Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.884804] ================================================================== [ 21.885755] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x720 [ 21.886636] Read of size 1 at addr fff00000c422827f by task kunit_try_catch/182 [ 21.887333] [ 21.888224] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.888500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.888571] Hardware name: linux,dummy-virt (DT) [ 21.888641] Call trace: [ 21.888702] dump_backtrace+0x9c/0x128 [ 21.888830] show_stack+0x20/0x38 [ 21.888893] dump_stack_lvl+0x8c/0xd0 [ 21.888946] print_report+0x118/0x5f0 [ 21.889022] kasan_report+0xdc/0x128 [ 21.889069] __asan_report_load1_noabort+0x20/0x30 [ 21.889120] ksize_unpoisons_memory+0x690/0x720 [ 21.889173] kunit_try_run_case+0x170/0x3f0 [ 21.889220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.889274] kthread+0x24c/0x2d0 [ 21.889321] ret_from_fork+0x10/0x20 [ 21.889367] [ 21.896699] Allocated by task 182: [ 21.897750] kasan_save_stack+0x3c/0x68 [ 21.898412] kasan_save_track+0x20/0x40 [ 21.898987] kasan_save_alloc_info+0x40/0x58 [ 21.899515] __kasan_kmalloc+0xd4/0xd8 [ 21.900496] __kmalloc_cache_noprof+0x154/0x320 [ 21.901094] ksize_unpoisons_memory+0xc0/0x720 [ 21.901653] kunit_try_run_case+0x170/0x3f0 [ 21.902202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.902803] kthread+0x24c/0x2d0 [ 21.903294] ret_from_fork+0x10/0x20 [ 21.904510] [ 21.904803] The buggy address belongs to the object at fff00000c4228200 [ 21.904803] which belongs to the cache kmalloc-128 of size 128 [ 21.905826] The buggy address is located 12 bytes to the right of [ 21.905826] allocated 115-byte region [fff00000c4228200, fff00000c4228273) [ 21.907013] [ 21.907332] The buggy address belongs to the physical page: [ 21.908300] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228 [ 21.909112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.909820] page_type: f5(slab) [ 21.910320] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.911114] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.912221] page dumped because: kasan: bad access detected [ 21.912867] [ 21.913089] Memory state around the buggy address: [ 21.913521] fff00000c4228100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.914633] fff00000c4228180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.915745] >fff00000c4228200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.916456] ^ [ 21.917390] fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.918139] fff00000c4228300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.918859] ================================================================== [ 21.813316] ================================================================== [ 21.814401] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x720 [ 21.815285] Read of size 1 at addr fff00000c4228273 by task kunit_try_catch/182 [ 21.816939] [ 21.817298] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.817414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.817494] Hardware name: linux,dummy-virt (DT) [ 21.817588] Call trace: [ 21.817677] dump_backtrace+0x9c/0x128 [ 21.817826] show_stack+0x20/0x38 [ 21.817896] dump_stack_lvl+0x8c/0xd0 [ 21.817948] print_report+0x118/0x5f0 [ 21.818024] kasan_report+0xdc/0x128 [ 21.818069] __asan_report_load1_noabort+0x20/0x30 [ 21.818120] ksize_unpoisons_memory+0x630/0x720 [ 21.818171] kunit_try_run_case+0x170/0x3f0 [ 21.818217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.818270] kthread+0x24c/0x2d0 [ 21.818315] ret_from_fork+0x10/0x20 [ 21.818364] [ 21.825516] Allocated by task 182: [ 21.825944] kasan_save_stack+0x3c/0x68 [ 21.826665] kasan_save_track+0x20/0x40 [ 21.827239] kasan_save_alloc_info+0x40/0x58 [ 21.828091] __kasan_kmalloc+0xd4/0xd8 [ 21.828580] __kmalloc_cache_noprof+0x154/0x320 [ 21.829236] ksize_unpoisons_memory+0xc0/0x720 [ 21.829902] kunit_try_run_case+0x170/0x3f0 [ 21.830527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.831307] kthread+0x24c/0x2d0 [ 21.832019] ret_from_fork+0x10/0x20 [ 21.832551] [ 21.832900] The buggy address belongs to the object at fff00000c4228200 [ 21.832900] which belongs to the cache kmalloc-128 of size 128 [ 21.834213] The buggy address is located 0 bytes to the right of [ 21.834213] allocated 115-byte region [fff00000c4228200, fff00000c4228273) [ 21.835978] [ 21.836246] The buggy address belongs to the physical page: [ 21.837168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228 [ 21.838071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.838807] page_type: f5(slab) [ 21.839307] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.840288] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.841119] page dumped because: kasan: bad access detected [ 