Date
June 23, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.323547] ================================================================== [ 33.323696] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 33.323967] Read of size 1 at addr fff00000c63f7473 by task kunit_try_catch/206 [ 33.324200] [ 33.324463] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.324694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.324767] Hardware name: linux,dummy-virt (DT) [ 33.324884] Call trace: [ 33.325095] show_stack+0x20/0x38 (C) [ 33.325338] dump_stack_lvl+0x8c/0xd0 [ 33.325456] print_report+0x118/0x608 [ 33.325572] kasan_report+0xdc/0x128 [ 33.325694] __asan_report_load1_noabort+0x20/0x30 [ 33.326056] ksize_unpoisons_memory+0x628/0x740 [ 33.326403] kunit_try_run_case+0x170/0x3f0 [ 33.326734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.326993] kthread+0x328/0x630 [ 33.327199] ret_from_fork+0x10/0x20 [ 33.327694] [ 33.327756] Allocated by task 206: [ 33.327840] kasan_save_stack+0x3c/0x68 [ 33.327995] kasan_save_track+0x20/0x40 [ 33.328114] kasan_save_alloc_info+0x40/0x58 [ 33.328224] __kasan_kmalloc+0xd4/0xd8 [ 33.328325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.328429] ksize_unpoisons_memory+0xc0/0x740 [ 33.328522] kunit_try_run_case+0x170/0x3f0 [ 33.328628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.328929] kthread+0x328/0x630 [ 33.329115] ret_from_fork+0x10/0x20 [ 33.329245] [ 33.329400] The buggy address belongs to the object at fff00000c63f7400 [ 33.329400] which belongs to the cache kmalloc-128 of size 128 [ 33.329592] The buggy address is located 0 bytes to the right of [ 33.329592] allocated 115-byte region [fff00000c63f7400, fff00000c63f7473) [ 33.329745] [ 33.329796] The buggy address belongs to the physical page: [ 33.329935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.330148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.330349] page_type: f5(slab) [ 33.330461] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.330589] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.330781] page dumped because: kasan: bad access detected [ 33.330867] [ 33.330914] Memory state around the buggy address: [ 33.331057] fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.331255] fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.331371] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.331469] ^ [ 33.331611] fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.331794] fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.331890] ================================================================== [ 33.333202] ================================================================== [ 33.333301] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 33.333413] Read of size 1 at addr fff00000c63f7478 by task kunit_try_catch/206 [ 33.333529] [ 33.333592] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.333780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.333844] Hardware name: linux,dummy-virt (DT) [ 33.333915] Call trace: [ 33.333967] show_stack+0x20/0x38 (C) [ 33.334135] dump_stack_lvl+0x8c/0xd0 [ 33.334276] print_report+0x118/0x608 [ 33.334765] kasan_report+0xdc/0x128 [ 33.334963] __asan_report_load1_noabort+0x20/0x30 [ 33.335174] ksize_unpoisons_memory+0x618/0x740 [ 33.335316] kunit_try_run_case+0x170/0x3f0 [ 33.335445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.336019] kthread+0x328/0x630 [ 33.336154] ret_from_fork+0x10/0x20 [ 33.336274] [ 33.336337] Allocated by task 206: [ 33.336410] kasan_save_stack+0x3c/0x68 [ 33.336520] kasan_save_track+0x20/0x40 [ 33.336822] kasan_save_alloc_info+0x40/0x58 [ 33.336992] __kasan_kmalloc+0xd4/0xd8 [ 33.337136] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.337248] ksize_unpoisons_memory+0xc0/0x740 [ 33.337534] kunit_try_run_case+0x170/0x3f0 [ 33.338835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.338976] kthread+0x328/0x630 [ 33.339081] ret_from_fork+0x10/0x20 [ 33.339177] [ 33.339222] The buggy address belongs to the object at fff00000c63f7400 [ 33.339222] which belongs to the cache kmalloc-128 of size 128 [ 33.340131] The buggy address is located 5 bytes to the right of [ 33.340131] allocated 115-byte region [fff00000c63f7400, fff00000c63f7473) [ 33.340383] [ 33.340441] The buggy address belongs to the physical page: [ 33.340512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.341791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.341923] page_type: f5(slab) [ 33.342516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.342837] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.342939] page dumped because: kasan: bad access detected [ 33.343575] [ 33.343626] Memory state around the buggy address: [ 