525] [ 11.415619] Memory state around the buggy address: [ 11.416080] ffff888102f2ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.416539] ffff888102f2ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.417138] >ffff888102f2ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.417619] ^ [ 11.418198] ffff888102f2ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.418495] ffff888102f2af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.419039] ================================================================== [ 11.438912] ================================================================== [ 11.439240] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.439569] Read of size 1 at addr ffff888102f2ae7f by task kunit_try_catch/213 [ 11.439873] [ 11.440011] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 11.440052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.440063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.440081] Call Trace: [ 11.440092] <TASK> [ 11.440105] dump_stack_lvl+0x73/0xb0 [ 11.440127] print_report+0xd1/0x610 [ 11.440147] ? __virt_addr_valid+0x1db/0x2d0 [ 11.440167] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.440184] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.440206] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.440225] kasan_report+0x141/0x180 [ 11.440246] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.440269] __asan_report_load1_noabort+0x18/0x20 [ 11.440289] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.440308] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.440326] ? finish_task_switch.isra.0+0x153/0x700 [ 11.440346] ? __switch_to+0x5d9/0xf60 [ 11.440365] ? dequeue_task_fair+0x166/0x4e0 [ 11.440387] ? __schedule+0x10cc/0x2b60 [ 11.440408] ? __pfx_read_tsc+0x10/0x10 [ 11.440427] ? ktime_get_ts64+0x86/0x230 [ 11.440450] kunit_try_run_case+0x1a5/0x480 [ 11.440487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.440505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.440528] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.440554] ? __kthread_parkme+0x82/0x180 [ 11.440574] ? preempt_count_sub+0x50/0x80 [ 11.440596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.440616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.440637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.440659] kthread+0x337/0x6f0 [ 11.440675] ? trace_preempt_on+0x20/0xc0 [ 11.440842] ? __pfx_kthread+0x10/0x10 [ 11.440869] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.440906] ? calculate_sigpending+0x7b/0xa0 [ 11.440926] ? __pfx_kthread+0x10/0x10 [ 11.440943] ret_from_fork+0x41/0x80 [ 11.440964] ? __pfx_kthread+0x10/0x10 [ 11.440981] ret_from_fork_asm+0x1a/0x30 [ 11.441011] </TASK> [ 11.441020] [ 11.448484] Allocated by task 213: [ 11.448668] kasan_save_stack+0x45/0x70 [ 11.448867] kasan_save_track+0x18/0x40 [ 11.449067] kasan_save_alloc_info+0x3b/0x50 [ 11.449281] __kasan_kmalloc+0xb7/0xc0 [ 11.449420] __kmalloc_cache_noprof+0x189/0x420 [ 11.449570] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.449747] kunit_try_run_case+0x1a5/0x480 [ 11.449956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.450203] kthread+0x337/0x6f0 [ 11.450366] ret_from_fork+0x41/0x80 [ 11.450791] ret_from_fork_asm+0x1a/0x30 [ 11.450980] [ 11.451075] The buggy address belongs to the object at ffff888102f2ae00 [ 11.451075] which belongs to the cache kmalloc-128 of size 128 [ 11.451443] The buggy address is located 12 bytes to the right of [ 11.451443] allocated 115-byte region [ffff888102f2ae00, ffff888102f2ae73) [ 11.452341] [ 11.452422] The buggy address belongs to the physical page: [ 11.452618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f2a [ 11.453051] flags: 0x200000000000000(node=0|zone=2) [ 11.453216] page_type: f5(slab) [ 11.453332] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.453673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.454192] page dumped because: kasan: bad access detected [ 11.454426] [ 11.454516] Memory state around the buggy address: [ 11.454684] ffff888102f2ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.455107] ffff888102f2ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.455383] >ffff888102f2ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.455636] ^ [ 11.456194] ffff888102f2ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.456418] ffff888102f2af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.456626] ================================================================== [ 11.420410] ================================================================== [ 11.420796] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.421233] Read of size 1 at addr ffff888102f2ae78 by task kunit_try_catch/213 [ 11.421535] [ 11.421638] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 11.421679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.421690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.421708] Call Trace: [ 11.421719] <TASK> [ 11.421733] dump_stack_lvl+0x73/0xb0 [ 11.421755] print_report+0xd1/0x610 [ 11.421777] ? __virt_addr_valid+0x1db/0x2d0 [ 11.421796] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.421815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.421837] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.421855] kasan_report+0x141/0x180 [ 11.421877] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.421912] __asan_report_load1_noabort+0x18/0x20 [ 11.421931] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.421951] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.421969] ? finish_task_switch.isra.0+0x153/0x700 [ 11.421990] ? __switch_to+0x5d9/0xf60 [ 11.422009] ? dequeue_task_fair+0x166/0x4e0 [ 11.422031] ? __schedule+0x10cc/0x2b60 [ 11.422053] ? __pfx_read_tsc+0x10/0x10 [ 11.422071] ? ktime_get_ts64+0x86/0x230 [ 11.422095] kunit_try_run_case+0x1a5/0x480 [ 11.422115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.422133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.422157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.422180] ? __kthread_parkme+0x82/0x180 [ 11.422200] ? preempt_count_sub+0x50/0x80 [ 11.422223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.422242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.422264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.422286] kthread+0x337/0x6f0 [ 11.422301] ? trace_preempt_on+0x20/0xc0 [ 11.422322] ? __pfx_kthread+0x10/0x10 [ 11.422339] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.422360] ? calculate_sigpending+0x7b/0xa0 [ 11.422379] ? __pfx_kthread+0x10/0x10 [ 11.422396] ret_from_fork+0x41/0x80 [ 11.422415] ? __pfx_kthread+0x10/0x10 [ 11.422432] ret_from_fork_asm+0x1a/0x30 [ 11.422461] </TASK> [ 11.422471] [ 11.430426] Allocated by task 213: [ 11.430575] kasan_save_stack+0x45/0x70 [ 11.430781] kasan_save_track+0x18/0x40 [ 11.431050] kasan_save_alloc_info+0x3b/0x50 [ 11.431265] __kasan_kmalloc+0xb7/0xc0 [ 11.431437] __kmalloc_cache_noprof+0x189/0x420 [ 11.431619] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.431876] kunit_try_run_case+0x1a5/0x480 [ 11.432058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.432264] kthread+0x337/0x6f0 [ 11.432430] ret_from_fork+0x41/0x80 [ 11.432613] ret_from_fork_asm+0x1a/0x30 [ 11.432949] [ 11.433025] The buggy address belongs to the object at ffff888102f2ae00 [ 11.433025] which belongs to the cache kmalloc-128 of size 128 [ 11.433387] The buggy address is located 5 bytes to the right of [ 11.433387] allocated 115-byte region [ffff888102f2ae00, ffff888102f2ae73) [ 11.433931] [ 11.434071] The buggy address belongs to the physical page: [ 11.434315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f2a [ 11.434590] flags: 0x200000000000000(node=0|zone=2) [ 11.434748] page_type: f5(slab) [ 11.435038] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.435642] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.436030] page dumped because: kasan: bad access detected [ 11.436223] [ 11.436315] Memory state around the buggy address: [ 11.436521] ffff888102f2ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.436966] ffff888102f2ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.437194] >ffff888102f2ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.437482] ^ [ 11.437788] ffff888102f2ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.438270] ffff888102f2af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.438544] ==================================================================