21.841748] [ 21.842138] Memory state around the buggy address: [ 21.842777] fff00000c4228100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.843858] fff00000c4228180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.844623] >fff00000c4228200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.845513] ^ [ 21.846185] fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.846877] fff00000c4228300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.847824] ================================================================== [ 21.849738] ================================================================== [ 21.850446] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x720 [ 21.851117] Read of size 1 at addr fff00000c4228278 by task kunit_try_catch/182 [ 21.851887] [ 21.852455] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.852672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.852755] Hardware name: linux,dummy-virt (DT) [ 21.852854] Call trace: [ 21.852927] dump_backtrace+0x9c/0x128 [ 21.853059] show_stack+0x20/0x38 [ 21.853166] dump_stack_lvl+0x8c/0xd0 [ 21.853282] print_report+0x118/0x5f0 [ 21.853384] kasan_report+0xdc/0x128 [ 21.853481] __asan_report_load1_noabort+0x20/0x30 [ 21.853654] ksize_unpoisons_memory+0x628/0x720 [ 21.853760] kunit_try_run_case+0x170/0x3f0 [ 21.853854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.853987] kthread+0x24c/0x2d0 [ 21.854041] ret_from_fork+0x10/0x20 [ 21.854091] [ 21.860605] Allocated by task 182: [ 21.861073] kasan_save_stack+0x3c/0x68 [ 21.861516] kasan_save_track+0x20/0x40 [ 21.862055] kasan_save_alloc_info+0x40/0x58 [ 21.862629] __kasan_kmalloc+0xd4/0xd8 [ 21.863196] __kmalloc_cache_noprof+0x154/0x320 [ 21.864113] ksize_unpoisons_memory+0xc0/0x720 [ 21.864687] kunit_try_run_case+0x170/0x3f0 [ 21.865294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.865976] kthread+0x24c/0x2d0 [ 21.866449] ret_from_fork+0x10/0x20 [ 21.866982] [ 21.867297] The buggy address belongs to the object at fff00000c4228200 [ 21.867297] which belongs to the cache kmalloc-128 of size 128 [ 21.868634] The buggy address is located 5 bytes to the right of [ 21.868634] allocated 115-byte region [fff00000c4228200, fff00000c4228273) [ 21.869747] [ 21.870105] The buggy address belongs to the physical page: [ 21.870808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228 [ 21.872428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.873150] page_type: f5(slab) [ 21.873623] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.874583] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.875613] page dumped because: kasan: bad access detected [ 21.876202] [ 21.876484] Memory state around the buggy address: [ 21.877002] fff00000c4228100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.877754] fff00000c4228180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.878510] >fff00000c4228200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.879207] ^ [ 21.880207] fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.880953] fff00000c4228300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.881664] ==================================================================
[ 18.337195] ================================================================== [ 18.337836] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 18.338596] Read of size 1 at addr ffff88810230dd78 by task kunit_try_catch/199 [ 18.339778] [ 18.340195] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 18.340326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.340355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.340386] Call Trace: [ 18.340423] <TASK> [ 18.340449] dump_stack_lvl+0x73/0xb0 [ 18.340488] print_report+0xd1/0x640 [ 18.340523] ? __virt_addr_valid+0x1db/0x2d0 [ 18.340555] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 18.340582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.340613] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 18.340640] kasan_report+0x140/0x180 [ 18.340673] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 18.340707] __asan_report_load1_noabort+0x18/0x20 [ 18.340736] ksize_unpoisons_memory+0x7eb/0x9b0 [ 18.340765] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.340792] ? finish_task_switch.isra.0+0x153/0x700 [ 18.340841] ? __switch_to+0x5d9/0xf60 [ 18.340921] ? __schedule+0xc49/0x27a0 [ 18.340992] ? __pfx_read_tsc+0x10/0x10 [ 18.341058] ? ktime_get_ts64+0x84/0x230 [ 18.341140] kunit_try_run_case+0x1a6/0x480 [ 18.341230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.341301] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 18.341345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.341381] ? __kthread_parkme+0x82/0x160 [ 18.341408] ? preempt_count_sub+0x50/0x80 [ 