Date
July 12, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.770062] ================================================================== [ 19.770175] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.770309] Read of size 1 at addr fff00000c599f178 by task kunit_try_catch/195 [ 19.770438] [ 19.770543] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.770813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.770894] Hardware name: linux,dummy-virt (DT) [ 19.770958] Call trace: [ 19.771000] show_stack+0x20/0x38 (C) [ 19.771524] dump_stack_lvl+0x8c/0xd0 [ 19.771901] print_report+0x118/0x608 [ 19.772151] kasan_report+0xdc/0x128 [ 19.772351] __asan_report_load1_noabort+0x20/0x30 [ 19.772553] ksize_unpoisons_memory+0x618/0x740 [ 19.772673] kunit_try_run_case+0x170/0x3f0 [ 19.772786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.772916] kthread+0x328/0x630 [ 19.773011] ret_from_fork+0x10/0x20 [ 19.773124] [ 19.773179] Allocated by task 195: [ 19.773242] kasan_save_stack+0x3c/0x68 [ 19.773339] kasan_save_track+0x20/0x40 [ 19.773427] kasan_save_alloc_info+0x40/0x58 [ 19.773516] __kasan_kmalloc+0xd4/0xd8 [ 19.773600] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.773692] ksize_unpoisons_memory+0xc0/0x740 [ 19.773778] kunit_try_run_case+0x170/0x3f0 [ 19.774933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.775066] kthread+0x328/0x630 [ 19.775147] ret_from_fork+0x10/0x20 [ 19.775223] [ 19.775267] The buggy address belongs to the object at fff00000c599f100 [ 19.775267] which belongs to the cache kmalloc-128 of size 128 [ 19.775397] The buggy address is located 5 bytes to the right of [ 19.775397] allocated 115-byte region [fff00000c599f100, fff00000c599f173) [ 19.775799] [ 19.775935] The buggy address belongs to the physical page: [ 19.776026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10599f [ 19.776423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.776568] page_type: f5(slab) [ 19.776655] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.777046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.777584] page dumped because: kasan: bad access detected [ 19.777814] [ 19.777882] Memory state around the buggy address: [ 19.777997] fff00000c599f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.778141] fff00000c599f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.778239] >fff00000c599f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.778371] ^ [ 19.778489] fff00000c599f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.778603] fff00000c599f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.778693] ================================================================== [ 19.781545] ================================================================== [ 19.781703] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.781864] Read of size 1 at addr fff00000c599f17f by task kunit_try_catch/195 [ 19.781988] [ 19.782050] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.782223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.782276] Hardware name: linux,dummy-virt (DT) [ 19.782338] Call trace: [ 19.782384] show_stack+0x20/0x38 (C) [ 19.782496] dump_stack_lvl+0x8c/0xd0 [ 19.782594] print_report+0x118/0x608 [ 19.782705] kasan_report+0xdc/0x128 [ 19.782854] __asan_report_load1_noabort+0x20/0x30 [ 19.782996] ksize_unpoisons_memory+0x690/0x740 [ 19.783143] kunit_try_run_case+0x170/0x3f0 [ 19.783281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.783432] kthread+0x328/0x630 [ 19.783544] ret_from_fork+0x10/0x20 [ 19.783657] [ 19.783695] Allocated by task 195: [ 19.783750] kasan_save_stack+0x3c/0x68 [ 19.783856] kasan_save_track+0x20/0x40 [ 19.783937] kasan_save_alloc_info+0x40/0x58 [ 19.784016] __kasan_kmalloc+0xd4/0xd8 [ 19.784099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.784177] ksize_unpoisons_memory+0xc0/0x740 [ 19.784291] kunit_try_run_case+0x170/0x3f0 [ 19.784399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.784529] kthread+0x328/0x630 [ 19.784606] ret_from_fork+0x10/0x20 [ 19.784726] [ 19.784766] The buggy address belongs to the object at fff00000c599f100 [ 19.784766] which belongs to the cache kmalloc-128 of size 128 [ 19.784917] The buggy address is located 12 bytes to the right of [ 19.784917] allocated 115-byte region [fff00000c599f100, fff00000c599f173) [ 19.785061] [ 19.785098] The buggy address belongs to the physical page: [ 19.785200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10599f [ 19.785309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.785401] page_type: f5(slab) [ 19.785475] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.785581] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.785717] page dumped because: kasan: bad access detected [ 19.785798] [ 19.785865] Memory state around the buggy address: [ 19.785960] fff00000c599f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.786060] fff00000c599f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.786161] >fff00000c599f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.786246] ^ [ 19.786330] fff00000c599f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.786416] fff00000c599f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.786495] ================================================================== [ 19.763234] ================================================================== [ 19.763361] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.763530] Read of size 1 at addr fff00000c599f173 by task kunit_try_catch/195 [ 19.763700] [ 19.763778] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.763975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.764038] Hardware name: linux,dummy-virt (DT) [ 19.764107] Call trace: [ 19.764172] show_stack+0x20/0x38 (C) [ 19.764305] dump_stack_lvl+0x8c/0xd0 [ 19.764416] print_report+0x118/0x608 [ 19.764527] kasan_report+0xdc/0x128 [ 19.764642] __asan_report_load1_noabort+0x20/0x30 [ 19.764776] ksize_unpoisons_memory+0x628/0x740 [ 19.764917] kunit_try_run_case+0x170/0x3f0 [ 19.765059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.765205] kthread+0x328/0x630 [ 19.765322] ret_from_fork+0x10/0x20 [ 19.765483] [ 19.765538] Allocated by task 195: [ 19.765634] kasan_save_stack+0x3c/0x68 [ 19.765754] kasan_save_track+0x20/0x40 [ 19.765896] kasan_save_alloc_info+0x40/0x58 [ 19.766019] __kasan_kmalloc+0xd4/0xd8 [ 19.766096] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.766182] ksize_unpoisons_memory+0xc0/0x740 [ 19.766276] kunit_try_run_case+0x170/0x3f0 [ 19.766390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.766479] kthread+0x328/0x630 [ 19.766592] ret_from_fork+0x10/0x20 [ 19.766684] [ 19.766732] The buggy address belongs to the object at fff00000c599f100 [ 19.766732] which belongs to the cache kmalloc-128 of size 128 [ 19.766906] The buggy address is located 0 bytes to the right of [ 19.766906] allocated 115-byte region [fff00000c599f100, fff00000c599f173) [ 19.767124] [ 19.767185] The buggy address belongs to the physical page: [ 19.767276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10599f [ 19.767394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.767501] page_type: f5(slab) [ 19.767609] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.767743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.767911] page dumped because: kasan: bad access detected [ 19.768004] [ 19.768063] Memory state around the buggy address: [ 19.768165] fff00000c599f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.768277] fff00000c599f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.768390] >fff00000c599f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.768514] ^ [ 19.768623] fff00000c599f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.768799] fff00000c599f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.768891] ==================================================================
[ 12.996125] ================================================================== [ 12.996614] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.996966] Read of size 1 at addr ffff888102b92873 by task kunit_try_catch/212 [ 12.997942] [ 12.998070] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.998118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.998129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.998151] Call Trace: [ 12.998164] <TASK> [ 12.998185] dump_stack_lvl+0x73/0xb0 [ 12.998217] print_report+0xd1/0x650 [ 12.998240] ? __virt_addr_valid+0x1db/0x2d0 [ 12.998264] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.998286] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.998309] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.998332] kasan_report+0x141/0x180 [ 12.998353] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.998387] __asan_report_load1_noabort+0x18/0x20 [ 12.998411] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.998435] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.998457] ? finish_task_switch.isra.0+0x153/0x700 [ 12.998481] ? __switch_to+0x47/0xf50 [ 12.998506] ? __schedule+0x10cc/0x2b60 [ 12.998528] ? __pfx_read_tsc+0x10/0x10 [ 12.998549] ? ktime_get_ts64+0x86/0x230 [ 12.998572] kunit_try_run_case+0x1a5/0x480 [ 12.998597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.998619] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.998643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.998937] ? __kthread_parkme+0x82/0x180 [ 12.998960] ? preempt_count_sub+0x50/0x80 [ 12.998983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.999007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.999032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.999057] kthread+0x337/0x6f0 [ 12.999076] ? trace_preempt_on+0x20/0xc0 [ 12.999100] ? __pfx_kthread+0x10/0x10 [ 12.999121] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.999142] ? calculate_sigpending+0x7b/0xa0 [ 