Date
July 25, 2025, 3:13 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.606008] ================================================================== [ 32.606096] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 32.606192] Read of size 1 at addr fff00000c9726973 by task kunit_try_catch/226 [ 32.606265] [ 32.606297] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.606445] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.606489] Hardware name: linux,dummy-virt (DT) [ 32.606520] Call trace: [ 32.606543] show_stack+0x20/0x38 (C) [ 32.606593] dump_stack_lvl+0x8c/0xd0 [ 32.606659] print_report+0x118/0x5e8 [ 32.606705] kasan_report+0xdc/0x128 [ 32.606755] __asan_report_load1_noabort+0x20/0x30 [ 32.606804] ksize_unpoisons_memory+0x628/0x740 [ 32.606860] kunit_try_run_case+0x170/0x3f0 [ 32.606906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.607494] kthread+0x328/0x630 [ 32.607559] ret_from_fork+0x10/0x20 [ 32.607609] [ 32.607831] Allocated by task 226: [ 32.607987] kasan_save_stack+0x3c/0x68 [ 32.608208] kasan_save_track+0x20/0x40 [ 32.608295] kasan_save_alloc_info+0x40/0x58 [ 32.608469] __kasan_kmalloc+0xd4/0xd8 [ 32.608621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.608718] ksize_unpoisons_memory+0xc0/0x740 [ 32.608766] kunit_try_run_case+0x170/0x3f0 [ 32.609107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.609367] kthread+0x328/0x630 [ 32.609617] ret_from_fork+0x10/0x20 [ 32.609770] [ 32.610082] The buggy address belongs to the object at fff00000c9726900 [ 32.610082] which belongs to the cache kmalloc-128 of size 128 [ 32.610183] The buggy address is located 0 bytes to the right of [ 32.610183] allocated 115-byte region [fff00000c9726900, fff00000c9726973) [ 32.610486] [ 32.610633] The buggy address belongs to the physical page: [ 32.610896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.611019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.611161] page_type: f5(slab) [ 32.611230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.611279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.611663] page dumped because: kasan: bad access detected [ 32.611796] [ 32.611857] Memory state around the buggy address: [ 32.611957] fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.612090] fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.612168] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.612302] ^ [ 32.612345] fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.612439] fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.612527] ================================================================== [ 32.618122] ================================================================== [ 32.618457] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 32.618527] Read of size 1 at addr fff00000c9726978 by task kunit_try_catch/226 [ 32.618585] [ 32.618891] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.619216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.619511] Hardware name: linux,dummy-virt (DT) [ 32.619847] Call trace: [ 32.620114] show_stack+0x20/0x38 (C) [ 32.620343] dump_stack_lvl+0x8c/0xd0 [ 32.620465] print_report+0x118/0x5e8 [ 32.620592] kasan_report+0xdc/0x128 [ 32.620770] __asan_report_load1_noabort+0x20/0x30 [ 32.620908] ksize_unpoisons_memory+0x618/0x740 [ 32.621047] kunit_try_run_case+0x170/0x3f0 [ 32.621123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.621196] kthread+0x328/0x630 [ 32.621479] ret_from_fork+0x10/0x20 [ 32.621850] [ 32.621876] Allocated by task 226: [ 32.621915] kasan_save_stack+0x3c/0x68 [ 32.622161] kasan_save_track+0x20/0x40 [ 32.622324] kasan_save_alloc_info+0x40/0x58 [ 32.622417] __kasan_kmalloc+0xd4/0xd8 [ 32.622453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.622497] ksize_unpoisons_memory+0xc0/0x740 [ 32.622539] kunit_try_run_case+0x170/0x3f0 [ 32.622583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.622633] kthread+0x328/0x630 [ 32.622678] ret_from_fork+0x10/0x20 [ 32.622715] [ 32.622742] The buggy address belongs to the object at fff00000c9726900 [ 32.622742] which belongs to the cache kmalloc-128 of size 128 [ 32.622812] The buggy address is located 5 bytes to the right of [ 32.622812] allocated 115-byte region [fff00000c9726900, fff00000c9726973) [ 32.622875] [ 32.622905] The buggy address belongs to the physical page: [ 32.623568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.623631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.623691] page_type: f5(slab) [ 32.623731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.623971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.624195] page dumped because: kasan: bad access detected [ 32.624632] [ 32.624719] Memory state around the buggy address: [ 32.624806] fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.624871] fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.625358] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.625484] ^ [ 32.625634] fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.625881] fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.625986] ================================================================== [ 32.628291] ================================================================== [ 32.628544] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 32.628652] Read of size 1 at addr fff00000c972697f by task kunit_try_catch/226 [ 32.629060] [ 32.629112] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.629202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.629289] Hardware name: linux,dummy-virt (DT) [ 32.629324] Call trace: [ 32.629345] show_stack+0x20/0x38 (C) [ 32.629424] dump_stack_lvl+0x8c/0xd0 [ 32.629651] print_report+0x118/0x5e8 [ 32.629704] kasan_report+0xdc/0x128 [ 32.629869] __asan_report_load1_noabort+0x20/0x30 [ 32.629930] ksize_unpoisons_memory+0x690/0x740 [ 32.630110] kunit_try_run_case+0x170/0x3f0 [ 32.630174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.630237] kthread+0x328/0x630 [ 32.630414] ret_from_fork+0x10/0x20 [ 32.630659] [ 32.630775] Allocated by task 226: [ 32.630841] kasan_save_stack+0x3c/0x68 [ 32.630904] kasan_save_track+0x20/0x40 [ 32.631023] kasan_save_alloc_info+0x40/0x58 [ 32.631175] __kasan_kmalloc+0xd4/0xd8 [ 32.631215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.631278] ksize_unpoisons_memory+0xc0/0x740 [ 32.631553] kunit_try_run_case+0x170/0x3f0 [ 32.631615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.631757] kthread+0x328/0x630 [ 32.631854] ret_from_fork+0x10/0x20 [ 32.631976] [ 32.632040] The buggy address belongs to the object at fff00000c9726900 [ 32.632040] which belongs to the cache kmalloc-128 of size 128 [ 32.632247] The buggy address is located 12 bytes to the right of [ 32.632247] allocated 115-byte region [fff00000c9726900, fff00000c9726973) [ 32.632528] [ 32.632555] The buggy address belongs to the physical page: [ 32.632589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.632675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.632724] page_type: f5(slab) [ 32.632768] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.632819] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.632880] page dumped because: kasan: bad access detected [ 32.632923] [ 32.632950] Memory state around the buggy address: [ 32.632984] fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.633037] fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.633101] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.633137] ^ [ 32.633185] fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.633227] fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.633275] ==================================================================
[ 26.194219] ================================================================== [ 26.194641] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 26.194926] Read of size 1 at addr ffff888106253173 by task kunit_try_catch/243 [ 26.195329] [ 26.195660] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 26.195706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.195717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.195737] Call Trace: [ 26.195750] <TASK> [ 26.195766] dump_stack_lvl+0x73/0xb0 [ 26.195795] print_report+0xd1/0x640 [ 26.195818] ? __virt_addr_valid+0x1db/0x2d0 [ 26.195870] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 26.195894] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.195920] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 26.195952] kasan_report+0x141/0x180 [ 26.195975] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 26.196003] __asan_report_load1_noabort+0x18/0x20 [ 26.196028] ksize_unpoisons_memory+0x81c/0x9b0 [ 26.196052] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.196086] ? finish_task_switch.isra.0+0x153/0x700 [ 26.196108] ? __switch_to+0x47/0xf80 [ 26.196135] ? __schedule+0x10da/0x2b60 [ 26.196157] ? __pfx_read_tsc+0x10/0x10 [ 26.196179] ? ktime_get_ts64+0x86/0x230 [ 26.196204] kunit_try_run_case+0x1a5/0x480 [ 26.196228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.196251] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.196272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.196299] ? __kthread_parkme+0x82/0x180 [ 26.196320] ? preempt_count_sub+0x50/0x80 [ 26.196344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.196368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.196391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.196415] kthread+0x337/0x6f0 [ 26.196436] ? trace_preempt_on+0x20/0xc0 [ 26.196458] ? __pfx_kthread+0x10/0x10 [ 26.196479] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.196503] ? calculate_sigpending+0x7b/0xa0 [ 26.196527] ? __pfx_kthread+0x10/0x10 [ 26.196549] ret_from_fork+0x116/0x1d0 [ 