Date
July 4, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.715582] ================================================================== [ 29.715635] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 29.715736] Read of size 1 at addr fff00000c5a97f78 by task kunit_try_catch/227 [ 29.715787] [ 29.715816] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 29.715916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.715944] Hardware name: linux,dummy-virt (DT) [ 29.715983] Call trace: [ 29.716014] show_stack+0x20/0x38 (C) [ 29.716064] dump_stack_lvl+0x8c/0xd0 [ 29.716109] print_report+0x118/0x608 [ 29.716156] kasan_report+0xdc/0x128 [ 29.716200] __asan_report_load1_noabort+0x20/0x30 [ 29.716248] ksize_unpoisons_memory+0x618/0x740 [ 29.716304] kunit_try_run_case+0x170/0x3f0 [ 29.716356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.716408] kthread+0x328/0x630 [ 29.716451] ret_from_fork+0x10/0x20 [ 29.716497] [ 29.716516] Allocated by task 227: [ 29.716544] kasan_save_stack+0x3c/0x68 [ 29.716585] kasan_save_track+0x20/0x40 [ 29.716623] kasan_save_alloc_info+0x40/0x58 [ 29.716660] __kasan_kmalloc+0xd4/0xd8 [ 29.716700] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.716740] ksize_unpoisons_memory+0xc0/0x740 [ 29.716794] kunit_try_run_case+0x170/0x3f0 [ 29.716835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.716877] kthread+0x328/0x630 [ 29.716920] ret_from_fork+0x10/0x20 [ 29.716954] [ 29.716972] The buggy address belongs to the object at fff00000c5a97f00 [ 29.716972] which belongs to the cache kmalloc-128 of size 128 [ 29.717029] The buggy address is located 5 bytes to the right of [ 29.717029] allocated 115-byte region [fff00000c5a97f00, fff00000c5a97f73) [ 29.717093] [ 29.717114] The buggy address belongs to the physical page: [ 29.717144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a97 [ 29.717532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.717607] page_type: f5(slab) [ 29.717674] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.717761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.717804] page dumped because: kasan: bad access detected [ 29.717837] [ 29.717905] Memory state around the buggy address: [ 29.717941] fff00000c5a97e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.717985] fff00000c5a97e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.718044] >fff00000c5a97f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.718083] ^ [ 29.718207] fff00000c5a97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.718281] fff00000c5a98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.718374] ================================================================== [ 29.718763] ================================================================== [ 29.718809] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 29.718859] Read of size 1 at addr fff00000c5a97f7f by task kunit_try_catch/227 [ 29.719033] [ 29.719082] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 29.719168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.719195] Hardware name: linux,dummy-virt (DT) [ 29.719262] Call trace: [ 29.719285] show_stack+0x20/0x38 (C) [ 29.719356] dump_stack_lvl+0x8c/0xd0 [ 29.719432] print_report+0x118/0x608 [ 29.719501] kasan_report+0xdc/0x128 [ 29.719549] __asan_report_load1_noabort+0x20/0x30 [ 29.719673] ksize_unpoisons_memory+0x690/0x740 [ 29.719845] kunit_try_run_case+0x170/0x3f0 [ 29.719939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.720024] kthread+0x328/0x630 [ 29.720067] ret_from_fork+0x10/0x20 [ 29.720152] [ 29.720190] Allocated by task 227: [ 29.720247] kasan_save_stack+0x3c/0x68 [ 29.720288] kasan_save_track+0x20/0x40 [ 29.720563] kasan_save_alloc_info+0x40/0x58 [ 29.720619] __kasan_kmalloc+0xd4/0xd8 [ 29.720686] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.720745] ksize_unpoisons_memory+0xc0/0x740 [ 29.720826] kunit_try_run_case+0x170/0x3f0 [ 29.720882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.720983] kthread+0x328/0x630 [ 29.721042] ret_from_fork+0x10/0x20 [ 29.721124] [ 29.721157] The buggy address belongs to the object at fff00000c5a97f00 [ 29.721157] which belongs to the cache kmalloc-128 of size 128 [ 29.721221] The buggy address is located 12 bytes to the right of [ 29.721221] allocated 115-byte region [fff00000c5a97f00, fff00000c5a97f73) [ 29.721295] [ 29.721595] The buggy address belongs to the physical page: [ 29.721672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a97 [ 29.721869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.721941] page_type: f5(slab) [ 29.721982] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.722049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.722313] page dumped because: kasan: bad access detected [ 29.722362] [ 29.722380] Memory state around the buggy address: [ 