18.341436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.341463] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.341499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.341536] kthread+0x257/0x310 [ 18.341562] ? __pfx_kthread+0x10/0x10 [ 18.341588] ret_from_fork+0x41/0x80 [ 18.341617] ? __pfx_kthread+0x10/0x10 [ 18.341643] ret_from_fork_asm+0x1a/0x30 [ 18.341683] </TASK> [ 18.341696] [ 18.358642] Allocated by task 199: [ 18.359880] kasan_save_stack+0x45/0x70 [ 18.360232] kasan_save_track+0x18/0x40 [ 18.360778] kasan_save_alloc_info+0x3b/0x50 [ 18.361177] __kasan_kmalloc+0xb7/0xc0 [ 18.361567] __kmalloc_cache_noprof+0x168/0x350 [ 18.362408] ksize_unpoisons_memory+0xc8/0x9b0 [ 18.362768] kunit_try_run_case+0x1a6/0x480 [ 18.363341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.363935] kthread+0x257/0x310 [ 18.364325] ret_from_fork+0x41/0x80 [ 18.364992] ret_from_fork_asm+0x1a/0x30 [ 18.365541] [ 18.365742] The buggy address belongs to the object at ffff88810230dd00 [ 18.365742] which belongs to the cache kmalloc-128 of size 128 [ 18.366939] The buggy address is located 5 bytes to the right of [ 18.366939] allocated 115-byte region [ffff88810230dd00, ffff88810230dd73) [ 18.368338] [ 18.368499] The buggy address belongs to the physical page: [ 18.368844] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230d [ 18.369849] flags: 0x200000000000000(node=0|zone=2) [ 18.370388] page_type: f5(slab) [ 18.370738] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.371703] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 18.372511] page dumped because: kasan: bad access detected [ 18.373085] [ 18.373332] Memory state around the buggy address: [ 18.374076] ffff88810230dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.374601] ffff88810230dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.375423] >ffff88810230dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.375660] ^ [ 18.376061] ffff88810230dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.376665] ffff88810230de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.377258] ================================================================== [ 18.296316] ================================================================== [ 18.297176] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 18.297735] Read of size 1 at addr ffff88810230dd73 by task kunit_try_catch/199 [ 18.298273] [ 18.298811] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 18.298947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.298982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.299037] Call Trace: [ 18.299074] <TASK> [ 18.299119] dump_stack_lvl+0x73/0xb0 [ 18.299168] print_report+0xd1/0x640 [ 18.299204] ? __virt_addr_valid+0x1db/0x2d0 [ 18.299278] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 18.299308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.299341] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 18.299368] kasan_report+0x140/0x180 [ 18.299402] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 18.299436] __asan_report_load1_noabort+0x18/0x20 [ 18.299467] ksize_unpoisons_memory+0x81e/0x9b0 [ 18.299496] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.299523] ? finish_task_switch.isra.0+0x153/0x700 [ 18.299552] ? __switch_to+0x5d9/0xf60 [ 18.299584] ? __schedule+0xc49/0x27a0 [ 18.299610] ? __pfx_read_tsc+0x10/0x10 [ 18.299635] ? ktime_get_ts64+0x84/0x230 [ 18.299670] kunit_try_run_case+0x1a6/0x480 [ 18.299701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.299728] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 18.299755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.299789] ? __kthread_parkme+0x82/0x160 [ 18.299831] ? preempt_count_sub+0x50/0x80 [ 18.299939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.300067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.300274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.300356] kthread+0x257/0x310 [ 18.300421] ? __pfx_kthread+0x10/0x10 [ 18.300478] ret_from_fork+0x41/0x80 [ 18.300509] ? __pfx_kthread+0x10/0x10 [ 18.300534] ret_from_fork_asm+0x1a/0x30 [ 18.300576] </TASK> [ 18.300589] [ 18.316654] Allocated by task 199: [ 18.317261] kasan_save_stack+0x45/0x70 [ 18.317643] kasan_save_track+0x18/0x40 [ 18.318557] kasan_save_alloc_info+0x3b/0x50 [ 18.318905] __kasan_kmalloc+0xb7/0xc0 [ 18.319459] __kmalloc_cache_noprof+0x168/0x350 [ 18.320054] ksize_unpoisons_memory+0xc8/0x9b0 [ 18.320490] kunit_try_run_case+0x1a6/0x480 [ 18.320939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.321389] kthread+0x257/0x310 [ 18.321703] ret_from_fork+0x41/0x80 [ 18.322088] ret_from_fork_asm+0x1a/0x30 [ 18.322594] [ 18.322876] The buggy address belongs to the object at ffff88810230dd00 [ 18.322876] which belongs to the cache kmalloc-128 of size 128 [ 18.324098] The buggy address is located 