Date
July 16, 2025, 12:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.801420] ================================================================== [ 30.801484] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.801733] Read of size 1 at addr fff00000c6361e73 by task kunit_try_catch/225 [ 30.801827] [ 30.801940] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.802030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.802058] Hardware name: linux,dummy-virt (DT) [ 30.802160] Call trace: [ 30.802185] show_stack+0x20/0x38 (C) [ 30.802252] dump_stack_lvl+0x8c/0xd0 [ 30.802360] print_report+0x118/0x5d0 [ 30.802409] kasan_report+0xdc/0x128 [ 30.802590] __asan_report_load1_noabort+0x20/0x30 [ 30.802826] ksize_unpoisons_memory+0x628/0x740 [ 30.802895] kunit_try_run_case+0x170/0x3f0 [ 30.802963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.803083] kthread+0x328/0x630 [ 30.803130] ret_from_fork+0x10/0x20 [ 30.803187] [ 30.803206] Allocated by task 225: [ 30.803386] kasan_save_stack+0x3c/0x68 [ 30.803438] kasan_save_track+0x20/0x40 [ 30.803595] kasan_save_alloc_info+0x40/0x58 [ 30.803704] __kasan_kmalloc+0xd4/0xd8 [ 30.803769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.803851] ksize_unpoisons_memory+0xc0/0x740 [ 30.803894] kunit_try_run_case+0x170/0x3f0 [ 30.804040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.804137] kthread+0x328/0x630 [ 30.804301] ret_from_fork+0x10/0x20 [ 30.804339] [ 30.804359] The buggy address belongs to the object at fff00000c6361e00 [ 30.804359] which belongs to the cache kmalloc-128 of size 128 [ 30.804438] The buggy address is located 0 bytes to the right of [ 30.804438] allocated 115-byte region [fff00000c6361e00, fff00000c6361e73) [ 30.804668] [ 30.804864] The buggy address belongs to the physical page: [ 30.804920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.805083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.805264] page_type: f5(slab) [ 30.805382] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.805447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.805553] page dumped because: kasan: bad access detected [ 30.805587] [ 30.805629] Memory state around the buggy address: [ 30.805874] fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.805968] fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.806105] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.806288] ^ [ 30.806389] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.806619] fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.806690] ================================================================== [ 30.807758] ================================================================== [ 30.808054] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.808279] Read of size 1 at addr fff00000c6361e78 by task kunit_try_catch/225 [ 30.808436] [ 30.808514] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.808688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.808767] Hardware name: linux,dummy-virt (DT) [ 30.808887] Call trace: [ 30.808988] show_stack+0x20/0x38 (C) [ 30.809067] dump_stack_lvl+0x8c/0xd0 [ 30.809245] print_report+0x118/0x5d0 [ 30.809395] kasan_report+0xdc/0x128 [ 30.809593] __asan_report_load1_noabort+0x20/0x30 [ 30.809757] ksize_unpoisons_memory+0x618/0x740 [ 30.809947] kunit_try_run_case+0x170/0x3f0 [ 30.810020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.810073] kthread+0x328/0x630 [ 30.810277] ret_from_fork+0x10/0x20 [ 30.810420] [ 30.810565] Allocated by task 225: [ 30.810635] kasan_save_stack+0x3c/0x68 [ 30.810806] kasan_save_track+0x20/0x40 [ 30.810848] kasan_save_alloc_info+0x40/0x58 [ 30.810952] __kasan_kmalloc+0xd4/0xd8 [ 30.810994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.811035] ksize_unpoisons_memory+0xc0/0x740 [ 30.811076] kunit_try_run_case+0x170/0x3f0 [ 30.811124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.811178] kthread+0x328/0x630 [ 30.811224] ret_from_fork+0x10/0x20 [ 30.811261] [ 30.811296] The buggy address belongs to the object at fff00000c6361e00 [ 30.811296] which belongs to the cache kmalloc-128 of size 128 [ 30.811356] The buggy address is located 5 bytes to the right of [ 30.811356] allocated 115-byte region [fff00000c6361e00, fff00000c6361e73) [ 30.811438] [ 30.811457] The buggy address belongs to the physical page: [ 30.811489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.811768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.811859] page_type: f5(slab) [ 30.812058] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.812240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.812331] page dumped because: kasan: bad access detected [ 30.812528] [ 30.812601] Memory state around the buggy address: [ 30.812635] fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.812796] fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.813108] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.813229] ^ [ 30.813318] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.813481] fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.813611] ================================================================== [ 30.815074] ================================================================== [ 30.815172] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 30.815346] Read of size 1 at addr fff00000c6361e7f by task kunit_try_catch/225 [ 30.815440] [ 30.815551] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.815641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.815895] Hardware name: linux,dummy-virt (DT) [ 30.816067] Call trace: [ 30.816137] show_stack+0x20/0x38 (C) [ 30.816297] dump_stack_lvl+0x8c/0xd0 [ 30.816388] print_report+0x118/0x5d0 [ 30.816465] kasan_report+0xdc/0x128 [ 30.816639] __asan_report_load1_noabort+0x20/0x30 [ 30.816693] ksize_unpoisons_memory+0x690/0x740 [ 30.816924] kunit_try_run_case+0x170/0x3f0 [ 30.817123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.817265] kthread+0x328/0x630 [ 30.817364] ret_from_fork+0x10/0x20 [ 30.817589] [ 30.817649] Allocated by task 225: [ 30.817739] kasan_save_stack+0x3c/0x68 [ 30.817796] kasan_save_track+0x20/0x40 [ 30.817850] kasan_save_alloc_info+0x40/0x58 [ 30.817895] __kasan_kmalloc+0xd4/0xd8 [ 30.817942] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.817991] ksize_unpoisons_memory+0xc0/0x740 [ 30.818032] kunit_try_run_case+0x170/0x3f0 [ 30.818069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.818115] kthread+0x328/0x630 [ 30.818148] ret_from_fork+0x10/0x20 [ 30.818184] [ 30.818203] The buggy address belongs to the object at fff00000c6361e00 [ 30.818203] which belongs to the cache kmalloc-128 of size 128 [ 30.818276] The buggy address is located 12 bytes to the right of [ 30.818276] allocated 115-byte region [fff00000c6361e00, fff00000c6361e73) [ 30.818345] [ 30.818371] The buggy address belongs to the physical page: [ 30.818422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.818478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.818747] page_type: f5(slab) [ 30.818844] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.819062] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.819203] page dumped because: kasan: bad access detected [ 30.819285] [ 30.819366] Memory state around the buggy address: [ 30.819561] fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.819632] fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.819964] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.820157] ^ [ 30.820310] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.820379] fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.820468] ==================================================================
[ 23.737544] ================================================================== [ 23.738107] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.738838] Read of size 1 at addr ffff888104a2497f by task kunit_try_catch/243 [ 23.739428] [ 23.739517] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 23.739575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.739587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.739608] Call Trace: [ 23.739627] <TASK> [ 23.739642] dump_stack_lvl+0x73/0xb0 [ 23.739671] print_report+0xd1/0x610 [ 23.739718] ? __virt_addr_valid+0x1db/0x2d0 [ 23.739740] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.739762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.739786] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.739809] kasan_report+0x141/0x180 [ 23.739829] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.739856] __asan_report_load1_noabort+0x18/0x20 [ 23.739929] ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.739952] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.739974] ? finish_task_switch.isra.0+0x153/0x700 [ 23.739995] ? __switch_to+0x47/0xf80 [ 23.740020] ? __schedule+0x10c6/0x2b60 [ 23.740042] ? __pfx_read_tsc+0x10/0x10 [ 23.740063] ? ktime_get_ts64+0x86/0x230 [ 23.740088] kunit_try_run_case+0x1a5/0x480 [ 23.740111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.740132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.740154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.740176] ? __kthread_parkme+0x82/0x180 [ 23.740195] ? preempt_count_sub+0x50/0x80 [ 23.740217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.740239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.740264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.740303] kthread+0x337/0x6f0 [ 23.740322] ? trace_preempt_on+0x20/0xc0 [ 23.740344] ? __pfx_kthread+0x10/0x10 [ 23.740364] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.740384] ? calculate_sigpending+0x7b/0xa0 [ 23.740407] ? __pfx_kthread+0x10/0x10 [ 23.740427] ret_from_fork+0x116/0x1d0 [ 