Date
July 3, 2025, 6:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.026288] ================================================================== [ 17.026692] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 17.026995] Read of size 1 at addr fff00000c78c1378 by task kunit_try_catch/194 [ 17.027078] [ 17.027299] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.027396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.027541] Hardware name: linux,dummy-virt (DT) [ 17.027652] Call trace: [ 17.027702] show_stack+0x20/0x38 (C) [ 17.027807] dump_stack_lvl+0x8c/0xd0 [ 17.028001] print_report+0x118/0x608 [ 17.028081] kasan_report+0xdc/0x128 [ 17.028136] __asan_report_load1_noabort+0x20/0x30 [ 17.028372] ksize_unpoisons_memory+0x618/0x740 [ 17.028434] kunit_try_run_case+0x170/0x3f0 [ 17.028485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.028604] kthread+0x328/0x630 [ 17.028646] ret_from_fork+0x10/0x20 [ 17.028695] [ 17.028712] Allocated by task 194: [ 17.028739] kasan_save_stack+0x3c/0x68 [ 17.029080] kasan_save_track+0x20/0x40 [ 17.029244] kasan_save_alloc_info+0x40/0x58 [ 17.029447] __kasan_kmalloc+0xd4/0xd8 [ 17.029553] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.029960] ksize_unpoisons_memory+0xc0/0x740 [ 17.030139] kunit_try_run_case+0x170/0x3f0 [ 17.030236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.030361] kthread+0x328/0x630 [ 17.030426] ret_from_fork+0x10/0x20 [ 17.030777] [ 17.030822] The buggy address belongs to the object at fff00000c78c1300 [ 17.030822] which belongs to the cache kmalloc-128 of size 128 [ 17.031019] The buggy address is located 5 bytes to the right of [ 17.031019] allocated 115-byte region [fff00000c78c1300, fff00000c78c1373) [ 17.031217] [ 17.031255] The buggy address belongs to the physical page: [ 17.031451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c1 [ 17.031767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.031918] page_type: f5(slab) [ 17.032051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.032240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.032350] page dumped because: kasan: bad access detected [ 17.032526] [ 17.032747] Memory state around the buggy address: [ 17.032851] fff00000c78c1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.032920] fff00000c78c1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.032973] >fff00000c78c1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.033038] ^ [ 17.033080] fff00000c78c1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.033278] fff00000c78c1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.033510] ================================================================== [ 17.017758] ================================================================== [ 17.017835] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 17.017898] Read of size 1 at addr fff00000c78c1373 by task kunit_try_catch/194 [ 17.017959] [ 17.017992] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.018086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.018114] Hardware name: linux,dummy-virt (DT) [ 17.018145] Call trace: [ 17.018167] show_stack+0x20/0x38 (C) [ 17.018215] dump_stack_lvl+0x8c/0xd0 [ 17.018261] print_report+0x118/0x608 [ 17.018305] kasan_report+0xdc/0x128 [ 17.018351] __asan_report_load1_noabort+0x20/0x30 [ 17.018402] ksize_unpoisons_memory+0x628/0x740 [ 17.018451] kunit_try_run_case+0x170/0x3f0 [ 17.018499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.018552] kthread+0x328/0x630 [ 17.018592] ret_from_fork+0x10/0x20 [ 17.018651] [ 17.018669] Allocated by task 194: [ 17.018697] kasan_save_stack+0x3c/0x68 [ 17.018736] kasan_save_track+0x20/0x40 [ 17.018771] kasan_save_alloc_info+0x40/0x58 [ 17.018810] __kasan_kmalloc+0xd4/0xd8 [ 17.018854] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.018894] ksize_unpoisons_memory+0xc0/0x740 [ 17.018931] kunit_try_run_case+0x170/0x3f0 [ 17.018968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.019019] kthread+0x328/0x630 [ 17.019734] ret_from_fork+0x10/0x20 [ 17.019780] [ 17.020044] The buggy address belongs to the object at fff00000c78c1300 [ 17.020044] which belongs to the cache kmalloc-128 of size 128 [ 17.020174] The buggy address is located 0 bytes to the right of [ 17.020174] allocated 115-byte region [fff00000c78c1300, fff00000c78c1373) [ 17.020244] [ 17.020263] The buggy address belongs to the physical page: [ 17.020535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c1 [ 17.020791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.020850] page_type: f5(slab) [ 17.020889] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.020941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.020984] page dumped because: kasan: bad access detected [ 17.021397] [ 17.021444] Memory state around the buggy address: [ 