Date
July 23, 2025, 2:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.633063] ================================================================== [ 15.633419] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 15.633488] Read of size 1 at addr fff00000c3f39978 by task kunit_try_catch/194 [ 15.633544] [ 15.633576] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 15.633921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.634157] Hardware name: linux,dummy-virt (DT) [ 15.634359] Call trace: [ 15.634405] show_stack+0x20/0x38 (C) [ 15.634466] dump_stack_lvl+0x8c/0xd0 [ 15.634669] print_report+0x118/0x5d0 [ 15.634764] kasan_report+0xdc/0x128 [ 15.634812] __asan_report_load1_noabort+0x20/0x30 [ 15.634874] ksize_unpoisons_memory+0x618/0x740 [ 15.635346] kunit_try_run_case+0x170/0x3f0 [ 15.635460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.635872] kthread+0x328/0x630 [ 15.636095] ret_from_fork+0x10/0x20 [ 15.636339] [ 15.636405] Allocated by task 194: [ 15.636442] kasan_save_stack+0x3c/0x68 [ 15.636810] kasan_save_track+0x20/0x40 [ 15.636930] kasan_save_alloc_info+0x40/0x58 [ 15.636976] __kasan_kmalloc+0xd4/0xd8 [ 15.637324] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.637468] ksize_unpoisons_memory+0xc0/0x740 [ 15.637524] kunit_try_run_case+0x170/0x3f0 [ 15.637873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.638065] kthread+0x328/0x630 [ 15.638103] ret_from_fork+0x10/0x20 [ 15.638380] [ 15.638506] The buggy address belongs to the object at fff00000c3f39900 [ 15.638506] which belongs to the cache kmalloc-128 of size 128 [ 15.638712] The buggy address is located 5 bytes to the right of [ 15.638712] allocated 115-byte region [fff00000c3f39900, fff00000c3f39973) [ 15.638787] [ 15.639160] The buggy address belongs to the physical page: [ 15.639204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f39 [ 15.639452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.639748] page_type: f5(slab) [ 15.639802] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.639992] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.640067] page dumped because: kasan: bad access detected [ 15.640380] [ 15.640535] Memory state around the buggy address: [ 15.640589] fff00000c3f39800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.640654] fff00000c3f39880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640744] >fff00000c3f39900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.640786] ^ [ 15.640848] fff00000c3f39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640914] fff00000c3f39a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640968] ================================================================== [ 15.619598] ================================================================== [ 15.619686] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 15.619740] Read of size 1 at addr fff00000c3f39973 by task kunit_try_catch/194 [ 15.619802] [ 15.619835] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 15.620365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.620769] Hardware name: linux,dummy-virt (DT) [ 15.620859] Call trace: [ 15.620890] show_stack+0x20/0x38 (C) [ 15.621027] dump_stack_lvl+0x8c/0xd0 [ 15.621157] print_report+0x118/0x5d0 [ 15.621220] kasan_report+0xdc/0x128 [ 15.621593] __asan_report_load1_noabort+0x20/0x30 [ 15.621793] ksize_unpoisons_memory+0x628/0x740 [ 15.621895] kunit_try_run_case+0x170/0x3f0 [ 15.622037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.622098] kthread+0x328/0x630 [ 15.622490] ret_from_fork+0x10/0x20 [ 15.622595] [ 15.622674] Allocated by task 194: [ 15.623150] kasan_save_stack+0x3c/0x68 [ 15.623566] kasan_save_track+0x20/0x40 [ 15.623742] kasan_save_alloc_info+0x40/0x58 [ 15.623840] __kasan_kmalloc+0xd4/0xd8 [ 15.623924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.623997] ksize_unpoisons_memory+0xc0/0x740 [ 15.624039] kunit_try_run_case+0x170/0x3f0 [ 15.624078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.624520] kthread+0x328/0x630 [ 15.624749] ret_from_fork+0x10/0x20 [ 15.624940] [ 15.624964] The buggy address belongs to the object at fff00000c3f39900 [ 15.624964] which belongs to the cache kmalloc-128 of size 128 [ 15.625328] The buggy address is located 0 bytes to the right of [ 15.625328] allocated 115-byte region [fff00000c3f39900, fff00000c3f39973) [ 15.625679] [ 15.625868] The buggy address belongs to the physical page: [ 15.626009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f39 [ 15.626181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.626347] page_type: f5(slab) [ 15.626411] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.627063] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.627310] page dumped because: kasan: bad access detected [ 15.627377] [ 15.627456] Memory state around the buggy address: [ 