Date
July 3, 2025, 11:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.981033] ================================================================== [ 19.981157] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.981270] Read of size 1 at addr fff00000c6345e7f by task kunit_try_catch/194 [ 19.981353] [ 19.981391] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.981482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.981524] Hardware name: linux,dummy-virt (DT) [ 19.981559] Call trace: [ 19.981581] show_stack+0x20/0x38 (C) [ 19.981635] dump_stack_lvl+0x8c/0xd0 [ 19.982798] print_report+0x118/0x608 [ 19.983142] kasan_report+0xdc/0x128 [ 19.983272] __asan_report_load1_noabort+0x20/0x30 [ 19.983387] ksize_unpoisons_memory+0x690/0x740 [ 19.983490] kunit_try_run_case+0x170/0x3f0 [ 19.983594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.984707] kthread+0x328/0x630 [ 19.985168] ret_from_fork+0x10/0x20 [ 19.985533] [ 19.985632] Allocated by task 194: [ 19.985717] kasan_save_stack+0x3c/0x68 [ 19.985813] kasan_save_track+0x20/0x40 [ 19.985950] kasan_save_alloc_info+0x40/0x58 [ 19.986063] __kasan_kmalloc+0xd4/0xd8 [ 19.986146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.986225] ksize_unpoisons_memory+0xc0/0x740 [ 19.986290] kunit_try_run_case+0x170/0x3f0 [ 19.986367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.986768] kthread+0x328/0x630 [ 19.986895] ret_from_fork+0x10/0x20 [ 19.987171] [ 19.987298] The buggy address belongs to the object at fff00000c6345e00 [ 19.987298] which belongs to the cache kmalloc-128 of size 128 [ 19.987524] The buggy address is located 12 bytes to the right of [ 19.987524] allocated 115-byte region [fff00000c6345e00, fff00000c6345e73) [ 19.987936] [ 19.987996] The buggy address belongs to the physical page: [ 19.988194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345 [ 19.988334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.988454] page_type: f5(slab) [ 19.988560] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.988777] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.988973] page dumped because: kasan: bad access detected [ 19.989302] [ 19.989344] Memory state around the buggy address: [ 19.989420] fff00000c6345d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.989655] fff00000c6345d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.989832] >fff00000c6345e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.989929] ^ [ 19.990007] fff00000c6345e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.990112] fff00000c6345f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.990530] ================================================================== [ 19.962984] ================================================================== [ 19.963181] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.963361] Read of size 1 at addr fff00000c6345e73 by task kunit_try_catch/194 [ 19.963513] [ 19.963615] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.963828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.963911] Hardware name: linux,dummy-virt (DT) [ 19.963998] Call trace: [ 19.964068] show_stack+0x20/0x38 (C) [ 19.964172] dump_stack_lvl+0x8c/0xd0 [ 19.964272] print_report+0x118/0x608 [ 19.964381] kasan_report+0xdc/0x128 [ 19.964504] __asan_report_load1_noabort+0x20/0x30 [ 19.964620] ksize_unpoisons_memory+0x628/0x740 [ 19.964980] kunit_try_run_case+0x170/0x3f0 [ 19.965137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.965308] kthread+0x328/0x630 [ 19.965487] ret_from_fork+0x10/0x20 [ 19.965687] [ 19.965758] Allocated by task 194: [ 19.965821] kasan_save_stack+0x3c/0x68 [ 19.965905] kasan_save_track+0x20/0x40 [ 19.965968] kasan_save_alloc_info+0x40/0x58 [ 19.966063] __kasan_kmalloc+0xd4/0xd8 [ 19.966143] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.966235] ksize_unpoisons_memory+0xc0/0x740 [ 19.966355] kunit_try_run_case+0x170/0x3f0 [ 19.966486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.966624] kthread+0x328/0x630 [ 19.966726] ret_from_fork+0x10/0x20 [ 19.966812] [ 19.966861] The buggy address belongs to the object at fff00000c6345e00 [ 19.966861] which belongs to the cache kmalloc-128 of size 128 [ 19.967049] The buggy address is located 0 bytes to the right of [ 19.967049] allocated 115-byte region [fff00000c6345e00, fff00000c6345e73) [ 19.967230] [ 19.967299] The buggy address belongs to the physical page: [ 19.967397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345 [ 19.967568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.967689] page_type: f5(slab) [ 19.967770] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.967881] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.967975] page dumped because: kasan: bad access detected [ 19.968050] [ 19.968085] Memory state around the buggy address: [ 