Date
July 22, 2025, 2:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.422777] ================================================================== [ 17.422936] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 17.423263] Read of size 1 at addr fff00000c6fb0973 by task kunit_try_catch/196 [ 17.423626] [ 17.423672] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 17.424107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.424172] Hardware name: linux,dummy-virt (DT) [ 17.424330] Call trace: [ 17.424385] show_stack+0x20/0x38 (C) [ 17.424633] dump_stack_lvl+0x8c/0xd0 [ 17.424894] print_report+0x118/0x5d0 [ 17.424970] kasan_report+0xdc/0x128 [ 17.425360] __asan_report_load1_noabort+0x20/0x30 [ 17.425426] ksize_unpoisons_memory+0x628/0x740 [ 17.425932] kunit_try_run_case+0x170/0x3f0 [ 17.426019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.426074] kthread+0x328/0x630 [ 17.426303] ret_from_fork+0x10/0x20 [ 17.426564] [ 17.426588] Allocated by task 196: [ 17.426636] kasan_save_stack+0x3c/0x68 [ 17.426826] kasan_save_track+0x20/0x40 [ 17.426905] kasan_save_alloc_info+0x40/0x58 [ 17.427026] __kasan_kmalloc+0xd4/0xd8 [ 17.427153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.427222] ksize_unpoisons_memory+0xc0/0x740 [ 17.427269] kunit_try_run_case+0x170/0x3f0 [ 17.427655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.427774] kthread+0x328/0x630 [ 17.427843] ret_from_fork+0x10/0x20 [ 17.427942] [ 17.427963] The buggy address belongs to the object at fff00000c6fb0900 [ 17.427963] which belongs to the cache kmalloc-128 of size 128 [ 17.428261] The buggy address is located 0 bytes to the right of [ 17.428261] allocated 115-byte region [fff00000c6fb0900, fff00000c6fb0973) [ 17.428678] [ 17.428729] The buggy address belongs to the physical page: [ 17.428901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0 [ 17.429000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.429337] page_type: f5(slab) [ 17.429581] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.429697] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.429801] page dumped because: kasan: bad access detected [ 17.429865] [ 17.429896] Memory state around the buggy address: [ 17.430008] fff00000c6fb0800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.430086] fff00000c6fb0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430604] >fff00000c6fb0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.430691] ^ [ 17.430736] fff00000c6fb0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430806] fff00000c6fb0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430844] ================================================================== [ 17.432853] ================================================================== [ 17.433113] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 17.433296] Read of size 1 at addr fff00000c6fb0978 by task kunit_try_catch/196 [ 17.433356] [ 17.433691] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 17.433829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.433889] Hardware name: linux,dummy-virt (DT) [ 17.433938] Call trace: [ 17.433967] show_stack+0x20/0x38 (C) [ 17.434126] dump_stack_lvl+0x8c/0xd0 [ 17.434200] print_report+0x118/0x5d0 [ 17.434317] kasan_report+0xdc/0x128 [ 17.434550] __asan_report_load1_noabort+0x20/0x30 [ 17.434788] ksize_unpoisons_memory+0x618/0x740 [ 17.434945] kunit_try_run_case+0x170/0x3f0 [ 17.435029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.435156] kthread+0x328/0x630 [ 17.435243] ret_from_fork+0x10/0x20 [ 17.435312] [ 17.435330] Allocated by task 196: [ 17.435358] kasan_save_stack+0x3c/0x68 [ 17.435606] kasan_save_track+0x20/0x40 [ 17.435790] kasan_save_alloc_info+0x40/0x58 [ 17.435938] __kasan_kmalloc+0xd4/0xd8 [ 17.436024] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.436147] ksize_unpoisons_memory+0xc0/0x740 [ 17.436222] kunit_try_run_case+0x170/0x3f0 [ 17.436266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.436516] kthread+0x328/0x630 [ 17.436699] ret_from_fork+0x10/0x20 [ 17.437119] [ 17.437194] The buggy address belongs to the object at fff00000c6fb0900 [ 17.437194] which belongs to the cache kmalloc-128 of size 128 [ 17.437334] The buggy address is located 5 bytes to the right of [ 17.437334] allocated 115-byte region [fff00000c6fb0900, fff00000c6fb0973) [ 17.437489] [ 17.437547] The buggy address belongs to the physical page: [ 17.437751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0 [ 17.437881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.438142] page_type: f5(slab) [ 17.438230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.438406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.438475] page dumped because: kasan: bad access detected [ 17.438588] [ 17.438607] Memory state around the buggy address: [ 17.438653] fff00000c6fb0800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.438712] fff00000c6fb0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.438907] >fff00000c6fb0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.439125] ^ [ 17.439210] fff00000c6fb0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.439351] fff00000c6fb0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.439429] ================================================================== [ 17.440364] ================================================================== [ 17.440412] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 17.440465] Read of size 1 at addr fff00000c6fb097f by task kunit_try_catch/196 [ 17.440834] [ 17.440958] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 17.441071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.441155] Hardware name: linux,dummy-virt (DT) [ 17.441203] Call trace: [ 17.441240] show_stack+0x20/0x38 (C) [ 17.441522] dump_stack_lvl+0x8c/0xd0 [ 17.441583] print_report+0x118/0x5d0 [ 17.441641] kasan_report+0xdc/0x128 [ 17.441693] __asan_report_load1_noabort+0x20/0x30 [ 17.441965] ksize_unpoisons_memory+0x690/0x740 [ 17.442020] kunit_try_run_case+0x170/0x3f0 [ 17.442076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.442341] kthread+0x328/0x630 [ 17.442421] ret_from_fork+0x10/0x20 [ 17.442469] [ 17.442632] Allocated by task 196: [ 17.442669] kasan_save_stack+0x3c/0x68 [ 17.442711] kasan_save_track+0x20/0x40 [ 17.442746] kasan_save_alloc_info+0x40/0x58 [ 17.442843] __kasan_kmalloc+0xd4/0xd8 [ 17.442882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.442919] ksize_unpoisons_memory+0xc0/0x740 [ 17.442960] kunit_try_run_case+0x170/0x3f0 [ 17.442999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.443039] kthread+0x328/0x630 [ 17.443072] ret_from_fork+0x10/0x20 [ 17.443108] [ 17.443138] The buggy address belongs to the object at fff00000c6fb0900 [ 17.443138] which belongs to the cache kmalloc-128 of size 128 [ 17.443198] The buggy address is located 12 bytes to the right of [ 17.443198] allocated 115-byte region [fff00000c6fb0900, fff00000c6fb0973) [ 17.443260] [ 17.443291] The buggy address belongs to the physical page: [ 17.443319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0 [ 17.443371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.443428] page_type: f5(slab) [ 17.443465] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.443523] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.443565] page dumped because: kasan: bad access detected [ 17.443596] [ 17.443613] Memory state around the buggy address: [ 17.443643] fff00000c6fb0800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.443686] fff00000c6fb0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.443729] >fff00000c6fb0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.443776] ^ [ 17.443826] fff00000c6fb0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.443871] fff00000c6fb0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.443918] ==================================================================
[ 11.547181] ================================================================== [ 11.547524] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.547912] Read of size 1 at addr ffff8881028ba17f by task kunit_try_catch/214 [ 11.548391] [ 11.548537] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 11.548596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.548606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.548625] Call Trace: [ 11.548636] <TASK> [ 11.548650] dump_stack_lvl+0x73/0xb0 [ 11.548694] print_report+0xd1/0x610 [ 11.548762] ? __virt_addr_valid+0x1db/0x2d0 [ 11.548785] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.548805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.548830] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.548851] kasan_report+0x141/0x180 [ 11.548874] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.548898] __asan_report_load1_noabort+0x18/0x20 [ 11.548923] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.548943] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.548961] ? finish_task_switch.isra.0+0x153/0x700 [ 11.548983] ? __switch_to+0x5d9/0xf60 [ 11.549002] ? dequeue_task_fair+0x166/0x4e0 [ 11.549025] ? __schedule+0x10c6/0x2b60 [ 11.549049] ? __pfx_read_tsc+0x10/0x10 [ 11.549070] ? ktime_get_ts64+0x86/0x230 [ 11.549118] kunit_try_run_case+0x1a5/0x480 [ 11.549140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.549158] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.549179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.549233] ? __kthread_parkme+0x82/0x180 [ 11.549254] ? preempt_count_sub+0x50/0x80 [ 11.549278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.549298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.549320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.549343] kthread+0x337/0x6f0 [ 11.549359] ? trace_preempt_on+0x20/0xc0 [ 11.549381] ? __pfx_kthread+0x10/0x10 [ 11.549398] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.549420] ? calculate_sigpending+0x7b/0xa0 [ 