23.740446] ? __pfx_kthread+0x10/0x10 [ 23.740465] ret_from_fork_asm+0x1a/0x30 [ 23.740495] </TASK> [ 23.740505] [ 23.753358] Allocated by task 243: [ 23.753485] kasan_save_stack+0x45/0x70 [ 23.753693] kasan_save_track+0x18/0x40 [ 23.754023] kasan_save_alloc_info+0x3b/0x50 [ 23.754473] __kasan_kmalloc+0xb7/0xc0 [ 23.754854] __kmalloc_cache_noprof+0x189/0x420 [ 23.755529] ksize_unpoisons_memory+0xc7/0x9b0 [ 23.755928] kunit_try_run_case+0x1a5/0x480 [ 23.756382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.756875] kthread+0x337/0x6f0 [ 23.757033] ret_from_fork+0x116/0x1d0 [ 23.757426] ret_from_fork_asm+0x1a/0x30 [ 23.757810] [ 23.757955] The buggy address belongs to the object at ffff888104a24900 [ 23.757955] which belongs to the cache kmalloc-128 of size 128 [ 23.758369] The buggy address is located 12 bytes to the right of [ 23.758369] allocated 115-byte region [ffff888104a24900, ffff888104a24973) [ 23.759305] [ 23.759473] The buggy address belongs to the physical page: [ 23.759990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24 [ 23.760724] flags: 0x200000000000000(node=0|zone=2) [ 23.761191] page_type: f5(slab) [ 23.761547] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.762117] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.762510] page dumped because: kasan: bad access detected [ 23.762805] [ 23.762970] Memory state around the buggy address: [ 23.763629] ffff888104a24800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.764399] ffff888104a24880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.764713] >ffff888104a24900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.765379] ^ [ 23.766111] ffff888104a24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.766341] ffff888104a24a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.766549] ================================================================== [ 23.673211] ================================================================== [ 23.674791] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 23.675764] Read of size 1 at addr ffff888104a24973 by task kunit_try_catch/243 [ 23.676801] [ 23.677293] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 23.677463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.677478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.677501] Call Trace: [ 23.677515] <TASK> [ 23.677531] dump_stack_lvl+0x73/0xb0 [ 23.677593] print_report+0xd1/0x610 [ 23.677615] ? __virt_addr_valid+0x1db/0x2d0 [ 23.677640] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 23.677662] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.677687] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 23.677709] kasan_report+0x141/0x180 [ 23.677730] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 23.677757] __asan_report_load1_noabort+0x18/0x20 [ 23.677779] ksize_unpoisons_memory+0x81c/0x9b0 [ 23.677801] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.677823] ? finish_task_switch.isra.0+0x153/0x700 [ 23.677844] ? __switch_to+0x47/0xf80 [ 23.677888] ? __schedule+0x10c6/0x2b60 [ 23.677910] ? __pfx_read_tsc+0x10/0x10 [ 23.677933] ? ktime_get_ts64+0x86/0x230 [ 23.677959] kunit_try_run_case+0x1a5/0x480 [ 23.677983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.678004] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.678026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.678049] ? __kthread_parkme+0x82/0x180 [ 23.678070] ? preempt_count_sub+0x50/0x80 [ 23.678091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.678113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.678138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.678164] kthread+0x337/0x6f0 [ 23.678183] ? trace_preempt_on+0x20/0xc0 [ 23.678206] ? __pfx_kthread+0x10/0x10 [ 23.678226] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.678246] ? calculate_sigpending+0x7b/0xa0 [ 23.678269] ? __pfx_kthread+0x10/0x10 [ 23.678299] ret_from_fork+0x116/0x1d0 [ 23.678317] ? __pfx_kthread+0x10/0x10 [ 23.678337] ret_from_fork_asm+0x1a/0x30 [ 23.678367] </TASK> [ 23.678378] [ 23.692384] Allocated by task 243: [ 23.692929] kasan_save_stack+0x45/0x70 [ 23.693448] kasan_save_track+0x18/0x40 [ 23.693977] kasan_save_alloc_info+0x3b/0x50 [ 23.694501] __kasan_kmalloc+0xb7/0xc0 [ 23.695036] __kmalloc_cache_noprof+0x189/0x420 [ 23.695671] ksize_unpoisons_memory+0xc7/0x9b0 [ 23.696272] kunit_try_run_case+0x1a5/0x480 [ 23.696832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.697664] kthread+0x337/0x6f0 [ 23.698128] ret_from_fork+0x116/0x1d0 [ 23.698580] ret_from_fork_asm+0x1a/0x30 [ 23.698978] [ 23.699244] The buggy address belongs to the object at ffff888104a24900 [ 23.699244] which belongs to the cache kmalloc-128 of size 128 [ 23.700343] The buggy address is located 0 bytes to the right of [ 23.700343] allocated 115-byte region [ffff888104a24900, ffff888104a24973) [ 23.701459] [ 23.701544] The