29.722486] fff00000c5a97e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.722642] fff00000c5a97e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.722729] >fff00000c5a97f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.722769] ^ [ 29.723115] fff00000c5a97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.723216] fff00000c5a98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.723255] ================================================================== [ 29.711702] ================================================================== [ 29.711795] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 29.711868] Read of size 1 at addr fff00000c5a97f73 by task kunit_try_catch/227 [ 29.711956] [ 29.712003] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 29.712117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.712174] Hardware name: linux,dummy-virt (DT) [ 29.712223] Call trace: [ 29.712293] show_stack+0x20/0x38 (C) [ 29.712410] dump_stack_lvl+0x8c/0xd0 [ 29.712505] print_report+0x118/0x608 [ 29.712561] kasan_report+0xdc/0x128 [ 29.712609] __asan_report_load1_noabort+0x20/0x30 [ 29.712657] ksize_unpoisons_memory+0x628/0x740 [ 29.712706] kunit_try_run_case+0x170/0x3f0 [ 29.712756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.712815] kthread+0x328/0x630 [ 29.713023] ret_from_fork+0x10/0x20 [ 29.713090] [ 29.713110] Allocated by task 227: [ 29.713138] kasan_save_stack+0x3c/0x68 [ 29.713179] kasan_save_track+0x20/0x40 [ 29.713216] kasan_save_alloc_info+0x40/0x58 [ 29.713254] __kasan_kmalloc+0xd4/0xd8 [ 29.713292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.713330] ksize_unpoisons_memory+0xc0/0x740 [ 29.713367] kunit_try_run_case+0x170/0x3f0 [ 29.713406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.713450] kthread+0x328/0x630 [ 29.713481] ret_from_fork+0x10/0x20 [ 29.713516] [ 29.713534] The buggy address belongs to the object at fff00000c5a97f00 [ 29.713534] which belongs to the cache kmalloc-128 of size 128 [ 29.713592] The buggy address is located 0 bytes to the right of [ 29.713592] allocated 115-byte region [fff00000c5a97f00, fff00000c5a97f73) [ 29.713653] [ 29.713674] The buggy address belongs to the physical page: [ 29.713717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a97 [ 29.713766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.713813] page_type: f5(slab) [ 29.713851] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.713909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.713971] page dumped because: kasan: bad access detected [ 29.714074] [ 29.714170] Memory state around the buggy address: [ 29.714278] fff00000c5a97e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.714361] fff00000c5a97e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.714418] >fff00000c5a97f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.714458] ^ [ 29.714523] fff00000c5a97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.714570] fff00000c5a98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.714608] ==================================================================
[ 25.395866] ================================================================== [ 25.396119] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.396447] Read of size 1 at addr ffff888105aac37f by task kunit_try_catch/243 [ 25.396771] [ 25.396880] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 25.396932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.396945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.396969] Call Trace: [ 25.396989] <TASK> [ 25.397009] dump_stack_lvl+0x73/0xb0 [ 25.397099] print_report+0xd1/0x650 [ 25.397129] ? __virt_addr_valid+0x1db/0x2d0 [ 25.397154] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.397178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.397205] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.397230] kasan_report+0x141/0x180 [ 25.397254] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.397283] __asan_report_load1_noabort+0x18/0x20 [ 25.397352] ksize_unpoisons_memory+0x7b6/0x9b0 [ 25.397381] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.397417] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 25.397450] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.397479] kunit_try_run_case+0x1a5/0x480 [ 25.397506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.397531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.397557] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.397582] ? __kthread_parkme+0x82/0x180 [ 25.397604] ? preempt_count_sub+0x50/0x80 [ 25.397629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.397655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.397681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.397707] kthread+0x337/0x6f0 [ 25.397728] ? trace_preempt_on+0x20/0xc0 [ 25.397754] ? __pfx_kthread+0x10/0x10 [ 