Date
July 17, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.563531] ================================================================== [ 15.563591] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 15.563951] Read of size 1 at addr fff00000c786a77f by task kunit_try_catch/195 [ 15.564089] [ 15.564158] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.564403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.564489] Hardware name: linux,dummy-virt (DT) [ 15.564546] Call trace: [ 15.564569] show_stack+0x20/0x38 (C) [ 15.564621] dump_stack_lvl+0x8c/0xd0 [ 15.564675] print_report+0x118/0x5d0 [ 15.564721] kasan_report+0xdc/0x128 [ 15.564777] __asan_report_load1_noabort+0x20/0x30 [ 15.564827] ksize_unpoisons_memory+0x690/0x740 [ 15.564883] kunit_try_run_case+0x170/0x3f0 [ 15.564930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.564999] kthread+0x328/0x630 [ 15.565049] ret_from_fork+0x10/0x20 [ 15.565096] [ 15.565128] Allocated by task 195: [ 15.565156] kasan_save_stack+0x3c/0x68 [ 15.565205] kasan_save_track+0x20/0x40 [ 15.565242] kasan_save_alloc_info+0x40/0x58 [ 15.565282] __kasan_kmalloc+0xd4/0xd8 [ 15.565326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.565368] ksize_unpoisons_memory+0xc0/0x740 [ 15.565404] kunit_try_run_case+0x170/0x3f0 [ 15.565442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.565485] kthread+0x328/0x630 [ 15.565516] ret_from_fork+0x10/0x20 [ 15.565551] [ 15.565569] The buggy address belongs to the object at fff00000c786a700 [ 15.565569] which belongs to the cache kmalloc-128 of size 128 [ 15.565639] The buggy address is located 12 bytes to the right of [ 15.565639] allocated 115-byte region [fff00000c786a700, fff00000c786a773) [ 15.565704] [ 15.565730] The buggy address belongs to the physical page: [ 15.565761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 15.565814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.565862] page_type: f5(slab) [ 15.565898] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.565949] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.566000] page dumped because: kasan: bad access detected [ 15.566032] [ 15.566050] Memory state around the buggy address: [ 15.566723] fff00000c786a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.566888] fff00000c786a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.566992] >fff00000c786a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.567173] ^ [ 15.567354] fff00000c786a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.567439] fff00000c786a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.567588] ================================================================== [ 15.550639] ================================================================== [ 15.550874] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 15.551003] Read of size 1 at addr fff00000c786a773 by task kunit_try_catch/195 [ 15.551060] [ 15.551094] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.551229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.551257] Hardware name: linux,dummy-virt (DT) [ 15.551339] Call trace: [ 15.551377] show_stack+0x20/0x38 (C) [ 15.551436] dump_stack_lvl+0x8c/0xd0 [ 15.551783] print_report+0x118/0x5d0 [ 15.551865] kasan_report+0xdc/0x128 [ 15.551931] __asan_report_load1_noabort+0x20/0x30 [ 15.552043] ksize_unpoisons_memory+0x628/0x740 [ 15.552096] kunit_try_run_case+0x170/0x3f0 [ 15.552310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.552395] kthread+0x328/0x630 [ 15.552546] ret_from_fork+0x10/0x20 [ 15.552608] [ 15.552627] Allocated by task 195: [ 15.552803] kasan_save_stack+0x3c/0x68 [ 15.552889] kasan_save_track+0x20/0x40 [ 15.553019] kasan_save_alloc_info+0x40/0x58 [ 15.553064] __kasan_kmalloc+0xd4/0xd8 [ 15.553109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.553349] ksize_unpoisons_memory+0xc0/0x740 [ 15.553477] kunit_try_run_case+0x170/0x3f0 [ 15.553633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.553718] kthread+0x328/0x630 [ 15.553758] ret_from_fork+0x10/0x20 [ 15.553921] [ 15.554108] The buggy address belongs to the object at fff00000c786a700 [ 15.554108] which belongs to the cache kmalloc-128 of size 128 [ 15.554253] The buggy address is located 0 bytes to the right of [ 15.554253] allocated 115-byte region [fff00000c786a700, fff00000c786a773) [ 15.554332] [ 15.554487] The buggy address belongs to the physical page: [ 15.554544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 15.554669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.554845] page_type: f5(slab) [ 15.555052] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.555172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.555273] page dumped because: kasan: bad access detected [ 15.555366] [ 15.555406] Memory state around the buggy address: [ 