17.021768] fff00000c78c1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.021895] fff00000c78c1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.022086] >fff00000c78c1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.022163] ^ [ 17.022378] fff00000c78c1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.022564] fff00000c78c1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.022635] ================================================================== [ 17.038334] ================================================================== [ 17.038405] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 17.038458] Read of size 1 at addr fff00000c78c137f by task kunit_try_catch/194 [ 17.038518] [ 17.038548] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.038628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.038661] Hardware name: linux,dummy-virt (DT) [ 17.038692] Call trace: [ 17.038713] show_stack+0x20/0x38 (C) [ 17.038760] dump_stack_lvl+0x8c/0xd0 [ 17.038807] print_report+0x118/0x608 [ 17.038859] kasan_report+0xdc/0x128 [ 17.038905] __asan_report_load1_noabort+0x20/0x30 [ 17.038957] ksize_unpoisons_memory+0x690/0x740 [ 17.039004] kunit_try_run_case+0x170/0x3f0 [ 17.039065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.039117] kthread+0x328/0x630 [ 17.039157] ret_from_fork+0x10/0x20 [ 17.039203] [ 17.039222] Allocated by task 194: [ 17.039256] kasan_save_stack+0x3c/0x68 [ 17.039305] kasan_save_track+0x20/0x40 [ 17.039344] kasan_save_alloc_info+0x40/0x58 [ 17.039390] __kasan_kmalloc+0xd4/0xd8 [ 17.039426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.039465] ksize_unpoisons_memory+0xc0/0x740 [ 17.039508] kunit_try_run_case+0x170/0x3f0 [ 17.039545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.039589] kthread+0x328/0x630 [ 17.039620] ret_from_fork+0x10/0x20 [ 17.039655] [ 17.039673] The buggy address belongs to the object at fff00000c78c1300 [ 17.039673] which belongs to the cache kmalloc-128 of size 128 [ 17.039739] The buggy address is located 12 bytes to the right of [ 17.039739] allocated 115-byte region [fff00000c78c1300, fff00000c78c1373) [ 17.039804] [ 17.039823] The buggy address belongs to the physical page: [ 17.039867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c1 [ 17.039919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.039980] page_type: f5(slab) [ 17.040018] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.040393] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.040440] page dumped because: kasan: bad access detected [ 17.040850] [ 17.040902] Memory state around the buggy address: [ 17.040996] fff00000c78c1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.041083] fff00000c78c1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.041361] >fff00000c78c1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.041444] ^ [ 17.041512] fff00000c78c1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.041612] fff00000c78c1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.041874] ==================================================================
[ 11.895343] ================================================================== [ 11.895691] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.895988] Read of size 1 at addr ffff8881029db67f by task kunit_try_catch/212 [ 11.896446] [ 11.896569] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.896612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.896623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.896642] Call Trace: [ 11.896660] <TASK> [ 11.896676] dump_stack_lvl+0x73/0xb0 [ 11.896702] print_report+0xd1/0x650 [ 11.896724] ? __virt_addr_valid+0x1db/0x2d0 [ 11.896746] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.896768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.896789] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.896811] kasan_report+0x141/0x180 [ 11.896832] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.896859] __asan_report_load1_noabort+0x18/0x20 [ 11.896883] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.896905] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.896926] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.896954] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.896981] kunit_try_run_case+0x1a5/0x480 [ 11.897004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.897025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.897047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.897069] ? __kthread_parkme+0x82/0x180 [ 11.897088] ? preempt_count_sub+0x50/0x80 [ 11.897124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.897146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.897168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.897190] kthread+0x337/0x6f0 [ 11.897208] ? trace_preempt_on+0x20/0xc0 [ 11.897234] ? __pfx_kthread+0x10/0x10 [ 11.897254] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.897273] ? calculate_sigpending+0x7b/0xa0 [ 11.897296] ? __pfx_kthread+0x10/0x10 [ 11.897317] ret_from_fork+0x116/0x1d0 [ 11.897335] ? __pfx_kthread+0x10/0x10 [ 11.897354] ret_from_fork_asm+0x1a/0x30 [ 11.897384] </TASK> [ 11.897395] [ 11.908125] Allocated by task 212: [ 11.908526] kasan_save_stack+0x45/0x70 [ 11.908763] kasan_save_track+0x18/0x40 [ 11.908907] kasan_save_alloc_info+0x3b/0x50 [ 11.909060] __kasan_kmalloc+0xb7/0xc0 [ 11.909355] __kmalloc_cache_noprof+0x189/0x420 [ 11.909800] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.910286] kunit_try_run_case+0x1a5/0x480 [ 11.910681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.911157] kthread+0x337/0x6f0 [ 11.911528] ret_from_fork+0x116/0x1d0 [ 11.911928] ret_from_fork_asm+0x1a/0x30 [ 11.912366] [ 11.912548] The buggy address belongs to the object at ffff8881029db600 [ 11.912548] which belongs to the cache kmalloc-128 of size 128 [ 11.913061] The buggy address is located 12 bytes to the right of [ 11.913061] allocated 115-byte region [ffff8881029db600, ffff8881029db673) [ 11.914036] [ 11.914222] The buggy address belongs to the physical page: [ 11.914820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db [ 11.915755] flags: 0x200000000000000(node=0|zone=2) [ 11.916328] page_type: f5(slab) [ 11.916737] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.917569] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.917985] page dumped because: kasan: bad access detected [ 11.918224] [ 11.918392] Memory state around the buggy address: [ 11.918862] ffff8881029db500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.919667] ffff8881029db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.920408] >ffff8881029db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.920950] ^ [ 11.921225] ffff8881029db680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.921872] ffff8881029db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.922671] ================================================================== [ 11.856509] ================================================================== [ 11.856992] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.857327] Read of size 1 at addr ffff8881029db673 by task kunit_try_catch/212 [ 11.857692] [ 11.857807] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.857853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.857865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.857884] Call Trace: [ 11.857895] <TASK> [ 11.857919] dump_stack_lvl+0x73/0xb0 [ 11.857946] print_report+0xd1/0x650 [ 11.857968] ? __virt_addr_valid+0x1db/0x2d0 [ 11.857991] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.858012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.858034] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.858056] kasan_report+0x141/0x180 [ 11.858076] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.858115] __asan_report_load1_noabort+0x18/0x20 [ 11.858139] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.858162] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.858183] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.858212] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.858238] kunit_try_run_case+0x1a5/0x480 [ 11.858261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.858282] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.858304] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.858326] ? __kthread_parkme+0x82/0x180 [ 11.858345] ? preempt_count_sub+0x50/0x80 [ 11.858367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.858390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.858411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.858433] kthread+0x337/0x6f0 [ 11.858452] ? trace_preempt_on+0x20/0xc0 [ 11.858475] ? __pfx_kthread+0x10/0x10 [ 11.858495] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.858515] ? calculate_sigpending+0x7b/0xa0 [ 11.858537] ? __pfx_kthread+0x10/0x10 [ 11.858558] ret_from_fork+0x116/0x1d0 [ 11.858576] ? __pfx_kthread+0x10/0x10 [ 11.858595] ret_from_fork_asm+0x1a/0x30 [ 11.858624] </TASK> [ 11.858635] [ 11.865945] Allocated by task 212: [ 11.866117] kasan_save_stack+0x45/0x70 [ 11.866371] kasan_save_track+0x18/0x40 [ 11.866580] kasan_save_alloc_info+0x3b/0x50 [ 11.866801] __kasan_kmalloc+0xb7/0xc0 [ 11.866992] __kmalloc_cache_noprof+0x189/0x420 [ 11.867351] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.867582] kunit_try_run_case+0x1a5/0x480 [ 11.867763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.867994] kthread+0x337/0x6f0 [ 11.868181] ret_from_fork+0x116/0x1d0 [ 11.868519] ret_from_fork_asm+0x1a/0x30 [ 11.868708] [ 11.868814] The buggy address belongs to the object at ffff8881029db600 [ 11.868814] which belongs to the cache kmalloc-128 of size 128 [ 11.869385] The buggy address is located 0 bytes to the right of [ 11.869385] allocated 