25.397778] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.397802] ? calculate_sigpending+0x7b/0xa0 [ 25.397827] ? __pfx_kthread+0x10/0x10 [ 25.397850] ret_from_fork+0x116/0x1d0 [ 25.397870] ? __pfx_kthread+0x10/0x10 [ 25.397903] ret_from_fork_asm+0x1a/0x30 [ 25.397936] </TASK> [ 25.397949] [ 25.405750] Allocated by task 243: [ 25.405981] kasan_save_stack+0x45/0x70 [ 25.406195] kasan_save_track+0x18/0x40 [ 25.406404] kasan_save_alloc_info+0x3b/0x50 [ 25.406807] __kasan_kmalloc+0xb7/0xc0 [ 25.406989] __kmalloc_cache_noprof+0x189/0x420 [ 25.407362] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.407542] kunit_try_run_case+0x1a5/0x480 [ 25.407756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.408023] kthread+0x337/0x6f0 [ 25.408172] ret_from_fork+0x116/0x1d0 [ 25.408357] ret_from_fork_asm+0x1a/0x30 [ 25.408633] [ 25.408708] The buggy address belongs to the object at ffff888105aac300 [ 25.408708] which belongs to the cache kmalloc-128 of size 128 [ 25.409252] The buggy address is located 12 bytes to the right of [ 25.409252] allocated 115-byte region [ffff888105aac300, ffff888105aac373) [ 25.409896] [ 25.410000] The buggy address belongs to the physical page: [ 25.410408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aac [ 25.410672] flags: 0x200000000000000(node=0|zone=2) [ 25.410914] page_type: f5(slab) [ 25.411117] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.411580] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.411972] page dumped because: kasan: bad access detected [ 25.412247] [ 25.412331] Memory state around the buggy address: [ 25.412532] ffff888105aac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.412753] ffff888105aac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.413022] >ffff888105aac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.413341] ^ [ 25.413859] ffff888105aac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.414128] ffff888105aac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.414525] ================================================================== [ 25.364710] ================================================================== [ 25.365047] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.365298] Read of size 1 at addr ffff888105aac378 by task kunit_try_catch/243 [ 25.366103] [ 25.366348] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 25.366417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.366431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.366454] Call Trace: [ 25.366474] <TASK> [ 25.366493] dump_stack_lvl+0x73/0xb0 [ 25.366522] print_report+0xd1/0x650 [ 25.366545] ? __virt_addr_valid+0x1db/0x2d0 [ 25.366571] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.366594] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.366620] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.366645] kasan_report+0x141/0x180 [ 25.366669] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.366698] __asan_report_load1_noabort+0x18/0x20 [ 25.366723] ksize_unpoisons_memory+0x7e9/0x9b0 [ 25.366748] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.366771] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 25.366804] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.366832] kunit_try_run_case+0x1a5/0x480 [ 25.366859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.366884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.366911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.366937] ? __kthread_parkme+0x82/0x180 [ 25.366959] ? preempt_count_sub+0x50/0x80 [ 25.366984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.367011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.367037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.367062] kthread+0x337/0x6f0 [ 25.367083] ? trace_preempt_on+0x20/0xc0 [ 25.367109] ? __pfx_kthread+0x10/0x10 [ 25.367133] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.367157] ? calculate_sigpending+0x7b/0xa0 [ 25.367183] ? __pfx_kthread+0x10/0x10 [ 25.367207] ret_from_fork+0x116/0x1d0 [ 25.367229] ? __pfx_kthread+0x10/0x10 [ 25.367252] ret_from_fork_asm+0x1a/0x30 [ 25.367286] </TASK> [ 25.367298] [ 25.380769] Allocated by task 243: [ 25.380980] kasan_save_stack+0x45/0x70 [ 25.381350] kasan_save_track+0x18/0x40 [ 25.381790] kasan_save_alloc_info+0x3b/0x50 [ 25.382455] __kasan_kmalloc+0xb7/0xc0 [ 25.382887] __kmalloc_cache_noprof+0x189/0x420 [ 25.383492] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.383853] kunit_try_run_case+0x1a5/0x480 [ 25.384243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.384661] kthread+0x337/0x6f0 [ 25.384790] ret_from_fork+0x116/0x1d0 [ 25.384946] ret_from_fork_asm+0x1a/0x30 [ 25.385091] [ 25.385163] The buggy address belongs to the object at ffff888105aac300 [ 25.385163] which belongs to the cache kmalloc-128 of size 128 [ 25.385621] The buggy address is located 5 bytes to the right of [ 