Date
July 8, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.596287] ================================================================== [ 19.596336] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.596403] Read of size 1 at addr fff00000c6343e7f by task kunit_try_catch/194 [ 19.596453] [ 19.596480] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.596604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.596631] Hardware name: linux,dummy-virt (DT) [ 19.596661] Call trace: [ 19.596681] show_stack+0x20/0x38 (C) [ 19.596730] dump_stack_lvl+0x8c/0xd0 [ 19.596844] print_report+0x118/0x608 [ 19.596890] kasan_report+0xdc/0x128 [ 19.596934] __asan_report_load1_noabort+0x20/0x30 [ 19.596984] ksize_unpoisons_memory+0x690/0x740 [ 19.597031] kunit_try_run_case+0x170/0x3f0 [ 19.597076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.597129] kthread+0x328/0x630 [ 19.597180] ret_from_fork+0x10/0x20 [ 19.597226] [ 19.597243] Allocated by task 194: [ 19.597269] kasan_save_stack+0x3c/0x68 [ 19.597309] kasan_save_track+0x20/0x40 [ 19.597344] kasan_save_alloc_info+0x40/0x58 [ 19.597386] __kasan_kmalloc+0xd4/0xd8 [ 19.597431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.597471] ksize_unpoisons_memory+0xc0/0x740 [ 19.597507] kunit_try_run_case+0x170/0x3f0 [ 19.597582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.597625] kthread+0x328/0x630 [ 19.597743] ret_from_fork+0x10/0x20 [ 19.597780] [ 19.597798] The buggy address belongs to the object at fff00000c6343e00 [ 19.597798] which belongs to the cache kmalloc-128 of size 128 [ 19.597854] The buggy address is located 12 bytes to the right of [ 19.597854] allocated 115-byte region [fff00000c6343e00, fff00000c6343e73) [ 19.597928] [ 19.597977] The buggy address belongs to the physical page: [ 19.598093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343 [ 19.598212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.598282] page_type: f5(slab) [ 19.598320] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.598369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.598440] page dumped because: kasan: bad access detected [ 19.598471] [ 19.598487] Memory state around the buggy address: [ 19.598519] fff00000c6343d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.598573] fff00000c6343d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.598673] >fff00000c6343e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.598819] ^ [ 19.598861] fff00000c6343e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.598907] fff00000c6343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.599118] ================================================================== [ 19.592558] ================================================================== [ 19.592608] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.592657] Read of size 1 at addr fff00000c6343e78 by task kunit_try_catch/194 [ 19.592890] [ 19.593139] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.593235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.593268] Hardware name: linux,dummy-virt (DT) [ 19.593395] Call trace: [ 19.593479] show_stack+0x20/0x38 (C) [ 19.593542] dump_stack_lvl+0x8c/0xd0 [ 19.593589] print_report+0x118/0x608 [ 19.593638] kasan_report+0xdc/0x128 [ 19.593684] __asan_report_load1_noabort+0x20/0x30 [ 19.593735] ksize_unpoisons_memory+0x618/0x740 [ 19.593789] kunit_try_run_case+0x170/0x3f0 [ 19.593992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.594091] kthread+0x328/0x630 [ 19.594295] ret_from_fork+0x10/0x20 [ 19.594369] [ 19.594387] Allocated by task 194: [ 19.594415] kasan_save_stack+0x3c/0x68 [ 19.594456] kasan_save_track+0x20/0x40 [ 19.594493] kasan_save_alloc_info+0x40/0x58 [ 19.594534] __kasan_kmalloc+0xd4/0xd8 [ 19.594570] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.594607] ksize_unpoisons_memory+0xc0/0x740 [ 19.594646] kunit_try_run_case+0x170/0x3f0 [ 19.594684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.594725] kthread+0x328/0x630 [ 19.594757] ret_from_fork+0x10/0x20 [ 19.594791] [ 19.594810] The buggy address belongs to the object at fff00000c6343e00 [ 19.594810] which belongs to the cache kmalloc-128 of size 128 [ 19.594873] The buggy address is located 5 bytes to the right of [ 19.594873] allocated 115-byte region [fff00000c6343e00, fff00000c6343e73) [ 19.595170] [ 19.595190] The buggy address belongs to the physical page: [ 19.595220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343 [ 19.595273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.595322] page_type: f5(slab) [ 19.595359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.595538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.595584] page dumped because: kasan: bad access detected [ 19.595676] [ 19.595694] Memory state around the buggy address: [ 