15.555565] fff00000c786a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.555609] fff00000c786a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.555835] >fff00000c786a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.556042] ^ [ 15.556200] fff00000c786a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.556275] fff00000c786a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.556320] ================================================================== [ 15.557654] ================================================================== [ 15.557705] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 15.557753] Read of size 1 at addr fff00000c786a778 by task kunit_try_catch/195 [ 15.557976] [ 15.558082] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.558220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.558268] Hardware name: linux,dummy-virt (DT) [ 15.558339] Call trace: [ 15.558379] show_stack+0x20/0x38 (C) [ 15.558433] dump_stack_lvl+0x8c/0xd0 [ 15.558489] print_report+0x118/0x5d0 [ 15.558677] kasan_report+0xdc/0x128 [ 15.558750] __asan_report_load1_noabort+0x20/0x30 [ 15.558860] ksize_unpoisons_memory+0x618/0x740 [ 15.558932] kunit_try_run_case+0x170/0x3f0 [ 15.559107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.559172] kthread+0x328/0x630 [ 15.559215] ret_from_fork+0x10/0x20 [ 15.559345] [ 15.559403] Allocated by task 195: [ 15.559450] kasan_save_stack+0x3c/0x68 [ 15.559641] kasan_save_track+0x20/0x40 [ 15.559741] kasan_save_alloc_info+0x40/0x58 [ 15.559785] __kasan_kmalloc+0xd4/0xd8 [ 15.559839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.560035] ksize_unpoisons_memory+0xc0/0x740 [ 15.560155] kunit_try_run_case+0x170/0x3f0 [ 15.560226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.560415] kthread+0x328/0x630 [ 15.560550] ret_from_fork+0x10/0x20 [ 15.560619] [ 15.560714] The buggy address belongs to the object at fff00000c786a700 [ 15.560714] which belongs to the cache kmalloc-128 of size 128 [ 15.560778] The buggy address is located 5 bytes to the right of [ 15.560778] allocated 115-byte region [fff00000c786a700, fff00000c786a773) [ 15.560885] [ 15.560933] The buggy address belongs to the physical page: [ 15.560966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 15.561230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.561378] page_type: f5(slab) [ 15.561445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.561509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.561639] page dumped because: kasan: bad access detected [ 15.561673] [ 15.561890] Memory state around the buggy address: [ 15.562133] fff00000c786a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.562200] fff00000c786a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.562306] >fff00000c786a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.562392] ^ [ 15.562631] fff00000c786a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.562723] fff00000c786a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.562841] ==================================================================
[ 13.430787] ================================================================== [ 13.431260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 13.431789] Read of size 1 at addr ffff8881025cc473 by task kunit_try_catch/211 [ 13.432096] [ 13.432205] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.432248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.432259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.432279] Call Trace: [ 13.432290] <TASK> [ 13.432306] dump_stack_lvl+0x73/0xb0 [ 13.432382] print_report+0xd1/0x610 [ 13.432406] ? __virt_addr_valid+0x1db/0x2d0 [ 13.432455] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.432479] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.432502] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.432527] kasan_report+0x141/0x180 [ 13.432567] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.432598] __asan_report_load1_noabort+0x18/0x20 [ 13.432634] ksize_unpoisons_memory+0x81c/0x9b0 [ 13.432659] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.432682] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.432716] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.432747] kunit_try_run_case+0x1a5/0x480 [ 13.432774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.432797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.432821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.432855] ? __kthread_parkme+0x82/0x180 [ 13.432877] ? preempt_count_sub+0x50/0x80 [ 13.432904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.432940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.432967] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.432994] kthread+0x337/0x6f0 [ 13.433014] ? trace_preempt_on+0x20/0xc0 [ 13.433047] ? __pfx_kthread+0x10/0x10 [ 