19.968153] fff00000c6345d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.968250] fff00000c6345d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.968578] >fff00000c6345e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.968947] ^ [ 19.969146] fff00000c6345e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.969322] fff00000c6345f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.969415] ================================================================== [ 19.970858] ================================================================== [ 19.970966] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.971095] Read of size 1 at addr fff00000c6345e78 by task kunit_try_catch/194 [ 19.971199] [ 19.971268] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.971453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.971515] Hardware name: linux,dummy-virt (DT) [ 19.971586] Call trace: [ 19.971634] show_stack+0x20/0x38 (C) [ 19.971745] dump_stack_lvl+0x8c/0xd0 [ 19.971857] print_report+0x118/0x608 [ 19.971963] kasan_report+0xdc/0x128 [ 19.972075] __asan_report_load1_noabort+0x20/0x30 [ 19.972181] ksize_unpoisons_memory+0x618/0x740 [ 19.972292] kunit_try_run_case+0x170/0x3f0 [ 19.972392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.972640] kthread+0x328/0x630 [ 19.972815] ret_from_fork+0x10/0x20 [ 19.973237] [ 19.973284] Allocated by task 194: [ 19.973346] kasan_save_stack+0x3c/0x68 [ 19.973613] kasan_save_track+0x20/0x40 [ 19.973731] kasan_save_alloc_info+0x40/0x58 [ 19.973809] __kasan_kmalloc+0xd4/0xd8 [ 19.973882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.974245] ksize_unpoisons_memory+0xc0/0x740 [ 19.974388] kunit_try_run_case+0x170/0x3f0 [ 19.974477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.974564] kthread+0x328/0x630 [ 19.974645] ret_from_fork+0x10/0x20 [ 19.974736] [ 19.974775] The buggy address belongs to the object at fff00000c6345e00 [ 19.974775] which belongs to the cache kmalloc-128 of size 128 [ 19.974885] The buggy address is located 5 bytes to the right of [ 19.974885] allocated 115-byte region [fff00000c6345e00, fff00000c6345e73) [ 19.975010] [ 19.975061] The buggy address belongs to the physical page: [ 19.975161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345 [ 19.975411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.975660] page_type: f5(slab) [ 19.975807] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.975968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.976115] page dumped because: kasan: bad access detected [ 19.976222] [ 19.976277] Memory state around the buggy address: [ 19.976379] fff00000c6345d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.976475] fff00000c6345d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.976612] >fff00000c6345e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.976752] ^ [ 19.976886] fff00000c6345e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.977221] fff00000c6345f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.977483] ==================================================================
[ 11.994629] ================================================================== [ 11.994973] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.995569] Read of size 1 at addr ffff888103173f7f by task kunit_try_catch/211 [ 11.995856] [ 11.995964] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.996003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.996014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.996031] Call Trace: [ 11.996047] <TASK> [ 11.996061] dump_stack_lvl+0x73/0xb0 [ 11.996087] print_report+0xd1/0x650 [ 11.996108] ? __virt_addr_valid+0x1db/0x2d0 [ 11.996143] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.996164] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.996185] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.996207] kasan_report+0x141/0x180 [ 11.996227] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.996253] __asan_report_load1_noabort+0x18/0x20 [ 11.996276] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.996299] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.996397] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.996425] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.996451] kunit_try_run_case+0x1a5/0x480 [ 11.996474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.996495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.996539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.996560] ? __kthread_parkme+0x82/0x180 [ 11.996579] ? preempt_count_sub+0x50/0x80 [ 11.996602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.996624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.996645] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.996667] kthread+0x337/0x6f0 [ 11.996685] ? trace_preempt_on+0x20/0xc0 [ 11.996707] ? __pfx_kthread+0x10/0x10 [ 