Date
July 1, 2025, 11:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.557186] ================================================================== [ 18.557276] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.557358] Read of size 1 at addr fff00000c7732673 by task kunit_try_catch/195 [ 18.557416] [ 18.557534] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.557786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.557830] Hardware name: linux,dummy-virt (DT) [ 18.557870] Call trace: [ 18.557897] show_stack+0x20/0x38 (C) [ 18.557961] dump_stack_lvl+0x8c/0xd0 [ 18.558018] print_report+0x118/0x608 [ 18.558070] kasan_report+0xdc/0x128 [ 18.558122] __asan_report_load1_noabort+0x20/0x30 [ 18.558196] ksize_unpoisons_memory+0x628/0x740 [ 18.558298] kunit_try_run_case+0x170/0x3f0 [ 18.558353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.558719] kthread+0x328/0x630 [ 18.558812] ret_from_fork+0x10/0x20 [ 18.558900] [ 18.558943] Allocated by task 195: [ 18.558980] kasan_save_stack+0x3c/0x68 [ 18.559027] kasan_save_track+0x20/0x40 [ 18.559071] kasan_save_alloc_info+0x40/0x58 [ 18.559162] __kasan_kmalloc+0xd4/0xd8 [ 18.559205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.559348] ksize_unpoisons_memory+0xc0/0x740 [ 18.559428] kunit_try_run_case+0x170/0x3f0 [ 18.559505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.559554] kthread+0x328/0x630 [ 18.559618] ret_from_fork+0x10/0x20 [ 18.559661] [ 18.559682] The buggy address belongs to the object at fff00000c7732600 [ 18.559682] which belongs to the cache kmalloc-128 of size 128 [ 18.559753] The buggy address is located 0 bytes to the right of [ 18.559753] allocated 115-byte region [fff00000c7732600, fff00000c7732673) [ 18.559916] [ 18.559941] The buggy address belongs to the physical page: [ 18.560069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 18.560160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.560289] page_type: f5(slab) [ 18.560399] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.560495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.560603] page dumped because: kasan: bad access detected [ 18.560704] [ 18.560792] Memory state around the buggy address: [ 18.560854] fff00000c7732500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.560946] fff00000c7732580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.561028] >fff00000c7732600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.561150] ^ [ 18.561282] fff00000c7732680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.561392] fff00000c7732700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.561453] ================================================================== [ 18.564775] ================================================================== [ 18.564858] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.565103] Read of size 1 at addr fff00000c7732678 by task kunit_try_catch/195 [ 18.565206] [ 18.565258] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.565369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.565514] Hardware name: linux,dummy-virt (DT) [ 18.565555] Call trace: [ 18.565579] show_stack+0x20/0x38 (C) [ 18.565639] dump_stack_lvl+0x8c/0xd0 [ 18.565694] print_report+0x118/0x608 [ 18.565746] kasan_report+0xdc/0x128 [ 18.565796] __asan_report_load1_noabort+0x20/0x30 [ 18.565997] ksize_unpoisons_memory+0x618/0x740 [ 18.566086] kunit_try_run_case+0x170/0x3f0 [ 18.566157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.566218] kthread+0x328/0x630 [ 18.566266] ret_from_fork+0x10/0x20 [ 18.566321] [ 18.566342] Allocated by task 195: [ 18.566517] kasan_save_stack+0x3c/0x68 [ 18.566575] kasan_save_track+0x20/0x40 [ 18.566637] kasan_save_alloc_info+0x40/0x58 [ 18.566695] __kasan_kmalloc+0xd4/0xd8 [ 18.566736] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.566809] ksize_unpoisons_memory+0xc0/0x740 [ 18.566853] kunit_try_run_case+0x170/0x3f0 [ 18.566895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.566945] kthread+0x328/0x630 [ 18.566979] ret_from_fork+0x10/0x20 [ 18.569146] [ 18.569314] The buggy address belongs to the object at fff00000c7732600 [ 18.569314] which belongs to the cache kmalloc-128 of size 128 [ 18.569394] The buggy address is located 5 bytes to the right of [ 18.569394] allocated 115-byte region [fff00000c7732600, fff00000c7732673) [ 18.569469] [ 18.569494] The buggy address belongs to the physical page: [ 18.569530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 18.569595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.569652] page_type: f5(slab) [ 18.569700] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.569757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.569803] page dumped because: kasan: bad access detected [ 18.569836] [ 18.569855] Memory state around the buggy address: [ 