25.385621] allocated 115-byte region [ffff888105aac300, ffff888105aac373) [ 25.386301] [ 25.386709] The buggy address belongs to the physical page: [ 25.387487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aac [ 25.388325] flags: 0x200000000000000(node=0|zone=2) [ 25.388795] page_type: f5(slab) [ 25.389126] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.389822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.390075] page dumped because: kasan: bad access detected [ 25.390447] [ 25.390798] Memory state around the buggy address: [ 25.391304] ffff888105aac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.392067] ffff888105aac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.392799] >ffff888105aac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.393254] ^ [ 25.393806] ffff888105aac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.394375] ffff888105aac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.395296] ================================================================== [ 25.335543] ================================================================== [ 25.336026] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 25.336503] Read of size 1 at addr ffff888105aac373 by task kunit_try_catch/243 [ 25.336818] [ 25.336930] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 25.336987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.337001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.337025] Call Trace: [ 25.337041] <TASK> [ 25.337063] dump_stack_lvl+0x73/0xb0 [ 25.337096] print_report+0xd1/0x650 [ 25.337121] ? __virt_addr_valid+0x1db/0x2d0 [ 25.337209] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.337238] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.337266] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.337291] kasan_report+0x141/0x180 [ 25.337316] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 25.337346] __asan_report_load1_noabort+0x18/0x20 [ 25.337371] ksize_unpoisons_memory+0x81c/0x9b0 [ 25.337410] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.337433] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 25.337466] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 25.337494] kunit_try_run_case+0x1a5/0x480 [ 25.337524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.337549] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.337575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.337601] ? __kthread_parkme+0x82/0x180 [ 25.337624] ? preempt_count_sub+0x50/0x80 [ 25.337649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.337676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.337702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.337728] kthread+0x337/0x6f0 [ 25.337749] ? trace_preempt_on+0x20/0xc0 [ 25.337775] ? __pfx_kthread+0x10/0x10 [ 25.337799] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.337823] ? calculate_sigpending+0x7b/0xa0 [ 25.337849] ? __pfx_kthread+0x10/0x10 [ 25.337873] ret_from_fork+0x116/0x1d0 [ 25.337894] ? __pfx_kthread+0x10/0x10 [ 25.337916] ret_from_fork_asm+0x1a/0x30 [ 25.337951] </TASK> [ 25.337966] [ 25.348756] Allocated by task 243: [ 25.349254] kasan_save_stack+0x45/0x70 [ 25.349594] kasan_save_track+0x18/0x40 [ 25.349741] kasan_save_alloc_info+0x3b/0x50 [ 25.349896] __kasan_kmalloc+0xb7/0xc0 [ 25.350433] __kmalloc_cache_noprof+0x189/0x420 [ 25.350884] ksize_unpoisons_memory+0xc7/0x9b0 [ 25.351423] kunit_try_run_case+0x1a5/0x480 [ 25.351851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.352212] kthread+0x337/0x6f0 [ 25.352345] ret_from_fork+0x116/0x1d0 [ 25.352951] ret_from_fork_asm+0x1a/0x30 [ 25.353448] [ 25.353623] The buggy address belongs to the object at ffff888105aac300 [ 25.353623] which belongs to the cache kmalloc-128 of size 128 [ 25.354457] The buggy address is located 0 bytes to the right of [ 25.354457] allocated 115-byte region [ffff888105aac300, ffff888105aac373) [ 25.355579] [ 25.355669] The buggy address belongs to the physical page: [ 25.355855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aac [ 25.356837] flags: 0x200000000000000(node=0|zone=2) [ 25.357462] page_type: f5(slab) [ 25.357817] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.358282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.359067] page dumped because: kasan: bad access detected [ 25.359541] [ 25.359735] Memory state around the buggy address: [ 25.360254] ffff888105aac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.360697] ffff888105aac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.361048] >ffff888105aac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.361932] ^ [ 25.362442] ffff888105aac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.362946] ffff888105aac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.363563] ==================================================================