11.996728] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.996749] ? calculate_sigpending+0x7b/0xa0 [ 11.996772] ? __pfx_kthread+0x10/0x10 [ 11.996794] ret_from_fork+0x116/0x1d0 [ 11.996812] ? __pfx_kthread+0x10/0x10 [ 11.996832] ret_from_fork_asm+0x1a/0x30 [ 11.996862] </TASK> [ 11.996873] [ 12.004538] Allocated by task 211: [ 12.004731] kasan_save_stack+0x45/0x70 [ 12.004896] kasan_save_track+0x18/0x40 [ 12.005204] kasan_save_alloc_info+0x3b/0x50 [ 12.005417] __kasan_kmalloc+0xb7/0xc0 [ 12.005624] __kmalloc_cache_noprof+0x189/0x420 [ 12.005848] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.006058] kunit_try_run_case+0x1a5/0x480 [ 12.006290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.006614] kthread+0x337/0x6f0 [ 12.006759] ret_from_fork+0x116/0x1d0 [ 12.006894] ret_from_fork_asm+0x1a/0x30 [ 12.007033] [ 12.007110] The buggy address belongs to the object at ffff888103173f00 [ 12.007110] which belongs to the cache kmalloc-128 of size 128 [ 12.007903] The buggy address is located 12 bytes to the right of [ 12.007903] allocated 115-byte region [ffff888103173f00, ffff888103173f73) [ 12.008592] [ 12.008711] The buggy address belongs to the physical page: [ 12.008918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173 [ 12.009170] flags: 0x200000000000000(node=0|zone=2) [ 12.009381] page_type: f5(slab) [ 12.009620] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.009973] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.010468] page dumped because: kasan: bad access detected [ 12.010736] [ 12.010830] Memory state around the buggy address: [ 12.011034] ffff888103173e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.011325] ffff888103173e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.011859] >ffff888103173f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.012195] ^ [ 12.012547] ffff888103173f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.012887] ffff888103174000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.013148] ================================================================== [ 11.977042] ================================================================== [ 11.977409] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.977703] Read of size 1 at addr ffff888103173f78 by task kunit_try_catch/211 [ 11.977927] [ 11.978036] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.978076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.978087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.978107] Call Trace: [ 11.978142] <TASK> [ 11.978156] dump_stack_lvl+0x73/0xb0 [ 11.978180] print_report+0xd1/0x650 [ 11.978201] ? __virt_addr_valid+0x1db/0x2d0 [ 11.978223] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.978245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.978265] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.978287] kasan_report+0x141/0x180 [ 11.978328] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.978355] __asan_report_load1_noabort+0x18/0x20 [ 11.978378] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.978400] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.978421] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.978448] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.978474] kunit_try_run_case+0x1a5/0x480 [ 11.978496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.978524] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.978546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.978567] ? __kthread_parkme+0x82/0x180 [ 11.978586] ? preempt_count_sub+0x50/0x80 [ 11.978608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.978630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.978651] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.978673] kthread+0x337/0x6f0 [ 11.978691] ? trace_preempt_on+0x20/0xc0 [ 11.978713] ? __pfx_kthread+0x10/0x10 [ 11.978732] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.978752] ? calculate_sigpending+0x7b/0xa0 [ 11.978775] ? __pfx_kthread+0x10/0x10 [ 11.978795] ret_from_fork+0x116/0x1d0 [ 11.978812] ? __pfx_kthread+0x10/0x10 [ 11.978831] ret_from_fork_asm+0x1a/0x30 [ 11.978860] </TASK> [ 11.978870] [ 11.986004] Allocated by task 211: [ 11.986203] kasan_save_stack+0x45/0x70 [ 11.986500] kasan_save_track+0x18/0x40 [ 11.986674] kasan_save_alloc_info+0x3b/0x50 [ 11.986851] __kasan_kmalloc+0xb7/0xc0 [ 11.986983] __kmalloc_cache_noprof+0x189/0x420 [ 11.987188] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.987466] kunit_try_run_case+0x1a5/0x480 [ 11.987673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.987899] kthread+0x337/0x6f0 [ 11.988062] ret_from_fork+0x116/0x1d0 [ 11.988223] ret_from_fork_asm+0x1a/0x30 [ 11.988387] [ 11.988478] The buggy address belongs to the object at ffff888103173f00 [ 11.988478] which belongs to the cache kmalloc-128 of size 128 [ 11.989014] The buggy address is located 5 bytes to the right of [ 11.989014] allocated 