15.627593] fff00000c3f39800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.627678] fff00000c3f39880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.627873] >fff00000c3f39900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.628050] ^ [ 15.628197] fff00000c3f39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.628263] fff00000c3f39a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.628806] ================================================================== [ 15.643452] ================================================================== [ 15.643513] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 15.643567] Read of size 1 at addr fff00000c3f3997f by task kunit_try_catch/194 [ 15.643844] [ 15.644288] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 15.644394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.644422] Hardware name: linux,dummy-virt (DT) [ 15.644846] Call trace: [ 15.644961] show_stack+0x20/0x38 (C) [ 15.645155] dump_stack_lvl+0x8c/0xd0 [ 15.645379] print_report+0x118/0x5d0 [ 15.645489] kasan_report+0xdc/0x128 [ 15.645576] __asan_report_load1_noabort+0x20/0x30 [ 15.645631] ksize_unpoisons_memory+0x690/0x740 [ 15.645791] kunit_try_run_case+0x170/0x3f0 [ 15.645843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.645958] kthread+0x328/0x630 [ 15.646004] ret_from_fork+0x10/0x20 [ 15.646053] [ 15.646071] Allocated by task 194: [ 15.646099] kasan_save_stack+0x3c/0x68 [ 15.646142] kasan_save_track+0x20/0x40 [ 15.646179] kasan_save_alloc_info+0x40/0x58 [ 15.646552] __kasan_kmalloc+0xd4/0xd8 [ 15.646683] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.646737] ksize_unpoisons_memory+0xc0/0x740 [ 15.646816] kunit_try_run_case+0x170/0x3f0 [ 15.646949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.646997] kthread+0x328/0x630 [ 15.647044] ret_from_fork+0x10/0x20 [ 15.647088] [ 15.647355] The buggy address belongs to the object at fff00000c3f39900 [ 15.647355] which belongs to the cache kmalloc-128 of size 128 [ 15.647534] The buggy address is located 12 bytes to the right of [ 15.647534] allocated 115-byte region [fff00000c3f39900, fff00000c3f39973) [ 15.647659] [ 15.647701] The buggy address belongs to the physical page: [ 15.647732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f39 [ 15.647788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.647859] page_type: f5(slab) [ 15.647903] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.647968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.648010] page dumped because: kasan: bad access detected [ 15.648042] [ 15.648061] Memory state around the buggy address: [ 15.648101] fff00000c3f39800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.648147] fff00000c3f39880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.648201] >fff00000c3f39900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.648241] ^ [ 15.648283] fff00000c3f39980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.648350] fff00000c3f39a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.648405] ==================================================================
[ 13.049177] ================================================================== [ 13.049611] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.049962] Read of size 1 at addr ffff8881025cc37f by task kunit_try_catch/211 [ 13.050354] [ 13.050444] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 13.050485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.050497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.050516] Call Trace: [ 13.050545] <TASK> [ 13.050560] dump_stack_lvl+0x73/0xb0 [ 13.050587] print_report+0xd1/0x610 [ 13.050620] ? __virt_addr_valid+0x1db/0x2d0 [ 13.050642] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.050664] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.050685] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.050707] kasan_report+0x141/0x180 [ 13.050728] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.050754] __asan_report_load1_noabort+0x18/0x20 [ 13.050777] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.050800] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.050830] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.050867] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.050893] kunit_try_run_case+0x1a5/0x480 [ 13.050917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.050957] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.050980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.051002] ? __kthread_parkme+0x82/0x180 [ 13.051031] ? preempt_count_sub+0x50/0x80 [ 13.051053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.051076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.051098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.051122] kthread+0x337/0x6f0 [ 13.051141] ? trace_preempt_on+0x20/0xc0 [ 13.051162] ? __pfx_kthread+0x10/0x10 [ 