33.343876] fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.344146] fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.344203] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.344272] ^ [ 33.344440] fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.344561] fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.344818] ================================================================== [ 33.345973] ================================================================== [ 33.346094] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 33.346230] Read of size 1 at addr fff00000c63f747f by task kunit_try_catch/206 [ 33.346357] [ 33.346424] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.346689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.346781] Hardware name: linux,dummy-virt (DT) [ 33.346867] Call trace: [ 33.346923] show_stack+0x20/0x38 (C) [ 33.347077] dump_stack_lvl+0x8c/0xd0 [ 33.347366] print_report+0x118/0x608 [ 33.347535] kasan_report+0xdc/0x128 [ 33.347701] __asan_report_load1_noabort+0x20/0x30 [ 33.347848] ksize_unpoisons_memory+0x690/0x740 [ 33.347996] kunit_try_run_case+0x170/0x3f0 [ 33.348145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.348421] kthread+0x328/0x630 [ 33.348733] ret_from_fork+0x10/0x20 [ 33.348915] [ 33.348962] Allocated by task 206: [ 33.349052] kasan_save_stack+0x3c/0x68 [ 33.349154] kasan_save_track+0x20/0x40 [ 33.349247] kasan_save_alloc_info+0x40/0x58 [ 33.349332] __kasan_kmalloc+0xd4/0xd8 [ 33.349454] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.349745] ksize_unpoisons_memory+0xc0/0x740 [ 33.349885] kunit_try_run_case+0x170/0x3f0 [ 33.350006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.350145] kthread+0x328/0x630 [ 33.350250] ret_from_fork+0x10/0x20 [ 33.350356] [ 33.350412] The buggy address belongs to the object at fff00000c63f7400 [ 33.350412] which belongs to the cache kmalloc-128 of size 128 [ 33.350569] The buggy address is located 12 bytes to the right of [ 33.350569] allocated 115-byte region [fff00000c63f7400, fff00000c63f7473) [ 33.350738] [ 33.350798] The buggy address belongs to the physical page: [ 33.350873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.350994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.351118] page_type: f5(slab) [ 33.351205] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.351442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.351674] page dumped because: kasan: bad access detected [ 33.351755] [ 33.351813] Memory state around the buggy address: [ 33.351984] fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.352126] fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352236] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.352335] ^ [ 33.352454] fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352574] fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352682] ==================================================================
[ 22.243958] ================================================================== [ 22.245133] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.245599] Read of size 1 at addr ffff888102b4ed78 by task kunit_try_catch/223 [ 22.245961] [ 22.246256] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 22.246343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.246365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.246411] Call Trace: [ 22.246437] <TASK> [ 22.246461] dump_stack_lvl+0x73/0xb0 [ 22.246517] print_report+0xd1/0x650 [ 22.246558] ? __virt_addr_valid+0x1db/0x2d0 [ 22.246599] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.246630] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.246669] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.246707] kasan_report+0x141/0x180 [ 22.246743] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.246784] __asan_report_load1_noabort+0x18/0x20 [ 22.246818] ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.246873] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.246907] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 22.246956] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.247008] kunit_try_run_case+0x1a5/0x480 [ 22.247035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.247053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.247074] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.247103] ? __kthread_parkme+0x82/0x180 [ 22.247127] ? preempt_count_sub+0x50/0x80 [ 22.247156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.247185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.247213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.247241] kthread+0x337/0x6f0 [ 22.247261] ? trace_preempt_on+0x20/0xc0 [ 22.247279] ? __pfx_kthread+0x10/0x10 [ 22.247296] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.247313] ? calculate_sigpending+0x7b/0xa0 [ 