buggy address belongs to the physical page: [ 23.702463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24 [ 23.703356] flags: 0x200000000000000(node=0|zone=2) [ 23.703533] page_type: f5(slab) [ 23.704116] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.705053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.705302] page dumped because: kasan: bad access detected [ 23.705471] [ 23.705542] Memory state around the buggy address: [ 23.705704] ffff888104a24800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.705936] ffff888104a24880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.706830] >ffff888104a24900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.707121] ^ [ 23.707443] ffff888104a24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.708406] ffff888104a24a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.709374] ================================================================== [ 23.710210] ================================================================== [ 23.710716] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.711144] Read of size 1 at addr ffff888104a24978 by task kunit_try_catch/243 [ 23.711453] [ 23.711575] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 23.711625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.711638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.711658] Call Trace: [ 23.711671] <TASK> [ 23.711688] dump_stack_lvl+0x73/0xb0 [ 23.711718] print_report+0xd1/0x610 [ 23.712080] ? __virt_addr_valid+0x1db/0x2d0 [ 23.712105] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.712127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.712151] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.712174] kasan_report+0x141/0x180 [ 23.712195] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.712221] __asan_report_load1_noabort+0x18/0x20 [ 23.712244] ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.712267] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.712301] ? finish_task_switch.isra.0+0x153/0x700 [ 23.712322] ? __switch_to+0x47/0xf80 [ 23.712347] ? __schedule+0x10c6/0x2b60 [ 23.712370] ? __pfx_read_tsc+0x10/0x10 [ 23.712391] ? ktime_get_ts64+0x86/0x230 [ 23.712415] kunit_try_run_case+0x1a5/0x480 [ 23.712439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.712461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.712483] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.712505] ? __kthread_parkme+0x82/0x180 [ 23.712524] ? preempt_count_sub+0x50/0x80 [ 23.712546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.712580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.712605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.712631] kthread+0x337/0x6f0 [ 23.712649] ? trace_preempt_on+0x20/0xc0 [ 23.712672] ? __pfx_kthread+0x10/0x10 [ 23.712692] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.712711] ? calculate_sigpending+0x7b/0xa0 [ 23.712734] ? __pfx_kthread+0x10/0x10 [ 23.712755] ret_from_fork+0x116/0x1d0 [ 23.712773] ? __pfx_kthread+0x10/0x10 [ 23.712793] ret_from_fork_asm+0x1a/0x30 [ 23.712824] </TASK> [ 23.712834] [ 23.723776] Allocated by task 243: [ 23.723908] kasan_save_stack+0x45/0x70 [ 23.724044] kasan_save_track+0x18/0x40 [ 23.724168] kasan_save_alloc_info+0x3b/0x50 [ 23.724381] __kasan_kmalloc+0xb7/0xc0 [ 23.724675] __kmalloc_cache_noprof+0x189/0x420 [ 23.725195] ksize_unpoisons_memory+0xc7/0x9b0 [ 23.725754] kunit_try_run_case+0x1a5/0x480 [ 23.726038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.726474] kthread+0x337/0x6f0 [ 23.726602] ret_from_fork+0x116/0x1d0 [ 23.726994] ret_from_fork_asm+0x1a/0x30 [ 23.727451] [ 23.727645] The buggy address belongs to the object at ffff888104a24900 [ 23.727645] which belongs to the cache kmalloc-128 of size 128 [ 23.728695] The buggy address is located 5 bytes to the right of [ 23.728695] allocated 115-byte region [ffff888104a24900, ffff888104a24973) [ 23.729430] [ 23.729503] The buggy address belongs to the physical page: [ 23.729905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24 [ 23.730923] flags: 0x200000000000000(node=0|zone=2) [ 23.731093] page_type: f5(slab) [ 23.731207] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.731441] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.731928] page dumped because: kasan: bad access detected [ 23.732532] [ 23.732718] Memory state around the buggy address: [ 23.733189] ffff888104a24800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.733869] ffff888104a24880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.734642] >ffff888104a24900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.735238] ^ [ 23.735742] ffff888104a24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.736164] ffff888104a24a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.736815] ==================================================================