13.051182] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.051202] ? calculate_sigpending+0x7b/0xa0 [ 13.051235] ? __pfx_kthread+0x10/0x10 [ 13.051255] ret_from_fork+0x116/0x1d0 [ 13.051273] ? __pfx_kthread+0x10/0x10 [ 13.051293] ret_from_fork_asm+0x1a/0x30 [ 13.051322] </TASK> [ 13.051332] [ 13.059278] Allocated by task 211: [ 13.059520] kasan_save_stack+0x45/0x70 [ 13.059669] kasan_save_track+0x18/0x40 [ 13.059805] kasan_save_alloc_info+0x3b/0x50 [ 13.060055] __kasan_kmalloc+0xb7/0xc0 [ 13.060244] __kmalloc_cache_noprof+0x189/0x420 [ 13.060450] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.060649] kunit_try_run_case+0x1a5/0x480 [ 13.060906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.061200] kthread+0x337/0x6f0 [ 13.061330] ret_from_fork+0x116/0x1d0 [ 13.061569] ret_from_fork_asm+0x1a/0x30 [ 13.061789] [ 13.061894] The buggy address belongs to the object at ffff8881025cc300 [ 13.061894] which belongs to the cache kmalloc-128 of size 128 [ 13.062496] The buggy address is located 12 bytes to the right of [ 13.062496] allocated 115-byte region [ffff8881025cc300, ffff8881025cc373) [ 13.063034] [ 13.063134] The buggy address belongs to the physical page: [ 13.063416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 13.063764] flags: 0x200000000000000(node=0|zone=2) [ 13.064017] page_type: f5(slab) [ 13.064322] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.064668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.064994] page dumped because: kasan: bad access detected [ 13.065259] [ 13.065331] Memory state around the buggy address: [ 13.065626] ffff8881025cc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.065937] ffff8881025cc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.066291] >ffff8881025cc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.066534] ^ [ 13.066749] ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.066973] ffff8881025cc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.067187] ================================================================== [ 13.029724] ================================================================== [ 13.030032] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.030441] Read of size 1 at addr ffff8881025cc378 by task kunit_try_catch/211 [ 13.030663] [ 13.030763] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 13.030804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.030824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.030843] Call Trace: [ 13.030857] <TASK> [ 13.030870] dump_stack_lvl+0x73/0xb0 [ 13.030895] print_report+0xd1/0x610 [ 13.030916] ? __virt_addr_valid+0x1db/0x2d0 [ 13.030937] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.030958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.030980] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.031002] kasan_report+0x141/0x180 [ 13.031023] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.031049] __asan_report_load1_noabort+0x18/0x20 [ 13.031072] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.031095] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.031116] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.031145] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.031171] kunit_try_run_case+0x1a5/0x480 [ 13.031194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.031215] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.031237] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.031259] ? __kthread_parkme+0x82/0x180 [ 13.031278] ? preempt_count_sub+0x50/0x80 [ 13.031300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.031323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.031345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.031368] kthread+0x337/0x6f0 [ 13.031386] ? trace_preempt_on+0x20/0xc0 [ 13.031408] ? __pfx_kthread+0x10/0x10 [ 13.031427] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.031448] ? calculate_sigpending+0x7b/0xa0 [ 13.031470] ? __pfx_kthread+0x10/0x10 [ 13.031490] ret_from_fork+0x116/0x1d0 [ 13.031508] ? __pfx_kthread+0x10/0x10 [ 13.031527] ret_from_fork_asm+0x1a/0x30 [ 13.031557] </TASK> [ 13.031567] [ 13.039544] Allocated by task 211: [ 13.039735] kasan_save_stack+0x45/0x70 [ 13.039935] kasan_save_track+0x18/0x40 [ 13.040072] kasan_save_alloc_info+0x3b/0x50 [ 13.040300] __kasan_kmalloc+0xb7/0xc0 [ 13.040588] __kmalloc_cache_noprof+0x189/0x420 [ 13.040745] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.041271] kunit_try_run_case+0x1a5/0x480 [ 13.041486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.041684] kthread+0x337/0x6f0 [ 13.041882] ret_from_fork+0x116/0x1d0 [ 13.042070] ret_from_fork_asm+0x1a/0x30 [ 13.042325] [ 13.042420] The buggy address belongs to the object at ffff8881025cc300 [ 13.042420] which belongs to the cache kmalloc-128 of size 128 [ 13.042932] The buggy address is located 5 bytes to