26.196568] ? __pfx_kthread+0x10/0x10 [ 26.196589] ret_from_fork_asm+0x1a/0x30 [ 26.196620] </TASK> [ 26.196631] [ 26.204367] Allocated by task 243: [ 26.204550] kasan_save_stack+0x45/0x70 [ 26.204749] kasan_save_track+0x18/0x40 [ 26.204968] kasan_save_alloc_info+0x3b/0x50 [ 26.205342] __kasan_kmalloc+0xb7/0xc0 [ 26.205778] __kmalloc_cache_noprof+0x189/0x420 [ 26.206052] ksize_unpoisons_memory+0xc7/0x9b0 [ 26.206257] kunit_try_run_case+0x1a5/0x480 [ 26.206406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.206638] kthread+0x337/0x6f0 [ 26.206829] ret_from_fork+0x116/0x1d0 [ 26.207027] ret_from_fork_asm+0x1a/0x30 [ 26.207291] [ 26.207376] The buggy address belongs to the object at ffff888106253100 [ 26.207376] which belongs to the cache kmalloc-128 of size 128 [ 26.207836] The buggy address is located 0 bytes to the right of [ 26.207836] allocated 115-byte region [ffff888106253100, ffff888106253173) [ 26.208426] [ 26.208520] The buggy address belongs to the physical page: [ 26.208761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253 [ 26.209211] flags: 0x200000000000000(node=0|zone=2) [ 26.209442] page_type: f5(slab) [ 26.209593] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.209988] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.210381] page dumped because: kasan: bad access detected [ 26.210607] [ 26.210696] Memory state around the buggy address: [ 26.210981] ffff888106253000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.211301] ffff888106253080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.211520] >ffff888106253100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.211733] ^ [ 26.211941] ffff888106253180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.212285] ffff888106253200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.213016] ================================================================== [ 26.233070] ================================================================== [ 26.233337] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.233567] Read of size 1 at addr ffff88810625317f by task kunit_try_catch/243 [ 26.233787] [ 26.233864] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 26.233908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.233919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.233938] Call Trace: [ 26.234105] <TASK> [ 26.234122] dump_stack_lvl+0x73/0xb0 [ 26.234152] print_report+0xd1/0x640 [ 26.234175] ? __virt_addr_valid+0x1db/0x2d0 [ 26.234199] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.234222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.234248] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.234272] kasan_report+0x141/0x180 [ 26.234295] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.234324] __asan_report_load1_noabort+0x18/0x20 [ 26.234348] ksize_unpoisons_memory+0x7b6/0x9b0 [ 26.234373] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.234396] ? finish_task_switch.isra.0+0x153/0x700 [ 26.234418] ? __switch_to+0x47/0xf80 [ 26.234444] ? __schedule+0x10da/0x2b60 [ 26.234465] ? __pfx_read_tsc+0x10/0x10 [ 26.234487] ? ktime_get_ts64+0x86/0x230 [ 26.234513] kunit_try_run_case+0x1a5/0x480 [ 26.234537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.234560] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.234582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.234609] ? __kthread_parkme+0x82/0x180 [ 26.234629] ? preempt_count_sub+0x50/0x80 [ 26.234652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.234677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.234700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.234725] kthread+0x337/0x6f0 [ 26.234745] ? trace_preempt_on+0x20/0xc0 [ 26.234768] ? __pfx_kthread+0x10/0x10 [ 26.234789] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.234813] ? calculate_sigpending+0x7b/0xa0 [ 26.234837] ? __pfx_kthread+0x10/0x10 [ 26.234908] ret_from_fork+0x116/0x1d0 [ 26.234928] ? __pfx_kthread+0x10/0x10 [ 26.234962] ret_from_fork_asm+0x1a/0x30 [ 26.234994] </TASK> [ 26.235004] [ 26.243111] Allocated by task 243: [ 26.243289] kasan_save_stack+0x45/0x70 [ 26.243485] kasan_save_track+0x18/0x40 [ 26.243673] kasan_save_alloc_info+0x3b/0x50 [ 26.243879] __kasan_kmalloc+0xb7/0xc0 [ 26.244071] __kmalloc_cache_noprof+0x189/0x420 [ 26.244447] ksize_unpoisons_memory+0xc7/0x9b0 [ 26.244599] kunit_try_run_case+0x1a5/0x480 [ 26.244744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.245018] kthread+0x337/0x6f0 [ 26.245201] ret_from_fork+0x116/0x1d0 [ 26.245390] ret_from_fork_asm+0x1a/0x30 [ 26.245591] [ 26.245685] The buggy address belongs to the object at ffff888106253100 [ 26.245685] which belongs to the cache kmalloc-128 of size 128 [ 26.246407] The buggy address is located 12 bytes to the right of [ 26.246407] allocated 115-byte region [ffff888106253100, ffff888106253173) [ 26.246991] [ 26.247100] The