13.433068] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.433090] ? calculate_sigpending+0x7b/0xa0 [ 13.433126] ? __pfx_kthread+0x10/0x10 [ 13.433149] ret_from_fork+0x116/0x1d0 [ 13.433168] ? __pfx_kthread+0x10/0x10 [ 13.433189] ret_from_fork_asm+0x1a/0x30 [ 13.433227] </TASK> [ 13.433239] [ 13.440842] Allocated by task 211: [ 13.441026] kasan_save_stack+0x45/0x70 [ 13.441202] kasan_save_track+0x18/0x40 [ 13.441343] kasan_save_alloc_info+0x3b/0x50 [ 13.441662] __kasan_kmalloc+0xb7/0xc0 [ 13.441858] __kmalloc_cache_noprof+0x189/0x420 [ 13.442079] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.442350] kunit_try_run_case+0x1a5/0x480 [ 13.442525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.442716] kthread+0x337/0x6f0 [ 13.442882] ret_from_fork+0x116/0x1d0 [ 13.443067] ret_from_fork_asm+0x1a/0x30 [ 13.443355] [ 13.443481] The buggy address belongs to the object at ffff8881025cc400 [ 13.443481] which belongs to the cache kmalloc-128 of size 128 [ 13.444008] The buggy address is located 0 bytes to the right of [ 13.444008] allocated 115-byte region [ffff8881025cc400, ffff8881025cc473) [ 13.444543] [ 13.444651] The buggy address belongs to the physical page: [ 13.444910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 13.445215] flags: 0x200000000000000(node=0|zone=2) [ 13.445447] page_type: f5(slab) [ 13.445731] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.446088] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.446480] page dumped because: kasan: bad access detected [ 13.446746] [ 13.446849] Memory state around the buggy address: [ 13.447074] ffff8881025cc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.447475] ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.447804] >ffff8881025cc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.448028] ^ [ 13.448363] ffff8881025cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.448715] ffff8881025cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.448947] ================================================================== [ 13.451760] ================================================================== [ 13.452513] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.454522] Read of size 1 at addr ffff8881025cc478 by task kunit_try_catch/211 [ 13.455629] [ 13.455838] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.455883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.455895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.455915] Call Trace: [ 13.455928] <TASK> [ 13.455942] dump_stack_lvl+0x73/0xb0 [ 13.455998] print_report+0xd1/0x610 [ 13.456021] ? __virt_addr_valid+0x1db/0x2d0 [ 13.456052] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.456076] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.456099] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.456124] kasan_report+0x141/0x180 [ 13.456146] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.456177] __asan_report_load1_noabort+0x18/0x20 [ 13.456203] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.456448] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.456478] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.456514] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.456546] kunit_try_run_case+0x1a5/0x480 [ 13.456586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.456610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.456634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.456660] ? __kthread_parkme+0x82/0x180 [ 13.456681] ? preempt_count_sub+0x50/0x80 [ 13.456708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.456733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.456758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.456784] kthread+0x337/0x6f0 [ 13.456803] ? trace_preempt_on+0x20/0xc0 [ 13.456826] ? __pfx_kthread+0x10/0x10 [ 13.456847] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.456869] ? calculate_sigpending+0x7b/0xa0 [ 13.456893] ? __pfx_kthread+0x10/0x10 [ 13.456915] ret_from_fork+0x116/0x1d0 [ 13.456934] ? __pfx_kthread+0x10/0x10 [ 13.456955] ret_from_fork_asm+0x1a/0x30 [ 13.456990] </TASK> [ 13.457000] [ 13.469893] Allocated by task 211: [ 13.470522] kasan_save_stack+0x45/0x70 [ 13.470753] kasan_save_track+0x18/0x40 [ 13.470933] kasan_save_alloc_info+0x3b/0x50 [ 13.471127] __kasan_kmalloc+0xb7/0xc0 [ 13.471831] __kmalloc_cache_noprof+0x189/0x420 [ 13.472350] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.472783] kunit_try_run_case+0x1a5/0x480 [ 13.473176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.473849] kthread+0x337/0x6f0 [ 13.474090] ret_from_fork+0x116/0x1d0 [ 13.474482] ret_from_fork_asm+0x1a/0x30 [ 13.474885] [ 13.474978] The buggy address belongs to the object at ffff8881025cc400 [ 13.474978] which belongs to the cache kmalloc-128 of size 128 [ 13.475866] The buggy address is located 5 bytes to the right