12.999167] ? __pfx_kthread+0x10/0x10 [ 12.999187] ret_from_fork+0x116/0x1d0 [ 12.999206] ? __pfx_kthread+0x10/0x10 [ 12.999226] ret_from_fork_asm+0x1a/0x30 [ 12.999256] </TASK> [ 12.999269] [ 13.011353] Allocated by task 212: [ 13.012268] kasan_save_stack+0x45/0x70 [ 13.012627] kasan_save_track+0x18/0x40 [ 13.013007] kasan_save_alloc_info+0x3b/0x50 [ 13.013309] __kasan_kmalloc+0xb7/0xc0 [ 13.013517] __kmalloc_cache_noprof+0x189/0x420 [ 13.013965] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.014246] kunit_try_run_case+0x1a5/0x480 [ 13.014440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.014953] kthread+0x337/0x6f0 [ 13.015096] ret_from_fork+0x116/0x1d0 [ 13.015522] ret_from_fork_asm+0x1a/0x30 [ 13.015787] [ 13.015884] The buggy address belongs to the object at ffff888102b92800 [ 13.015884] which belongs to the cache kmalloc-128 of size 128 [ 13.016648] The buggy address is located 0 bytes to the right of [ 13.016648] allocated 115-byte region [ffff888102b92800, ffff888102b92873) [ 13.017454] [ 13.017549] The buggy address belongs to the physical page: [ 13.018000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b92 [ 13.018287] flags: 0x200000000000000(node=0|zone=2) [ 13.018527] page_type: f5(slab) [ 13.018664] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.019296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.019762] page dumped because: kasan: bad access detected [ 13.019980] [ 13.020212] Memory state around the buggy address: [ 13.020391] ffff888102b92700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.020923] ffff888102b92780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.021180] >ffff888102b92800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.021597] ^ [ 13.022105] ffff888102b92880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.022401] ffff888102b92900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.022699] ================================================================== [ 13.023763] ================================================================== [ 13.024590] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.025249] Read of size 1 at addr ffff888102b92878 by task kunit_try_catch/212 [ 13.026060] [ 13.026169] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.026211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.026222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.026356] Call Trace: [ 13.026379] <TASK> [ 13.026394] dump_stack_lvl+0x73/0xb0 [ 13.026423] print_report+0xd1/0x650 [ 13.026445] ? __virt_addr_valid+0x1db/0x2d0 [ 13.026468] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.026490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.026512] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.026536] kasan_report+0x141/0x180 [ 13.026557] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.026585] __asan_report_load1_noabort+0x18/0x20 [ 13.026610] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.026635] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.026797] ? finish_task_switch.isra.0+0x153/0x700 [ 13.026821] ? __switch_to+0x47/0xf50 [ 13.026846] ? __schedule+0x10cc/0x2b60 [ 13.026868] ? __pfx_read_tsc+0x10/0x10 [ 13.026888] ? ktime_get_ts64+0x86/0x230 [ 13.026912] kunit_try_run_case+0x1a5/0x480 [ 13.026936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.026959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.026983] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.027007] ? __kthread_parkme+0x82/0x180 [ 13.027027] ? preempt_count_sub+0x50/0x80 [ 13.027049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.027074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.027097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.027122] kthread+0x337/0x6f0 [ 13.027141] ? trace_preempt_on+0x20/0xc0 [ 13.027163] ? __pfx_kthread+0x10/0x10 [ 13.027183] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.027204] ? calculate_sigpending+0x7b/0xa0 [ 13.027229] ? __pfx_kthread+0x10/0x10 [ 13.027249] ret_from_fork+0x116/0x1d0 [ 13.027268] ? __pfx_kthread+0x10/0x10 [ 13.027287] ret_from_fork_asm+0x1a/0x30 [ 13.027317] </TASK> [ 13.027327] [ 13.037961] Allocated by task 212: [ 13.038113] kasan_save_stack+0x45/0x70 [ 13.038323] kasan_save_track+0x18/0x40 [ 13.038512] kasan_save_alloc_info+0x3b/0x50 [ 13.039122] __kasan_kmalloc+0xb7/0xc0 [ 13.039304] __kmalloc_cache_noprof+0x189/0x420 [ 13.039583] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.039977] kunit_try_run_case+0x1a5/0x480 [ 13.040204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.040534] kthread+0x337/0x6f0 [ 13.040926] ret_from_fork+0x116/0x1d0 [ 13.041110] ret_from_fork_asm+0x1a/0x30 [ 13.041309] [ 13.041399] The buggy address belongs to the object at ffff888102b92800 [ 13.041399] which belongs to the cache kmalloc-128 of size 128 [ 13.042483] The buggy address is located 5 bytes to the right of [ 13.042483] allocated 115-byte region [ffff888102b92800, ffff888102b92873) [ 13.043357] [ 13.043450] The buggy address belongs to the physical page: [ 13.043876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b92 [ 13.044311] flags: 0x200000000000000(node=0|zone=2) [ 13.044622] page_type: f5(slab) [ 13.045022] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.045436] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.045884] page dumped because: kasan: bad access detected [ 13.046186] [ 13.046436] Memory state around the buggy address: [ 13.046789] ffff888102b92700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.047096] ffff888102b92780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.047389] >ffff888102b92800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.048087] ^ [ 13.048373] ffff888102b92880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.048897] ffff888102b92900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.049320] ================================================================== [ 13.050041] ================================================================== [ 13.050609] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.051170] Read of size 1 at addr ffff888102b9287f by task kunit_try_catch/212 [ 13.051637] [ 13.051777] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.051819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.051830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.051849] Call Trace: [ 13.051862] <TASK> [ 13.051877] dump_stack_lvl+0x73/0xb0 [ 13.051904] print_report+0xd1/0x650 [ 13.051926] ? __virt_addr_valid+0x1db/0x2d0 [ 13.051948] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.051971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.051995] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.052018] kasan_report+0x141/0x180 [ 13.052039] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.052067] __asan_report_load1_noabort+0x18/0x20 [ 13.052091] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.052114] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.052137] ? finish_task_switch.isra.0+0x153/0x700 [ 13.052159] ? __switch_to+0x47/0xf50 [ 13.052183] ? __schedule+0x10cc/0x2b60 [ 13.052204] ? __pfx_read_tsc+0x10/0x10 [ 13.052224] ? ktime_get_ts64+0x86/0x230 [ 13.052247] kunit_try_run_case+0x1a5/0x480 [ 13.052271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.052293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.052316] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.052339] ? __kthread_parkme+0x82/0x180 [ 13.052359] ? preempt_count_sub+0x50/0x80 [ 13.052382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.052405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.052429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.052454] kthread+0x337/0x6f0 [ 13.052472] ? trace_preempt_on+0x20/0xc0 [ 13.052495] ? __pfx_kthread+0x10/0x10 [ 13.052515] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.052536] ? calculate_sigpending+0x7b/0xa0 [ 13.052559] ? __pfx_kthread+0x10/0x10 [ 13.052580] ret_from_fork+0x116/0x1d0 [ 13.052597] ? __pfx_kthread+0x10/0x10 [ 13.052617] ret_from_fork_asm+0x1a/0x30 [ 13.052647] </TASK> [ 13.052842] [ 13.063097] Allocated by task 212: [ 13.063447] kasan_save_stack+0x45/0x70 [ 13.063839] kasan_save_track+0x18/0x40 [ 13.064102] kasan_save_alloc_info+0x3b/0x50 [ 13.064288] __kasan_kmalloc+0xb7/0xc0 [ 13.064463] __kmalloc_cache_noprof+0x189/0x420 [ 13.064885] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.065096] kunit_try_run_case+0x1a5/0x480 [ 13.065289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.065522] kthread+0x337/0x6f0 [ 13.065673] ret_from_fork+0x116/0x1d0 [ 13.066157] ret_from_fork_asm+0x1a/0x30 [ 13.066327] [ 13.066498] The buggy address belongs to the object at ffff888102b92800 [ 13.066498] which belongs to the cache kmalloc-128 of size 128 [ 13.067310] The buggy address is located 12 bytes to the right of [ 13.067310] allocated 115-byte region [ffff888102b92800, ffff888102b92873) [ 13.068061] [ 13.068154] The buggy address belongs to the physical page: [ 13.068381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b92 [ 13.068947] flags: 0x200000000000000(node=0|zone=2) [ 13.069145] page_type: f5(slab) [ 13.069308] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.069823] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.070139] page dumped because: kasan: bad access detected [ 13.070370] [ 13.070450] Memory state around the buggy address: [ 13.070648] ffff888102b92700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.070948] ffff888102b92780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.071256] >ffff888102b92800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.071545] ^ [ 13.072285] ffff888102b92880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.072547] ffff888102b92900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.073045] ==================================================================