18.569893] fff00000c7732500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.569942] fff00000c7732580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.569990] >fff00000c7732600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.570034] ^ [ 18.570077] fff00000c7732680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.570126] fff00000c7732700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.570182] ================================================================== [ 18.570970] ================================================================== [ 18.571084] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.571254] Read of size 1 at addr fff00000c773267f by task kunit_try_catch/195 [ 18.571309] [ 18.571582] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.571710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.571777] Hardware name: linux,dummy-virt (DT) [ 18.571838] Call trace: [ 18.571875] show_stack+0x20/0x38 (C) [ 18.571983] dump_stack_lvl+0x8c/0xd0 [ 18.572140] print_report+0x118/0x608 [ 18.572261] kasan_report+0xdc/0x128 [ 18.572325] __asan_report_load1_noabort+0x20/0x30 [ 18.572429] ksize_unpoisons_memory+0x690/0x740 [ 18.572547] kunit_try_run_case+0x170/0x3f0 [ 18.572600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.572833] kthread+0x328/0x630 [ 18.573016] ret_from_fork+0x10/0x20 [ 18.573155] [ 18.573197] Allocated by task 195: [ 18.573241] kasan_save_stack+0x3c/0x68 [ 18.573304] kasan_save_track+0x20/0x40 [ 18.573346] kasan_save_alloc_info+0x40/0x58 [ 18.573391] __kasan_kmalloc+0xd4/0xd8 [ 18.573430] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.573472] ksize_unpoisons_memory+0xc0/0x740 [ 18.573516] kunit_try_run_case+0x170/0x3f0 [ 18.573558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.573617] kthread+0x328/0x630 [ 18.573652] ret_from_fork+0x10/0x20 [ 18.573700] [ 18.573720] The buggy address belongs to the object at fff00000c7732600 [ 18.573720] which belongs to the cache kmalloc-128 of size 128 [ 18.573787] The buggy address is located 12 bytes to the right of [ 18.573787] allocated 115-byte region [fff00000c7732600, fff00000c7732673) [ 18.573871] [ 18.573901] The buggy address belongs to the physical page: [ 18.573947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 18.574008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.574065] page_type: f5(slab) [ 18.574119] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.574501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.574583] page dumped because: kasan: bad access detected [ 18.574687] [ 18.574755] Memory state around the buggy address: [ 18.574865] fff00000c7732500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.575034] fff00000c7732580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.575104] >fff00000c7732600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.575266] ^ [ 18.575395] fff00000c7732680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.575446] fff00000c7732700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.575491] ==================================================================
[ 11.932408] ================================================================== [ 11.932732] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.933019] Read of size 1 at addr ffff88810258d37f by task kunit_try_catch/211 [ 11.933246] [ 11.933495] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.933543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.933554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.933583] Call Trace: [ 11.933603] <TASK> [ 11.933623] dump_stack_lvl+0x73/0xb0 [ 11.933654] print_report+0xd1/0x650 [ 11.933678] ? __virt_addr_valid+0x1db/0x2d0 [ 11.933700] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.933721] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.933742] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.933763] kasan_report+0x141/0x180 [ 11.933784] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.933810] __asan_report_load1_noabort+0x18/0x20 [ 11.933833] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.933855] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.933875] ? finish_task_switch.isra.0+0x153/0x700 [ 11.933896] ? __switch_to+0x47/0xf50 [ 11.933921] ? __schedule+0x10cc/0x2b60 [ 11.933992] ? __pfx_read_tsc+0x10/0x10 [ 11.934013] ? ktime_get_ts64+0x86/0x230 [ 11.934036] kunit_try_run_case+0x1a5/0x480 [ 11.934061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.934081] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.934105] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.934126] ? __kthread_parkme+0x82/0x180 [ 11.934146] ? preempt_count_sub+0x50/0x80 [ 11.934167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.934189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.934210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.934232] kthread+0x337/0x6f0 [ 11.934251] ? trace_preempt_on+0x20/0xc0 [ 11.934274] ? __pfx_kthread+0x10/0x10 [ 11.934293] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.934313] ? calculate_sigpending+0x7b/0xa0 [ 11.934336] ? __pfx_kthread+0x10/0x10 [ 11.934355] ret_from_fork+0x116/0x1d0 [ 11.934385] ? __pfx_kthread+0x10/0x10 [ 11.934404] ret_from_fork_asm+0x1a/0x30 [ 11.934435] </TASK> [ 11.934445] [ 11.943210] Allocated by task 211: [ 11.943396] kasan_save_stack+0x45/0x70 [ 11.943561] kasan_save_track+0x18/0x40 [ 11.943756] kasan_save_alloc_info+0x3b/0x50 [ 11.943965] __kasan_kmalloc+0xb7/0xc0 [ 11.944261] __kmalloc_cache_noprof+0x189/0x420 [ 11.944445] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.944604] kunit_try_run_case+0x1a5/0x480 [ 11.944819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.945122] kthread+0x337/0x6f0 [ 11.945368] ret_from_fork+0x116/0x1d0 [ 11.945737] ret_from_fork_asm+0x1a/0x30 [ 11.945926] [ 11.946014] The buggy address belongs to the object at ffff88810258d300 [ 11.946014] which belongs to the cache kmalloc-128 of size 128 [ 11.946539] The buggy address is located 12 bytes to the right of [ 11.946539] allocated 115-byte region [ffff88810258d300, ffff88810258d373) [ 11.947062] [ 11.947207] The buggy address belongs to the physical page: [ 11.947463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10258d [ 11.947788] flags: 0x200000000000000(node=0|zone=2) [ 11.948045] page_type: f5(slab) [ 11.948215] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.948463] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.948690] page dumped because: kasan: bad access detected [ 11.948860] [ 11.948928] Memory state around the buggy address: [ 11.949172] ffff88810258d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.949507] ffff88810258d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.949948] >ffff88810258d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.950257] ^ [ 11.951107] ffff88810258d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.951386] ffff88810258d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.951652] ================================================================== [ 11.912205] ================================================================== [ 11.913162] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.913867] Read of size 1 at addr ffff88810258d378 by task kunit_try_catch/211 [ 11.914474] [ 11.914572] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.914618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.914629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.914649] Call Trace: [ 11.914670] <TASK> [ 11.914692] dump_stack_lvl+0x73/0xb0 [ 11.914725] print_report+0xd1/0x650 [ 11.914749] ? __virt_addr_valid+0x1db/0x2d0 [ 11.914772] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.914794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.914814] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.914836] kasan_report+0x141/0x180 [ 11.914857] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.914883] __asan_report_load1_noabort+0x18/0x20 [ 11.914906] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.914928] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.914949] ? finish_task_switch.isra.0+0x153/0x700 [ 11.914971] ? __switch_to+0x47/0xf50 [ 11.914996] ? __schedule+0x10cc/0x2b60 [ 11.915018] ? __pfx_read_tsc+0x10/0x10 [ 11.915038] ? ktime_get_ts64+0x86/0x230 [ 11.915061] kunit_try_run_case+0x1a5/0x480 [ 11.915086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.915106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.915129] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.915150] ? __kthread_parkme+0x82/0x180 [ 11.915170] ? preempt_count_sub+0x50/0x80 [ 11.915191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.915213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.915236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.915257] kthread+0x337/0x6f0 [ 11.915276] ? trace_preempt_on+0x20/0xc0 [ 11.915299] ? __pfx_kthread+0x10/0x10 [ 11.915318] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.915338] ? calculate_sigpending+0x7b/0xa0 [ 11.915361] ? __pfx_kthread+0x10/0x10 [ 11.915391] ret_from_fork+0x116/0x1d0 [ 11.915409] ? __pfx_kthread+0x10/0x10 [ 11.915428] ret_from_fork_asm+0x1a/0x30 [ 11.915458] </TASK> [ 11.915469] [ 11.922855] Allocated by task 211: [ 11.923475] kasan_save_stack+0x45/0x70 [ 11.923694] kasan_save_track+0x18/0x40 [ 11.923897] kasan_save_alloc_info+0x3b/0x50 [ 11.924176] __kasan_kmalloc+0xb7/0xc0 [ 11.924349] __kmalloc_cache_noprof+0x189/0x420 [ 11.924593] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.924757] kunit_try_run_case+0x1a5/0x480 [ 11.924904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.925076] kthread+0x337/0x6f0 [ 11.925245] ret_from_fork+0x116/0x1d0 [ 11.925445] ret_from_fork_asm+0x1a/0x30 [ 11.925643] [ 11.925871] The buggy address belongs to the object at ffff88810258d300 [ 11.925871] which belongs to the cache kmalloc-128 of size 128 [ 11.926636] The buggy address is located 5 bytes to the right of [ 11.926636] allocated 115-byte