buggy address belongs to the physical page: [ 26.247284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253 [ 26.247623] flags: 0x200000000000000(node=0|zone=2) [ 26.247902] page_type: f5(slab) [ 26.248078] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.248362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.248696] page dumped because: kasan: bad access detected [ 26.248991] [ 26.249080] Memory state around the buggy address: [ 26.249268] ffff888106253000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.249563] ffff888106253080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.250039] >ffff888106253100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.250336] ^ [ 26.250618] ffff888106253180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.250996] ffff888106253200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.251290] ================================================================== [ 26.213717] ================================================================== [ 26.213961] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.214518] Read of size 1 at addr ffff888106253178 by task kunit_try_catch/243 [ 26.214867] [ 26.214985] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 26.215031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.215042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.215061] Call Trace: [ 26.215075] <TASK> [ 26.215089] dump_stack_lvl+0x73/0xb0 [ 26.215127] print_report+0xd1/0x640 [ 26.215150] ? __virt_addr_valid+0x1db/0x2d0 [ 26.215173] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.215196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.215222] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.215246] kasan_report+0x141/0x180 [ 26.215269] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.215297] __asan_report_load1_noabort+0x18/0x20 [ 26.215322] ksize_unpoisons_memory+0x7e9/0x9b0 [ 26.215346] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 26.215369] ? finish_task_switch.isra.0+0x153/0x700 [ 26.215391] ? __switch_to+0x47/0xf80 [ 26.215417] ? __schedule+0x10da/0x2b60 [ 26.215438] ? __pfx_read_tsc+0x10/0x10 [ 26.215460] ? ktime_get_ts64+0x86/0x230 [ 26.215484] kunit_try_run_case+0x1a5/0x480 [ 26.215509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.215532] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.215554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.215580] ? __kthread_parkme+0x82/0x180 [ 26.215600] ? preempt_count_sub+0x50/0x80 [ 26.215624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.215648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.215673] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.215698] kthread+0x337/0x6f0 [ 26.215719] ? trace_preempt_on+0x20/0xc0 [ 26.215742] ? __pfx_kthread+0x10/0x10 [ 26.215763] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.215788] ? calculate_sigpending+0x7b/0xa0 [ 26.215812] ? __pfx_kthread+0x10/0x10 [ 26.215834] ret_from_fork+0x116/0x1d0 [ 26.215854] ? __pfx_kthread+0x10/0x10 [ 26.215875] ret_from_fork_asm+0x1a/0x30 [ 26.215906] </TASK> [ 26.215917] [ 26.224241] Allocated by task 243: [ 26.224373] kasan_save_stack+0x45/0x70 [ 26.224517] kasan_save_track+0x18/0x40 [ 26.224652] kasan_save_alloc_info+0x3b/0x50 [ 26.224817] __kasan_kmalloc+0xb7/0xc0 [ 26.225017] __kmalloc_cache_noprof+0x189/0x420 [ 26.225378] ksize_unpoisons_memory+0xc7/0x9b0 [ 26.225593] kunit_try_run_case+0x1a5/0x480 [ 26.225806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.226218] kthread+0x337/0x6f0 [ 26.226394] ret_from_fork+0x116/0x1d0 [ 26.226560] ret_from_fork_asm+0x1a/0x30 [ 26.226755] [ 26.226928] The buggy address belongs to the object at ffff888106253100 [ 26.226928] which belongs to the cache kmalloc-128 of size 128 [ 26.227454] The buggy address is located 5 bytes to the right of [ 26.227454] allocated 115-byte region [ffff888106253100, ffff888106253173) [ 26.228166] [ 26.228257] The buggy address belongs to the physical page: [ 26.228489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253 [ 26.228808] flags: 0x200000000000000(node=0|zone=2) [ 26.229043] page_type: f5(slab) [ 26.229216] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.229615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.230052] page dumped because: kasan: bad access detected [ 26.230315] [ 26.230388] Memory state around the buggy address: [ 26.230567] ffff888106253000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.230788] ffff888106253080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.231123] >ffff888106253100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.231541] ^ [ 26.231982] ffff888106253180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.232328] ffff888106253200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.232601] ==================================================================