of [ 13.475866] allocated 115-byte region [ffff8881025cc400, ffff8881025cc473) [ 13.477298] [ 13.477543] The buggy address belongs to the physical page: [ 13.477795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 13.478102] flags: 0x200000000000000(node=0|zone=2) [ 13.478316] page_type: f5(slab) [ 13.478807] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.479525] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.480014] page dumped because: kasan: bad access detected [ 13.480291] [ 13.480385] Memory state around the buggy address: [ 13.480999] ffff8881025cc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.481451] ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.481757] >ffff8881025cc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.482049] ^ [ 13.482774] ffff8881025cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.483082] ffff8881025cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.483756] ================================================================== [ 13.484701] ================================================================== [ 13.485020] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.485831] Read of size 1 at addr ffff8881025cc47f by task kunit_try_catch/211 [ 13.486395] [ 13.486657] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.486800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.486813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.486834] Call Trace: [ 13.486850] <TASK> [ 13.486867] dump_stack_lvl+0x73/0xb0 [ 13.486897] print_report+0xd1/0x610 [ 13.486955] ? __virt_addr_valid+0x1db/0x2d0 [ 13.486979] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.487003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.487026] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.487050] kasan_report+0x141/0x180 [ 13.487073] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.487104] __asan_report_load1_noabort+0x18/0x20 [ 13.487129] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.487153] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.487179] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.487211] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.487307] kunit_try_run_case+0x1a5/0x480 [ 13.487335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.487357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.487383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.487428] ? __kthread_parkme+0x82/0x180 [ 13.487449] ? preempt_count_sub+0x50/0x80 [ 13.487474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.487499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.487524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.487559] kthread+0x337/0x6f0 [ 13.487578] ? trace_preempt_on+0x20/0xc0 [ 13.487603] ? __pfx_kthread+0x10/0x10 [ 13.487624] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.487646] ? calculate_sigpending+0x7b/0xa0 [ 13.487670] ? __pfx_kthread+0x10/0x10 [ 13.487693] ret_from_fork+0x116/0x1d0 [ 13.487712] ? __pfx_kthread+0x10/0x10 [ 13.487733] ret_from_fork_asm+0x1a/0x30 [ 13.487769] </TASK> [ 13.487779] [ 13.495035] Allocated by task 211: [ 13.495164] kasan_save_stack+0x45/0x70 [ 13.495405] kasan_save_track+0x18/0x40 [ 13.495733] kasan_save_alloc_info+0x3b/0x50 [ 13.495954] __kasan_kmalloc+0xb7/0xc0 [ 13.496090] __kmalloc_cache_noprof+0x189/0x420 [ 13.496475] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.496730] kunit_try_run_case+0x1a5/0x480 [ 13.496941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.497145] kthread+0x337/0x6f0 [ 13.497435] ret_from_fork+0x116/0x1d0 [ 13.497630] ret_from_fork_asm+0x1a/0x30 [ 13.497771] [ 13.497841] The buggy address belongs to the object at ffff8881025cc400 [ 13.497841] which belongs to the cache kmalloc-128 of size 128 [ 13.498272] The buggy address is located 12 bytes to the right of [ 13.498272] allocated 115-byte region [ffff8881025cc400, ffff8881025cc473) [ 13.498793] [ 13.499016] The buggy address belongs to the physical page: [ 13.499221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 13.499609] flags: 0x200000000000000(node=0|zone=2) [ 13.499843] page_type: f5(slab) [ 13.499967] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.500203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.500736] page dumped because: kasan: bad access detected [ 13.501106] [ 13.501182] Memory state around the buggy address: [ 13.501369] ffff8881025cc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.501590] ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.501869] >ffff8881025cc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.502183] ^ [ 13.503029] ffff8881025cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.503412] ffff8881025cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.503684] ==================================================================