region [ffff88810258d300, ffff88810258d373) [ 11.927038] [ 11.927141] The buggy address belongs to the physical page: [ 11.927416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10258d [ 11.927776] flags: 0x200000000000000(node=0|zone=2) [ 11.928040] page_type: f5(slab) [ 11.928294] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.928535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.929264] page dumped because: kasan: bad access detected [ 11.929547] [ 11.929725] Memory state around the buggy address: [ 11.929958] ffff88810258d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.930189] ffff88810258d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.930416] >ffff88810258d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.930787] ^ [ 11.931108] ffff88810258d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.931453] ffff88810258d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.931836] ================================================================== [ 11.882173] ================================================================== [ 11.882693] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.883201] Read of size 1 at addr ffff88810258d373 by task kunit_try_catch/211 [ 11.883509] [ 11.883805] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.883855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.883890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.883912] Call Trace: [ 11.883968] <TASK> [ 11.883989] dump_stack_lvl+0x73/0xb0 [ 11.884023] print_report+0xd1/0x650 [ 11.884046] ? __virt_addr_valid+0x1db/0x2d0 [ 11.884070] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.884113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.884135] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.884156] kasan_report+0x141/0x180 [ 11.884177] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.884203] __asan_report_load1_noabort+0x18/0x20 [ 11.884227] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.884249] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.884288] ? finish_task_switch.isra.0+0x153/0x700 [ 11.884314] ? __switch_to+0x47/0xf50 [ 11.884342] ? __schedule+0x10cc/0x2b60 [ 11.884365] ? __pfx_read_tsc+0x10/0x10 [ 11.884403] ? ktime_get_ts64+0x86/0x230 [ 11.884427] kunit_try_run_case+0x1a5/0x480 [ 11.884451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.884472] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.884497] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.884518] ? __kthread_parkme+0x82/0x180 [ 11.884557] ? preempt_count_sub+0x50/0x80 [ 11.884580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.884617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.884638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.884660] kthread+0x337/0x6f0 [ 11.884678] ? trace_preempt_on+0x20/0xc0 [ 11.884701] ? __pfx_kthread+0x10/0x10 [ 11.884722] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.884741] ? calculate_sigpending+0x7b/0xa0 [ 11.884765] ? __pfx_kthread+0x10/0x10 [ 11.884785] ret_from_fork+0x116/0x1d0 [ 11.884802] ? __pfx_kthread+0x10/0x10 [ 11.884820] ret_from_fork_asm+0x1a/0x30 [ 11.884851] </TASK> [ 11.884861] [ 11.897280] Allocated by task 211: [ 11.897669] kasan_save_stack+0x45/0x70 [ 11.897940] kasan_save_track+0x18/0x40 [ 11.898113] kasan_save_alloc_info+0x3b/0x50 [ 11.898895] __kasan_kmalloc+0xb7/0xc0 [ 11.899337] __kmalloc_cache_noprof+0x189/0x420 [ 11.899788] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.900176] kunit_try_run_case+0x1a5/0x480 [ 11.900465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.900725] kthread+0x337/0x6f0 [ 11.901046] ret_from_fork+0x116/0x1d0 [ 11.901467] ret_from_fork_asm+0x1a/0x30 [ 11.901841] [ 11.902039] The buggy address belongs to the object at ffff88810258d300 [ 11.902039] which belongs to the cache kmalloc-128 of size 128 [ 11.902490] The buggy address is located 0 bytes to the right of [ 11.902490] allocated 115-byte region [ffff88810258d300, ffff88810258d373) [ 11.903626] [ 11.903811] The buggy address belongs to the physical page: [ 11.904365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10258d [ 11.905147] flags: 0x200000000000000(node=0|zone=2) [ 11.905617] page_type: f5(slab) [ 11.905915] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.906625] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.906878] page dumped because: kasan: bad access detected [ 11.907355] [ 11.907541] Memory state around the buggy address: [ 11.908009] ffff88810258d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.909097] ffff88810258d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.909602] >ffff88810258d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.910141] ^ [ 11.910354] ffff88810258d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.910589] ffff88810258d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.911257] ==================================================================