Date
July 5, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.293970] ================================================================== [ 19.294153] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.294303] Read of size 1 at addr fff00000c56f1d78 by task kunit_try_catch/195 [ 19.294426] [ 19.294499] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.294728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.294793] Hardware name: linux,dummy-virt (DT) [ 19.294858] Call trace: [ 19.294902] show_stack+0x20/0x38 (C) [ 19.295007] dump_stack_lvl+0x8c/0xd0 [ 19.295120] print_report+0x118/0x608 [ 19.295220] kasan_report+0xdc/0x128 [ 19.295314] __asan_report_load1_noabort+0x20/0x30 [ 19.295478] ksize_unpoisons_memory+0x618/0x740 [ 19.295641] kunit_try_run_case+0x170/0x3f0 [ 19.295755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.295876] kthread+0x328/0x630 [ 19.296012] ret_from_fork+0x10/0x20 [ 19.296161] [ 19.296208] Allocated by task 195: [ 19.296268] kasan_save_stack+0x3c/0x68 [ 19.296370] kasan_save_track+0x20/0x40 [ 19.296456] kasan_save_alloc_info+0x40/0x58 [ 19.296546] __kasan_kmalloc+0xd4/0xd8 [ 19.296670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.296758] ksize_unpoisons_memory+0xc0/0x740 [ 19.296846] kunit_try_run_case+0x170/0x3f0 [ 19.296931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.297029] kthread+0x328/0x630 [ 19.297122] ret_from_fork+0x10/0x20 [ 19.297208] [ 19.297260] The buggy address belongs to the object at fff00000c56f1d00 [ 19.297260] which belongs to the cache kmalloc-128 of size 128 [ 19.297921] The buggy address is located 5 bytes to the right of [ 19.297921] allocated 115-byte region [fff00000c56f1d00, fff00000c56f1d73) [ 19.298389] [ 19.298469] The buggy address belongs to the physical page: [ 19.298533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 19.298635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.298735] page_type: f5(slab) [ 19.299439] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.299515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.299558] page dumped because: kasan: bad access detected [ 19.299595] [ 19.299631] Memory state around the buggy address: [ 19.299685] fff00000c56f1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.299728] fff00000c56f1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.299770] >fff00000c56f1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.299807] ^ [ 19.299848] fff00000c56f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.299890] fff00000c56f1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.299927] ================================================================== [ 19.300831] ================================================================== [ 19.301239] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.301398] Read of size 1 at addr fff00000c56f1d7f by task kunit_try_catch/195 [ 19.301513] [ 19.301579] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.301756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.301814] Hardware name: linux,dummy-virt (DT) [ 19.301889] Call trace: [ 19.301937] show_stack+0x20/0x38 (C) [ 19.302046] dump_stack_lvl+0x8c/0xd0 [ 19.302155] print_report+0x118/0x608 [ 19.302261] kasan_report+0xdc/0x128 [ 19.303441] __asan_report_load1_noabort+0x20/0x30 [ 19.303705] ksize_unpoisons_memory+0x690/0x740 [ 19.303854] kunit_try_run_case+0x170/0x3f0 [ 19.303979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.304111] kthread+0x328/0x630 [ 19.304218] ret_from_fork+0x10/0x20 [ 19.304387] [ 19.304450] Allocated by task 195: [ 19.304525] kasan_save_stack+0x3c/0x68 [ 19.304616] kasan_save_track+0x20/0x40 [ 19.304693] kasan_save_alloc_info+0x40/0x58 [ 19.304782] __kasan_kmalloc+0xd4/0xd8 [ 19.304875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.305001] ksize_unpoisons_memory+0xc0/0x740 [ 19.305095] kunit_try_run_case+0x170/0x3f0 [ 19.305172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.305257] kthread+0x328/0x630 [ 19.305327] ret_from_fork+0x10/0x20 [ 19.305639] [ 19.305711] The buggy address belongs to the object at fff00000c56f1d00 [ 19.305711] which belongs to the cache kmalloc-128 of size 128 [ 19.305835] The buggy address is located 12 bytes to the right of [ 19.305835] allocated 115-byte region [fff00000c56f1d00, fff00000c56f1d73) [ 19.306057] [ 19.306100] The buggy address belongs to the physical page: [ 19.306165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 19.306552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.306694] page_type: f5(slab) [ 19.306783] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.306900] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.307003] page dumped because: kasan: bad access detected [ 19.307104] [ 19.307144] Memory state around the buggy address: [ 19.307222] fff00000c56f1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.307318] fff00000c56f1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.307412] >fff00000c56f1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.307509] ^ [ 19.307597] fff00000c56f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.307899] fff00000c56f1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.307991] ================================================================== [ 19.287408] ================================================================== [ 19.287556] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.287672] Read of size 1 at addr fff00000c56f1d73 by task kunit_try_catch/195 [ 19.287806] [ 19.287877] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.288041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.288099] Hardware name: linux,dummy-virt (DT) [ 19.288166] Call trace: [ 19.288221] show_stack+0x20/0x38 (C) [ 19.288390] dump_stack_lvl+0x8c/0xd0 [ 19.288528] print_report+0x118/0x608 [ 19.288645] kasan_report+0xdc/0x128 [ 19.288783] __asan_report_load1_noabort+0x20/0x30 [ 19.288915] ksize_unpoisons_memory+0x628/0x740 [ 19.289043] kunit_try_run_case+0x170/0x3f0 [ 19.289195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.289323] kthread+0x328/0x630 [ 19.289456] ret_from_fork+0x10/0x20 [ 19.289607] [ 19.289648] Allocated by task 195: [ 19.289720] kasan_save_stack+0x3c/0x68 [ 19.289846] kasan_save_track+0x20/0x40 [ 19.289967] kasan_save_alloc_info+0x40/0x58 [ 19.290101] __kasan_kmalloc+0xd4/0xd8 [ 19.290181] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.290272] ksize_unpoisons_memory+0xc0/0x740 [ 19.290415] kunit_try_run_case+0x170/0x3f0 [ 19.290566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.290710] kthread+0x328/0x630 [ 19.290789] ret_from_fork+0x10/0x20 [ 19.290857] [ 19.290892] The buggy address belongs to the object at fff00000c56f1d00 [ 19.290892] which belongs to the cache kmalloc-128 of size 128 [ 19.291036] The buggy address is located 0 bytes to the right of [ 19.291036] allocated 115-byte region [fff00000c56f1d00, fff00000c56f1d73) [ 19.291196] [ 19.291243] The buggy address belongs to the physical page: [ 19.291315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 19.291461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.291577] page_type: f5(slab) [ 19.291658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.291762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.291906] page dumped because: kasan: bad access detected [ 19.292025] [ 19.292070] Memory state around the buggy address: [ 19.292141] fff00000c56f1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.292237] fff00000c56f1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.292346] >fff00000c56f1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.292492] ^ [ 19.292626] fff00000c56f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.292800] fff00000c56f1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.292897] ==================================================================
[ 14.097985] ================================================================== [ 14.098367] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.099222] Read of size 1 at addr ffff888103332278 by task kunit_try_catch/211 [ 14.099618] [ 14.099760] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.099815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.099829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.100166] Call Trace: [ 14.100186] <TASK> [ 14.100208] dump_stack_lvl+0x73/0xb0 [ 14.100244] print_report+0xd1/0x650 [ 14.100271] ? __virt_addr_valid+0x1db/0x2d0 [ 14.100297] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.100324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.100349] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.100376] kasan_report+0x141/0x180 [ 14.100401] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.100433] __asan_report_load1_noabort+0x18/0x20 [ 14.100461] ksize_unpoisons_memory+0x7e9/0x9b0 [ 14.100488] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.100513] ? finish_task_switch.isra.0+0x153/0x700 [ 14.100537] ? __switch_to+0x47/0xf50 [ 14.100567] ? __schedule+0x10cc/0x2b60 [ 14.100592] ? __pfx_read_tsc+0x10/0x10 [ 14.100616] ? ktime_get_ts64+0x86/0x230 [ 14.100643] kunit_try_run_case+0x1a5/0x480 [ 14.100690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.100715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.100742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.100767] ? __kthread_parkme+0x82/0x180 [ 14.100846] ? preempt_count_sub+0x50/0x80 [ 14.100875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.100902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.100928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.100954] kthread+0x337/0x6f0 [ 14.100977] ? trace_preempt_on+0x20/0xc0 [ 14.101004] ? __pfx_kthread+0x10/0x10 [ 14.101027] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.101051] ? calculate_sigpending+0x7b/0xa0 [ 