19.595744] fff00000c6343d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.595786] fff00000c6343d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.595828] >fff00000c6343e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.595868] ^ [ 19.595909] fff00000c6343e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.595950] fff00000c6343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.596001] ================================================================== [ 19.586683] ================================================================== [ 19.586743] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.586794] Read of size 1 at addr fff00000c6343e73 by task kunit_try_catch/194 [ 19.586844] [ 19.586877] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.586964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.586992] Hardware name: linux,dummy-virt (DT) [ 19.587025] Call trace: [ 19.587049] show_stack+0x20/0x38 (C) [ 19.587097] dump_stack_lvl+0x8c/0xd0 [ 19.587143] print_report+0x118/0x608 [ 19.587202] kasan_report+0xdc/0x128 [ 19.587649] __asan_report_load1_noabort+0x20/0x30 [ 19.587723] ksize_unpoisons_memory+0x628/0x740 [ 19.587858] kunit_try_run_case+0x170/0x3f0 [ 19.588117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.588330] kthread+0x328/0x630 [ 19.588404] ret_from_fork+0x10/0x20 [ 19.588520] [ 19.588539] Allocated by task 194: [ 19.588569] kasan_save_stack+0x3c/0x68 [ 19.588640] kasan_save_track+0x20/0x40 [ 19.588697] kasan_save_alloc_info+0x40/0x58 [ 19.588925] __kasan_kmalloc+0xd4/0xd8 [ 19.589203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.589364] ksize_unpoisons_memory+0xc0/0x740 [ 19.589403] kunit_try_run_case+0x170/0x3f0 [ 19.589441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.589495] kthread+0x328/0x630 [ 19.589526] ret_from_fork+0x10/0x20 [ 19.589722] [ 19.589743] The buggy address belongs to the object at fff00000c6343e00 [ 19.589743] which belongs to the cache kmalloc-128 of size 128 [ 19.589988] The buggy address is located 0 bytes to the right of [ 19.589988] allocated 115-byte region [fff00000c6343e00, fff00000c6343e73) [ 19.590054] [ 19.590074] The buggy address belongs to the physical page: [ 19.590233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106343 [ 19.590289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.590336] page_type: f5(slab) [ 19.590374] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.590734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.590807] page dumped because: kasan: bad access detected [ 19.590876] [ 19.590920] Memory state around the buggy address: [ 19.590952] fff00000c6343d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.591037] fff00000c6343d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.591111] >fff00000c6343e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.591205] ^ [ 19.591363] fff00000c6343e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.591418] fff00000c6343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.591458] ==================================================================
[ 12.939456] ================================================================== [ 12.940441] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.941062] Read of size 1 at addr ffff888102662f78 by task kunit_try_catch/212 [ 12.941538] [ 12.941839] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.941970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.941985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.942006] Call Trace: [ 12.942027] <TASK> [ 12.942048] dump_stack_lvl+0x73/0xb0 [ 12.942082] print_report+0xd1/0x650 [ 12.942105] ? __virt_addr_valid+0x1db/0x2d0 [ 12.942128] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.942152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.942174] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.942198] kasan_report+0x141/0x180 [ 12.942220] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.942248] __asan_report_load1_noabort+0x18/0x20 [ 12.942272] ksize_unpoisons_memory+0x7e9/0x9b0 [ 12.942296] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.942319] ? finish_task_switch.isra.0+0x153/0x700 [ 12.942341] ? __switch_to+0x47/0xf50 [ 12.942367] ? __schedule+0x10cc/0x2b60 [ 12.942389] ? __pfx_read_tsc+0x10/0x10 [ 12.942410] ? ktime_get_ts64+0x86/0x230 [ 12.942435] kunit_try_run_case+0x1a5/0x480 [ 12.942460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.942482] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.942695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.942724] ? __kthread_parkme+0x82/0x180 [ 12.942746] ? preempt_count_sub+0x50/0x80 [ 12.942771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.942796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.942821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.942846] kthread+0x337/0x6f0 [ 12.942864] ? trace_preempt_on+0x20/0xc0 [ 12.942888] ? __pfx_kthread+0x10/0x10 [ 12.942908] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.942978] ? calculate_sigpending+0x7b/0xa0 [ 12.943005] ? __pfx_kthread+0x10/0x10 [ 12.943029] ret_from_fork+0x116/0x1d0 [ 12.943047] ? __pfx_kthread+0x10/0x10 [ 12.943067] ret_from_fork_asm+0x1a/0x30 [ 12.943099] </TASK> [ 12.943109] [ 12.956035] Allocated by task 212: [ 12.956202] kasan_save_stack+0x45/0x70 [ 12.956440] kasan_save_track+0x18/0x40 [ 12.956888] kasan_save_alloc_info+0x3b/0x50 [ 12.957272] __kasan_kmalloc+0xb7/0xc0 [ 12.957673] __kmalloc_cache_noprof+0x189/0x420 [ 12.957904] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.958494] kunit_try_run_case+0x1a5/0x480 [ 12.958810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.959243] kthread+0x337/0x6f0 [ 12.959511] ret_from_fork+0x116/0x1d0 [ 12.959699] ret_from_fork_asm+0x1a/0x30 [ 12.959897] [ 12.960271] The buggy address belongs to the object at ffff888102662f00 [ 12.960271] which belongs to the cache kmalloc-128 of size 128 [ 12.960895] The buggy address is located 5 bytes to the right of [ 12.960895] allocated 115-byte region [ffff888102662f00, ffff888102662f73) [ 12.961551] [ 12.961886] The buggy address belongs to the physical page: [ 12.962273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 12.962870] flags: 0x200000000000000(node=0|zone=2) [ 12.963308] page_type: f5(slab) [ 12.963466] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.963924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.964278] page dumped because: kasan: bad access detected [ 12.964638] [ 12.964742] Memory state around the buggy address: [ 12.964901] ffff888102662e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.965219] ffff888102662e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.965849] >ffff888102662f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.966365] ^ [ 12.967124] ffff888102662f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.967542] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.968021] ================================================================== [ 12.909420] ================================================================== [ 12.910380] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 12.910774] Read of size 1 at addr ffff888102662f73 by task kunit_try_catch/212 [ 12.911148] [ 12.911271] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.911317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.911328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.911348] Call Trace: [ 12.911361] <TASK> [ 12.911378] dump_stack_lvl+0x73/0xb0 [ 12.911409] print_report+0xd1/0x650 [ 12.911432] ? __virt_addr_valid+0x1db/0x2d0 [ 12.911455] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.911611] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.911635] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.911659] kasan_report+0x141/0x180 [ 12.911680] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 12.911710] __asan_report_load1_noabort+0x18/0x20 [ 12.911735] ksize_unpoisons_memory+0x81c/0x9b0 [ 12.911759] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.911781] ? finish_task_switch.isra.0+0x153/0x700 [ 12.911805] ? __switch_to+0x47/0xf50 [ 12.911832] ? __schedule+0x10cc/0x2b60 [ 12.911855] ? __pfx_read_tsc+0x10/0x10 [ 12.911876] ? ktime_get_ts64+0x86/0x230 [ 12.911900] kunit_try_run_case+0x1a5/0x480 [ 12.911980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.912007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.912032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.912055] ? __kthread_parkme+0x82/0x180 [ 12.912076] ? preempt_count_sub+0x50/0x80 [ 12.912099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.912123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.912148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.912173] kthread+0x337/0x6f0 [ 12.912191] ? trace_preempt_on+0x20/0xc0 [ 12.912215] ? __pfx_kthread+0x10/0x10 [ 12.912236] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.912257] ? calculate_sigpending+0x7b/0xa0 [ 12.912281] ? __pfx_kthread+0x10/0x10 [ 12.912302] ret_from_fork+0x116/0x1d0 [ 12.912320] ? __pfx_kthread+0x10/0x10 [ 12.912341] ret_from_fork_asm+0x1a/0x30 [ 12.912372] </TASK> [ 12.912383] [ 12.924017] Allocated by task 212: [ 12.924410] kasan_save_stack+0x45/0x70 [ 12.924656] kasan_save_track+0x18/0x40 [ 12.925038] kasan_save_alloc_info+0x3b/0x50 [ 12.925256] __kasan_kmalloc+0xb7/0xc0 [ 12.925443] __kmalloc_cache_noprof+0x189/0x420 [ 12.925951] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.926435] kunit_try_run_case+0x1a5/0x480 [ 12.926759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.927216] kthread+0x337/0x6f0 [ 12.927349] ret_from_fork+0x116/0x1d0 [ 12.927703] ret_from_fork_asm+0x1a/0x30 [ 12.928034] [ 12.928141] The buggy address belongs to the object at ffff888102662f00 [ 12.928141] which belongs to the cache kmalloc-128 of size 128 [ 12.928928] The buggy address is located 0 bytes to the right of [ 