115-byte region [ffff888103173f00, ffff888103173f73) [ 11.989749] [ 11.989820] The buggy address belongs to the physical page: [ 11.989991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173 [ 11.990259] flags: 0x200000000000000(node=0|zone=2) [ 11.990447] page_type: f5(slab) [ 11.990573] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.990833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.991523] page dumped because: kasan: bad access detected [ 11.991788] [ 11.991882] Memory state around the buggy address: [ 11.992110] ffff888103173e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.992535] ffff888103173e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.992852] >ffff888103173f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.993184] ^ [ 11.993471] ffff888103173f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.993690] ffff888103174000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.994006] ================================================================== [ 11.958696] ================================================================== [ 11.959159] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.959489] Read of size 1 at addr ffff888103173f73 by task kunit_try_catch/211 [ 11.959797] [ 11.959923] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.959966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.959977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.959996] Call Trace: [ 11.960007] <TASK> [ 11.960021] dump_stack_lvl+0x73/0xb0 [ 11.960046] print_report+0xd1/0x650 [ 11.960069] ? __virt_addr_valid+0x1db/0x2d0 [ 11.960090] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.960112] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.960168] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.960190] kasan_report+0x141/0x180 [ 11.960211] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.960237] __asan_report_load1_noabort+0x18/0x20 [ 11.960260] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.960282] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.960323] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.960352] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.960378] kunit_try_run_case+0x1a5/0x480 [ 11.960402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.960423] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.960445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.960466] ? __kthread_parkme+0x82/0x180 [ 11.960489] ? preempt_count_sub+0x50/0x80 [ 11.960513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.960535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.960557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.960579] kthread+0x337/0x6f0 [ 11.960597] ? trace_preempt_on+0x20/0xc0 [ 11.960618] ? __pfx_kthread+0x10/0x10 [ 11.960639] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.960659] ? calculate_sigpending+0x7b/0xa0 [ 11.960682] ? __pfx_kthread+0x10/0x10 [ 11.960702] ret_from_fork+0x116/0x1d0 [ 11.960719] ? __pfx_kthread+0x10/0x10 [ 11.960739] ret_from_fork_asm+0x1a/0x30 [ 11.960768] </TASK> [ 11.960779] [ 11.967950] Allocated by task 211: [ 11.968113] kasan_save_stack+0x45/0x70 [ 11.968299] kasan_save_track+0x18/0x40 [ 11.968435] kasan_save_alloc_info+0x3b/0x50 [ 11.968582] __kasan_kmalloc+0xb7/0xc0 [ 11.968826] __kmalloc_cache_noprof+0x189/0x420 [ 11.969050] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.969350] kunit_try_run_case+0x1a5/0x480 [ 11.969557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.969798] kthread+0x337/0x6f0 [ 11.969920] ret_from_fork+0x116/0x1d0 [ 11.970051] ret_from_fork_asm+0x1a/0x30 [ 11.970219] [ 11.970310] The buggy address belongs to the object at ffff888103173f00 [ 11.970310] which belongs to the cache kmalloc-128 of size 128 [ 11.971060] The buggy address is located 0 bytes to the right of [ 11.971060] allocated 115-byte region [ffff888103173f00, ffff888103173f73) [ 11.971588] [ 11.971662] The buggy address belongs to the physical page: [ 11.971835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103173 [ 11.972269] flags: 0x200000000000000(node=0|zone=2) [ 11.972763] page_type: f5(slab) [ 11.972930] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.973209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.973840] page dumped because: kasan: bad access detected [ 11.974043] [ 11.974163] Memory state around the buggy address: [ 11.974440] ffff888103173e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.974686] ffff888103173e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.974902] >ffff888103173f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.975182] ^ [ 11.975742] ffff888103173f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.976243] ffff888103174000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.976613] ==================================================================