14.101078] ? __pfx_kthread+0x10/0x10 [ 14.101102] ret_from_fork+0x116/0x1d0 [ 14.101123] ? __pfx_kthread+0x10/0x10 [ 14.101147] ret_from_fork_asm+0x1a/0x30 [ 14.101182] </TASK> [ 14.101195] [ 14.112319] Allocated by task 211: [ 14.112541] kasan_save_stack+0x45/0x70 [ 14.113109] kasan_save_track+0x18/0x40 [ 14.113433] kasan_save_alloc_info+0x3b/0x50 [ 14.113957] __kasan_kmalloc+0xb7/0xc0 [ 14.114167] __kmalloc_cache_noprof+0x189/0x420 [ 14.114416] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.114681] kunit_try_run_case+0x1a5/0x480 [ 14.115429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.115959] kthread+0x337/0x6f0 [ 14.116680] ret_from_fork+0x116/0x1d0 [ 14.117296] ret_from_fork_asm+0x1a/0x30 [ 14.117548] [ 14.117675] The buggy address belongs to the object at ffff888103332200 [ 14.117675] which belongs to the cache kmalloc-128 of size 128 [ 14.119116] The buggy address is located 5 bytes to the right of [ 14.119116] allocated 115-byte region [ffff888103332200, ffff888103332273) [ 14.120273] [ 14.120548] The buggy address belongs to the physical page: [ 14.121207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332 [ 14.122057] flags: 0x200000000000000(node=0|zone=2) [ 14.122290] page_type: f5(slab) [ 14.122497] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.122871] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.123424] page dumped because: kasan: bad access detected [ 14.123681] [ 14.123850] Memory state around the buggy address: [ 14.124101] ffff888103332100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.124444] ffff888103332180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.124807] >ffff888103332200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.125210] ^ [ 14.125563] ffff888103332280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.125861] ffff888103332300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.126308] ================================================================== [ 14.068551] ================================================================== [ 14.069482] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 14.069930] Read of size 1 at addr ffff888103332273 by task kunit_try_catch/211 [ 14.070282] [ 14.070434] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.070492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.070506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.070532] Call Trace: [ 14.070548] <TASK> [ 14.070571] dump_stack_lvl+0x73/0xb0 [ 14.070607] print_report+0xd1/0x650 [ 14.070633] ? __virt_addr_valid+0x1db/0x2d0 [ 14.070804] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.070835] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.070876] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.070904] kasan_report+0x141/0x180 [ 14.070931] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 14.070963] __asan_report_load1_noabort+0x18/0x20 [ 14.070991] ksize_unpoisons_memory+0x81c/0x9b0 [ 14.071018] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.071043] ? finish_task_switch.isra.0+0x153/0x700 [ 14.071071] ? __switch_to+0x47/0xf50 [ 14.071197] ? __schedule+0x10cc/0x2b60 [ 14.071231] ? __pfx_read_tsc+0x10/0x10 [ 14.071256] ? ktime_get_ts64+0x86/0x230 [ 14.071305] kunit_try_run_case+0x1a5/0x480 [ 14.071336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.071360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.071388] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.071414] ? __kthread_parkme+0x82/0x180 [ 14.071437] ? preempt_count_sub+0x50/0x80 [ 14.071463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.071490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.071515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.071541] kthread+0x337/0x6f0 [ 14.071565] ? trace_preempt_on+0x20/0xc0 [ 14.071592] ? __pfx_kthread+0x10/0x10 [ 14.071615] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.071639] ? calculate_sigpending+0x7b/0xa0 [ 14.071681] ? __pfx_kthread+0x10/0x10 [ 14.071705] ret_from_fork+0x116/0x1d0 [ 14.071727] ? __pfx_kthread+0x10/0x10 [ 14.071751] ret_from_fork_asm+0x1a/0x30 [ 14.071845] </TASK> [ 14.071862] [ 14.083690] Allocated by task 211: [ 14.083979] kasan_save_stack+0x45/0x70 [ 14.084171] kasan_save_track+0x18/0x40 [ 14.084690] kasan_save_alloc_info+0x3b/0x50 [ 14.084962] __kasan_kmalloc+0xb7/0xc0 [ 14.085191] __kmalloc_cache_noprof+0x189/0x420 [ 14.085934] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.086208] kunit_try_run_case+0x1a5/0x480 [ 14.086489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.086841] kthread+0x337/0x6f0 [ 14.087304] ret_from_fork+0x116/0x1d0 [ 14.087603] ret_from_fork_asm+0x1a/0x30 [ 14.087979] [ 14.088095] The buggy address belongs to the object at ffff888103332200 [ 14.088095] which belongs to the cache kmalloc-128 of size 128 [ 14.089101] The buggy address is located 0 bytes to the right of [ 14.089101] allocated 115-byte region [ffff888103332200, ffff888103332273) [ 14.089770] [ 14.089992] The buggy address belongs to the physical page: [ 14.090269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332 [ 14.090692] flags: 0x200000000000000(node=0|zone=2) [ 14.091067] page_type: f5(slab) [ 14.091308] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.091692] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.092169] page dumped because: kasan: bad access detected [ 14.092873] [ 14.093098] Memory state around the buggy address: [ 14.093538] ffff888103332100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.094074] ffff888103332180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.094505] >ffff888103332200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.095155] ^ [ 14.095514] ffff888103332280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.096167] ffff888103332300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.096518] ================================================================== [ 14.126994] ================================================================== [ 14.127412] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.127775] Read of size 1 at addr ffff88810333227f by task kunit_try_catch/211 [ 14.128213] [ 14.128329] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.128382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.128396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.128421] Call Trace: [ 14.128442] <TASK> [ 14.128465] dump_stack_lvl+0x73/0xb0 [ 14.128499] print_report+0xd1/0x650 [ 14.128524] ? __virt_addr_valid+0x1db/0x2d0 [ 14.128550] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.128576] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.128601] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.128627] kasan_report+0x141/0x180 [ 14.128665] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.128697] __asan_report_load1_noabort+0x18/0x20 [ 14.128725] ksize_unpoisons_memory+0x7b6/0x9b0 [ 14.128752] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 14.128777] ? finish_task_switch.isra.0+0x153/0x700 [ 14.128802] ? __switch_to+0x47/0xf50 [ 14.128832] ? __schedule+0x10cc/0x2b60 [ 14.128858] ? __pfx_read_tsc+0x10/0x10 [ 14.128882] ? ktime_get_ts64+0x86/0x230 [ 14.128909] kunit_try_run_case+0x1a5/0x480 [ 14.128936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.128961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.128988] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.129014] ? __kthread_parkme+0x82/0x180 [ 14.129037] ? preempt_count_sub+0x50/0x80 [ 14.129063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.129090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.129116] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.129142] kthread+0x337/0x6f0 [ 14.129164] ? trace_preempt_on+0x20/0xc0 [ 14.129191] ? __pfx_kthread+0x10/0x10 [ 14.129215] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.129239] ? calculate_sigpending+0x7b/0xa0 [ 14.129267] ? __pfx_kthread+0x10/0x10 [ 14.129291] ret_from_fork+0x116/0x1d0 [ 14.129311] ? __pfx_kthread+0x10/0x10 [ 14.129335] ret_from_fork_asm+0x1a/0x30 [ 14.129370] </TASK> [ 14.129382] [ 14.139329] Allocated by task 211: [ 14.139523] kasan_save_stack+0x45/0x70 [ 14.139723] kasan_save_track+0x18/0x40 [ 14.140043] kasan_save_alloc_info+0x3b/0x50 [ 14.140317] __kasan_kmalloc+0xb7/0xc0 [ 14.140539] __kmalloc_cache_noprof+0x189/0x420 [ 14.140884] ksize_unpoisons_memory+0xc7/0x9b0 [ 14.141099] kunit_try_run_case+0x1a5/0x480 [ 14.141338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.141626] kthread+0x337/0x6f0 [ 14.141785] ret_from_fork+0x116/0x1d0 [ 14.142235] ret_from_fork_asm+0x1a/0x30 [ 14.142438] [ 14.142533] The buggy address belongs to the object at ffff888103332200 [ 14.142533] which belongs to the cache kmalloc-128 of size 128 [ 14.143176] The buggy address is located 12 bytes to the right of [ 14.143176] allocated 115-byte region [ffff888103332200, ffff888103332273) [ 14.143883] [ 14.143977] The buggy address belongs to the physical page: [ 14.144185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332 [ 14.144473] flags: 0x200000000000000(node=0|zone=2) [ 14.144733] page_type: f5(slab) [ 14.144933] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.145339] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.145757] page dumped because: kasan: bad access detected [ 14.146038] [ 14.146124] Memory state around the buggy address: [ 14.146311] ffff888103332100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.146578] ffff888103332180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.147474] >ffff888103332200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.148065] ^ [ 14.148458] ffff888103332280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.148780] ffff888103332300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.149155] ==================================================================