22.247332] ? __pfx_kthread+0x10/0x10 [ 22.247350] ret_from_fork+0x116/0x1d0 [ 22.247365] ? __pfx_kthread+0x10/0x10 [ 22.247399] ret_from_fork_asm+0x1a/0x30 [ 22.247428] </TASK> [ 22.247438] [ 22.255972] Allocated by task 223: [ 22.256288] kasan_save_stack+0x45/0x70 [ 22.256586] kasan_save_track+0x18/0x40 [ 22.256975] kasan_save_alloc_info+0x3b/0x50 [ 22.257306] __kasan_kmalloc+0xb7/0xc0 [ 22.257522] __kmalloc_cache_noprof+0x189/0x420 [ 22.257731] ksize_unpoisons_memory+0xc7/0x9b0 [ 22.258176] kunit_try_run_case+0x1a5/0x480 [ 22.258396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.258590] kthread+0x337/0x6f0 [ 22.258733] ret_from_fork+0x116/0x1d0 [ 22.258939] ret_from_fork_asm+0x1a/0x30 [ 22.259211] [ 22.259352] The buggy address belongs to the object at ffff888102b4ed00 [ 22.259352] which belongs to the cache kmalloc-128 of size 128 [ 22.259948] The buggy address is located 5 bytes to the right of [ 22.259948] allocated 115-byte region [ffff888102b4ed00, ffff888102b4ed73) [ 22.260807] [ 22.260925] The buggy address belongs to the physical page: [ 22.261197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e [ 22.262301] flags: 0x200000000000000(node=0|zone=2) [ 22.262702] page_type: f5(slab) [ 22.262858] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.263292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.263611] page dumped because: kasan: bad access detected [ 22.264023] [ 22.264255] Memory state around the buggy address: [ 22.264441] ffff888102b4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.264661] ffff888102b4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.264891] >ffff888102b4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.265320] ^ [ 22.266115] ffff888102b4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.266603] ffff888102b4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.266955] ================================================================== [ 22.213526] ================================================================== [ 22.214403] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 22.214871] Read of size 1 at addr ffff888102b4ed73 by task kunit_try_catch/223 [ 22.215476] [ 22.215618] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 22.215699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.215720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.215755] Call Trace: [ 22.215781] <TASK> [ 22.215808] dump_stack_lvl+0x73/0xb0 [ 22.215859] print_report+0xd1/0x650 [ 22.215897] ? __virt_addr_valid+0x1db/0x2d0 [ 22.215930] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 22.215951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.215972] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 22.215991] kasan_report+0x141/0x180 [ 22.216009] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 22.216031] __asan_report_load1_noabort+0x18/0x20 [ 22.216057] ksize_unpoisons_memory+0x81c/0x9b0 [ 22.216432] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.216480] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 22.216522] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.216559] kunit_try_run_case+0x1a5/0x480 [ 22.216593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.216623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.216653] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.216683] ? __kthread_parkme+0x82/0x180 [ 22.216710] ? preempt_count_sub+0x50/0x80 [ 22.216742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.216767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.216787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.216806] kthread+0x337/0x6f0 [ 22.216821] ? trace_preempt_on+0x20/0xc0 [ 22.216871] ? __pfx_kthread+0x10/0x10 [ 22.216894] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.216912] ? calculate_sigpending+0x7b/0xa0 [ 22.216932] ? __pfx_kthread+0x10/0x10 [ 22.216950] ret_from_fork+0x116/0x1d0 [ 22.216966] ? __pfx_kthread+0x10/0x10 [ 22.216983] ret_from_fork_asm+0x1a/0x30 [ 22.217009] </TASK> [ 22.217021] [ 22.229824] Allocated by task 223: [ 22.229996] kasan_save_stack+0x45/0x70 [ 22.230154] kasan_save_track+0x18/0x40 [ 22.230447] kasan_save_alloc_info+0x3b/0x50 [ 22.230621] __kasan_kmalloc+0xb7/0xc0 [ 22.231205] __kmalloc_cache_noprof+0x189/0x420 [ 22.231723] ksize_unpoisons_memory+0xc7/0x9b0 [ 22.232193] kunit_try_run_case+0x1a5/0x480 [ 22.232428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.232675] kthread+0x337/0x6f0 [ 22.232821] ret_from_fork+0x116/0x1d0 [ 22.232994] ret_from_fork_asm+0x1a/0x30 [ 22.233507] [ 22.233728] The buggy address belongs to the object at ffff888102b4ed00 [ 22.233728] which belongs to the cache kmalloc-128 of size 128 [ 22.234701] The buggy address is located 0 bytes to the right of [ 22.234701] allocated 115-byte region [ffff888102b4ed00, ffff888102b4ed73) [ 