the right of [ 13.042932] allocated 115-byte region [ffff8881025cc300, ffff8881025cc373) [ 13.043664] [ 13.044021] The buggy address belongs to the physical page: [ 13.044383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 13.044740] flags: 0x200000000000000(node=0|zone=2) [ 13.044986] page_type: f5(slab) [ 13.045128] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.045362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.045697] page dumped because: kasan: bad access detected [ 13.046034] [ 13.046179] Memory state around the buggy address: [ 13.046397] ffff8881025cc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.046717] ffff8881025cc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.047040] >ffff8881025cc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.047464] ^ [ 13.047775] ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.048039] ffff8881025cc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.048509] ================================================================== [ 13.006184] ================================================================== [ 13.007335] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 13.007664] Read of size 1 at addr ffff8881025cc373 by task kunit_try_catch/211 [ 13.007966] [ 13.008077] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 13.008123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.008135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.008158] Call Trace: [ 13.008171] <TASK> [ 13.008189] dump_stack_lvl+0x73/0xb0 [ 13.008220] print_report+0xd1/0x610 [ 13.008242] ? __virt_addr_valid+0x1db/0x2d0 [ 13.008265] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.008287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.008308] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.008330] kasan_report+0x141/0x180 [ 13.008351] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.008378] __asan_report_load1_noabort+0x18/0x20 [ 13.008401] ksize_unpoisons_memory+0x81c/0x9b0 [ 13.008423] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.008445] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.008474] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.008500] kunit_try_run_case+0x1a5/0x480 [ 13.008525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.008546] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.008569] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.008686] ? __kthread_parkme+0x82/0x180 [ 13.008715] ? preempt_count_sub+0x50/0x80 [ 13.008742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.008765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.008788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.008819] kthread+0x337/0x6f0 [ 13.008839] ? trace_preempt_on+0x20/0xc0 [ 13.008866] ? __pfx_kthread+0x10/0x10 [ 13.008885] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.008906] ? calculate_sigpending+0x7b/0xa0 [ 13.008929] ? __pfx_kthread+0x10/0x10 [ 13.008950] ret_from_fork+0x116/0x1d0 [ 13.008968] ? __pfx_kthread+0x10/0x10 [ 13.008987] ret_from_fork_asm+0x1a/0x30 [ 13.009016] </TASK> [ 13.009028] [ 13.019159] Allocated by task 211: [ 13.019708] kasan_save_stack+0x45/0x70 [ 13.019985] kasan_save_track+0x18/0x40 [ 13.020402] kasan_save_alloc_info+0x3b/0x50 [ 13.020607] __kasan_kmalloc+0xb7/0xc0 [ 13.020793] __kmalloc_cache_noprof+0x189/0x420 [ 13.021131] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.021463] kunit_try_run_case+0x1a5/0x480 [ 13.021638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.021905] kthread+0x337/0x6f0 [ 13.022057] ret_from_fork+0x116/0x1d0 [ 13.022536] ret_from_fork_asm+0x1a/0x30 [ 13.022748] [ 13.022853] The buggy address belongs to the object at ffff8881025cc300 [ 13.022853] which belongs to the cache kmalloc-128 of size 128 [ 13.023433] The buggy address is located 0 bytes to the right of [ 13.023433] allocated 115-byte region [ffff8881025cc300, ffff8881025cc373) [ 13.024292] [ 13.024408] The buggy address belongs to the physical page: [ 13.024652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025cc [ 13.025010] flags: 0x200000000000000(node=0|zone=2) [ 13.025497] page_type: f5(slab) [ 13.025642] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.026153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.026621] page dumped because: kasan: bad access detected [ 13.026865] [ 13.026948] Memory state around the buggy address: [ 13.027149] ffff8881025cc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.027445] ffff8881025cc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.027736] >ffff8881025cc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.028033] ^ [ 13.028618] ffff8881025cc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.028882] ffff8881025cc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.029274] ==================================================================