0 bytes to the right of [ 18.324098] allocated 115-byte region [ffff88810230dd00, ffff88810230dd73) [ 18.325062] [ 18.325308] The buggy address belongs to the physical page: [ 18.326000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230d [ 18.326769] flags: 0x200000000000000(node=0|zone=2) [ 18.327361] page_type: f5(slab) [ 18.327780] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.328462] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 18.329160] page dumped because: kasan: bad access detected [ 18.329665] [ 18.329963] Memory state around the buggy address: [ 18.330541] ffff88810230dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.331306] ffff88810230dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.331972] >ffff88810230dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.332589] ^ [ 18.333246] ffff88810230dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.333916] ffff88810230de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.334536] ================================================================== [ 18.379755] ================================================================== [ 18.380588] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 18.381254] Read of size 1 at addr ffff88810230dd7f by task kunit_try_catch/199 [ 18.381864] [ 18.382490] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 18.382594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.382623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.382674] Call Trace: [ 18.382725] <TASK> [ 18.382775] dump_stack_lvl+0x73/0xb0 [ 18.382856] print_report+0xd1/0x640 [ 18.382931] ? __virt_addr_valid+0x1db/0x2d0 [ 18.383010] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 18.383077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.383453] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 18.383487] kasan_report+0x140/0x180 [ 18.383522] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 18.383556] __asan_report_load1_noabort+0x18/0x20 [ 18.383586] ksize_unpoisons_memory+0x7b8/0x9b0 [ 18.383615] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.383643] ? finish_task_switch.isra.0+0x153/0x700 [ 18.383673] ? __switch_to+0x5d9/0xf60 [ 18.383705] ? __schedule+0xc49/0x27a0 [ 18.383731] ? __pfx_read_tsc+0x10/0x10 [ 18.383756] ? ktime_get_ts64+0x84/0x230 [ 18.383790] kunit_try_run_case+0x1a6/0x480 [ 18.383837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.383898] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 18.383929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.383965] ? __kthread_parkme+0x82/0x160 [ 18.383992] ? preempt_count_sub+0x50/0x80 [ 18.384020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.384047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.384082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.384118] kthread+0x257/0x310 [ 18.384143] ? __pfx_kthread+0x10/0x10 [ 18.384168] ret_from_fork+0x41/0x80 [ 18.384196] ? __pfx_kthread+0x10/0x10 [ 18.384244] ret_from_fork_asm+0x1a/0x30 [ 18.384288] </TASK> [ 18.384301] [ 18.402201] Allocated by task 199: [ 18.402752] kasan_save_stack+0x45/0x70 [ 18.403157] kasan_save_track+0x18/0x40 [ 18.403586] kasan_save_alloc_info+0x3b/0x50 [ 18.403992] __kasan_kmalloc+0xb7/0xc0 [ 18.404840] __kmalloc_cache_noprof+0x168/0x350 [ 18.405424] ksize_unpoisons_memory+0xc8/0x9b0 [ 18.405966] kunit_try_run_case+0x1a6/0x480 [ 18.406507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.407152] kthread+0x257/0x310 [ 18.407466] ret_from_fork+0x41/0x80 [ 18.407821] ret_from_fork_asm+0x1a/0x30 [ 18.408556] [ 18.408774] The buggy address belongs to the object at ffff88810230dd00 [ 18.408774] which belongs to the cache kmalloc-128 of size 128 [ 18.409824] The buggy address is located 12 bytes to the right of [ 18.409824] allocated 115-byte region [ffff88810230dd00, ffff88810230dd73) [ 18.411070] [ 18.411328] The buggy address belongs to the physical page: [ 18.411805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10230d [ 18.412886] flags: 0x200000000000000(node=0|zone=2) [ 18.413341] page_type: f5(slab) [ 18.413492] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.413737] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 18.414734] page dumped because: kasan: bad access detected [ 18.415528] [ 18.415928] Memory state around the buggy address: [ 18.416423] ffff88810230dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.417192] ffff88810230dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.417787] >ffff88810230dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.418405] ^ [ 18.419207] ffff88810230dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.419912] ffff88810230de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.420921] ==================================================================