115-byte region [ffff8881029db600, ffff8881029db673) [ 11.869862] [ 11.869968] The buggy address belongs to the physical page: [ 11.870299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db [ 11.870641] flags: 0x200000000000000(node=0|zone=2) [ 11.870842] page_type: f5(slab) [ 11.871020] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.871498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.871737] page dumped because: kasan: bad access detected [ 11.871915] [ 11.871991] Memory state around the buggy address: [ 11.872180] ffff8881029db500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.872500] ffff8881029db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.873065] >ffff8881029db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.873298] ^ [ 11.873512] ffff8881029db680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.873734] ffff8881029db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.874300] ================================================================== [ 11.875763] ================================================================== [ 11.876138] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.876739] Read of size 1 at addr ffff8881029db678 by task kunit_try_catch/212 [ 11.876971] [ 11.877092] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.877149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.877203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.877225] Call Trace: [ 11.877244] <TASK> [ 11.877260] dump_stack_lvl+0x73/0xb0 [ 11.877286] print_report+0xd1/0x650 [ 11.877308] ? __virt_addr_valid+0x1db/0x2d0 [ 11.877330] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.877352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.877373] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.877395] kasan_report+0x141/0x180 [ 11.877416] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.877442] __asan_report_load1_noabort+0x18/0x20 [ 11.877466] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.877489] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.877511] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.877539] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.877565] kunit_try_run_case+0x1a5/0x480 [ 11.877587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.877608] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.877631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.877653] ? __kthread_parkme+0x82/0x180 [ 11.877673] ? preempt_count_sub+0x50/0x80 [ 11.877695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.877718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.877739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.877762] kthread+0x337/0x6f0 [ 11.877783] ? trace_preempt_on+0x20/0xc0 [ 11.877807] ? __pfx_kthread+0x10/0x10 [ 11.877828] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.877847] ? calculate_sigpending+0x7b/0xa0 [ 11.877871] ? __pfx_kthread+0x10/0x10 [ 11.877891] ret_from_fork+0x116/0x1d0 [ 11.877909] ? __pfx_kthread+0x10/0x10 [ 11.877929] ret_from_fork_asm+0x1a/0x30 [ 11.877960] </TASK> [ 11.877971] [ 11.885732] Allocated by task 212: [ 11.885905] kasan_save_stack+0x45/0x70 [ 11.886132] kasan_save_track+0x18/0x40 [ 11.886393] kasan_save_alloc_info+0x3b/0x50 [ 11.886575] __kasan_kmalloc+0xb7/0xc0 [ 11.886745] __kmalloc_cache_noprof+0x189/0x420 [ 11.886943] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.887155] kunit_try_run_case+0x1a5/0x480 [ 11.887572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.887823] kthread+0x337/0x6f0 [ 11.887980] ret_from_fork+0x116/0x1d0 [ 11.888191] ret_from_fork_asm+0x1a/0x30 [ 11.888681] [ 11.888787] The buggy address belongs to the object at ffff8881029db600 [ 11.888787] which belongs to the cache kmalloc-128 of size 128 [ 11.889237] The buggy address is located 5 bytes to the right of [ 11.889237] allocated 115-byte region [ffff8881029db600, ffff8881029db673) [ 11.890042] [ 11.890131] The buggy address belongs to the physical page: [ 11.890313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db [ 11.890560] flags: 0x200000000000000(node=0|zone=2) [ 11.890857] page_type: f5(slab) [ 11.891031] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.891658] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.891894] page dumped because: kasan: bad access detected [ 11.892071] [ 11.892226] Memory state around the buggy address: [ 11.892596] ffff8881029db500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.893358] ffff8881029db580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.893688] >ffff8881029db600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.893972] ^ [ 11.894326] ffff8881029db680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.894596] ffff8881029db700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.894813] ==================================================================