22.235422] [ 22.235588] The buggy address belongs to the physical page: [ 22.236361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e [ 22.236758] flags: 0x200000000000000(node=0|zone=2) [ 22.237560] page_type: f5(slab) [ 22.237865] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.238569] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.239184] page dumped because: kasan: bad access detected [ 22.239612] [ 22.239697] Memory state around the buggy address: [ 22.240280] ffff888102b4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.240630] ffff888102b4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.241324] >ffff888102b4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.241533] ^ [ 22.242184] ffff888102b4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.242698] ffff888102b4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.243184] ================================================================== [ 22.267510] ================================================================== [ 22.267841] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.268478] Read of size 1 at addr ffff888102b4ed7f by task kunit_try_catch/223 [ 22.268785] [ 22.268955] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 22.269027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.269048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.269077] Call Trace: [ 22.269100] <TASK> [ 22.269123] dump_stack_lvl+0x73/0xb0 [ 22.269175] print_report+0xd1/0x650 [ 22.269213] ? __virt_addr_valid+0x1db/0x2d0 [ 22.269250] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.269289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.269512] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.269574] kasan_report+0x141/0x180 [ 22.269617] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.269667] __asan_report_load1_noabort+0x18/0x20 [ 22.269708] ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.269750] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.269788] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 22.269838] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.269883] kunit_try_run_case+0x1a5/0x480 [ 22.269925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.269960] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.269991] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.270058] ? __kthread_parkme+0x82/0x180 [ 22.270207] ? preempt_count_sub+0x50/0x80 [ 22.270254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.270297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.270340] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.270392] kthread+0x337/0x6f0 [ 22.270427] ? trace_preempt_on+0x20/0xc0 [ 22.270465] ? __pfx_kthread+0x10/0x10 [ 22.270501] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.270538] ? calculate_sigpending+0x7b/0xa0 [ 22.270578] ? __pfx_kthread+0x10/0x10 [ 22.270616] ret_from_fork+0x116/0x1d0 [ 22.270649] ? __pfx_kthread+0x10/0x10 [ 22.270685] ret_from_fork_asm+0x1a/0x30 [ 22.270741] </TASK> [ 22.270763] [ 22.284001] Allocated by task 223: [ 22.284808] kasan_save_stack+0x45/0x70 [ 22.285003] kasan_save_track+0x18/0x40 [ 22.285132] kasan_save_alloc_info+0x3b/0x50 [ 22.285402] __kasan_kmalloc+0xb7/0xc0 [ 22.286237] __kmalloc_cache_noprof+0x189/0x420 [ 22.286455] ksize_unpoisons_memory+0xc7/0x9b0 [ 22.287033] kunit_try_run_case+0x1a5/0x480 [ 22.287412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.287751] kthread+0x337/0x6f0 [ 22.288296] ret_from_fork+0x116/0x1d0 [ 22.288610] ret_from_fork_asm+0x1a/0x30 [ 22.289044] [ 22.289205] The buggy address belongs to the object at ffff888102b4ed00 [ 22.289205] which belongs to the cache kmalloc-128 of size 128 [ 22.289991] The buggy address is located 12 bytes to the right of [ 22.289991] allocated 115-byte region [ffff888102b4ed00, ffff888102b4ed73) [ 22.291347] [ 22.291788] The buggy address belongs to the physical page: [ 22.291991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e [ 22.292845] flags: 0x200000000000000(node=0|zone=2) [ 22.293137] page_type: f5(slab) [ 22.293372] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.293714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.294769] page dumped because: kasan: bad access detected [ 22.295176] [ 22.295273] Memory state around the buggy address: [ 22.295460] ffff888102b4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.296019] ffff888102b4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.296596] >ffff888102b4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.297117] ^ [ 22.297513] ffff888102b4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.297906] ffff888102b4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.298249] ==================================================================