11.549441] ? __pfx_kthread+0x10/0x10 [ 11.549458] ret_from_fork+0x41/0x80 [ 11.549494] ? __pfx_kthread+0x10/0x10 [ 11.549512] ret_from_fork_asm+0x1a/0x30 [ 11.549556] </TASK> [ 11.549566] [ 11.558261] Allocated by task 214: [ 11.558462] kasan_save_stack+0x45/0x70 [ 11.558794] kasan_save_track+0x18/0x40 [ 11.558992] kasan_save_alloc_info+0x3b/0x50 [ 11.559201] __kasan_kmalloc+0xb7/0xc0 [ 11.559396] __kmalloc_cache_noprof+0x189/0x420 [ 11.559749] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.559952] kunit_try_run_case+0x1a5/0x480 [ 11.560177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.560415] kthread+0x337/0x6f0 [ 11.560545] ret_from_fork+0x41/0x80 [ 11.560753] ret_from_fork_asm+0x1a/0x30 [ 11.560977] [ 11.561089] The buggy address belongs to the object at ffff8881028ba100 [ 11.561089] which belongs to the cache kmalloc-128 of size 128 [ 11.561647] The buggy address is located 12 bytes to the right of [ 11.561647] allocated 115-byte region [ffff8881028ba100, ffff8881028ba173) [ 11.562326] [ 11.562397] The buggy address belongs to the physical page: [ 11.562569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ba [ 11.562813] flags: 0x200000000000000(node=0|zone=2) [ 11.563336] page_type: f5(slab) [ 11.563657] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.564238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.564939] page dumped because: kasan: bad access detected [ 11.565209] [ 11.565305] Memory state around the buggy address: [ 11.565764] ffff8881028ba000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.566002] ffff8881028ba080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.566218] >ffff8881028ba100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.566438] ^ [ 11.567062] ffff8881028ba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.567391] ffff8881028ba200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.567752] ================================================================== [ 11.503491] ================================================================== [ 11.503962] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.504204] Read of size 1 at addr ffff8881028ba173 by task kunit_try_catch/214 [ 11.504438] [ 11.504529] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 11.504573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.504584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.504605] Call Trace: [ 11.504617] <TASK> [ 11.504634] dump_stack_lvl+0x73/0xb0 [ 11.504658] print_report+0xd1/0x610 [ 11.504679] ? __virt_addr_valid+0x1db/0x2d0 [ 11.504700] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.504718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.504740] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.504758] kasan_report+0x141/0x180 [ 11.504780] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.504803] __asan_report_load1_noabort+0x18/0x20 [ 11.504822] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.504841] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.504859] ? finish_task_switch.isra.0+0x153/0x700 [ 11.504882] ? __switch_to+0x5d9/0xf60 [ 11.504902] ? dequeue_task_fair+0x166/0x4e0 [ 11.504930] ? __schedule+0x10c6/0x2b60 [ 11.504952] ? __pfx_read_tsc+0x10/0x10 [ 11.504970] ? ktime_get_ts64+0x86/0x230 [ 11.504994] kunit_try_run_case+0x1a5/0x480 [ 11.505014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.505032] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.505051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.505074] ? __kthread_parkme+0x82/0x180 [ 11.505096] ? preempt_count_sub+0x50/0x80 [ 11.505119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.505138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.505160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.505182] kthread+0x337/0x6f0 [ 11.505198] ? trace_preempt_on+0x20/0xc0 [ 11.505220] ? __pfx_kthread+0x10/0x10 [ 11.505814] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.505839] ? calculate_sigpending+0x7b/0xa0 [ 11.505861] ? __pfx_kthread+0x10/0x10 [ 11.505881] ret_from_fork+0x41/0x80 [ 11.505901] ? __pfx_kthread+0x10/0x10 [ 11.505918] ret_from_fork_asm+0x1a/0x30 [ 11.505949] </TASK> [ 11.505960] [ 11.514430] Allocated by task 214: [ 11.514618] kasan_save_stack+0x45/0x70 [ 11.514922] kasan_save_track+0x18/0x40 [ 11.515122] kasan_save_alloc_info+0x3b/0x50 [ 11.515348] __kasan_kmalloc+0xb7/0xc0 [ 11.515542] __kmalloc_cache_noprof+0x189/0x420 [ 11.515764] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.515980] kunit_try_run_case+0x1a5/0x480 [ 11.516144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.516327] kthread+0x337/0x6f0 [ 11.516691] ret_from_fork+0x41/0x80 [ 11.516909] ret_from_fork_asm+0x1a/0x30 [ 11.517113] [ 11.517183] The buggy address belongs to the object at ffff8881028ba100 [ 11.517183] which belongs to the cache kmalloc-128 of size 128 [ 11.519055] The buggy address is located 0 bytes to the right of [ 11.519055] allocated 115-byte region [ffff8881028ba100, ffff8881028ba173) [ 11.519821] [ 11.519921] The buggy address belongs to the physical page: [ 11.520124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ba [ 11.520427] flags: 0x200000000000000(node=0|zone=2) [ 11.520670] page_type: f5(slab) [ 11.520820] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.521130] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.521526] page dumped because: kasan: bad access detected [ 11.521839] [ 11.521914] Memory state around the buggy address: [ 11.522118] ffff8881028ba000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.522450] ffff8881028ba080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.522892] >ffff8881028ba100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.523153] ^ [ 11.523503] ffff8881028ba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.523815] ffff8881028ba200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.524101] ================================================================== [ 11.524777] ================================================================== [ 11.525094] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.525797] Read of size 1 at addr ffff8881028ba178 by task kunit_try_catch/214 [ 11.526120] [ 11.526242] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 11.526285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.526296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.526316] Call Trace: [ 11.526328] <TASK> [ 11.526342] dump_stack_lvl+0x73/0xb0 [ 11.526369] print_report+0xd1/0x610 [ 11.526390] ? __virt_addr_valid+0x1db/0x2d0 [ 11.526411] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.526429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.526451] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.526469] kasan_report+0x141/0x180 [ 11.526491] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.526515] __asan_report_load1_noabort+0x18/0x20 [ 11.526535] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.526555] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.526573] ? finish_task_switch.isra.0+0x153/0x700 [ 11.526595] ? __switch_to+0x5d9/0xf60 [ 11.526614] ? dequeue_task_fair+0x166/0x4e0 [ 11.526638] ? __schedule+0x10c6/0x2b60 [ 11.526987] ? __pfx_read_tsc+0x10/0x10 [ 11.527014] ? ktime_get_ts64+0x86/0x230 [ 11.527040] kunit_try_run_case+0x1a5/0x480 [ 11.527060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.527078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.527098] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.527122] ? __kthread_parkme+0x82/0x180 [ 11.527143] ? preempt_count_sub+0x50/0x80 [ 11.527167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.527186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.527208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.527244] kthread+0x337/0x6f0 [ 11.527260] ? trace_preempt_on+0x20/0xc0 [ 11.527283] ? __pfx_kthread+0x10/0x10 [ 11.527300] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.527321] ? calculate_sigpending+0x7b/0xa0 [ 11.527342] ? __pfx_kthread+0x10/0x10 [ 11.527359] ret_from_fork+0x41/0x80 [ 11.527395] ? __pfx_kthread+0x10/0x10 [ 11.527412] ret_from_fork_asm+0x1a/0x30 [ 11.527443] </TASK> [ 11.527453] [ 11.535608] Allocated by task 214: [ 11.535740] kasan_save_stack+0x45/0x70 [ 11.535886] kasan_save_track+0x18/0x40 [ 11.536020] kasan_save_alloc_info+0x3b/0x50 [ 11.536455] __kasan_kmalloc+0xb7/0xc0 [ 11.536649] __kmalloc_cache_noprof+0x189/0x420 [ 11.536870] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.537089] kunit_try_run_case+0x1a5/0x480 [ 11.537306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.537652] kthread+0x337/0x6f0 [ 11.537850] ret_from_fork+0x41/0x80 [ 11.537993] ret_from_fork_asm+0x1a/0x30 [ 11.538188] [ 11.538268] The buggy address belongs to the object at ffff8881028ba100 [ 11.538268] which belongs to the cache kmalloc-128 of size 128 [ 11.539114] The buggy address is located 5 bytes to the right of [ 11.539114] allocated 115-byte region [ffff8881028ba100, ffff8881028ba173) [ 11.539818] [ 11.539911] The buggy address belongs to the physical page: [ 11.540094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ba [ 11.540347] flags: 0x200000000000000(node=0|zone=2) [ 11.540580] page_type: f5(slab) [ 11.541418] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.542499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.543495] page dumped because: kasan: bad access detected [ 11.543681] [ 11.543775] Memory state around the buggy address: [ 11.544004] ffff8881028ba000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.544556] ffff8881028ba080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.544987] >ffff8881028ba100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.545197] ^ [ 11.545521] ffff8881028ba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.546082] ffff8881028ba200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.546363] ==================================================================