12.928928] allocated 115-byte region [ffff888102662f00, ffff888102662f73) [ 12.929801] [ 12.929908] The buggy address belongs to the physical page: [ 12.930366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 12.930941] flags: 0x200000000000000(node=0|zone=2) [ 12.931347] page_type: f5(slab) [ 12.931674] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.932282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.932765] page dumped because: kasan: bad access detected [ 12.933132] [ 12.933231] Memory state around the buggy address: [ 12.933435] ffff888102662e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.934148] ffff888102662e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.934825] >ffff888102662f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.936261] ^ [ 12.936715] ffff888102662f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.937411] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.938350] ================================================================== [ 12.969560] ================================================================== [ 12.969918] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.970511] Read of size 1 at addr ffff888102662f7f by task kunit_try_catch/212 [ 12.971090] [ 12.971206] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.971251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.971262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.971283] Call Trace: [ 12.971301] <TASK> [ 12.971319] dump_stack_lvl+0x73/0xb0 [ 12.971351] print_report+0xd1/0x650 [ 12.971374] ? __virt_addr_valid+0x1db/0x2d0 [ 12.971397] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.971420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.971442] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.971466] kasan_report+0x141/0x180 [ 12.971487] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.971968] __asan_report_load1_noabort+0x18/0x20 [ 12.972001] ksize_unpoisons_memory+0x7b6/0x9b0 [ 12.972027] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 12.972051] ? finish_task_switch.isra.0+0x153/0x700 [ 12.972073] ? __switch_to+0x47/0xf50 [ 12.972099] ? __schedule+0x10cc/0x2b60 [ 12.972121] ? __pfx_read_tsc+0x10/0x10 [ 12.972142] ? ktime_get_ts64+0x86/0x230 [ 12.972167] kunit_try_run_case+0x1a5/0x480 [ 12.972192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.972214] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.972238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.972263] ? __kthread_parkme+0x82/0x180 [ 12.972283] ? preempt_count_sub+0x50/0x80 [ 12.972306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.972330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.972355] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.972379] kthread+0x337/0x6f0 [ 12.972397] ? trace_preempt_on+0x20/0xc0 [ 12.972421] ? __pfx_kthread+0x10/0x10 [ 12.972441] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.972462] ? calculate_sigpending+0x7b/0xa0 [ 12.972487] ? __pfx_kthread+0x10/0x10 [ 12.972508] ret_from_fork+0x116/0x1d0 [ 12.972537] ? __pfx_kthread+0x10/0x10 [ 12.972557] ret_from_fork_asm+0x1a/0x30 [ 12.972614] </TASK> [ 12.972624] [ 12.983591] Allocated by task 212: [ 12.983747] kasan_save_stack+0x45/0x70 [ 12.984190] kasan_save_track+0x18/0x40 [ 12.984374] kasan_save_alloc_info+0x3b/0x50 [ 12.984797] __kasan_kmalloc+0xb7/0xc0 [ 12.985072] __kmalloc_cache_noprof+0x189/0x420 [ 12.985367] ksize_unpoisons_memory+0xc7/0x9b0 [ 12.985678] kunit_try_run_case+0x1a5/0x480 [ 12.986034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.986350] kthread+0x337/0x6f0 [ 12.986618] ret_from_fork+0x116/0x1d0 [ 12.986811] ret_from_fork_asm+0x1a/0x30 [ 12.987279] [ 12.987377] The buggy address belongs to the object at ffff888102662f00 [ 12.987377] which belongs to the cache kmalloc-128 of size 128 [ 12.988180] The buggy address is located 12 bytes to the right of [ 12.988180] allocated 115-byte region [ffff888102662f00, ffff888102662f73) [ 12.988756] [ 12.988985] The buggy address belongs to the physical page: [ 12.989338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 12.989791] flags: 0x200000000000000(node=0|zone=2) [ 12.990154] page_type: f5(slab) [ 12.990284] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.990778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.991273] page dumped because: kasan: bad access detected [ 12.991534] [ 12.991620] Memory state around the buggy address: [ 12.991820] ffff888102662e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.992193] ffff888102662e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.992490] >ffff888102662f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.992780] ^ [ 12.993066] ffff888102662f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.993358] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.994174] ==================================================================